💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › PHUK › phuk_01.txt captured on 2022-06-12 at 14:00:14.

View Raw

More Information

-=-=-=-=-=-=-

=============================================================================

   		PHUK MAGAZINE - Phile 0 of 10

=============================================================================



Welcome to the very first issue of P/H-UK magazine, an ezine for the

Hackers & Phreakers in the United Kingdom. In case you can't work it

out, P/H-UK stands for Phreak/Hack-United Kingdom, and having pointed

that out I promise to never mention it again!. This issue is a little

lame and a little thin, the way most h/p zines are at first, but we

hope that PHUK will grow with time and become a bit more substantial.



This issue we have some goodies, especially the chunk of the BT

computer security manual, a piece by Otaku on Defcon ][, some

circuitry from TheGoat, and a nice piece of history courtesy (!) of

New Scientist circa 1973.



Anyway, without further ado, lets go on to the contents ..



PS: THIS IS A BETA COPY OF PHUK#1 ..... NO RESPONSIBILITY CAN BE HELD

FOR ANY AND ALL SPELLING AND GRAMMATICAL ERRORS THAT OCCUR IN THIS

TFILE ----  the rest of it is down to us and the normal disclaimers

apply ... i.e. don't use this info to phuk with the system, just

read and enjoy (heheheh).



=============================================================================

   		P / H - U - K -- C O N T E N T S

=============================================================================

0: INTRO: You're reading it!

-----------------------------------------------------------------------------

1: EDITORIAL: Channel 4 Documentaries SUCK!

-----------------------------------------------------------------------------

2: NEWSBYTES: UK News

-----------------------------------------------------------------------------

3: HISTORY: New Scientist 1973

-----------------------------------------------------------------------------

4: DEFCON II - Otaku

-----------------------------------------------------------------------------

5: ANSWERPHONE: The Panasonic KX-T1446BE

-----------------------------------------------------------------------------

6: CIRCUIT: Simple Line Monitor - TheGoat

-----------------------------------------------------------------------------

7: NO GIFT FROM HALLMARK - DrKaos

-----------------------------------------------------------------------------

8: BT Computer Security Manual - Mrs. Brady of Doncaster

-----------------------------------------------------------------------------

9: Notes & Queries: A question & Answer Forum

-----------------------------------------------------------------------------

10: OUTRO: Next Issue .... we hope!!

-----------------------------------------------------------------------------

=============================================================================

   		PHUK MAGAZINE - Phile 1 of 10

=============================================================================



		-----------------------------------------

   		CHANNEL FOUR DOCUMENTARIES SUCK - Phuk-Ed

		-----------------------------------------



That recent documentary on channel four sucked. Just what we needed

was some stupid media c*nts telling the entire world that we were all

boxing throught Hawaii Bell. For some strange reason this line died

very soon after the documentary .... are we surprised? I think not.

At the same time horror stories about people being charged for boxed

calls through 0800 numbers began to circulate, stories of beeing fed

straight into overseas operators when using Country Direct numbers,

along with a whole slew of paranoia, which may or may not just be

disinformation designed to discourage boxing in th UK.



For example, I recently leeched a tfile from a UK bbs that claimed

that from 10-02-94 BT have been monitoring all free phone numbers

from the base in Blackpool, and that the information is also going to

the BT investigations dept at Milton Keynes. The person writing the

tfile claims to be a contracter linked to BT, and that Channel 4

had contacted BT before the documentary was screened and that this

resulted in the circulation of a confidential memo was sent

to all system & exchange managers asking what steps can be taken.

Apparently suggestions ranged from "put filters on the line", via 

"link all 0800 calls to a billing machine" to "change all the

numbers". Well the many of the numbers HAVE changed, and even the

merest hint that all 0800 calls are getting routed into a computer

and analysed to check if they are legitimate data/voice/fax calls

is enough to give any phreak the willies! He also claims that "any

questions can be directed to bt internal investigations on

0800-890-999, ask for extension 131". [Does anyone know if this

number is really the BT investigations unit??]. We do not need this

type of paranoia, and all because of one stupid documentary!



The documentary itself was pathetic. Programming your computers to do

continuous directory listings might look good to the media vampires,

but to anyone with any computer literacy it just looks stupid.

Showing the two anonymous hackers inside a Brighton phone box with

what must have been the BIGGEST tape machine you could possible carry

(can't show Walkmans can we now guys!) while boxing using a tape was

hilarious. Showing them dial up an American sex line while they were

saying in essence that this is a line for all the sad computers spods

who can't get a girlfriend, was a joke. The whole chunk of credit

card fraud at the end, bleeped as if they were giving away vital

information, (of course no-one knew about credit card fraud before!)

was a useful ploy used by the documentary to discredit hackers (look

middle classes, your credit is under attack ... better lock those

hackers up quick!!).



This documentary should act as a warning to any hackers who might

consider getting involved with the media in any way. They can, and

WILL distort what you say by selective editing and voiceovers. They

can and WILL sensationalise hacking in an attempt to increase ratings

and thus advertising revenue. Luckily at least one person in the

known universe is trying to put together a film that shows hackers

and phreakers in a more favourable light ... and we here at PHUK

magazine wish her the best of luck!





Phuk-Ed.



+++

EOF=============================================================================

   		PHUK MAGAZINE - Phile 2 of 10

=============================================================================



				------------

	   			UK NEWSBYTES

				------------



-- PHONE DAY



   Phone Day is almost upon us! Well, not quite, its on the 16th of

April 1995, but judging by the, amount of energy BT is putting into

the big event the public are meant to absorb this information by some

weird sort of osmosis ....  and now us phone phreaks are telling them

all about it instead of BT! Certainly all of Joe public I have spoken

to treat phone day as some sort of publicity stunt, like Give Up

Smoking week, where you are encouraged to use the phone more on Phone

Day. When it is explained that Phone Day is the day that all the

dailing codes change the response is mixed, ranging from "why would

they do that", to "Oh No, not again!", from people who remember the

great day when London split its codes into 2 zones (071 & 081), and

the amount of hassle it caused them! Funny enough I found an old BT

card explaining the LAST change in codes marked "BT - It's you we

answer to" .... hmmm guess thats why you still charge in UNITS

instead of seconds huh guys!



   Of course companies offering Phone Day services have sprung up ..

they will update all your databases ... at a price!! In actual fact

the new codes have been with us for some months, and it has been

possible to use the new London codes (0171 & 0181) for a while now.

In case you can't remember (!), Phone Day means that all codes

starting with 0 will now start 01, and Leeds, Sheffield, Nottingham

Leicester and Bristol all get new codes (I won't bore you with the

numbers!).





-- CALLER RETURN / CALLER ID



   Of course the BIG story of the month should have been the

introduction of caller return and caller ID on the 5th of November

.... here's what the SUN newspaper had to say about it on the 28th of

October ... (When I first wrote this of course I said 'by the time

you read this .....').



+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



[from the SUN Newspaper, 28-10-94]



BT cures hang-ups for free



   People who rush to answer the phone just as it stops ringing will

be able to find out who called thanks to a free BT service unveiled

yesterday.

   From Novemeber the 5th, frustrated customers can dial a code and

listen to a recorded message telling them who was the last to call

them.

   BT says the number of return calls will cost the cover of the

service.

   The firm is also introducing "Caller Display" which allows people

to see the number of the person calling before they answer.



+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



   Once again the actual service has been around for a while in some

areas, just not "switched on". So if I dial 141, to block CI/CR, I

get a message "Sorry, you have dialled an incorect service code,

please replace the handset and consult your instructions". Similarly,

dialing 1471 gets the message "Sorry no telephone number is stored".

BUT when I phoned the BT helpline (0800-80-1471) to ask about costs,

I was told (incorrectly) that Caller Return would cost 3.99 per

month, and that Caller Display would cost an "unspecified amount"

plus the cost or rental of the equipment. Funny thing was though,

that when the helpful young BT chap asked me for my area code "for

his database" and then repeated the number back he got it wrong!!!



   What is really cool is that Joe Public HAS woken up to the

problems this might cause, hence the following article from the

Guardian, 4th November 1994.



+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



[from the GUARDIAN Newspaper, 04-11-94]



BT forced to delay service identifying callers



   British Telecom has been forced to postpone the launch of two

services which reveal a caller's number - because the public is not

yet aware of the risks involved.

   Civil Liberties lobbies have been concerned about privacy,

pointing out that a doctor, for examle, ringing a patient from home

would not want to disclose his private number. And ex-directory

numbers will be identifiable unless customers opt to retain anonymity.

   BT, which has already spent several million pounds promoting the

services and warning that numbers could easily be identified, has had

to increase its budget for an extra two week campaign of newspaper

and televsion advertisments.

   The services, Call Return and Caller Display, will now come into

operation on midnight on November 21, rather than tomorrow. This

follows recent discussions between BT and Oftel, the industry

regulator, which insisted that the public must be fully informed

beforehand.

   A BT spokesman said that the group was disappointed at the lack of

awareness in view of its advertising.

   Call Return enables a phone owner to identify the number of the

last caller, by dialling a short code. Subscribers to Caller Display

will have a phone or box that shows the number of an incoming call on

a screen.

   BT has built in two safeguards. Customers can have the calling

line identification (CLI) signa on all outgoing signals automatically

blocked, or they can block the signal on individual calls by dialling

141 before the number. However the CLI signal will be available to

BT's malicious calls units. [no shit!! and WHO else can get it!]

   Many with ex-directory numbers (15 percent of personal customer)

believe that their numbers should be protected automatically.



+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



   Methinks, we have not heard the last of this .......



	..... and indeed we hadn't! after "WatchDog" had a good go at

BT over CR/CD the service didn't start until November 22nd, as

planned. However, once again everything was put in place some time

before, allowing us to play with the service, which came into force

around 18:00 that day. CR does pass unlisted numbers across the lines,

but we haven't been able to test whether it passes ex-directory or

not. Blocking seems to work as advertised, and cell-phone numbers are

also not passed along. What worries me, however, is that on several

occasions after recieving a call from what I knew to be a listed

number, and from people who I wouldn't call phreaks and use the 141

blocking code, were not stored for my use :( Watch this space for

updates!



-- INTERNET MANIA



   Anyone who hasn't heard of the Internet these days must be blind,

deaf, half-asleep or all three. With the introduction of a Guardian

ONLINE section, the bbc getting their own email address ..(yes!! you

can email the broom cupboard!), the opening of London's first

fully fledged, and much hyped "CyberCafe", and the publication of

not one but 2 expensive glossies (Internet & Comms, and .net),

everyone and his dog will have an internet account by the year 2000

(well, if we don't run out of addresses first!).



	However, at a minimum 1.50 UKP per half hour for the privilege

of having coffee, danish & WWW, we here at PHUK magazine feel that

Cyberia might be spending some of their hard earned (!!) profits on an

internet security expert before too long :)



+++

	That's all for this ish, don't forget, NEWSBYTE exists on

contributions from its readers, so send your snippets, comments etc to

PHUK magazine at anon19143@anon.penet.fi, where we will do our best to

include them in the next issue.



-- BT HACKER :)



	OK, boring, but I couldn't resist commenting! Calling the BT

contractor who stole the queen's phone number a HACKER is a joke!! But

then the Independant wouldn't have sold so many papers with the

headline "Sub-Contactor Breaks Confidentiality Agreement" would it?



+++

EOF=============================================================================

   		PHUK MAGAZINE - Phile 3 of 10

=============================================================================



			---------------------------

   			HISTORY: New Scientist 1973

			---------------------------



This issue's HISTORY section has an article published in the New

Scientist on the 13th December 1973 in the wake of the Old Bailey

trial. The article made the front page, running under the headline

"Are phone phreaks just telephone addicts?". Anything in square

brackets is mine, the rest comes straight from the magazine page to

you ... Enjoy & Have phun! - Phuk-Ed



--

[headline]



   			Are telephones addictive?

[intro]



Nine "phone phreaks" were acquitted last month after a seven-week

trial at the Old Bailey. The trial gave considerable publicity to teh

techniques used by a small and determined group of intellectuals with

a compulsive desire to know the telephone system inside out.



[start]



When Post Office invesigators raided a Hammersmith, London flat in

October 1972, the found a "phone phreaks" conference in progress with

large quantities of telephone equipment, a computer printout listing

supposedly secret Post Office codes, and devices for making calls. A

Post Office installed monitoring device showed that one man had spent

much of the day experimenting with one of London's international

exchanges.



Nineteen men went on trial on 3 October at the Old Bailey. With

advance promises of nominal fines, 10 pleaded guilty - one to

actually making calls, the others to conspiracy. Fines ranged from 50

to 100 [pounds]. The other nine stood trial for conspiracy to defraud

the telephone system. On 13 November, all were acquitted, in a trial

estimated to have cost more than 100,000 [pounds].



Most were men in their 20s holding university degrees, primarily from

Oxford, Cambridge and London. Their interest had begun in student

days, usually from reading standard texts such as Atkinson's Telphony

and moving on to the Post Office Electrical Engineers Journal.

Experiments by exhuastive dialing on local networks followed. Soon

the exhausted the possibilities of dialing and moved on to electronic

aids. Their attitude was neatly summarised by the trial judge Neil

McKinnon, QC, when he commented: "Some take to heroin, some take to

telephones." He, too, entered into the spirit of the thing and asked

for the codes used in his own local exchange in south London.



Like scientists conducting experiments, the phone phreaks report

results to one another. And they take a perverse delight in writing

to the Post Office to explain new and previously undetected ways to

beat the telephone system - often the Post Office does not believe

these suggestions until much later. The penetration of the Post

Office's secrets has been massive. The investigation that led to the

recent trial was apparently triggered by the discovery that for some

years the Cambridge University Titan computer had held complete and

laboriously compiled files detailing the entire trunk and local

network system



[caption]



Imitate control signals



[start]



In general, telephone enthusiasts (as the court genteely put it) work

by imitating the control signals that the telephone system must have.

he signals tell an exchange, for example, that a call is coming from

another exchange, or that a subscriber has hung up, or that a call

has been answered and that charging should begin. On long distance

trunk circuits the signals are withing the normal telephone speech

bandwidth (30 Hz - 3 kHz), and the UK Post Office uses pulses of

single frequency - 2.28 kHz, As the signalling must take place on the

line which will be used for the call, there is no way that the Post

Office can prevent anyone from imitating the codes. Usually they use

a "bleeper" which puts the tone onto the line with an accoustic

coupler, similar to that used for portable computer terminals.

Details of using a bleeper to make international calls are given in

the box.



[start sub-box]



[photograph with caption]



Typical phone phreaking equipment. Rear right - an older style AC9

simulator (bleeper) with a telephone dial. Front, a newer AC9

simulator, with an accoustic coupler (an ordinary telephone

earpiece). Rear left - a multifrequency simulator. A print-out of

telephone codes lies under the equipment.



[basically thats what the photo shows ... this stuff is OLD and

clunky looking though!]



[end sub-box]



In the last few years, the Post Office has begun the introduction of

the Trunk Transit Network to effect speedier transit of information.

Where the normal system uses pulses of 2.28 kHz to represent numbers

(1 pulse for 1, 2 for 2, etc, just like a telephone dial), the new

Multifrequcny system (MF2) has six different tones, and uses two at a

time, permitting 15 possible combinations (10 numbers and 5 control

signals). Thus, where the 0 required 10 pulses, it now only requires

1. The Post Office hopes to introduce full nationwide STD using this

technique by 1980. This goal was achieved in the USA and many

European countries some years ago. Generating the six tones required

in the UK is more complex than tha traditional 2.28 kHz, and involves

a six-frequency generator. Because many countries have their own sets

of tones, the international phone phreak will need a set of bleepers.

One presented in evidence at the trial was very elaborate, being

capable of simulating seven different signalling sytems. Nicknamed

the Mighty Wurlitzer, it was rumoured to cost 200 [pounds] to build.

The Post Office offered 20 [pounds] for it.



As new MF2 centres are added to the network - Newcastle, Hull and

Bradford last month - the Post Office is reportedly intensly worried

about the vulnerability of MF2. It is perhaps typical that the Post

Office were initially complacent, and did not believe the Cambridge

undergrad who some years ago told them that MF2 could be beaten.



One defendant revealed that he and others had written a set of

letters to the Post Office explaining flaws in the system. His most

recent contribution - a dialling sequence known as 9-1-11 which would

give irregular STD service from small country exchanges - was

haughtlyi rejected by a Post Office expert with "it couldn't

theoretically work".



[begin sub-box]



[caption]



Bleeping around the world



[start]



At the trial, the Post Office gave a demonstration of how

international calls might be made, using a bleeper. The telephone

enthusiast first dials an STD call to a destination which will be

charged at local rate - from London to Badger's Mount just north of

Sevenoaks will do. This call is routed automatically through the

london STD centre and the trunk exchange in sevenoaks. When the call

(which is made to a number known to be spare) had gone through, he

sends the "clear forward" signal which tells Badger's Mount that the

call is finished. Because the enthusiast's telephone is still off the

hook, the London equipment believes that the call to be still in

progress. The result is an open line going as far as the Sevenoaks

trunk exchange.



He then sends to Sevenoaks a signal known as "seize" which wakes up

the Sevenoaks end. He could then send the digit "1" which will put

him on the outgoing trunks from Sevenoaks. By dialling the secret

trunk codes or routings, he can then dial freely through the trunk

network. He could dial to Tunbridge Wells (code 15) and through it to

Cardiff (65) and London International (112). At this point, by using

other tones, he could if he wished experiment in any part of the

world.



Unlike STD codes, the trunk codes are not the same throughout the

country - to get from Reading to Tunbridge the code would be 35

rather than 15. Thus the enthusiasts have built up massive files of

trunk codes, often produced on computer printouts.



Knowing the codes, however, does little good because they cannot

simply be dialled - extra equipment is required. The clicks that an

ordinary telephone dial sends down the line are reallt DC pulses, 67

millisec (ms) long, send at the rate of 10 per second. Long distance

trunk circuits cannot handle DC, so the exchange automatically

converts these to eually long pulses of 2.28 kHz. This signalling

system is known as AC9. Having already passed the local exchange, the

phone phreak must produce his own 2.28 kHz signals. Some people are

actuially able to whistle the correct tone, but most phone phreaks

use some sort of electronic simulator - usually called a bleeper -

made up of a tone generator and a telephone dial or more complex push

button system. The device must also produce at least one other signal

- the Clear Forward which is 700 ms of 2.28 kHz. The seize signal is

simply a "1".



One of the effects of the clear forward signal is to accidentally

generate another signal which starts the equipment in London charging

for the call. Thus, the user of a bleeper is then paying for the call

whether or not he ever completes it. But the charge is always for a

call to the first exchange dialed (London always thinks that the call

is to Badger's Mount) so the bleeper user always starts with a call

to the local exchange to keep the cost down.



The legal question enters at this point - the effect of the recent

acquittal would appear to be that using a bleeper is not illegal

unless a call is actually completed, in which case the phone phreak

is getting a long distance call at local rates. Simple possesion of

bleepers themselves is apparently not illegal, although the Post

Office has the right to disconnect the phone of anyone who uses one



[there is a diagram accompanying this sub-box which just uses a box

and arrow type diagram showing the relationships between the

different exchanges discussed in para 2]



[end sub-box]



[caption]



Dial direct



[start]



There is a second major way for the telephone enthusiasts to get into

the PO network. As described here recently (vol 58, pg 23), some

engineers had covertly installed their own unauthorised links. As

these individuals had ample opportunity to discover the secrets of

the telephone network, the only purpose of such circuits could be

fraud, as was shown in the recent prosecution of a Bristol engineer

who operated an Air Charter compnay on the side. Several other

accesses arose accidentaly, caused by careless or sloppy design. Thei

utility to telephone enthusiasts had resulted in a large scale hunt

for them. A list of these trunk accesses was eventually passed to the

Post Office. Nevertheless, suggestions of "sabotage from within" are

hotly denied by the Post Office. But a recent example is an

"engineers fiddle" fitted to the Chiswick exchange. It allowed North

London Post Office staff who knew about it to make free STD calls,

quite illegally from phones all over London. By dialling 995 for

Chiswick, then 47, then any four digits to "unlock" the circuit

(since someone, perhaps even an investigator, might stumble on 995-47

by accident), they would be enabled to dial free calls. This money

saving device disappeared earlier this year, when the code became

needed for new subscribers on that exchange and the engineer had to

take it out.



Two devices to avoid payment were displayed at the trial. One, known

simply as a black box or non-charge facility, is simply a battery and

two simple components that can be fitted to any telephone and prevent

the exchange from realising that the called telephone has been

answered - thus no charge is made to the caller.



The other was more amusing - a 2p piece on a length of thread. Its

student owner had not known that it could be used for telephones, but

a zealous executive engineer studied the problem and showed the court

how, with a little legerdemain, it could be retrieved from the reject

slot of the coin box.



[caption]



Telephone tapping?



As might be expected in Watergate year, allegations of telephone

tapping were well to the fore, and several Post Office methods were

exposed. The first, and simplest, is a printermeter, which makes an

automatic record of whom you call, for how long, and the exact time

and date of the call. The second is the misuse of special test

circuits to listen in to any call. The operator or monitor merely has

to dial you number on these special circuits, and listen for as long

as he likes. The intended use of such circuits is to interrupt a call

to tell you that someone is trying to call you from abroad, for

instance.



The third is the euphemistically named "Call Check Circuit" - this

can be attached to any phone in the country - and is undetectable. It

can be used with a tape recorder to record all incoming and outgoing

calls. Identifiable only by the type number painted on it, 60345, it

is now fitted as standard equipment.



[start sub-box]



[photograph with caption]



The Post Office goes to great, but unsuccessful lengths to keep its

secrets. The centre door (31-32 High Holborn) is the unmarked

entrance to the Kingsway exchange, London's largest trunk exchange,

located in two deep bomb shelters under Chancery Lane underground

station.



[end sub-box]



The British Post Office is not the only organisation with pranksters

prowling through their system. In the USA, the vast telephone network

has been blighted for some time by the phenomenon. For technical

reasons, the Bell system is far more open to the possessor of a Blue

Box, as a bleeper is called across the Atlantic. Forty years ago,

world telephone technologies diverged. The Bell system, which owns

almost all of North America;s 140 million telephones, started to use

the crossbar system, while Britain stuck with the Strowger method,

invented by a Kansas City undertaker in the 1890s. The effect of the

crossbar on the trunk network was to enable the same codes that are

used for the nationwide dialling system to be used for the internal

codes of the system, resulting in far greater reliability and faster

operation. It also uses a multifrequency signalling system, using

frequencies between 700 Hz and 1700 Hz. Because of the identical code

usage, US phreaks are sparedn the hard work of compiling and using

special trunk codes as in Britain.



The phreaks first appeared on the US scene in the early 1960s when a

group of MIT students were found to have conducted a late night

dialling experiment on the Defense Department's secret network. They

were rewarded with jobs when they explained their system to Bell

investigators. The attitude was a little different a few years later

when blind Joe Engressia, sometimes acclaimed as the "King of the

Phone Phreaks", was discovered merrily whistling down the line to fix

up free calls around the world for his school friends. As a result of

his widely-publicised prosecution, many individuals who had been

working in teh dark, alone, across the continent rang in to Blind

Joe. The new technology spread rapidly through the underground, and

names like Captain Crunch and Midnight Stalker became commonplace on

illegaly procured trunks. The name "phone phreak" identified the

enthusiasts with the common underground usage of freak as someone who

was cool and used drugs.



Since then, the telephone system has been a battleground between the

phreaks and the Telcos (as the telephone companies nickname themselves).

Abbie Hoffman's Yippies, the Youth International Party, gave birth to

a phreak division whose monthly, The Party Line, publishes details of

the latest and best Anti-Telco hardware. It has recently diversified

into using high-power magnets on parking meters in order to stay

longer, cheaper. In June 1972, Ramparts carried a set of instructions

on how to build the Black Box, or non-charge facility.



In the US, phreaking is receiving increasing publicity, and the

annual conference held on 8 September at a major New York hotel was

given wide press coverage. Unveiled at that meeting was the Red Box -

an electronic device that simulates tone pulses sent to an operator

when money is put into a coin box.



From the Telcos this year comes their effort to keep up, the Model

51A Dialled Digit recorder. It costs $3500. For a further $1000 the

MF option can be fitted, and with another $100 for the 67A extender,

the telephone company can have a recorder which will record no less

than four different types of signalling: a match to the Mighty

Wurlitzer.



[begin sub-box]



[caption]



An Old Bailey anniversary



This year is the 20th anniversary of another Old Bailey telephone

conspiracy trial. In that year, a Mayfair chemical company director

and two friends were accused of making automatic trunk calls around

Britain - almost ten years before STD was introduced. And all for a

single charge of an old penny.



Their method was known as the Toll A drop-back, named after Toll A,

an exchange near St Paul's which routes calls between London and

nearby non-London exchanges. The trick was to dial a number, such as

Dartford 21111, which was then not allocated. Then, the reciever rest

would be "flashed" (depressed for 1/2 a second). This would act in a

similar way to the "clear forward" on the a.c. system. The caller

would be left with an open line into the Toll A exchange.



The user could then dial a code, 018, which would take him on to what

was then the first trunk (long distance) exchange in Britain. Once

again with a list of trunk codes which he could have compiled by

experimentation, he could dial around Britain. The advantages of

these methods in 1953 was immense. The delays on trunk calls through

the trunk operator could often be several hours, and the quality very

poor.



The method is still available. One of the defendannts in last month's

trial was alleged to have made experiments by using a Toll A dropback.

He had dialled Caterham 41111, a number not in use. Then by flashing,

he could dial through the Toll A exchange, and out through exchanges

around London to some point where he would be able to dial up onto

the trunk network.



In May, a London chemistry student pleaded guilty to making calls to

he US utilising Toll A dropback via exchanges in Surrey where trunk

accesses had been fitted at the time. he was fined 70 [pounds] plus

10 [pounds] costs and ordered to pay the Post Office 350 [pounds] for

lost revenue.



[end sub-box]



[Phew! I am knackered after typing that in! but I hoped you enjoyed

it! Nice to know that the Red Box has come of age ... being 21 years

old this year! I actually met one of these defendants at this trial

at a 2600 meeting last year. A few questions though ... WHERE are the

Call Check Circuit marked 60345 installed??? In a junction? a DP? In

you house??? and WHY can't BT be as complacent as the Post Office are

reported to have been? - Phuk-Ed]



+++

EOF=============================================================================

   		PHUK MAGAZINE - Phile 4 of 10

=============================================================================



		----------------------------------------

		DEFCON ][ , Las Vegas, July 1994 - Otaku

		----------------------------------------



Since I have been nagged to write a space filling article for this

inaugural issue of PHUK, here are some person observations about the

DEFCON ][ conference held this summer.



Unlike Winn Schwartau, I am not a writer/lecturer on security issues,

but those of you who want another view  of what went on at DEFCON ][

should read his account "Cyber-Christ  meets Lady Luck" in PHRACK 46 ,

file 19.



In January 1994, before I had decided to go to DEFCON ][, I saw an

article in alt.2600 from a journalist wanting to meet "hacker/phreaker

types". I suggested that he go to DEFCON ][ in July and perhaps report

as follows (looking back, I must have been psychic, because some

things happened just as predicted !):



>Judging by the press coverage of last year's HEU event in the Netherlands,

>someone needs to educate the media/government, perhaps you can help. 



>Here are some suggestions 8-)



>Unlike the HEU event, you should be able to write your story from the

>comfort of an air conditioned bar. Editors too old fashioned to

>believe the authenticity of email might be convinced by a creatively

>constructed expenses claim for bar room interviews of "sources".



>With Las Vegas as a background, you can pique your editors interest with

>quotes from Hunter S. Thompson's "Fear and Loathing in Las Vegas"

>Go on to draw attention to the similarity of the physical look and atmosphere

>of Las Vegas at night and most of the literary visions of Cyberspace from the

>likes of William Gibson ("Neuromancer") and Neal Stephenson ("Snow Crash").

>Since you are in the desert, you could even drag in references to Wild Palms.

>(Culture & technology)



Winn Schwartau mentions Hunter S.Thompson in his article, so perhaps I had

the right idea !



>If you can tag along with the right people, you will no doubt visit all

>the sights of Vegas. See if you can persuade someone with a cell phone scanner

>to show you how to track the call girls being despatched to the

>various hotels.

>(Sex and technology)



The call girl/cell phone stuff was done:  a couple of potential

customers were warned off by "the voice of God" breaking in on their

cell phone conversation and warning that it was a police setup. At

least one drug deal was also scotched in a similar manner.



>This could lead you nicely on to the other Vegas cliches of pondering the

>enormous amount of money flowing about the place and all the computer

>and telecomms technology used to provide the infrastructure to the casinos.

>Recount the stories of the computer assisted Blackjack hackers.

>(Money & technology)



>No doubt there should be various law enforcment types lurking about.

>Ask them about the Steve Jackson affair and about Phiber Optik.

>(Legal issues & technology)





I heard that an approach had been made to one of the delegates, asking

if he could "hack into the the Sands Casino Baccarat high-rollers

list". Since this game accounts for more than half the profits of a

casino, the few mega-rich gamblers who choose to lose at baccarat are

feted with free rooms, food, drink, women etc. A suitablly impressive

looking data file was constructed, and Gail Thackery's name was put on

it. She was a guest speaker, and also the District Attorney who was

involved in the farcical Operation Sundevil affair involving Steve

Jackson games.



>Ask people about PGP. Compare and contrast the arguments about freedom,

>privacy and strong public key encryption from the Cypherpunks, to the right

>to bear arms arguments of the NRA. Ask what Bill Clinton and Al Gore are up

>to with the Clipper chip proposal. Will access to the new Digital Superhighway

>if it gets built be as free as this Internet ?

>(Government & technology)



Phillip Zimmermman, author of PGP was one of the speakers



>A few photos of people with reversed baseball caps posing with laptops and

>cell phones in front of the various casinos (at night for best effect)

>and you might be able to sell the story to the mainstream media.



There were plenty of reversed baseball caps, but only one person had

gone so far as to get a computer chip implanted next to his tatoos

(seriously !)



The conference was held in the Sahara Hotel, which is not the newest,

biggest or most luxurious, but was a whole lot more comfortable than

either the Dutch campsite which hosted HEU or the New York flea pit

that apparently hosted HOPE.



I fell in with the organiser of the conference, Dark Tangent, a law

student from Seattle, as well as TDK (one of the elite few from the

UK), MTV, Tagger and a man with no nickname.



"Lets's go and see the MGM" :this is the biggest casino/resort hotel

in Vegas, 5000+ rooms, the usual huge casino, a seven story lion

guarding the entrance and a theme park similar to Disneyland. Since we

were here to enjoy ourselves, we headed off in a couple of cars.

                                            

We toured past the Las Vegas Hilton, which used to have the largest

illuminated neon sign in the world (worth $2 million, over 100 feet

high). Unfortunately it had collapsed into a heap of twisted girders

and broken glass the day before I arrived.



The MGM is huge, even by Vegas standards, but of course every punter

is treated like a VIP, so there is obligatory valet parking at the

entrance. We got out of the two cars we had cruised up in, whereupon,

the man with no nickname got managed to lock the keys to one of the

cars inside it, in the middle of the valet parking lane.



The car valets then proceeded to give us a demonstartion of car

repossession techniques using flexible metal strips known as "slim

jims" which they inserted between the rubber seal and the glass of the

car window. They were trying from both sides, with little apparent

success, but those musical Vegas words "there will be a big tip for

you" were uttered and both driver's and passenger's doors sprang open

as if by magic !  We decided to christen the man with no nickname

"Repo Man" in honour of his part in our entertainment and education

but upon reflection "Repo-Spazz" seemed to stick.



The evening was a cool 90 degrees Fahrenheit, so we headed indoors to

the air-conditioned casino, which was impressive enough in scale, but

held little interest for us as we headed off to the amusement park on

the other side. 



We watched an amusing slapstick/stunt performance involving costumed

pirates and much leaping off walls and diving into water. Piracy seems

to be a theme in Vegas. There is hotel called Treasure Island, in

front of which, just to draw the crowds, are two full sized pirate

ships on an artificial lake, which periodically stage a performance

involving crews of actors, sword fights etc. One of the ships then

"sails" towards the other and fires cannon etc. 



The rides were ok, and we did not have to queue as this was late in

the day. We were nearly ejected from one ride, a flight simulator type

"ride to the centre of the earth" , when  one of our number could not

resist the temptation to spit into one of the pools of water lit by a

red light which was supposed to represent  a pool of molten lava

(there are security cameras everywhere in Vegas !).



We had more fun on a proper roller coaster type ride, which happened

mostly indoors, and so although short, was quite fast and aggressive

in its twists and turns. MTV lost his precious baseball cap, which he

had to go back for later and Dark Tangent was taken by the video photo

of a girl in one of the cars following us. At the point where the

cameras flashed, she was holding on to herself in such a fashion that

Dark Tangent bribed the photo clerk for a copy. It may appear on the

DEFCON ][ WWW and ftp site at dfw.com under Aleph1' s pages. 



Nearly midnight, and Vegas keeps on going (they pump extra oxygen into

the casino air conditioning in the wee hours of the morning to keep

the staff and punters awake, and also make sure that there are no

visible clocks or windows to give you time clues), but, hey, there is a

conference due to start tomorrow !



We went back to Dark Tangent's room and I helped stuff an extra sheet

into hundreds of copies of the conference program. I got my

psychodelic conference badge (#1 no less!)  and various stories were

recounted. The infamous Oregon State vehicle licence/voters roll

CD-ROM was displayed and discussed. This contains the names ,

addresses , telphone numbers and social security numbers of thousands

of  citizens in the state of Oregon , legally obtained by paying the

appropriate fee to the proper authorities, in exactly the same way as

the credit bureaux and marketing database companies do. Somehow the

act of translating it from 9 inch tape format to CD-ROM format and

making it available to the public caused quite a stir in Oregon. As

the warning on the label says "Do not use this to create false

identities, apply for credit cards etc-"



Who says phone phreaks are a menace to society ? One of the female

conference delegates was having difficulties with the hotel phone

equipment. Within 5 minutes the jack was out of the wall and various

soldering irons were in use and her phone was repaired without any

need to call hotel maintainance at 1am in the morning. Perhaps this

was when it was discovered that the trunking which held the phone

lines to your room, also had the wires for most of the rest of the

same floor 8-)



The hotel had given us a conference room the size of a couple of

tennis courts for free providing that Dark Tangent could supply the

requisite number of hotel bookings. Normally this works well for the

hotel, e.g. there was also a convention of Railway Signalmen booked in

at the same time, who spent much more on beer and at the tables than

the DEFCON crowd did.



Dark Tangent organised the registration process, but of course there

were people who had pre-registered, of whom no record could be found

("computer problem") and there was much waiting around for things to

happen. The DEFCON  tshirts were popular, and Dark Tangent learned

that black outsells white which outsells green. 



Once the various speakers got going, things were fine, but generally,

unlike HEU, there was hardly any technology on show for people to play

with. The most desparate email addicts did get a 'Net connection' on

Zak's portable Sun clone via a Macintosh modem and several hours of

social engineering of the hotel operator.



Much of Dark Tangent's promised equipment failed to turn up in time.



Since Zak is from the UK, and TDK sorted out some of the PA and

overhead projector problems, and I lent my portable for some German

Videophone type stuff, the very small UK contingent aquitted itself

better than the native Americans in terms of conference

hardware/software. 



The point of such a conference is not to have an online

hacking/phreaking session, or to play with the Internet, but to meet

interesting people. 



I had interesting chats with Philip Zimmerman, the author of Pretty

Good Privacy public key encrpyption (he is working  on a PGP for

voice/audio which will do what the infamous Clipper chip is meant to

do, without government interference). I got to chat with Padgett

Petersen, an anti-virus expert and also with Winn Schwartau and other

more anonymous people, including the winner of the "I am a Fed" tshirt

in the  "Spot the Fed " contest.



Winn's book "Information Warfare" has some details of High Energy

Radio Frequency weapons, which although military in origin, can

apparently be home brewed to produce a 16 megawatt directed pulse

which can frazzle a computer at a distance. He raised the possability

of a HERF gun demo perhaps at the next DEFCON, out in the desert,

providing that the attendees do not have pacemakers etc. The

implications of this sort of technology are as significant for us in

the UK as they are in the USA. What would have happened if the IRA had

used a HERF gun or a similar EMP/T bomb instead of explosives in the

City of London ? 



Dr Mark Ludwig gave his wry International Virus Writing Competion

award to one of the proponents of the media hype surrounding the fact

of the announcement of a Virus Writing Conference. His Virus CD-ROM

containing hundreds of live computer viruses and source code seemed to

sell out quickly. He now looks at computer viruses in terms of

evoloution and has done experiments with Genetic Algorithm programming

to allow virus code to mutate and recombine in order to evade the

attentions of anti-virus scanning software. Since he has also

published protected mode boot sector infectors, all the snobs who

think that just because they are running Linux, Windows NT, or OS/2

that they are safe from mere MSDOS viruses, had better think again.



Annaliza (an honourary member of the UK contingent, since she attends

the 2600 meetings in London when she is over here) gave a talk about

her video "Unauthorised Access" and Christian from the Chaos Computer

Club in Germany gave an account of things over there. He also showed

the cool video phone technology he is working on using my portable.



TDK ran through what was happening in the UK (you should know all

about that already)



One of the most interesting ideas I picked up from DEFCON was from

Stephen Dunifer of Berkley Free Radio. He is involved in Free Radio

(i.e. "pirate" broadcasting ) using CAD/CAM designed, stable frequency

micro-power transmitters. As these do not drift as much as commercial

stations do, there tend to be fewer complaints, and the stations can

stay on air longer before the authorities have to be seen to act to

shut them down. He and his collegues have been involved in providing

such cheap transmitters to the Chiapas indians during and after their

recent revolt against the Mexican government. the plans for these,

including PCB graphics and component lists are available by ftp from

crl.com, directory ftp/users/ro/frbspd



What caught my attention was his description of a recent rave in the

Bay area, where due to restrictions on amplified music, the DJs

broadcast on FM via a micro-power transmitter and got the audience to

bring along their boom-boxes. The concept of an audience of ravers all

wearing Sony Walkmans seemed quite bizzare and Californian, but it

made me think of what might be possible/necessary after the UK

Criminal Justice Bill gets passed.



There were a couple of interesting talks by private detective /

telephone bugging types. I watched a couple of them demonstrate how to

pick a lock (somehow one of the hotel's noticeboards with those

movable letters behind a locked glass fronted door got re-arranged).

With the right tools and a bit of practice it seems quite easy. There

is a shop opposite the hotel which sells bugging / anti bugging

equipment, which these professionals were naturally contemptuous of.

It seems to be a major pastime in the USA, and of course DEFCON aided

things by publishing the frequencies used by the local police and

hotel security staff. Can Princess Diana be seriously contemplating

exile in the USA ? Somehow I think that the "Squidgy" tapes incident

would be childs' play in the USA. 



There was an interesting talk on anonymous remailers, and the

possabilities of extending the concept of remailer chaining and

encryption. The old military/ diplomatic signals security trick of

continuously sending a stream of messages between re-mailers, even

when they are have no "real" messages to send was discussed, since it

was claimed that anon.penet.fi had been the target of successful

traffic analysis.



Whilst the convention was in progress, the big event was of course the

opening of Planet Hollywood, the film star owned burger restaurant in

Caesar's Palace shopping mall. I did mosey along, and the crowds were

even bigger than when the one in London opened, all hoping for a

glance of Arnie or Bruce. I did not see them, but I did see at least 6

"Hollywood Blonde" women, tall and beautiful, each with a wizened

monkey at least twice their age and about half their height as an

escort, heading for the opening festivities.



I resisted the temptation to go go haring off into the desert in

search of something interesting in Area 54 and Groom Lake

("Dreamland") where the US stealth planes and it is rumoured captured

UFOs lurk. 



By the end of the conference, the DEFCON tshirts were no longer

causing many double takes "are DEFCON a rock band ?" and I had

"nearly" won a jackpot from a slot machine . It was time to head off

to San Francisco and then home. 



All in all I enjoyed DEFCON ][ and look forward to the similar event

which TDK may be organising in London this April. Watch this space,

and send offers of help, money, etc. care of the editors of PHUK

magazine.



- Otaku



+++

EOF

=============================================================================

   		PHUK MAGAZINE - Phile 5 of 10

=============================================================================



		-----------------------------------

		ANSWERPHONES - Panasonic KX-T1446BE

		-----------------------------------



Reading the phile in sUBTERRANEAN TECHNOLOGIES mAGAZINE by nEIL.s on

answerphones, (complete with BT Response 400 manual), made me realise

that quite a few people mess with these things and that working the

commands out is often more of a drag than hacking the remote code. A

happened to have a answerphone manual and decided to type in the

relevant portions and send them to PHUK magazine. If everyone typed

in an answerphone manual then we would soon have the manuals for

every answerphone in the known universe .... making our lives

considerably easier!



Anyway, on with the answerphone manual



--

   			Panasonic KX-T1446BE





1 backspace incoming message

2 skip forward incoming message (ICM)

3 incoming message reset

4 memory playback

7 begin re-recording outgoing message (OGM)

8 continue through incoming messages

9 end recording outgoing message

0 turn off machine



Playing Back Messages









many messages you have got (up to 8 times)



the messages



continue listening to ICM



Playing Back Newly Recorded Messages









pressing 4



Rewinding/Fast-Forwarding the ICM while Hearing Messages









Resetting the ICM for Future Messages





after all messages have been played





















tape to the end of all the messages



Recording a Marker Message





seconds later by another 2 beeps. 











Changing the Outgoing Message









a long beep will be heard















Setting & Cancelling Answer Mode











--



Right, that's the lot ... anyone else with answerphone manuals or

lists of commands send them to us & we'll make sure they get a wide

distribution :)



+++

EOF

=============================================================================

   		PHUK MAGAZINE - Phile 6 of 10

=============================================================================



		-----------------------------

		Simple Line Monitor - TheGoat

		-----------------------------





The simple line monitor provides a number of functions, initialy it

was produced to give a visual indication of ringing.



Parts : Line connection jack & cable.

	Two led's, green and red.

	Two resistors 33K.

	Small piece of vero.



For convenience I used a ready molded phone jack cable scavenged from

an old phone, I also found it had a .1" pin socket on the other end,

the plug for which was also removeable from the phone, mounting the

plug at one end of the vero, I put the resistors and LEDs in the

middle to form a small square.



1                             +----------------------+

2   +------\         +----+ ==+2-\-R1----D1+----+    |

3/4 |P/jack]+----//--|    + ==+   \--R2----+D2--+    |

5   +------/         +----+ ==+5----------------+    |

6                             +----------------------+



Effectivly, pin 2 of the phone jack connects to both resistors each

resistor to a diode, note positive of each diode. and finaly both

diode ends lead back to pin 5 of the phone jack.



	Pin 2 ------------------+-------+

				|	|

				R1	R2

				|	|

				+	|

				D1	D2

				|	+

				|	|

	Pin 5 ------------------+-------+



The connection of pin 5 and 2 is not too important.



When connected to a line one LED will be lit to show line voltage,

if a ring signal is present both LEDs will light brightly in the ring

pattern. (ie: flash-flash--blank-blank-..... etc). As such this met

the initial requirements, but when we first tried it in anger we

found it could also indicate a number of other things. When a phone

is also attached to the line and is picked up the single LED will dim

to about half its previous brightness. If a futher phone is added,

then when the second phone is picked up a futher dimming is noticable.

When tapping a line, indication that the destination phone is in use is

important.



Coming in the next article: Upgrading to give a direct connection to

a computer port for Ring Indication.



- TheGoat



+++

EOF=============================================================================

   		PHUK MAGAZINE - Phile 7 of 10

=============================================================================



			------------------------------

			NO GIFT FROM HALLMARK - DrKaos

			------------------------------



After the 2600 article by FyberLyte ("The Magical Tone Box", 2600 Vol

10, No.4), I hunted in vain through my local Rat Shack for an

ISD1000A but without any joy. Of course I did not plan to do Red

Boxing, as it doesn't work in the UK, but I did think that the chip

had applications that could stretch as far as a whole number

including CF, KP & ST ....



When the buzz started about the Hallmark cards that could record

speech & tones began, I looked all over for a UK source of the

Hallmark cards, even going as far to phone their UK HQ, only to learn

that they were not imported into the UK. I did however find a UK

supplier, DISET UK, and phoned them with the express idea of

engineering some "samples" out of them on the grounds that I wanted

to buy several hundred or so of these cards (yeah right!). As this

approach seemed to fail I took the backup approach of ordering two

cards by mail order for about 12 quid. The cards arrived, and then

some MORE cards arrived, and then still MORE cards arrived .... until

I had 6 in all...:)



I dismantled my card and removed the microphone and crappy little

speaker and then put the whole mess into a DAT tape box along with a

record/playback switch, an actuation press switch and a phono jack

for the imput (throwing away the mike in the process). I won't bore

you with the details of the actual construction because that was

covered in 2600 Vol 11, No 1 ("A Gift from Hallmark" by Bernie S).

Suffice it to say that anyone with half a brain and a soldering iron

can figure out how it works and box it adding switches etc themselves.



In testing my box I found that I had plenty of space for a good long

sequence: Break, Clear Forward, KP2, <num>, ST .... but never managed

to succesfully seize a trunk with it (although the break seemed

fine). About this time my tone generating machine (an Amiga) broke,

and I also learned that the timings were suspect in the box proggie I

was using, so I just put it down to the program, threw the box in the

drawer and forgot about it.



In the meantime I had given out cards to several people, so that they

could experiment with them also. One of these nefarious individuals

was at that time boxing with a Walkman and was suffering tape

stretch, and thought that the Diset Box would be cool.



I forgot all about the Diset Box for a while, being occupied with

other things, but at a 2600 meeting a while ago the subject of the

Diset cards came up and I asked the individual concerned whether he

had ever constructed the box. Yes, he had, he replied, but it didn't

work!! Apparently, using the same tones and trunks that he could

succesfully box over with his Walkman, he had loaded up the box and

set off only to find that what did work with his Walkman, did not

work with the box :( Shame!



Now I thought about this recently, and it seems that there could be

several reasons for the failure: (i) volume not loud enough, (ii)

distortion or clipping of frequencies caused by the algorithm used in

the digitisation process, or (iii) distortion caused by using the

crappy little speaker that came with the card. Unfortunately my Amiga

is still broken, and until I buy a soundblaster card I cannot

generate tones, and that has to wait until I get gainful employment!



Still, if anyone has succesfully overcome the problems with the Diset

box by improving amplification or speaker quality PHUK magazine would

like to hear about it. In the meantime here is the address of Diset

UK should anyone want to play with a Diset Box themselves.



Diset UK, Portica House, Addison Road, Chilton Industrial Estate,

Sudbury, Suffolk, CO10 6YJ. Phone: 0787-310775



- DrKaos



+++

EOF=============================================================================

   		PHUK MAGAZINE - Phile 8 of 10

=============================================================================



		------------------------------------------

		British Telecom - Computer Security Manual

		------------------------------------------

			Mrs. Brady, of Doncaster

			------------------------



Heads up!! This one is a goody! sent to us anonymously by someone who

wishes only to be known by the name of Mrs. Brady of Doncaster, this

is a delightful trashing find of the British Telecom Computer Security

manual!! Run in PHUK as a three part series, here is the first part,

right up to the bits about computers and networks ... which should

make you all look forward to the next issue of PHUK magazine....:)





SEC|POL|AO12

NOT TO BE SHOWN OUTSIDE BT	

ISIS Directive

Computer Security Manual

Origin: Security and Investigation Directorate

Issue 7: March 1993



Contents



Foreword by the chairman. . . . . . . . . . . . . . . . .  iv



Amendment record sheet. . . . . . . . . . . . . . . . . . . v



List of effective pages . . . . . . . . . . . . . . . . . vii 



Introduction and scope. . . . . . . . . . . . . . . . . . 1-1

Introduction. . . . . . . . . . . . . . . . . . . . . . . 1-2

Scope and purpose . . . . . . . . . . . . . . . . . . . . 1-2

Relationship to the previous issue. . . . . . . . . . . . 1-3

Structure of the manual . . . . . . . . . . . . . . . . . 1-3

Feedback. . . . . . . . . . . . . . . . . . . . . . . . . 1-4

Use of the CSM by suppliers and contractors . . . . . . . 1-4

Acknowledgements. . . . . . . . . . . . . . . . . . . . . 1-4



Objectives and policy . . . . . . . . . . . . . . . . . . 2-1

Introduction. . . . . . . . . . . . . . . . . . . . . . . 2-2

Corporate policy on electronic system security. . . . . . 2-2

Objective . . . . . . . . . . . . . . . . . . . . . . . . 2-2

Relationship to other security policies . . . . . . . . . 2-2

Responsibility for security . . . . . . . . . . . . . . . 2-3

Derivation of security requirements . . . . . . . . . . . 2-4

Security policy for the life cycle. . . . . . . . . . . . 2-6

Security evaluation, certification and accreditation. . . 2-7

Security approvals. . . . . . . . . . . . . . . . . . . . 2-9

Product security. . . . . . . . . . . . . . . . . . . . .2-10



Communications and network security . . . . . . . . . . . 3-1

Introduction. . . . . . . . . . . . . . . . . . . . . . . 3-2

System interconnection  . . . . . . . . . . . . . . . . . 3-4

Network management  . . . . . . . . . . . . . . . . . . . 3-5

Network architecture  . . . . . . . . . . . . . . . . . . 3-5

Threats to networked systems  . . . . . . . . . . . . . . 3-8

Cryptographic protection  . . . . . . . . . . . . . . . .3-13

Electronic Mail Systems . . . . . . . . . . . . . . . . .3-14



Electronic systems insta11ations  . . . . . . . . . . . . 4-1 

Introduction  . . . . . . . . . . . . . . . . . . . . . . 4-2

Accommodation . . . . . . . . . . . . . . . . . . . . . . 4-2

Services  . . . . . . . . . . . . . . . . . . . . . . . . 4-4

Electronic system equipment sign posting  . . . . . . . . 4-5

Physical access control strategy  . . . . . . . . . . . . 4-5

Personnel access  . . . . . . . . . . . . . . . . . . . . 4-7

System or master consoles . . . . . . . . . . . . . . . . 4-8

Other terminals . . . . . . . . . . . . . . . . . . . . . 4-9

Communications rooms and equipment  . . . . . . . . . . . 4-9

Media libraries and disaster stores . . . . . . . . . . . 4-9



5    Personal computers . . . . . . . . . . . . . . 5-1

5.1  Introduction . . . . . . . . . . . . . . . . . 5-2

5.2  Personal security responsibility . . . . . . . 5-3

5.3  PC and data access security. . . . . . . . . . 5 4

5.4  Security of software . . . . . . . . . . . . . 5-8

5.5  Personal computer communications . . . . . . . 5-8

5.6  Contingency planning . . . . . . . . . . . . . 5-10

5.7  File Servers . . . . . . . . . . . . . . . . . 5-12



6    User access to computers . . . . . . . . . . . 6-1

6.1  Introduction . . . . . . . . . . . . . . . . . 6-3

6.2  Regulating access to computers . . . . . . . . 6-3

6.3  Identification . . . . . . . . . . . . . . . . 6-4

6.4  Passwords. . . . . . . . . . . . . . . . . . . 6-6

6.5  Limitations of password security . . . . . . . 6-10

6.6  Logging on . . . . . . . . . . . . . . . . . . 6-11

6.7  Logging off. . . . . . . . . . . . . . . . . . 6-14

6.8  User privileges. . . . . . . . . . . . . . . . 6-15

6.9  Access to user files . . . . . . . . . . . . . 6-16

6.10 Customer access to BT computers. . . . . . . . 6-17

6.11 Contractors . . . . . . . . . . . . . . . . . .6-18



7    Software and data . . . . . . . . . . . . . . .7-1

7.1  Introduction. . . . . . . . . . . . . . . . . .7-2

7.2  Software installation and maintenance . . . . .7-2

7.3  Log facilities and system data. . . . . . . . .7-4

7.4  Data sensitivity. . . . . . . . . . . . . . . .7_7

7.5  Storage . . . . . . . . . . . . . . . . . . . .7-8

7.6  Disposal of media . . . . . . . . . . . . . . .7-9

7.7  Computer viruses. . . . . . . . . . . . . . . .7-11



8    Administraion . . . . . . . . . . . . . . . . .8-1

8.1  Introduction. . . . . . . . . . . . . . . . . .8-2

8.2  Personnel . . . . . . . . . . . . . . . . . . .8-2

8.3  Disaster protection . . . . . . . . . . . . . .8-7



9    Data protection act . . . . . . . . . . . . . .9-1

9.1  Introduction. . . . . . . . . . . . . . . . . .9-2

9.2  Data protection act principles. . . . . . . . .9-2

9.3  Definitions . . . . . . . . . . . . . . . . . .9-3

9.4  Registration. . . . . . . . . . . . . . . . . .9-4



10   Further information . . . . . . . . . . . . . .10-1

10.1 Introduction. . . . . . . . . . . . . . . . . .10-2

10.2 Security contacts . . . . . . . . . . . . . . .10-2

10.3 Sources of other guidance . . . . . . . . . . .10-4

10.4 Contingency Planning for Anton Piller Orders. .10-7

10.5 GLS conhcts (1993/94) . . . . . . . . . . . . .10-9



11   Approved products . . . . . . . . . . . . . . .11-1

11.1 Introduction. . . . . . . . . . . . . . . . . .11-2

11.2 List of products. . . . . . . . . . . . . . . .11-2



G    Glossary. . . . . . . . . . . . . . . . . . . .G-1



Foreward by the chairman



A vital element in our drive to achieve the highest quality of service

standards is the provision of a secure work environment. This means

that our resources - people, systems, information and physical assets

must be protected against a variety of threats which range from

the malicious to the criminal. We also have security obligations that

form part of the legal and regulatory requirements we must observe.



The Information Security Code, Computer Security Manual and Physical

Security Handbook define the ways in which we can maintain a secure

environment. They clarify our responsibilities and provide the expert

guidance which we can use to achieve and maintain the levels of

security appropriate to the various activities of BT. The rules

outlined in these publications are mandatory. 



IDT Vallance



Introduction and scope



Contents



1.1   Introduction . . . . . . . . . . . . . . . . . . . 1-2

1.2   Scope and purpose. . . . . . . . . . . . . . . . . 1-2

1.3   Relationship to the previous issue . . . . . . . . 1-3

1.4   Structure of the manua1. . . . . . . . . . . . . . 1-3

1.5   Feedback . . . . . . . . . . . . . . . . . . . . . 1-4

1.6   Use of the CSM by supp1iers and contractors. . . . 1-4

1.7   Acknowledgements . . . . . . . . . . . . . . . . . 1-4



1.l Introduction



British Telecom (BT) is highly reliant on electronic systems to support its

business processes. Computers are used in many critical points in the business: in

switching systems, administration systems and management systems. Many of

these systems are either interconnected, or are planned to be interconnected,

BT's infrastructure of systems will become highly integrated.



This evolutionary process makes security even more important. It is

becoming possible to access a wide variety of information from a

single terminal. Furthermore, a security flaw or failure in one system

may allow unauthorised access or misuse of other systems. 



BT possesses valuable information about its customers and their

commercial operations which it is our responsibility to safeguard.

Coupled with this should be an awareness of the possibility of

computer crime by people inside and outside BT.  



While security failures are, like any other quality failure, bad

business practice, the repercussions may be more serious.



There are many motivators for good electronic security. BT is obliged

under the terms of its current licence to observe a Code of Practice

on disclosure of customer information. Disclosure of information could

also provide likely movements in the price of BT shares or those of

our suppliers. It could be used to embarrass the business by

disclosure of commercial negotiations. The business could also suffer

through corruption or loss of data. There could also be personal legal

liability under the terms of the Data Protection Act in the event of

security failure. All these possibilities make the security of BT

computer operations increasingly important. 



Good security does not have to be expensive. Often simple, low-cost

measures, combined with a positive attitude to security, can achieve

considerable reduction in the vulnerability of BT systems.



1.2 Scope and purpose



Although this manual is called the Computer Secunty Manual, it

encompasses all electronic systems that are broadly computer-based. It

applies equally, for example, to digital switching systems and

building access control systems, as well as to the mainframe and

personal computers for which it has customarily been used.



BT is now operating in a global environment and its activities cover

most parts of the world. Many of its non-core activities and overseas

operations are carried out through subsidiary companies. All people

working in these wholly-owned subsidiaries are also "BT people". "BT"

refers to the parent company and all its wholly owned subsidiaries.

Adoption of the CSM in partly-owned subsidiaries will be a matter

negotiated between the Director of Security and Investigation and the

senior management of each part-owned subsidiary. 



The purpose of the Computer Secunty Manual is to enable BT people to

recognise possible threats to BT s systems, and to bring together the

current guidance on electronic security principles and practices which

may be used to minimise the risk.



Examples of threats include:

o natural calamities such as fire or flood

o sophisticated tampering

o software errors

o hardware failure

o vulnerability of communication links

o unauthorised use of terminals

o hacking

o deliberate damage, and

o fraud.



The Computer Security Manual is primarily intended for those who specify

security requirements in BTs systems and those who implement them, it

is also essential reading for users of those systems so that they may

understand the rationale behind the protective measures that may be

imposed upon them. While it is recognised that the threats to BT's

systems are constantly changing, the guidance given is the best

available at the time of issue. It should be recognised however, that

guidance will need to be revised when existing threats change or new

threats appear. 



1.3 Relationship to the previous issue



Although some of the policies on electronic systems security affecting

computers have changed since the last issue, the previous structure

has been retained where possible, so as to cause minimum inconvenience

to users of the manual. 



1.4 Structure of the manual



This version of the Computer Security Manual contains mandatory

requirements, called CSM Policies, which should be followed in the

design, implementation and operation of systems.



The CSM Policies describe various mechanisms that can be employed to

protect the security of an electronic system, and are derived from

threats (that have been found) and countermeasures that can be used.



The main text provides guidance and background to the CSM Policy statements.



The chapters have been ordered to reflect the larger view of systems

(networked systems and the supporting network infrastructure), and

then narrowing that view to large computer systems, personal

computers, and so on. 



The page number found at the bottom of each page is in the format

chapter-page in chapter and facilitates the easy replacement of entire

chapters without upsetting the numbering of pages in subsequent chapters.



1.5 Feedback



The policy and guidance contained in e Computer Security Manual is

prepared and issued after extensive discussion with experts in

electronic security throughout the business. The Electronic Security

Unit welcomes feedback from users on the adequacy of the guidance

given, so that future issues may be improved.



1.6 Use of the CSM by suppliers and contractors



The CSM is the baseline document for the protection of BT's electronic

assets on BT premises, in transit, at employees' homes or on

contractors' premises. Where a supplier or contractor has obligations

to protect BT assets, a copy of the CSM may be loaned to supply the

necessary guidance provided: 

Agreement is obtained from DSecI



2 A non-disclosure agreement is in place with the supplier or

contractor based on the "Acceptance Agreement from BT"' contained

within the Information Security Code



3 Sections 10 and 11 are removed from the manual before it is lent to

anyone outside BT. 



4 The manual is returned to BT upon completion or termination of the

contract. 



Updates to the CSM will be sent to the manager who originally arranged

the loan, who must ensure that the update arrangements meet criteria 3

and 4 above. The CSM must be returned on completion of termination of

the contract.



1.7 Acknowledgements



We would like to thank the help received by all parts of the BT Group

in the production of this version of the Manual. In particular, Group

Security, Group Information Services, British Telecom International,

British Telecom Security Consultancy, Business Communications,

Development and Procurement, Internal Audit, and to others for their

feedback to this, and previous issues of the Manual. 



Objectives and policy



Contents



2.1   Introduction . . . . . . . . . . . . . . . . . . . . . . 2-2



2.2   Corporate policy on electronic system security . . . . . 2-2



2.3   Objective. . . . . . . . . . . . . . . . . . . . . . . . 2-2



2.4   Relationship to other security policies. . . . . . . . . 2-2

2.4.1 Application  . . . . . . . . . . . . . . . . . . . . . . 2-3



2.5   Responsibility for security . . . . . . . . . . . . . . . 2-3

2.5.1 Business operation or process owner. . . . . . . . . . . 2-3

2.5.2 System supplier. . . . . . . . . . . . . . . . . . . . . 2-4



2.6   Derivation of security requirements. . . . . . . . . . . 2-4

2.6.1 Value and impact analysis. . . . . . . . . . . . . . . . 2-4

2.6.2 Data sensitivity . . . . . . . . . . . . . . . . . . . . 2-4

2.6.3 Countermeasures . . . . . . . . . . . . . . . . . . . . .2-5

2.6.4 Risk analysis. . . . . . . . . . . . . . . . . . . . . . 2-6



2.7   Security policy for the life cycle . . . . . . . . . . . . 2-6



2.8   Security evaluation, certification and accreditation . . . 2-7

2.8.1 Scope of accreditation . . . . . . . . . . . . . . . . . 2-7

2.8.2 Four-stage approach to security accreditation. . . . . . 2-7



2.9   Security approva1s . . . . . . . . . . . . . . . . . . . 2-9



2.10  Product security . . . . . . . . . . . . . . . . . . . . 2-9



2.1 Introduction



This chapter describes the objectives of the Computer Security Manual,

and places electronic security in the context of the security

infrastructure for BT s business operations and processes.



2.2 Corporate policy on electronic system security



The electronic systems security policy for the BT Group as affirmed by

Malcolm Argent, Group Director & Secretary, on 8th August 1990 is

reproduced below. 



"The British Telecom Group attaches particular importance to the

security of its business processes and systems. The Group's policy on

electronic security is to ensure that we properly safeguard all our

switching systems, information systems and other electronic assets,

having regard to legal and regulatory requirements, our commercial

interests and sound business practices. 



This policy covers all aspects of the electronic environment: systems;

administration procedures; environmental controls; hardware; software;

data and networks. It applies to all stages in the system life cycle,

from feasibility study through to in service and operations. It

applies no matter whether the system is developed or bought by BT. It

is the responsibility of managers at all levels to observe this policy

themselves and to ensure that it is fully understood and followed by

their people.



To help managers carry out their responsibilities, the Director of

Security and Investigation will issue appropriate guidelines, on a

continuing basis, supplementing the requirements of the Computer

Security Manual, The Information Security Code and the Physical

Security Handbook to take account of changing threats to BT's

electronic systems. He will also be the central point of information

for the Company's policy on electronic security and will monitor

compliance with it. "



2.3 Objective



The Computer Security Manual draws together the policies applying to

computer systems in particular, and electronic systems in general,

supplementing it with guidance and advice on implementation. Within

the BT Group there are many different computer systems supporting a

multitude of business processes. Therefore it is not possible to

produce specific recommendations for the security of every aspect of

every system. The objective of the Manual is to concentrate on the

baseline policy and guidelines generally applicable to BT systems.



2.4 Relationship to other security policies



The Computer Security Manual is an elaboration and extension of the

information security strategy contained in the Information Security

Code.



2.4.1 Application



Except where inapplicable, the Policies enumerated in the Computer

Security Manual are MANDATORY. For example: Passwords are not a

mandatory feature of all BT systems, but where an analysis suggests

that passwords are a sufficiently strong measure to regulate access to

those systems, the relevant policies on passwords contained in this

Manual become mandatory. Policies usually appear after any descriptive

text and are numbered to assist the checking of compliance in systems.



While Policies are mandatory, all supporting guidance and advice on

implementing the policies is discretionary, although strongly

recommended to achieve a harmonious and consistent approach to

electronic security throughout the BT Group. Policies appear within

boxes.



POLICY 2.1: ASSIMILATION OF REVISED MANDATORY POLICY



From the date of publication, this issue of the Computer Security

Manual applies to all new systems supporting BT's business operations

and processes. It also applies to any changes to existing systems, in

particular where an opportunity to update security occurs, so as to

achieve greater compliance with the policies given in this manual.



2.5 Responsibility for security



Every BT employee, and those contracted to work for BT have the

responsibility to ensure the security of BT assets. Where the asset is

information, the degree of protection needed is defined by the owner

of the information. Additional measures may be required beyond those

necessary to protect BT's information assets because of legal

requirements.



2.5.1 Business operation or process owner



It is the responsibility of the owner of each business operation or

process to recognise the value of their activity, and the potential

impact on the business from security failure. In the context of the

Computer Security Manual, ownership of a process is defined as the

manager responsible or accountable for the process.  The

responsibility of the business operation or process owner also extends

to ensuring that, in general terms, security of the systems supporting

the process is adequate in relationship to the impact of security

failure. A service level agreement should exist between the business

process and the system owners.



POLICY2.2: RESPONSIBILITY ASSIGNED TO PROCESS OWNERS



The owner of each business process shall ensure that security is

adequate in the systems that support the process.



2.5.2 System supplier



The process owner will be responsible for evaluating the impact of

security failure and deciding on the general requirements for

security. The detailed implementation of security controls and

countermeasures to meet the owner's requirements will be the

responsibility of the system supplier whose computer systems support

the process. The process owner and the computer supplier will usually

be linked through a customer/supplier relationship. The quality of

computer security, including the adherence to the policies described

in this Manual should be the subject of a Service Level Agreement. 

2.6 Derivation of security requirements



2.6.1 Value and impact analysis



The security measures needed to safeguard each business process wil be

determined from the sensitivity of the material handled and the impact

of security failure, defined in terms of confidentiality, integrity

and availability. The owner of each business operation or process will

ensure that the value of the information processed and the impact of

security failure are known since they are the core parameters in the

rationale of cost-effective security. Sometimes the value of the

information may be obvious and easily quantified as a monetary

expression. On other occasions, the value of the information or

processing capability is less apparent, protection being necessary to

safeguard only the reputation or credibility of the Business.  Impact

of failure includes the concepts of asset value, importance, damage to

the  business because of information disclosure, loss of accuracy or

currency of the information, and loss of the use of business-critical

resources. 



2.6.2 Data sensitivity



The Informaion Security Code describes the privacy marking to be used

to identify information which requires a level of protection beyond

that provided by a clear desk policy. Currently this protection is

defined only in terms of the confidentiality requirements of security.

There is no comparable marking for integrity or availability. 



Information stored using electronic media is more vulnerable wen

stored than information on paper . It can be easily modified without

trace, and its content is not immediately obvious. It is readily

deleted, and in large systems can be easily lost. Therefore the

sensitivity of electronic data should be specified in terms of the

impact of loss arising from failure of confidentiality, integrity or

availability. 



To preserve compatibility with the paper-based system, data

sensitivities for electronic information use the same criteria for

assessing the impact of security failure, thus allowing common threat

models to be used. 



2.6.2.1 Sensitivity level 1



Information for which the impact of inaccuracy, alteration, disclosure

or unavailability would be to cause inconvenience or reduction in

operational efficiency.



2.6.2.2 Sensitivity level 2



Information for which the impact of inaccuracy, alteration, disclosure

or unavailability would be to cause any of the following:



o Significant financial loss to BT;



o Significant gain to a competitor;



o Marked embarrassment to BT;



o Marked loss of confidence to BT and its commercial dealing;



o Marked reduction of BT's standing in the community or to relationships generally.



Information marked IN CONFIDENCE has sensitivity level 2.



2.6.2.3 Sensitivity 1evel 3



Information for which the impact of inaccuracy, alteration, disclosure

or unavailability would be to cause any of the following:



o Substantial financial loss to BT;



o Substantial gain to a competitor;



o Severe embarrassment to BT;



o Serious loss of confidence in BT;



o Serious reduction of BT's standing in the community or to

relationships generally.



Information marked IN STRICTEST CONFIDENCE has sensitivity level 3 and

are called in this manual High Impact Systems.



2.6.2.4 Sensitivity levels above 3



Impact scenarios exist for failures of security for data beyond

sensitivity level 3. Specialist advice is available from the Director

of Security and Investigation on electronic systems which process:

corporate plans; business propositions (new enterprises, flotations,

joint ventures, take-overs); personnel and industrial relations

matters; marketing strategies and plans; financial and tariff

proposals, and high-level contractual matters, or other information

which is price-sensitive within the terms of the Stock Exchange

Listing Agreement.



POLICY2.3: VALUE OF ASSETS AND IMPACT OF FAILURE



The value of the information, assets or processing capability to be

protected shall be estimated and recorded, as shall the impact of

possible disclosure, inaccuracy, incompleteness or unavailability of

that information. 



2.6.3 Countermeasures



A fundamental objective is to ensure that the countermeasures deployed

to protect sensitive information or processes should be practical and

appropriate to the threats against the electronic systems, giving due

regard to the impact of security failure. 



While insufficient, inappropriate, or poorly implemented

countermeasures may leave a system unduly vulnerable, excessive

countermeasures may lead to complacency, the neglect of security

operating procedures, and an unjustifiably high overhead of processing

power, or severe operational difficulties. 



POLICY 2.4: COUNTERMEASURES



The cost of countermeasures should be appropriate to the threats to

security and business processes, the value of the information being

protected and the impact of any security failure.



2.6.4 Risk analysis



It is the responsibility of the owner of each business operation or

process to assess and manage effectively the degree of risk to

commercially sensitive information, and the resilience of critical

business processes supported by computer-based systems. The risk

analysis will take cognisance of the value of the information or

critical processes being protected, and the perceived threats to the

system. Furthermore, the risk analysis should not be a once-only

exercise. It should be repeated regularly and revalidated whenever

significant changes occur to the security assumptions. 



POLICY2.5: RISK ANALYSIS



At all principal stages during the life cycle of each project

involving the storage or processing of commercially sensitive

information, or the provision of High Impact Systems, a risk analysis

shall be undertaken. The analysis, which must be repeated periodically

or revalidated to assess the impact of change, must be so as to

determine the vulnerability of the commercially sensitive information

or applications in its processing environment, given the prevailing

threats to security, the countermeasures deployed, and the value of

the information being processed.



2.7 Security policy for the life cycle



The preparation of a Security Policy Document (Security Statement)

should be viewed as an integral part of the life-cycle of business

processes. At the beginning of each project a security policy will be

prepared to guide the implementation of security in the systems that

will support the business operation. This vital step is necessary to

ensure that correct business planning decisions are taken. Where

security is a relevant feature of a process, its provision will be

costed and included in business cases going forward for financial

approval.



POLICY 2.6: SECURITY POLICY DOCUMENT



A Security Policy Document will be prepared by the owner of a business

process, outlining the system, the impact or loss associated with

possible security failure, the threats to the system, the proposed

countermeasures, and a risk analysis. The Security Policy Document

will guide development and  implementation of security features during

the development life- cycle of the system that supports the business

process, of which electronic security is an integral part. A Security

Policy Document is also required for existing systems where the impact

of security failure is high.



Details of all BT multi-user, administration and management systems

must be registered by the Development Manager on the Applications

Inventory. This is the catalogue of the company's software assets, and

is used to inform People of what systems exist and assist management

of the portfolio. The requirement to register covers systems that are

either developed or procured by BT. Details may be found in section 10.



2.8 Security evaluation, certification and accreditation



The accreditation life cycle is a process for checking that

appropriate security is built into the specification, development and

operational procedures for systems, thereby ensuring that the security

requirements of the business are met prior to the system becoming

operational.



Security accreditation for electronic systems has three main objectives:



- to ensure that the level of security in BT's High Impact Systems is

adequate; 

- to prevent systems without adequate security being deployed until

remedial action has been undertaken; and

- to provide a framework for the continued improvement of the quality

of security in BT's systems.



2.8.1 Scope of accreditation



System security accreditation is a process which is undertaken to

ensure that security mechanisms, procedures and functions have been

implemented in a way that guarantees a level of confidence in the

quality of the system security.  The BT scheme, which is broadly based

upon the 'Information Technology Security Evaluation Criteria'

(lTSEC), is facilitated through agents operating on behalf of the

Director of Security and Investigation.



2.8.2 Four-stage approach to security accreditation



The object of Security Accreditation is to reduce the risk of security

failure without unduly delaying the implementation of important

systems. To assist in meeting this objective a four-stage

accreditation process has been developed. 



2.8.2.1 Stage 1 - Security Policy Document (Creation and Approval)



The Security Policy Document (SPD) outlines the system, the impact or

loss associated with possible security failure, the threats to the

system and the generic countermeasures. The SPD will also contain a

risk analysis and an assurance  rating to be used during subsequent

evaluation and certification. Only high impact systems progress into

the evaluation, certification and accreditation stages. Note, however,

that all new systems must have a System Security Statement, regardless

of the need to progress into stage 2. The SPD is created by the owner

of the business process and approved by DSecI.



2.8.2.2 Stage 2 - Evaluation



Those systems which are to be included in the accreditation process,

as indicated within the SPD and agreed by Director of Security and

Investigation (DSecl), will be evaluated to ascertain that the

required level of assurance has been achieved. The SPD is the baseline

document against which the system is evaluated.



DSecI will nominate an evaluator to gain and subsequently analyse

information on the following:



Requirements - a detailed description of the system requirements

relating to its security.



Architectural design - an examination of the system architecture.



Detailed design - a more detailed description on how specific security

components have been designed. 



Implementation- evidence of functional and mechanism testing.

Examination of source code and hardware drawings.



Configuration control- evidence of an effective change control

procedure which is able to provide unique identification of the system

and details of an acceptance procedure.



Program languages and compilers - details about the language(s) used.



Developers' security- security procedures including physical and

personnel arrangements.



Operational documentation - examination of the user and administration

documentation provided. 



Operational environment-



- delivery and configuration - configuration information, delivery and

audited system generation procedures and evidence of an approved

distribution procedure;

- startup and operation - secure startup and operation procedures,

including a description of security functions that have a relevance

during system startup. Evidence that effective hardware diagnostic

test procedures exist. 



2.8.2.3 Stage 3 - Certification



Certification occurs after the system has been developed. In order for

certification to be given, the evidence as described within the

evaluation report(s) must show that security has been correctly

applied during the development phase. 



2.8.2.4 Stage 4 - Accreditation



Final accreditation occurs after the system has been running for a

limited period of time as agreed between DSecI and the Process Owner.

The purpose of the trial is to allow the secure operating procedures

to be assessed in a live environment. The system is then inspected in

its operational environment to ascertain whether compliance has been

achieved. When a security audit indicates that this aspect of security

is satisfactory, final security accreditation can be given, after

which the system enters the normal periodic security audit cycle.



POLICY 2.7: SECURITY ACCREDlTATION



It is the responsibility of the owner of each business process, for

which the impact of failure is high, before making operational use of

the system to furnish the Director of Security and Investigation with

evidence that the security requirements described in its Security

Policy Document have been observed during the development life cycle.



2.9 Security approvals



Many of the policies within the Computer Security Manual require that

only products approved by the Director of Security and Investigation

may be used to protect BT commercially sensitive information and processes.



SecID maintains a list of approved products. If you require a product

to be submitted through the approvals procedure it is necessary to do

this via SecID. See the contact data in Section 10.



2.10 Product security



Developers and procurers of products for internal BT use should be

aware of the target market for the products. An assessment must be

made of the likely sensitivity of material handled by the product.

Although security demands personal responsibility from the people

carrying out a particular business process, managers should not avoid

the responsibility of providing users with a secure product

environment. It is much better to design security into products rather

than to add it on as an afterthought. Substantial economies of scale

can be achieved by building security into products.





POLICY 2.8: PRODUCTS FOR INTERNAL USE



Managers shall ensure that the security of products intended for

internal BT use meet users' needs. A clear statement shall be included

with all literature giving the sensitivity level for which the product

is suitable, and the circumstances under which it will retain its

suitability. 



Communications and network security



Contents



3.1   Introduction . . . . . . . . . . . . . . . . . . . . . 3-2

3.1.1 General policies . . . . . . . . . . . . . . . . . . . 3-2



3.2   System interconnection . . . . . . . . . . . . . . . . 3-4



3.3   Network management . . . . . . . . . . . . . . . . . . 3-5



3.4   Network architecture . . . . . . . . . . . . . . . . . 3-5

3.4.1 Private circuits . . . . . . . . . . . . . . . . . . . 3-5

3.4.2 Public Switched Telephone Network (PSTN) . . . . . . . 3-6

3.4.3 Public data networks . . . . . . . . . . . . . . . . . 3-6

3.4.4 Local area networks. . . . . . . . . . . . . . . . . . 3-7



3.5   Threats to networked systems . . . . . . . . . . . . . 3-8

3.5.1 Information disclosure . . . . . . . . . . . . . . . . 3-8

3.5.2 Unauthorised access. . . . . . . . . . . . . . . . . . 3-10

3.5.3 Modification, insertion and deletion . . . . . . . . . 3-12

3.5.4 Denial or failure of service . . . . . . . . . . . . . 3-12



3.6   Cryptographic protection . . . . . . . . . . . . . . . 3-13



3.7   E1ectronic Mail Systems. . . . . . . . . . . . . . . . 3-14



3.1 Introduction



Transmitting information between computers and other electronic based

systems can represent a substantial threat to security. Therefore

safeguards appropriate to the sensitivity of the information and the

transmission medium should be adopted during its transmission.



Most of the measures described in this section are concerned only with

the protection of communication links against attack by unauthorised

persons. Few of the techniques safeguard against illicit activities by

authorised users who misuse their privilege. This section gives

guidance on the acceptability of various communications methods and

services for the transfer of commercially sensitive information. The

methods recommended do not necessarily give complete

protection absolute security is never feasible. This section addresses

the issues of computer systems connected by networks, either to other

computers for exchange of information or to enable remote access where

the users of computer-based applications are remote from the service

or information provider. 



The advice and guidance offered herein is applicable to networks of

mainframes, personal computers and terminals or any combination of

them.



3.1.1 General policies



The following general policies apply to every case of electronic

transfer of privacy marked information.



POLICY 3.1: INFORMATION CORRECTLY LABELLED



The originator shall ensure that information to be communicated is

correctly marked in accordance with the Information Security Code.



POLICY 3.2: INFORMATION APPROPRIATELY PROTECTED



It is the responsibility of the author and originator of privacy

marked or commercially sensitive information communicated via

electronic means to ensure that it is always correctly safeguarded.



\POLICY 3.3: INFORMATION CORRECTLY ADDRESSED



The originator shall ensure that IN STRICTEST CONFIDENCE information

is sent only to a specific authorised recipient.



POLICY 3.4: TRANSMISSION OF HIGH IMPACT OR IN STRICTEST

CONFIDENCE ELECTRONIC INFORMATION



HIGH IMPACT or IN STRICTEST CONFIDENCE information shall not be

transmitted without the protection of an encryption system approved by

Director of Security and Investigation except where one of the

following is used: 



1. private circuits for which access to all distribution frame and

flexibility points are secured for HIGH IMPACT or IN STRICTEST

CONFIDENCE information, and which are routed via ducts, risers and

conduits having tamper detecting seals.



2. fibre optic circuits for which all connection points are secured

for HIGH IMPACT or IN STRICTEST CONFIDENCE information,



3. an Exclusive LAN in a secured area used only by BT People.



POLICY 3.5: TRANSMISSION OF IN CONFIDENCE ELECTRONIC INFORMATION



IN CONFIDENCE information shall not be transmitted without the

protection of approved encryption system unless communication is

strongly authenticated, such as by:



1. via Private Circuits between BT buildings,



2. via the Public Switched Telephone Network with approved dialback systems,



3. via the PSS using closed user groups (or equivalent), or



4. via the PSS with a challenge response system.



POLICY 3.6: USE OF ELECTRONIC MAIL SYSTEMS



Privacy marked or sensitive information shall not be transmitted

between systems using Electronic Mail Systems that have not been

approved as suitable for that use by the Director of Security and

Investigation.



POLICY 3.7: SPECIAL DISPENSATION IN AN EMERGENCY



Where special justification exists, for example in emergencies, IN

STRICTEST CONFIDENCE information may exceptionally be transmitted

according to the conditions for IN CONFIDENCE material. In these

circumstances, prior authority from a person in the Senior Management

Group shall be obtained on each occasion.



System interconnection



The connection of a system of computers by means of a network forms

the basis for bilateral agreements and practices between those

responsible for the security of the computers and those responsible

for the security of the network. A failure by any of those involved to

correctly secure the equipment for which they are responsible, may

result in a failure of security of the entire network.



It is the responsibility of the owners of all computer systems

connected to a network to ensure that their security is not

compromised by the network techniques used, or by any subsequent

changes to the network configuration and topology. Before allowing

connection of a computer system to a LAN or other network, the owners

of the business processes entrusted to that system must satisfy

themselves that their policy for security will not be violated.



Connection must be refused by the computer system administrator on

behalf of the business process owner if the networking arrangements

are or become inconsistent with the security policy. These

considerations apply to any network which permits access to several

computer systems via a common telecommunications facility (whether all

users need such access or not).



The connection of any computer system to a network introduces a number

of additional threats to the security of that system, to the security

of the network and to any other computer system sharing the network.

By far the greatest threat to a computer connected to a network is the

possibility of unauthorised access from other network users. Other

threats include the accidental or unintentional distribution of

privacy marked information across the network. 



The vulnerability of the network increases because the authority to

grant users permission to access the network is given to the

administrator of the connected computer system. If that computer were

already connected to another network, for example, the number of

potential users might increase dramatically.



POLICY 3.8: CONNECTION OF A COMPUTER SYSTEM TO NETWORKS



The administrators of a computer system connected to networks shall

ensure that the network arrangements do not contravene the security

policy of the business processes or applications being supported by

their system.



POLICY 3.9: INTERCONNECTION OF NETWORKS



Networks shall not be joined together unless it can be shown that the

resulting network does not contravene the security policy of either

network or of the security policy of those systems connected to either

network. 



POLICY 3.10: ADMINISTRATION OF A COMPUTER CONNECTED TO A

NETWORK



The administrators of a computer system connected to networks shall

ensure that the security administration of their system does not

contravene the security policy of the network to which their system is

connected.



3.3 Network management



Owners of systems connected to a network have a level of expectation

about the services that the network provides. For example, network

users may expect that the service:



o is available when it is needed,

o has sufficient capacity to carry the load,

o is able to ensure the confidentiality of information in transit,

o does not corrupt the information in transit,

o delivers the information to the intended recipient,

o restricts access to those so authorised.



The level of service offered by the network should be well documented

and will form the basis of any contract between the owner of the

network and the owners of the connected systems.



POLICY 3.11: NETWORK SECURITY POLICY



Providers of networks that claim to provide security functions shall

declare to their users and customers the protective measures, and

conditions placed on the users of the network, for security offered by

the network and shall make available a document describing these

features and their applications.



3.4 Network architecture



The following means of computer-to-computer and user-to-computer

access are commonly encountered:



o Private Circuits,

o Public Switched Telephone Network,

o Public data networks (PSS, for example),

o Local Area Networks (of various types), and

o Integrated Services Digital Network (called IDA in the UK).



3.4.1 Private circuits



Private Circuits are often perceived as being secure because of their

immunity to logical attack, that is, hacking. They are not necessarily

physically secure because their fixed routing may make them vulnerable

to direct interception. Typically, Private Circuits may be routed via

the distribution frame of the local exchange and the building serving

the user. Unless otherwise protected, the information on the Private

Circuit is vulnerable to interception at these points.



3.4.2 Public Switched Telephone Network (PSTN)



The PSTN is open to public access and is the favoured medium for

unauthorised access world-wide. Because Calling Line Identification

(CLI) is not currently provided as a basic facility, it is not easy to

identify the origin of connection attempts. For this reason, dialup

PSTN access to BT systems containing sensitive data is forbidden

unless adequate precautions are taken. 



The connection of computers to the PSTN for the purposes of

outward-bound connections to information service providers is strongly

discouraged unless it can be demonstrated that the connection

equipment cannot be subverted or incorrectly configured so as to

permit inward-bound connections. 



POLICY 3.12: PSTN CONNECTION TO BT SYSTEMS



BT computer systems containing or processing sensitive information

shall not be connected to the PSTN unless adequate precautions are

taken to protect the system from unauthorised access.



3.4.3 Public data networks



Worldwide, there are many different data networks available to the

public. The following comments refer specifically to BT's UK data

network known as PSS. 



In general, there are two methods by which a connection to PSS can be

achieved: ]



o by direct connection (a private circuit connecting the user to the

X25 network), or 



o by dial connection (via the PSTN, to an X25 PAD in the network).



Each user of PSS is identified by a Network User Address (NUA) which

is analogous to a telephone number. Where the user is directly

connected to PSS, the NUA is permanently associated with that line and

can provide a valuable check on the user's identity.



If the user gains access to the PSS by dial connection to a PAD, he

identifies himself to the network by means of a password (sometimes

called the Network User Identity, NUI). This is, in turn, checked by

the network management software to find the corresponding NUA of the

user. Because the NUA does not identify a particular line or location,

security may be compromised if a password is discovered by other people.



Use of the following facilities can decrease the vulnerability of the

PSS to attack:



o All authorised users can be included in a Closed User Group (CUG).

In effect, this creates a private network not available to

unauthorised parties. However this advantage may be compromised if the

CUG includes the NUAs of dial-up users who are authenticated only by

passwords.



o The caller's Network User Address (NUA) provided by PSS can be

checked by the host against a list of authorised callers.



3.4.4 Local area netvorks



Access to computers and computer-to-computer communications via LANs

may present a substantial risk to security. Most LANs are implemented

using a shared transmission medium which broadcasts all the signals to

most or all of the attached nodes. Some LANs support Closed User

Groups (CUGs) in a manner analogous to the PSS and so may also provide

some call origination information. The relative ease of user access to

LAN control software and hardware makes dependence on the security of

any of these facilities unwise. The situation is especially aggravated

where LANs are connected by gateways to one another, the PSS, or to

the PSTN. In each case the risk of unauthorised access is increased

enormously. See earlier CSM Policies in this section regarding the

interconnection of networks. Data on LANs are generally regarded as

being at risk because: 



o Most LANs are designed around a shared communications facility which

generally broadcasts signals to all of the attached nodes, security

being dependent on access points ignoring messages not specifically

addressed to them. 



O LANs are frequently used as the carriers of Office Automation

facilities in the office environment where system security was not

necessarily a prime consideration in the original choice of the

accommodation. 



O LAN signalling sometimes extends into the radio frequency spectrum

and, if electromagnetic signals are emitted from the cabling, LAN

traffic can be intercepted (see also TEMPESI) .



Strong methods of user authentication must be implemented if privacy

marked information is transmitted over the LAN so special precautions

may need to be applied to LANs in order to enhance their operational

security. Three particular types of LAN are defined below:



3.4.4.1 Exclusive LANs

An Exclusive LAN is one where its security depends on:



o its use being restricted to only those users who have an operational

need to use it 



o its access points being within BT secure premises



o its not being connected to another network - public or private.



If the LAN spans several buildings, the links between those premises

should be secured by encryption.



3.4.4.2 Access-controlled LANs



An Access-controlled LAN is one which incorporates special precautions

to restrict access between users and resources. All resources

accessible from equipment under a user's control, for example a dumb

terminal, PC or workstation are protected by strong authentication

mechanism. Strong authentication is an authentication mechanism that

is resilient to eavesdropping and masquerade attacks in the context of

the communications network between user and system. 



Authentication of connections to LAN nodes may be implemented using

systems based on Kerberos. (Further advice may be obtained from D&P

Data Security Laboratories, see Section 11).



Where there may be a number of separate LAN segments interconnected by

bridges or gateways, each individual LAN segment must comply with the

access control policy. 



3.4.4.3 Ordinary LANs



An Ordinary LAN is one which does not meet the security criteria for

an Exclusive or an Access-controlled LAN.



3.4.4.4 LAN Usage



In general the following applies:



LAN Type       Usage



Exclusive          In Strictest Confidence

Access Controlled  In Confidence

Ordinary           Non-Privacy marked



Note that use of a specific LAN architecture does not negate the use

of other mandatory features which may be required for handling

sensitive information.



The security of a LAN is a complex issue, especially when the

mechanisms for processing, storing, or transmitting sensitive

information do not all offer the same level of security. In this case

contact the Commercial Security Unit for further guidance.



POLICY 3.13: LOCAL AREA NETWORKS



A LAN shall be characterised as one of Exclusive, Access Controlled,

or Ordinary so that the owners, administrators, and users, are aware

of the security controls that must be enforced.



3.5 Threats to networked systems



Four major threats exist to networked systems:



1 Disclosure of information stored or in transit on the network.



2 Masquerading as an authorised user.



3 Accidental or unauthorised modification, insertion or deletion of

the information stored or in transit on the network, and



4 Denial of the use of the network to those entitled to use it.



3.5.1 Information disclosure



Much sensitive information (access information as well as user data)

can be gained from illicit interception of telecommunications signals

by tapping and bugging. These activities are usually committed against

local lines rather than the main network. This is because local plant

is more accessible to illicit interception and there is little or no

confusion from other multiplexed signals. 



All forms of radio, microwave, infrared and other beam transmission

techniques are also vulnerable to interception.



Four classes of countermeasures may be brought to bear to reduce the

risk of information disclosure. These are:



o Data separation,

o Physical protection,

o TEMPEST protection, and

o Cryptographic protection.



3.5.1.1 Data sparation



Depending on the architecture of the chosen network, information of

varying sensitivity may be in transit simultaneously across a single

channel. Under these circumstances, there needs to be a clear

distinction between the level of sensitivity of information. This can

be achieved by either: 



o commencing a new single-level communications session each time there

is a change to the level of data sensitivity, or



o Labelling each item of data with its sensitivity in such a way that

the protocol used on the multi-level channel provides clear indication

of the sensitivity, and facilitates unambiguous pairing between the

label and the associated data received or sent. 



In either circumstance, the communication channel should be secured to

handle the most sensitive information that it is expected to carry.



3.5.1.2 Physical protection



Because any network may be vulnerable to eavesdropping, special care

must be taken when transmitting highly sensitive information.



Many networks are located in buildings that are considerably less

secure than purpose-built computer centres. When planning the

installation of the network, the guidelines and suggestions detailed

in the section on Electronic Systems Installations should be followed

as far as possible.



On these occasions, where it is operationally necessary to install

networks in insecure buildings, including those to which members of

the public have access, the following additional points must be

considered:



o cabling should be continuous and not be routed through areas where

public access is permitted. If this is not possible it should be

contained in heavy duty grounded metal conduit preferably requiring a

specialised tool to remove the inspection plates.



o where sensitive information is likely to be transmitted on a

network, consideration should be given to using protected cable.



o where sensitive information is transmitted, consideration should be

given to housing termination points, ie. wall mounted coaxial sockets,

in proprietary lockable metal boxes. These must be kept locked at all

times when authorised staff are not present.



o after the installation of cabling, particularly when completed by

outside contractors and in a building not dedicated to BT use, the

routing of the cable must be thoroughly inspected to ensure that it

meets the original specification and that it has not been routed to

locations which could be used by potential eavesdroppers.



o the power switches of network connected terminals should be fitted with

proprietary lockable boxes (which are kept locked!) .



POLICY 3.21: NETWORK MONlTORING



The use of network monitoring equipment must be strictly controlled.



3.5.1.3 Tempest protection



Communications lines, personal computers, Visual Display Units (VDUs)

and printers may radiate significant amounts of radio frequency energy

and it is possible for data displayed on a screen or being printed to

be intercepted. TEMPEST is the name of the technology that enables

this unintentional radio emission to be reduced to acceptable

proportions. In practice the signals can only be received over a short

distance and identifying one particular VDU/printer among several

others is difficult. Although the threat may be real in some military

situations, for the commercial world it must be considered a threat

only when the information being handled is extremely sensitive.



For specialist advice on the applicability and methods of TEMPEST

protection, refer to Section 10.



3.5.1.4 Cryptographic protection



The use of cryptographic techniques is not limited in its application

to the protection of communications networks. This topic is covered in

the Cyptographic Protection section.



3.5.2 Unauthorised access



Connection requests across a network should be verified as to their

authenticity. The chosen authentication mechanism should not place

undue or unwarranted trust on the network to carry the authentication

information accurately or in secrecy unless it has been proved able to

carry out that function. Care should be taken to ensure that the

chosen mechanisms for user authentication are sufficiently strong and

that they are managed correctly.



It is important to realise that user authentication information is

carried across the network and should be appropriately protected, that

is, with the same rigour as that afforded to the information that it

protects. If cryptographic methods are used to facilitate access

control, then the algorithm, configuration and key management must be

approved by the Director of Security and Investigation. Where

cryptographic keys are shared, a method of personal authentication

should be used in addition.



If a strong method of authentication (eg. a one time password) is

used, then this may be adequate as the sole means of authentication.

Otherwise, in addition to personal authentication, authentication of

the recipient's point of entry to the communications network is

required. To be acceptable this must reliably identify the recipient

as being at a fixed physical location. This location must be

authenticated as one at which the recipient may receive the

information. Suitable methods are dependent on the type of connection

and are as follows: 



o PRIVATE CIRCUIT - The recipient should be connected via a private

circuit to a fixed location.



o PUBLIC DATA NETWORK - The recipient should be at an authorised fixed

address which is verified by the originator, or should be a member of

an authorised CUG, or authenticated by a one-time password system in

the network.



o PUBLIC SWITCHED TELEPHONE NETWORK- The recipient should be at an

authorised fixed address which is verified by the originator by

dialling-out or by a dialback device approved by the Director of

Security and Investigation. 



o INTEGRATED DIGITAL ACCESS - The recipient should be at an authorised

address which is verified by the originator by dialling-out or by

checking the Calling Line Identification.



o LOCALAREA NETWORKS - The recipient should be at an authorised port

on an access-controlled LAN, or at any port on an exclusive LAN.



o OTHER DATA NETWORKS - The recipient should be at an authorised port

on a BT-only data network which does not use broadcast transmission.



POLICY 3.14: NETWORK ORIGIN AUTHENTICATION



The identity of network users shall be authenticated. Where the method

of authentication is weak, strong technical methods shall be employed

to determine the point of access of the originator into the network. 



3.5.2.1 Dialback



The security of dial in access may be enhanced by providing an

'Automatic Dialback' facility whereby the caller is forced, at the

outset of a call, to declare his identity to the system. The equipment

terminates the call and dials the caller on a different outgoing-only

line using a telephone number it associates with the caller's declared

identity. This prevents access from arbitrary telephone locations and

offers an audit and accountability mechanism.



Some types of dialback device may be defeated by quite simple

techniques, and therefore do not give the intended protection. Only

the system administrator should be able to modify the list of

authorised telephone numbers stored in the dialback equipment.

Dialback systems used to protect BT's commercially sensitive

information must be approved by the Director of Security and

Investigation.



In some systems manual dialback may be appropriate, however, whether

dialback is automatic or manual, a full log of each access should be

maintained. Because Dialback units only provide authentication of the

point of entry into the Public Switched Telephone Network (PSTN),

other measures should be taken for High Impact Systems.



Dialback techniques can be rendered ineffective if the exchange offers

a Call Diversion facility.



POLICY 3.15: DIALBACK



Where the method of network user authentication is weak, the point of

access into the network shall be established using a dialback unit

that has been approved by the Director of Security and Investigation.



3.5.3 Modification, insertion and deletion



Special measures may need to be taken to ensure that information is

not lost or corrupted in transit across a network. For example,

message sequence numbers can be used to detect the accidental or

deliberate deletion or insertion of entire blocks of information in

the information stream.



Accidental modification of the information in transit can be detected

by the use ofcomparatively simple techniques, for example checksums or

Cyclic Redundancy Checks (CRCs). Where it is anticipated that

deliberate attempts will be made to modify information then

cryptographic techniques may be appropriate.



Cryptographic techniques may be used to prove:



o that data has not been modified,

o the identity of the originator of information,

o that information has been delivered to its intended destination, and

o the source of information into a network.



Note that the adoption of cryptographic techniques for one purpose may

offer the opportunity of other checks. For example, the adoption of

Digital Signatures will provide a facility to enable the detection of

accidental or deliberate modification of information. Cryptographic

techniques are technically difficult to design and implement such that

their use and management is not prone to errors and subsequent

security failures. Because of this, the use of any such equipment must

have the approval of the Director of Security and Investigation.



POLICY 3.16: DIGITAL SIGNATURES



In the design of systems where proof of origin of a message must be

ascertained, Digital Signature techniques shall be considered and

documented.



POLICY3.17: NON REPUDIATION SERVICES



In the design of systems where it is necessary to prove that the

intended recipient has received information, cryptographic techniques

to manufacture an incontrovertible receipt note shall be considered

and documented.



POLICY 3.18: DATA ORIGIN AUTHENTICATION



In the design of systems where there is a requirement to prove the

identity of the origin of data then cryptographic techniques shall be

considered and documented.



3.5.4 Denial or failure of service



In the office environment there is generally no need to provide

fallback communication systems as the standard response time for fault

correction is adequate for most requirements. However, for systems

which use private circuits or the PSS as the prime means of

communication, it is worth considering using PSTN as a fallback for

nonsensitive data provided that the PSTN connection is not made

permanent.



At purpose-built computer centres the situation is somewhat different

as most systems would become useless in the event of loss of their

communications links. Some link redundancy is generally necessary to

protect against this. Communication links that are provisioned as

backup should if possible, be terminated on different hardware in the

system and routed via different cable ducts and transmission routes so

as to minimise the danger of loss of both links in the event of a

hardware failure.



POLICY 3.19: NETWORK AVAILABILITY



In the design of systems, measures shall be taken to ensure that the

availability of the network satisfies the system's requirement.



3.6 Cryptographic protection



Modern encryption techniques are regarded as offering a formidable

barrier to any adversary and probably an insurmountable barrier unless

substantial computing power is available or the key and algorithm are

compromised. 



The use of cryptographic techniques can contribute significantly to

security by offering strong mechanisms to:



o authenticate the user,

o authenticate the calling location,

o assure message integrity,

o maintain the confidentiality of messages.



The use of encryption is not without operational problems some of

which are listed below:



o encryption packages inevitably involve an overhead in terms of key

management and administration although, in some public key systems,

this overhead is reduced.



o serious problems can arise if individuals forget their keys or

become indisposed etc. As a precaution, it may be prudent to keep

duplicate cryptographic keys or copies of the files in unencrypted

form. Any such duplicates must be kept securely.



o encrypted information may contain control characters which make it a

prerequisite that any protocol used to transmit a file electronically

is completely transparent to the file contents. It is likely that

encrypted data would interfere with many network operating systems. As

a result either considerable tailoring of a system or specially

developed encryption packages would be required to enable encrypted

data to be transmitted.



o some encryption systems are not suitable for every type of network

so expert advice must be sought.



Encryption systems used to protect BT's commercially sensitive

information must be approved by the Director of Security and

Investigation.



POLICY 3.20: APPROVAL OF USE OF CRYPTOGRAPHY



Any cryptographic techniques or encryption systems selected to

safeguard BT information shall have been approved by the Director of

Security and Investigation prior to their use.



3.7 Electronic Mail Systems



There are considerable risks associated with current electronic mail

systems. In particular, data may be forged, altered, redirected or

intercepted. Although techniques are being developed to solve many of

these problems, users of electronic mail systems should be aware of

their present limitations. The advice given here is for guidance and

is intended to highlight areas of concern. In the future specific

policies will be produced to cover electronic mail security.



Authentication



Currently, most systems authenticate users by means of User IDs and

passwords. This is not a strong means of authenticating users.

Electronic mail systems should not be used as a means of providing

authorisation to other individuals for carrying out tasks unless they

have been specified, designed and installed for that purpose. For

example, it should not be possible to requisition goods on the basis

of an uncorroborated electronic mail message. At present, in the UK, a

handwritten signature is a legally-binding proof of authorisation.

Electronic mail systems using weak authentication do not offer the

required level of proof and assurance of the origination of a message.

Designers of electronic mail systems should look at

currently-available technologies which offer scope for proof of

origination.



Integrity



Without appropriate coding techniques, messages may easily be

intercepted and modified or replayed. Designers of systems should

ensure that the threats are understood and that appropriate

countermeasures are adopted. Digital signatures can be used very

effectively to ensure the integrity and authenticity of a message.



Labelling



Labelling is a way of attaching a marker to a message, file or segment

of data, to indicate a specific attribute. Often the attribute is the

sensitivity of the information. Systems which make use of labels are

able to utilise sophisticated access methods for permitting access to

data An example might be a system which permitting IN CONFIDENCE

material to be redirected to a colleague for action, perhaps because

of holiday arrangements, but which did not permit STAFF IN CONFIDENCE

material to be so directed.



Mail redirection



Automatic electronic mail redirection should not be used unless it is

possible for the message originator to know that message redirection

is in operation.



Account usage



Where it is operationally necessary for another person to use an

electronic mail account for a short time, it is imperative that a hand

over is arranged in a manner which ensures:



o that any password is only known by one person



o that the time period during which the account is temporarily managed by the

other person is documented and recorded by the system manager.



The system manager is the only person authorised to make and record

such a change, and must ensure that the required written authorisation

is signed by the user.



Electronic systems installations



Contents



4.1    Introduction . . . . . . . . . . . . . . . . . . 4-2



4.2    Accommodation. . . . . . . . . . . . . . . . . . 4-2

4.2.1  Natural disasters. . . . . . . . . . . . . . . . 4-2

4.2.2  Civil unrest . . . . . . . . . . . . . . . . . . 4-2

4.2.3  Neighbouring accommodation . . . . . . . . . . . 4-3

4.2.4  Fire . . . . . . . . . . . . . . . . . . . . . . 4-3



4.3    Services . . . . . . . . . . . . . . . . . . . . 4_4

4.3.1  Electrical power . . . . . . . . . . . . . . . . 4-4

4.3.2  Maintenance of local environments. . . . . . . . 4-5



4.4    Electronic system equipment sign posting . . . . 4-5



4.5    Physical access conol strategy . . . . . . . . . 4-5

4.5.1  Access to secure areas . . . . . . . . . . . . . 4-6

4.5.2  Data cabinets and safes. . . . . . . . . . . . . 4-6



4.6    Personnel access . . . . . . . . . . . . . . . . 4-7

4.6.1  Staff, official visitors and other personnel . . 4-7

4.6.2  'General interest' visits. . . . . . . . . . . . 4-7



4.7    System or master consoles. . . . . . . . . . . . 4-8



4.8    Other terminals. . . . . . . . . . . . . . . . . 4-9



4.9    Communications rooms and equipment . . . . . . . 4-9



4.10   Media libraries and disaster stores. . . . . . . 4-9



4.1 Introduction



Security of significant computer or network installations concerns not

only the security of the computer and electronic hardware but also the

protection of systems in general, software, user data, media library

facilities, communications networks and the safety and well being of

personnel.  These installations need to be protected against the

effects of events such as fire, flood, loss of power, failure of

air-conditioning and ancillary plant and damage by natural or man-made

hazards. This chapter should be read in conjunction with the Physical

Security Handbook. 



4.2 Accommodation



During the planning of an electronic installation due consideration

must be given to both the location of the building that will house the

equipment and the placement of the equipment within the building as

this has a direct effect on the overall security requirements. The

following factors must be considered when selecting installation

sites:



o natural disasters,

o civil unrest,

o neighbouring accommodation,

o fire.



4.2.1 Natural disasters

Certain natural disasters could either severely damage the

installation directly, or prevent its operation by unavailability of

staff.



These include:



o Local flooding including fracture of air conditioning or water

cooling equipment.

o Local landslide, subsidence and so on,

o exceptional weather conditions.



4.2.2 Civil unrest

Electronic system installations might be popular targets for attack by

politically motivated groups and individuals as well as by mobs. It is

undesirable that an electronic system site should be in a vicinity

with:



o unusually high risk of mob violence,

o unusually high incidence of criminal and malicious damage,

o unusually high risk terrorist activity.



If such a site is unavoidable, additional levels of physical security

may be appropriate.



4.2.3 Neighbouring accommodation

Even if the areas housing the electronic system equipment are well

designed, there could be possible hazards from incompatible

neighbouring accommodation both internal and external to the equipment

such as:



o staff restaurants, fuel storage areas (risk of fire),

o washrooms, piped water facilities and tanks (risk of flood),

o electrical generator rooms, railways, radio and radar transmitting

stations (risk of vibration and electromagnetic interference).



POLICY 4.1: SlTlNG OF ELECTRONIC SYSTEMS



The physical siting and location of an electronic system shall be

planned with due regard to security considerations from the inception

of the planning process. The effects of natural disasters, civil

unrest and threats from incompatible neighbouring accommodation shall

be taken into consideration when planning purpose-built electronic

system installations.



4.2.4 Fire

Fire remains one of the most serious of all security hazards

especially in data preparation and media library areas where large

quantities of combustible material are present and electronic

equipment is often allowed to run unattended. Detailed advice on fire

precautions must be sought from local fire safety experts but the main

considerations are: 



o limitation of whole-building fire risk,

o limitation of fire risk in main computer and electronic system room,

o limitation of fire risk in data preparation areas.



The necessary preventative measures include:



o partitioning of the installation into fire compartments,



o use of fire-retardant construction materials,

automatic fire detection equipment,



o automatic fire alarm systems (may be linked directly to local fire

station),



o automatic fire suppression equipment (especially Halon gas or

similar systems in the main computer and electronic system room. The

traditional view is that sprinklers are inappropriate here because of

the affect of water on the electronic hardware. Halon has

environmental and safety problems so expert advice must be sought.),



o manual fire fighting equipment, and



o enforcement of fire safety procedures (such as no smoking areas) .

For specific guidance you should refer to Chapter 10 for the BT Fire

Safety Manager in the BT Safety Unit. 



POLICY 4.2: FIRE THREATS



The threat and impact of fire shall be taken into consideration when

planning dedicated electronic systems installations.



4.3 Services



The security of services and especially electric light and power

should be considered where appropriate during the siting of electronic

system installations. Provisions may need to be made to cater for a

growth in requirements. 



4.3.1 Electrical power



Standby power sources should be available for all systems where

availability has been identified as important. Any emergency power

supplies should provide no-break protection otherwise data will be

corrupted during switching. It should be tested regularly and there

should be sufficient fuel available. When the power load of a unit is

extended, checks should be carried out to ensure the power of the

standby source is sufficient. 



Standby power should be invoked not only in the event of total

disruption of primary power, but also at any time that primary power

falls outside (above or below) the equipment manufacturer's

specification. Standby power should also be available to ensure

continued operation of all security monitoring and access control

devices. The provision of adequate monitoring facilities should enable

switch over to occur before the equipment manufacturer's specification

is exceeded.



POLICY 4.3: EMERGENCY POWER SUPPLY



Electronic systems shall be safeguarded from the threat of disrupted

electric power by the provision of standby power facilities where

appropriate. 



Power supplies used for systems containing high-sensitivity or

high-availability applications and data must be monitored periodically

to ensure sufficient quality of power for the safe and reliable

operation of these systems.  Computer systems are extremely sensitive

to the quality of power delivered. Good grounding, "clean" isolated

power (no transient voltage spikes, brownouts, sags, intermittent

losses) and reliable connections and cabling are essential.

Preferably, these should be verified prior to the installation of a

system.  For all applicable systems, the power conditions should be

measured at the point where power is applied to the system cabinets or

boxes. Periodic checks should be supplemented by checks done when

known power conditions change due to modifications in electrical

supply or load.



Power distribution panels, cabinets and rooms must be considered

sensitive areas and protected appropriately.



4.3.2 Maintenance of local environments



For electronic systems requiring a controlled environment (temperature

and humidity) main and standby air conditioning facilities should also

be provided. Any vents to the outside should also be physically

secured to prevent intruders.



POLICY 4.4: MAINTENANCE OF LOCAL ENVIRONMENT



The threat of electronic systems operating outside of their specified

temperature and humidity ranges shall be minimised by provision of

adequate equipment



4.4 Electronic system equipment sign posting



The location of electronic system equipment within a building, for

example connection points, communications frames, has a direct effect

on the overall security arrangements and must be considered carefully.



Ideally, computer and electronic systems should be located above

ground level, but below the top floor and away from exterior windows.

It is preferable that the installation should be windowless and with

no equipment visible from outside the building. Windows not only

represent a security hazard but also can have an adverse effect on

environmental controls. All external signposts of the facility or

obvious displays should be minimised. 



POLICY 4.5: SIGN POSTING OF ELECTRONIC SYSTEMS



Buildings housing electronic systems shall not be obviously marked or

signposted.



4.5 Physical access control strategy



General site security is never a substitute for control of direct

access to the electronic system installation, which must always be a

secure area in its own right. 



Physical security is enhanced by enforcing several layers of defence,

often called 'Defence in depth'. Access to the site should be

controlled through a manned station which, in turn, regulates entry to

buildings specifically those housing important electronic systems.

Further access controls can then be enforced at the entrance to the

general computing area, and again at the doors to rooms containing the

computer and electronic systems, communications plant and media

library.



In summary, access to the actual computing and electronic system

facility must not be possible except



o past a manned station, or

o through locked doors requiring speciat keys or codes to open.



To ensure compliance with a system security policy it may be a

requirement that sensitive systems are separated physically as well as

logically.



For more specific advice and guidance, refer to the Physical Securiy

Handbook.



POLICY 4.6: PHYSICAL ACCESS CONTROLS



In the design of systems, physical access controls shall be

implemented so as to prevent unauthorised access to sensitive areas.



Small installations which cannot economically justify a manned station

but use access control methods shall record the issue and receipt of

keys, and, where oractical, their use.



POLICY 4.7: SECURITY OF UNATTENDED BUILDING



Sensitive installations in unattended buildings should be physically

secure and alarmed through to an alarm monitoring station.



POLICY 4.8: PHYSICAL SECURlTY HANDBOOK



In the planning of accommodation and siting of electronic systems

attention shall be paid to the recommendations and guidance documented

in the Physical Security Handbook.



4.5.1  Access to secure areas



Subject to fire regulations, there should be a minimum number of

physical access points to the secure area housing the electronic

system installation, preferably one usual portal and one emergency

exit, the latter opening outwards only from the installation.



Even if authorised staff are present in the vicinity of computer and

electronicsystems, all routes of entry should normally be locked; the

use of self-closing and self-locking doors is recommended. 



4.5.2 Data cabinets and safes



In addition to the access controls, physical protection for the data

itself must be provided. A Data Cabinet or Data Safe is used to

protect magnetic media against hazards such as Fire, Dust, Pilferage,

Accidental or Malicious damage and the effects of water from

sprinklers. Where the information recorded on the magnetic media

warrants a higher level of physical security, the Data Cabinet or Safe

should be kept in a Strongroom or a proprietary Security Safe. 



IN CONFIDENCE and encrypted IN STRICTEST CONFIDENCE marked media may

be stored in Data Cabinets, provided correct procedures are in force

for the control of the data cabinet keys or combination locks.

Unencrypted IN  STRICTEST CONFIDENCE marked media may also be stored

on an occasional basis. For regular storage of small quantities of IN

CONFIDENCE or unencrypted IN STRICTEST CONFIDENCE marked media, a data

insert for filing cabinets is available which may be used to store

such media in approved security furniture.



For further advice, refer to the Information Security Code.



There are standing arrangements for the purchase of Data Safes; refer

to Chapter 10 for further information.



4.6 Personnel access



4.6.1 Staff, official visitors and other personnel



Access to sensitive computer and electronic system installations

should be allowed only to those with a genuine need to perforrn their

duties. Other personnel (maintenance engineers, cleaners) must conform

with a formal logging procedure for entry. They should be accompanied

at all times. A visitor remains the responsibility of the host for the

duration of the visit.



All personnel, including visitors and non-BT staff such as cleaners

and maintenance engineers, must be issued with passcards. The style of

the passcards should be such that the bearer can be identified as

regular staff or a visitor, as such, the passcard must be displayed

clearly at all times whilst within the building. 



Special consideration should be given to controlling the access of

ancillary personnel such as cleaners and service engineers (BT and

non-B. Temporary changes such as building work or accommodation moves

must not be used to justify a relaxation in procedures. Special

arrangements should be made to accommodate these.



POLICY 4.9: PERSONNEL IN SENSITIVE AREAS



Only authorised people shall have access to sensitive areas.

Procedures shall be in place and maintained to control the access of

external maintenance engineers or other personnel. 



POLICY 4.10: MANAGEMENT AND USE OF PASSCARDS



Passcards shall be issued and worn at all times. Their style shall be

such as to enable a clear distinction between regular staff, BT and

non-BT visitors. 



For specific advice and guidance, the Information Security Code applies.



4.6.2 'General interest' visits



Although BT wishes to maintain good relations with the community,

general visitors are not permitted into operational computer centres.

Visits to associated premises may be permitted but should not be

actively encouraged. Any request for a visit should be considered on

its merits by local management. 



When a visit is arranged, the following measures must be taken to

minimise the risk:



1 Formal entry and exit procedures must be scrupulously followed.



2 Visitors must be issued with passcards.



3 Parties must be organised so that they are of manageable size so as

to ensure that all visitors are accompanied and supervised at all

times. A ratio of five visitors to each BT guide one of whom must be

at least a level 2 manager (MPG4), is suggested.



4 The route and timetable must be preplanned and strictly followed so

as to avoid all sensitive areas.



5 Areas of work which are demonstrated must be selected to avoid close

up viewing of sensitive information (such as logging on procedures,

network access numbers and customer data) .



6 Staff must be given adequate warning of impending visits so that

sensitive material and access methods can be concealed.



7 Passwords must be changed after any such visit if it is considered

that any have been compromised.



8 Any handouts must have been authorised by the local manager in

accordance with the Information Security Code.



9 The carrying by visitors of cameras and electronic devices capable

of interference with computer systems must be prohibited.



POLICY 4.11: GENERAL INTEREST VISlTS



Local rules governing visitors and visits shall be documented.

Visitors shall be guided so as to exclude them from all sensitive

areas. Refer to the Physical Security Handbook for guidance.



4.7 System or master consoles



Controls against unauthorised activity are essential on electronic

access to computer and electronic system facilities, in particular

over communications links but also to computer and electronic system

consoles. System or master consoles usually provide access to highly

privileged activities, for example system administration and software

or machine maintenance; others may provide enhanced operator

privileges necessary for efficient machine usage.



Master consoles must be located in the most physically secure

environment available within the computer and electronic system

building complex to prevent unauthorised use of the console. The

consoles must be sited so that use may not be overlooked and cabled so

that their traffic cannot be intercepted. 



Access to master consoles must be restricted and all operations

recorded. The log or journal should be regularly scrutinised to

identify any signs of irregular or unauthorised usage.



POLICY 4.12: USE OF SYSTEM CONSOLES



Procedures concerning the proper use of primary system consoles or

system terminals shall be documented and the application of those

procedures enforced.



4.8 Other terminals



Terminals outside the computer and electronic system room should not

have access to operator or other special privileges. Other users which

might need access to privileged commands might include software

support groups, network management groups and remote software

engineers. If privileged access is required, and the temporary use of

a terminal other than the primary or system console cannot be avoided,

its use should be strictly controlled, supervised and, in some

circumstances, audited.



Terminals located in non-BT buildings deserve special attention to

ensure that their use cannot compromise the security of BT systems to

which they may be connected.



4.9 Communications rooms and equipment



All communications equipment must be sited in a physically secure

environment within the installation and must be subject to their own

restricted access controls. Where it is not possible to locate

communications equipment within dedicated accommodation then the

equipment itself should be physically secured in purpose built

lockable furniture. 



Cable entry points, risers and runs shall be provided with adequate

protection to prevent unauthorised access, and accidental or

deliberate damage. 



POLICY 4.13: COMMUNICATIONS EQUIPMENT PHYSICAL SECURITY



Communications equipment shall be located in its own secure

environment or in secure furniture and subject to restricted access

control appropriate to the sensitivity of the data being communicated. 



4.10 Media libraries and disaster stores



Special care must be taken to safeguard media libraries and disaster

stores. Data held in a compact form is particularly vulnerable to

accidental or malicious damage and its security depends on physical

protective measures, access control and staff reliability.



Both the media library and the disaster store must be restricted to

specifically authorised staff.



The disaster store must be sited so that it will be unaffected by any

incident at the computer centre. It must also be sited so that the

contents are not affected by strong electromagnetic influences. See

the Physical Security Handbook for further guidance.



POLICY 4.14: DISASTER STORE



Any disaster store shall be physically protected and remote from the

computer centre. Access to the store shall be governed by local

operational instructions.





+++

EOF

=============================================================================

   		PHUK MAGAZINE - Phile 9 of 10

=============================================================================



			---------------

			Notes & Queries

			---------------



Note: Notes & Queries is the section where the readers send in any

questions, problems etc that they might have, and other readers can

send in the answers. Obviously, in the first issue of a magazine, this

is not going to work!! However, just to be a pain in the arse, and

just to pad out this section, we have gone to all the trouble to ....

... make some up!!! 





Q: Does anyone have a full list of BT Star services?



A: It just so happens that I do .....



------------------------------------------------------------------------------

                 SYSTEM X STAR SERVICES - QUICK REFERENCE SHEET

------------------------------------------------------------------------------

Divert all calls            *21*TEL NO#    #21# TO CANCEL

Divert on busy              *67*TEL NO#    #67# TO CANCEL

Divert on no reply          *61*NUMBER#    #61# TO CANCEL

------------------------------------------------------------------------------

Bar incoming calls          *261#          #261# TO CANCEL

Bar outgoing call           *34X# ; x below:    OLD -CODES-   NEW

         Stop all but 999 & 151                 N/A            1

         Stop national/international            N/A            2

         Stop calls starting "0" (non-local)    2              N/A

         Stop international "010"               3              3

         Stop operator calls/services NOT 151   4              4

         Stop star services except this one!    5              5



Cancel outgoing call barring               #34X*KEYWORD#

To check outgoing call barring             *#34#

------------------------------------------------------------------------------

Storing a code calling number              *51*CODE*NUMBER#

Checking a stored code                     *#51*CODE#

Dialling a stored number                   **CODE

Repeat Last Called Number                  **00

------------------------------------------------------------------------------

Reminder call               *55*TIME#      #55# TO CANCEL

Reminder call (DAY)         *56*TIME*X#    #56*TIME*X# CANCELS

       x=1-Mon, 2-Tue, 3-Wed, 4-Thu, 5-Fri, 6-Sat, 7-Sun, 8-Mon-Fri, 9-Every

Check what reminder calls are active       *#56#

------------------------------------------------------------------------------

To hold caller one and make call 2         [R] NUMBER

Shuttle between (holding other)            [R] 2

Open a three way conversation              [R] 3

End call with current, shuttle to other    [R] 1

Disconnect from caller 1 on a three way    [R] 5

Disconnect from caller 2 on a three way    [R] 7

------------------------------------------------------------------------------

Call waiting                *43#           #43# TO CANCEL

Reject an incoming call                    [R] 0

Take a waiting call (After current call)   [R] 1

Take a waiting call (hold current caller)  [R] 2

Shuttle between callers                    [R] 2

------------------------------------------------------------------------------

Advice on call cose         *40*TEL NO#

Set up for all calls        *411#          #411# TO CANCEL

------------------------------------------------------------------------------

Check on services currently operating      *#001#    (Sys X only)

------------------------------------------------------------------------------



--



Q: In the light of the recent BT "hacking" case can anyone tell me

the difference between what the media call "hacking" and what the

lawyers call "Breach of Confidentiality"?



A: Um, No! Can any of our more legal-eagle style readers please

enlighten us?



--



Q: In the light of the recent BT "hacking" case, I was just

wondering, what WAS the oh-so-secret telephone number for the 

Queen?



A: Last time I looked the Queen's telephone number was 071-445-2865,

oh and by the way, that oh-so-secret MI5 number was probably

0800-894-410, because they gave everyone a hard time when you rang

it!! (Let's just say that they got all secretive and asked where we

had got this number ......) Just remember ... PHUK magazine ...you

heard it here LAST!!!



--



Q: Can you make up anymore stupid questions before everyone gets

bored?



A: No, we can't! That's why we want YOU the reader to send your

questions and answers to us, at anon93143@anon.penet.fi .... so that

we have more to publish and can keep phukmag goin with the minimum of

effort on our part (of course) so that we can spend more time playing

with computers and less time asking people for the articles they

promised 3 months ago ......



+++

EOF

=============================================================================

   		PHUK MAGAZINE - Phile 10 of 10

=============================================================================





				-----

				OUTRO

				-----



Well, its been fun hasn't it? What's that I hear you say? It hasn't!

What the articles were too biased towards phones and not enough

hacking? You thought the articles were feeble? You think you could do

better!! 



Well thats more like it .... if you think you can do better than the

articles in PHUK-zine then write them and send them to us. We always

need snippets of news, articles, code, numbers, hints, tips and

general ideas to keep the ball rolling.



Anyhow, next month we have the following goodies for you ....



Green Boxing - DrKaos & TheGoat

BT Computer Security Manual Part II

Something on Novell Networks ...

Some trash from BT wastebins ....

And maybe something on hacking for a change ....:)



Send all articles, flames, Letters of Comment etc etc to PHUK

magazine, anon93143@anon.penet.fi, OR speak to any of the PHUK crew

at any London 2600 meeting .........



- have PHUN and be careful out there ... it a dangerous world and

getting worse by the minute!



- Phuk-Ed



+++

EOF



.