💾 Archived View for spam.works › mirrors › textfiles › law › ripco-wa.rra captured on 2023-06-16 at 19:02:03.
View Raw
More Information
-=-=-=-=-=-=-
*** SEIZURE WARRANT DOCUMENTS FOR RIPCO BBS ***
- *******************************************************************
On May 8, 1990, RIPCO BBS was closed and the equipment seized as the result
of a seizure warrant. FULL DISCLOSURE Magazine obtained publicly available
copies of the various documents related to the warrant, which are
reproduced below.
The documents include (in order presented):
1. Government's petition for Assistance during Execution of Search Warrant
2. ORDER approving assistance
3. Order authorizing blocking out income telephone and data calls
4. Application for order to block out calls
5. Application and affidavit for seizure warrant (Barbara Golden, affiant)
6. Application and affidavit for seizure warrant (G. Kirt Lawson, affiant)
Attached to the original documents (but not presented here) are an
application (by Ira H. Raphaelson and William J. Cook, United States
attorney and AUSA) to suppress the seizure warrant for 90 days, and a
variety of photographs of Dr. Ripco's premises.
- ******************************************************************
- ***************************************
Government's Petition for Assistance
- ***************************************
UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF ILLINOIS
EASTERN DIVISION
UNITED STATES OF AMERICA )
)
v. ) No. 90-M-187 & 90-M-188
) Magistrate James T. Balog
)
xxxx NORTH CLYBOURN, CHICAGO )
ILLINOIS AND xxxx NORTH )
LAWNDALE, CHICAGO, ILLINOIS )
GOVERNMENT'S PETITION FOR ASSISTANCE
DURING EXECUTION OF SEARCH WARRANT
The United States of America, by its attorney, Ira H.
Raphaelson, United States Attorney for the Northern District of
Illinois, petitions this Court for an order directing
representatives of AT&T's Corporate Security Division to accompany
Special Agents of the Secret Service during the execution of the
search warrant against the premises of xxxx North Clybourn,
Chicago, Illinois, and xxxx North Lawndale, Chicago, Illinois. This
petition is supported by the following:
1. The affidavit of Special Agent Barbara Golden of the
Secret Service is incorporated herein by reference.
2. AT&T has offered the assistance of Jerry Dalton and John
Hickey of AT&T Corporate Security/Information Protection to the
government and this Court. Both men are very experienced in the
operation of computers and especially in the analysis of UNIX
systems.
3. We also request that Sergeant Abigail Abrahams of the
Illinois State Police be authorized in the execution of the
aforementioned warrants. Sergeant Abrahams has investigated the
computer bulletin board (BBS) operation since approximately 1988
- 1 -
and has extensive details with respect to the structure of the BBS
and its contents.
While these individuals will not be seizing evidence, their
assistance is necessary to quickly read and identify the
critical files in the computer being searched. Moreover, their presence
during the search will insure that the records on the computer are
not accidentally erased and remain intact.
Respectfully submitted,
IRA H. RAPHAELSON
United States Attorney
BY: (signature of)
WILLIAM J. COOK
Assistant United States Attorney
- 3 -
UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF ILLINOIS
EASTERN DIVISION
UNITED STATES OF AMERICA )
)
v. ) No. 90-M-187 & 90-M-188
) Magistrate James T. Balog
)
xxxx NORTH CLYBOURN, CHICAGO )
ILLINOIS AND xxxx NORTH )
LAWNDALE, CHICAGO, ILLINOIS )
ORDER
In view of the specialized nature of the evidence that is
being sought in this warrant, _______________, as indicated in the
government's petition and the affidavit for the search warrant,
which is incorporated herein by reference;
It is Hereby Ordered that representatives of AT&T's Corporate
Security Division and Sergeant Abigail Abrahams of the Illinois
State Police accompany Special Agents of the United States Secret
Service during the execution of the search warrant to assist those
agents in the recovery and identification of the evidence sought
in the warrant.
(signature) James T. Balog
5-7-90 UNITED STATES MAGISTRATE
- 3 -
UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF ILLINOIS
EASTERN DIVISION
IN THE MATTER OF THE )
APPLICATION OF THE UNITED STATES )
OF AMERICAN FOR AN ORDER FOR THE ) No. 90-M-187 & 90-M-188
BLOCKING OF INCOMING TELEPHONE ) Magistrate James T. Balog
AND DATA CALLS AT (312 )528-5020 )
(312 )xxx-xxxx AND (312)xxx-xxxx )
ORDER AUTHORIZING BLOCKING OUT INCOME TELEPHONE DATA CALLS
An application having been made before me by Colleen D.
Coughlin, an Assistant United States Attorney for the Northern
District of Illinois, pursuant to Title 28, United States Code,
Section 1651, for an Order to "block out" incoming telephone and
data calls by the Illinois Bell Telephone company, and there is
reason to believe that requested actions are relevant to a
legitimate law enforcement investigation;
IT IS ORDERED THAT:
1. Illinois Bell Telephone company servicing said telephone
lines shall "Block out" of incoming telephone and data calls on
(312) 528-5020, (312) xxx-xxxx and (312) xxx-xxxx, which telephone
and data lines are on premises which are the subject of federal
search warrants to be executed the 8th day of May, 1990 at
approximately 0630 hours. Such "blocking out" of incoming
telephone and data calls shall commence at 0500 hours on May 8,
1990 and continue up to and incoming 1700 hours on May 8, 1990, or
until the completion of the search warrants, whichever is the
earlier.
2. The "blocking out" of incoming telephone and data calls
will likely assist in the execution of search warrants seeking
- 4 -
evidence of violations of Title 18, United States Code, Sections
1343, 1030, 1962, 1963, and 371.
(signature of)
JAMES T. BALOG
Magistrate
5-7-89 (sic)
- 5 -
UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF ILLINOIS
EASTERN DIVISION
IN THE MATTER OF THE )
APPLICATION OF THE UNITED STATES )
OF AMERICAN FOR AN ORDER FOR THE ) No. 90-M-187 & 90-M-188
BLOCKING OF INCOMING TELEPHONE ) Magistrate James T. Balog
AND DATA CALLS AT (312 )528-5020 )
(312 )xxx-xxxx AND (312)xxx-xxxx )
A P P L I C A T I O N
Now comes the UNITED STATES OF AMERICA, by IRA H. RAPHAELSON,
United States Attorney and Colleen D. Coughlin, Assistant United
States Attorney, and makes application pursuant to Title 28, United
States Code, Section 1651, the All Writs Act, for an Order to stop
or "block out" incoming telephone calls to particular telephone
and/or data lines, as described below, by the Illinois Bell
Telephone Company.
In support of this Application the undersigned states as
follows:
1. This Application seeks an order requiring the Illinois
Bell Telephone Company to "block out" incoming telephone and data
calls from 0500 hours until 1700 on May 8, 1990 regarding the
following numbers (312) 528-5020, (312) xxx-xxxx and (312) xxx-
xxxx.
2. The United States Secret Service has been conducting a
two year investigation into the activities of computer hackers
which will result in thirty-two search warrants being executed
across the United States on May 8, 1990 beginning at 0630 hours.
3. Because the United States Secret Service needs to ensure
the integrity of the evidence at each of these locations from
remote access tampering, alteration, or destruction, this "blocking
out" order is required.
4. This action by Illinois Bell Telephone will only "block
out" incoming calls and the telephones will at all times be capable
of making "outgoing" calls. Thus, the telephone lines will at all
times be available for emergency outgoing calls.
5. It is reasonably believed by the United States Secret
Service, based on experience and their investigation in this
case, that the requested action will be of substantial assistance
in forwarding this criminal investigation.
6. The All Writs Act, 28 U.S.C. 1651, provides as follows:
The Supreme Court and all courts
established by the Act of Congress may issue all
writs necessary and appropriate in aid of their
respective jurisdictions and agreeable to the
uses and principles of law.
7. A Federal Court has power to issue "such commands under
the All Writs Act as may be necessary or appropriate to effectuate
and prevent the frustration of orders it has previously issued in
the exercise of its jurisdiction...." UNITED STATES v. NEW YORK
TELEPHONE CO., 434 U.S. 159, 172 (1977).
WHEREFORE, on the basis of the allegations contained in this
Application, applicant requests this Court to enter an order for
"blocking out" of income telephone and/or data calls at the above
described telephone numbers.
It is further requested that Illinois Bell Telephone Company
may be ordered to make no disclosure of the existence of this
Application and Order until further order of this Court since
- 2 -
disclosure of this request to the individual or individuals whose
telephone lines are affected would threaten or impede this computer
investigation.
Respectfully submitted,
IRA H. RAPHAELSON
United States Attorney
By: (signed)
COLLEEN D. COUGHLIN
Assistant United States Attorney
- 3 -
- ***************************************************
{transcriber's note:}
Following is the APPLICATION AND AFFADAVIT FOR SEIZURE WARRANT,
Case number 90-M-187, dated May 7, 1990.
Affiant: Barbara Golden, Special Agent, U.S. Secret Service
Location: United State District Court, Northern District of Illinois
Judicial Officer: Magistrate James T. Balog
The warrant alleges violations under Title 18, USC, Sections
1343, 1030, 1029, 1962, 1963, and 371.
- ******************************************
--------------(Begin Barbara Golden's Affidavit)-----------------
State of Illinois )
) SS
County of Cook )
AFFIDAVIT
1. I, Barbara Golden, am a Special Agent of the United States
Secret Service and have been so employed for the past fourteen years; the
past three years as a Special Agent. I am present assigned to the
Computer Fraud Section of the United States Secret Service in Chicago. I
am submitting this affidavit in support of the search warrants for the
residence of Bruce Xxxxxxxxxxx xxxx North Lawndale, Chicago, Illinois
(including the detached garage behind the house) and his business address
at xxxx North Clybourn, Chicago, Illinois.
2. This affidavit is based upon my investigation and information
provided to me by Special Agent G. Kirt Lawson of the United States Secret
Service in Phoenix, Arizona and by other agents of the United States
Secret Service. I have also received information from Sergeant Abigail
Abrahams of the Illinois State Police.
3. Additionally, I have received technical information and
investigative assistance from Roland Kwasny of Illinois Bell Telephone
Corporate Security.
VIOLATIONS INVOLVED
4. This warrant is requested to recover unauthorized and illegally
used access codes posted on the RIPCO BBS by computer hackers and to
develop evidence of their illegal use of those codes in violation of
federal criminal laws, including:
- 1 -
a. 18 USC 2314 which provides federal criminal sanctions against
individuals who knowingly and intentionally transport stolen property or
property contained by fraud, valued at $5,000.00 or more, in interstate
commerce.
b. 18 USC 1030(a)(6) provides federal criminal sanctions against
individuals who, knowingly and with intent to defraud, traffic in
interstate commerce any information through which a computer may be
accessed without authorization in interstate commerce.
c. Other federal violations involved in this case may include Wire
Fraud (18 U.S.C. 1343), Access Device Fraud (U.S.C. 1029) and other
violations listed and described on page 15, 16, and 17 of the attached
affidavit of Special Agent Lawson.
LAWSON AFFIDAVIT
5. The attached affidavit of Special Agent Kirt Lawson is
incorporated herein in its entirety and is attached as Attachment 1.
Lawson's affidavit is based upon a two year undercover investigation of
the United States Secret Service involving an undercover bulletin board
located in Phoenix, Arizona. Essentially, Lawson's affidavit and my
investigation establish probably cause to believe:
a. Bruce Xxxxxxxxxxx, using the computer hacker handle "Dr. Ripco",
has been operating the RIPCO BBS in Chicago since approximately
December 10, 1983.
- 2 -
b. During the time period named in the Lawson affidavit unauthorized
access codes were posted on the RIPCO BBS by various computer hackers.
c. The access codes posted on the RIPCO BBS have been determined by
Special Agent Lawson to be valid access codes which are being used without
authorization of the true authorized user of the access codes. Moreover,
in many cases the access codes have been reported stolen by the true
authorized user(s).
d. Special Agent Lawson's investigation has further determined that
the access codes posted on the RIPCO BBS are not concealed from the system
administrator of the BBS and could be seen by the system administrator
during an examination of the BBS.
6. I have personally worked with S.A. Lawson on computer crime
investigations and known him to be a reliable agent of the Secret Service
and an expert in the field of telecommunication investigations.
7. I personally received the attached affidavit on May 1, 1990 and
have verified with S.A. Lawson that it is in fact his affidavit and have
verified with S.A. Lawson that it is in fact his affidavit and that it
accurately reflects his investigation. I have verified information with
respect to his investigation with Special Agent Lawson as recently as May
7, 1990.
- 3 -
UPDATED PROBABLE CAUSE
8. On May 1, 1990, I personally observed that the surveillance
cameras described on pages 32 and 33 of Lawson's affidavit still
appear to be in operation. (The antennas and surveillance cameras
located at the Clybourn address are reflected in the photographs
attached as Attachment 2.)
9. On May 4, 19900, I personally updated the status of the
telephone lines at the Clybourn address with Roland Kwasny of Illinois
Bell Telephone. Kwasny advised me that those telephones continue to
be in active service at this time.
ITEMS TO BE SEIZED
10. On pages 36 to 39 of his affidavit S.A. Lawson describes the
items to be seized at the search locations.
Locations to be Searched
11. The complete description of the business location to be searched
on Clybourn Street is contained on page 30 of S.A. Lawson's affidavit.
(Photographs of that location are in Attachment 2.) I have personally
observed the resident to be searched on Lawndale on May 1, 1990. The
photographs attached to this affidavit as Attachment 3 truly and
accurately show the residence known as xxxx North Lawndale, Chicago,
Illinois, as of May 1, 1990.
- 4 -
EXAMINATION OF COMPUTER RECORDS
13. Request is made herein to search and seize the above described
computer and computer data and to read the information contained in and on
the computer and computer data.
14. The following attachments are incorporated herein by reference:
Attachment 1 - Affidavit of S.A. Lawson (39 pages): Attachment 2 -
Photographs of the Clybourn address (2 pages); Attachment 3 - Photographs
of the Lawndale address (1 page).
(signature)
Special Agent Barbara Golden
United States Secret Service
Sworn and Subscribed to before
me this 7th day of May, 1990.
(signature)
James T. Balog
UNITED STATES MAGISTRATE
- 5 -
** (End Barbara Golden's Affidavit) **
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
** (Begin G. Kirt Lawson's affidavit) **
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
State of Arizona )
) SS
County of Maricopa )
AFFIDAVIT
1. Your affiant G. Kirt Lawson has been a Special Agent of the U.S.
Secret service for eighteen years and in the course of his employment has
investigated over 100 cases involving credit card fraud, theft, computer-
related crime, and other offenses. I have training from the Secret
Service in the investigation of computer fraud, have attended six or more
seminars on investigative procedures from AT&T and the Secret Service, and
have lectured on computer crime for the IEEE (an international
professional group of electrical engineers) and Bellcore (the research /
security organization owned by the regional Bell operating companies.)
Within the last year, I have assisted the Arizona Attorney General's
office with the execution of three computer-crime search warrants, and the
Austin, Texas field office of the Secret Service with the execution of
another computer-related search warrant. Over the last two years, I
have assisted numerous state, local, and federal law enforcement
agents in half a dozen U.S. cities by providing information and
technical assistance which has led to the execution of over a dozen
search warrants in computer crime cases nationwide.
- 1 -
SOURCES OF INFORMATION
2. Your affiant has also received technical information and
investigative assistance from the following experts in the field of
telecommunication fraud and computer crime:
a. R.E. "Sandy" Sandquist,, Regional Security Manager, U.S. Sprint
Communications Company, who has been so employed since 1987, and was
previously employed by General Telephone (GTE) as a special agent,
technical investigations since 1983. He has investigated cases of
communications fraud involving computer hackers, computer bulletin board
systems (see Definitions section below), and the abuse of voice mail
message computers, involving over 100 systems. He has assisted law
enforcement search teams in the execution of search warrants, and has
trained many state, local and federal agents in the investigation of
computer and communications crime.
b. Stephen R. Purdy, Special Agent, U.S. Secret Service, currently
the Assistant to the Special Agent In Charge of Fraud Division of the
Computer Diagnostic Lab in Washington, D.C. He is a member of the Federal
Computer Investigations Committee, and is currently its Co-Chair. He has
helped to design training programs in computer crime and
telecommunications fraud investigations for the Federal Law Enforcement
Training Center in Glynco, Georgia. He also developed and instructs in
the Secret Service's training program in computer fraud investigations.
- 2 -
c. George Mehnert has been a Special Agent with the Arizona Attorney
General's office for more than twelve years; for the last three years, he
has been responsible for special projects including the investigation of
computer crime. He has taken courses relating to computer hardware and
software programs from various industry sources and a local college, and
has worked with computer hardware and software, including communications
equipment and analysis tools, in investigative matters for more than six
years. Mehnert has instructed numerous state and local law enforcement
agencies in the methodology of executing search warrants involving
computers, and in the investigation of computer crimes. He recently
published of article on this subject in a law enforcement periodical. In
the past two years, Mehnert has been involved in thirty warrant searches
relating to the seizure of computer of communications-related evidence.
d. In addition to the above, affiant has also received technical
assistance and information from the following communication industry
sources: Steve Matthews, Telenet; Leila Stewart, MCI; Sue Welch, MCI;
Toni Ames, U.S. West; Connie Bullock, ComSystems (a long-distance
carrier); Karen Torres, MidAmerican Communications Company; Richard
Petiollo and Richard Kopacz, AT&T; Hank Kluepfel and David Bauer,
Bellcore (a research/security company owned by the Bell Regional Operating
Companies); Marty Locker, International Telephone and Telegraph (ITT),
and credit industry sources: Valerie Larrison, American Express; MaryAnn
Birkinshaw, TRW: Michelle Mason, CBI (TRW and CBI are national card
bureaus).
- 3 -
DEFINITIONS AND EXPLANATIONS
3. Computer hackers: individuals involved in the unauthorized
intrusion into computer systems by various means. They commonly identify
themselves by aliases of "hacker handles" when communicating by voice or
electronically with other hackers. Because they normally communicate
through electronic bulletin board systems in several states, and because
they often conduct their hacking activities against victims at many
locations outside their local calling area, computer hackers typically use
long-distance carrier customer authorization codes without the permission
of the individuals or corporations to which they are assigned, in order to
achieve "free" long distance telecommunications (over standard voice
lines, or over data-communications services). Search warrants executed in
hacker cases routinely produce evidence of theft of communications
services, and often product of possession, use, and/or distribution of
credit cards as well.
4. Electronic Bulletin Board System (BBS): an electronic
bulletin board is a computer operated as a medium of electronic
communications between computer users at different locations.
Users access the BBS by telephone from distant locations (often
their residences), using their own computers and communication
devices (modems). Typical functions of a BBS include (1) providing
storage for a software library; (2) allowing users to "download"
(copy to their own computers) various files or software programs;
(3) allowing users to
- 4 -
exchange and store messages by "electronic mail"; and (4) publishing
of text files and tutorials, which contain information or instructions
on various subjects of interest to the users. Although many BBS's are
operated as commercial services to the public (large services such as
Compuserve and The Source may offer many more functions than those
listed above), thousands of BBS's are privately operated by
individuals who run them from their residences, or by special-interest
clubs. It is common for a BBS to have several sections or
"conferences" on the system, to which a particular level of access is
required: many users might have access to lower-level sections, while
only some users would be permitted to access the highest-level
sections (many sysops --defined below-- "voice validate" a prospective
user, using a telephone call to screen users and determine whether
they are law enforcement, adults, or other undesirables). This is
particularly true of BBS's whose members are involved in some form of
criminal activity. Many "underground" or criminal bulletin boards
contain subsections through which the users regularly exchange stolen
customer authorization codes, credit card numbers, and information on
techniques or methods for the commission of such crimes as computer
fraud and abuse, access device fraud and wire fraud.
5. System operator/system administrator (sysop): the person(s)
charged with the responsibility for operating a particular computer
bulletin board system (usually the owner of
- 5 -
the computer who lives in the residence where the BBS is operating).
In order to perform their necessary supervisory and maintenance
functions, sysops who run or own the BBS give themselves the highest
level of access, or privileges, available on a system. In the case
of a bulletin board sysop, these functions typically include deciding
whether or not to to give access or type of privileges to allow to
different users, and the ability to read the entire content stored on
the BBS (including "private mail" -- see electronic mail, below.)
Sysops control the BBS, can remove contents, add and delete users,
change the programming, alter the communications parameters, and
perform a number of administrative and maintenance tasks associated
with operation of the BBS.
6. Electronic mail (E-mail): electronic mail is a means of
communication among computer users, and is one of the features normally
found on a BBS. Each user on a criminal BBS has a distinct
identifier, with a computer hacker's "username" or "login" often
identical to his hacker handle (handles tend toward the theatrical,
I.e. Prophet of Doom, DungeonMaster, Ax Murderer, etc.) and a unique
confidential password; each user may also be assigned a user number by
the system. Users may send "public" mail by leaving a message in a
section of the system where all who call in may read the message and
respond. They may also send "private mail" by sending a message
limited to a particular individual or group.
- 6 -
In this instance, other users would not be able to read the private
message. (Except, of course for the sysop, as explained above.)
7. Chat: unlike electronic mail, which consists of messages and
responses entered and stored for later review, the "chat" communication on
a BBS consists of simultaneous interactive communication between the sysop
and a user, or between two or more users -- the computer equivalent of a
conference call. A more sophisticated BBS may have more than one
telephone line connected to the system, so that two or more users can
"talk" to each other though the BBS from their own computer systems at one
time.
8. Voice Mail System (VMS): a voice mail system is an electronic
messaging computer which acts as an answering service. These systems are
generally either (1) operated for hire to the public by commercial
communications companies, often in combination with cellular telephone or
paging services, or (2) by corporations for the convenience of employees
and customers. In either case, the subscriber or employee is assigned an
individual "mailbox" on the system which is capable of performing several
functions. Among these functions are receiving and storing messages from
callers, sending messages to other boxes on the system, and sending
messages to a pre-selected group of boxes. These functions are performed
by pushing the appropriate numerical commands on a telephone keypad for
the desired function.
- 7 -
9. While voice mail systems vary among manufacturers, in general, a
caller dials either a local area code and number, or an "800" number to
access the system. Generally, the caller hears a corporate greeting
identifying the system and listing instructions for leaving a message and
other options. To leave a message, the caller enters a "mailbox number,"
a series of digits (often identical to the assigned owner's telephone
extension), on his own telephone keypad. The caller then hears whatever
greeting the mailbox owner has chosen to leave. Again, the caller can
usually exercise several options, one of which is to dictate an oral
message after a tone.
10. In this respect, the voice mail system operates much like a
telephone answering machine. Rather than being recorded on audio tape,
however, the message is stored in digitized form by the computer system.
When the message is retrieved, the computer plays it back as sound
understandable by the human ear. The entire VMS is actually a computer
system accessible through telephone lines; the messages are stored on
large-capacity computer disks.
11. A caller needs to known only the extension or mailbox number in
order to leave a message for the employee or subscriber. In order to
retrieve the messages or delete them from the system, however, the person
to whom the box is assigned must have both the box number and a
confidential password: the password ensures privacy of the communications,
by acting as a "key" to "unlock" the box and reveal its contents. Anyone
- 8 -
calling the telephone number of the mailbox hears the owner's greeting --
only the content of messages left for the owner is protected by the
password or security code. The person to whom the box is assigned may
also have the ability to change his password, thereby preventing access to
the box contents by anyone who may have learned his password.
12. Private Branch Exchange (PBX): a private branch exchange is a
device which operates as a telephone switching system to provide internal
communications between telephone facilities located on the owner's
premises as well as communications between the company and other private
or public networks. By dialing the specific telephone number of a PBX
equipped with a remote access feature and entering a numeric password or
code on a telephone keypad or by means of a computer modem, the caller can
obtain a dial tone, enabling the caller to place long distance calls at
the expense of the company operating the PBX.
13. Phone phreak: phone phreaks, like computer hackers, are
persons involved in the theft of long-distance services and other
forms of abuse of communications technology, but they often do not
have computer systems. Rather than communicating with each other
through BBS's, they communicate with each other and, exchange stolen
carrier customer authorization codes and credit cards, either directly
or by means of stolen or "hacked" corporate voice mailboxes. Phone
phreaks may also set up fraudulent conference calls for the
- 9 -
exchange of information. A phone phreak may operate a "codeline" (a
method of disseminating unauthorized access devices) on a fraudulently
obtained voice mailbox, receiving messages containing stolen credit
card numbers from his co-conspirators, and in turn "broadcasting" them
to those he shares this information with during the greeting (box
owner's message to callers), which can be heard by anyone dialing the
mailbox number. Phone phreaks and computer hackers sometimes share
information by means of the conference calls and codelines. Like
computer hackers, phone phreaks also identify themselves by "handles"
or aliases.
BACKGROUND OF THE INVESTIGATION
14. Over the past several years, the U.S. Secret Service has received
and increasing number of complaints from long distance carriers, credit
card companies, credit reporting bureaus, and other victims of crimes
committed by computer hackers, phone phreaks, and computer bulletin board
users and operators (see Definitions section), which have resulted in
substantial financial losses and business disruption to the victims.
Because the persons committing these crimes use aliases or "handles", mail
drops under false names, and other means to disguise themselves, they have
been extremely difficult to catch. They also conspire with many others to
exchange information such as stolen long distance carrier authorization
codes, credit card numbers, and technical information relating to the
unauthorized invasion of computer systems and voice mail
- 10 -
messaging computers, often across state or national borders, making
the investigation of a typical conspiracy extremely complex. Many of
these persons are juveniles or young adults, associate electronically
only with others they trust or who have "proven" themselves by
committing crimes in order to gain the trust of the group, and use
characteristic "hacker jargon." By storing and trading information
through a network of BBS's, the hackers increase the number of
individuals attacking or defrauding a particular victim, and therefore
increase the financial loss suffered by the victim.
15. For all of the above reasons, the U.S. Secret Service established
a computer crime investigation project in the Phoenix field office,
utilizing an undercover computer bulletin board. The purpose of the
undercover BBS was to provide a medium of communication for persons
engaged in criminal offenses to exchange information with each other and
with the sysop (CI 404-235) about their criminal activities. The bulletin
board began operating on September 1, 1988 at 11:11 p.p., Mountain
Standard Time, was located at 11459 No. 28th Drive, Apt. 2131, Phoenix,
Arizona, and was accessed through telephone number (602) 789-9269. It was
originally installed on a Commodore personal computer, but on January 13,
1989 was reconfigured to operate on an Amiga 2000 personal computer.
16. The system was operated by CI 404-235, a volunteer paid
confidential informant to the U.S. Secret Service. CI 404-235 was
facing no criminal charges. Over the past eighteen
- 11 -
months, information by CI 404-235 (see paragraph 16) has consistently
proved to be accurate and reliable. The Arizona Attorney General's
office executed six search warrants related to affiant's investigation
in 1989 and 1990 (affiant participated in three of these). Evidence
obtained in those searches corroborated information previously given
to affiant or to George Mehnert, Special Agent of the Arizona Attorney
General's office by CI 404-235. In over a dozen instances, CI
404-235's information was verified through other independent sources,
or in interviews with suspects, or by means of a dialed number
recorder (pen register). One arrest in New York has been made as a
result of CI 404-235's warning of planned burglary which did occur at
a NYNEX (New York regional Bell operating company) office. Throughout
this investigation, CI 404-235 has documented the information provided
to the affiant by means of computer printouts obtained from the
undercover BBS and from suspect systems, and consensual tape
recordings of voice conversations or voice-mail messages.
17. Because many of the criminal bulletin board systems require that
a new person seeking access to the telephone code or credit card sections
contribute stolen card information to demonstrate "good faith," when asked
to do so, CI 404-235 has "posted," (left on the system in a message)
Sprint, MidAmerican or ComSystems authorization codes given to affiant by
investigators at these companies for that purpose.
- 12 -
EVIDENCE IN HACKER CASES
18. Computer hackers and persons operating or using computer bulletin
board systems commonly keep records of their criminal activities on paper,
in handwritten or printout form, and magnetically stored, on computer hard
drives, diskettes, or backup tapes. They also commonly tape record
communications such as voice mail messages containing telephone
authorization codes and credit cards. On several occasions, affiant
has interviewed George Mehnert, Special Agent, Arizona Attorney
General's office and R.E. "Sandy" Sandquist, Security Manager, U.S.
Sprint, about the types of evidence normally found in connection with
computer/ communications crimes. Both have assisted more than 20
search teams in the execution of search warrants in such cases. Both
Mehnert and Sandquist stated that because of the sheer volume of
credit card numbers, telephone numbers and authorization codes, and
computer passwords, and other information necessary to conduct this
type of criminal activity, in almost every case, they have found a
large volume of paper records and magnetically-stored evidence at
scenes being searched. Because of the ease of storing large amounts
of information on computer storage media such as diskettes, in a very
small space, computer hackers and bulletin board users or operators
keep the information they have collected for years, rather than
discarding it. Mehnert stated that in virtually every
communications/computer crime case he has investigated, the suspect was
found to have records in his possession dating
- 13 -
back for years -- Mehnert stated that it is common in such cases to
find records dating from 1985 and sometimes, even earlier.
19. Sandquist confirmed Mehnert's experience, stating that hackers
and phone phreaks typically also keep a notebook listing the location of
information especially important to them, for easy access. Mehnert has
seized several of these "hacker notebooks" in computer/communications
crime cases; they were usually found quite close to the computer system,
or in the hacker's possession. Both Mehnert and Sandquist stated that it
is common for a person involved in the theft of communications services
(long distance voice or data calls, voice mail boxes, etc.) also to be
involved in the distribution or use of stolen credit cards and/or numbers;
hackers and phone phreaks often trade codes for credit cards, or the
reverse. Both Mehnert and Sandquist stated that it is common to find
credit card carbons at locations being searched for stolen telephone
authorization codes.
20. Both Mehnert and Sandquist also stated other evidence commonly
found in connection with these cases includes telephone lineman tools and
handsets (used for invading telephone company pedestal or cross-boxes and
networks, or for illegal interception of others' communications), tone
generators (for placing fraudulent calls by electronically "fooling"
the telephone network into interpreting the tones and legitimate
electronic switching signals), computer systems (including central
processing unit, monitor or screen, keyboard, modem for
- 14 -
computer communications, and printer), software programs and
instruction manuals. Sysops of bulletin boards also commonly keep
historical backup copies of the bulletin board contents or message
traffic, in order to be able to restore the system in the event of a
system crash, a power interruption or other accident. An important
piece of evidence typically found in connection with a criminal
bulletin board is the "user list" -- sysops normally keep such a list
on the BBS, containing the real names and telephone numbers of users
who communicate with each other only by "handles." The user list is a
very substantial piece of evidence linking the co-conspirators to the
distribution of telephone codes and credit cards through the BBS
messages or electronic mail.
21. Mehnert and Sandquist stated that it is also common to find lists
of voice mailboxes used by the suspect or his co-conspirators, along with
telephone numbers and passwords to the voice mailboxes. Many suspects
also carry pagers to alert them to incoming messages.
CRIMINAL VIOLATIONS
22. Criminal violations may include, but are not limited to, the
following crimes:
23. Wire fraud: 18 U.S.C. ~ 1343 prohibits the use of interstate
wire communications as part of a scheme to defraud, which includes
obtaining money or property (tangible or intangible) by a criminal or
the loss of something of value by the victim. Investigation by your
affiant has determined that
- 15 -
the actions of the computer hackers, phone phreaks and bulletin board
operators detected in this investigation defrauded telephone companies
whose customer authorization codes were exchanged through the BBS's)
gained valuable property because their fraud scheme provided them with
telephone customer authorization codes and other access devices which
in turn could be used by them to obtain telephone services and
property which would be charged to the victim companies. Their scheme
also provided them with access to private branch exchange (PBX)
numbers and codes which could be used to obtain telephone service
which was charged to the victim companies.
24. Computer fraud and abuse: 18 U.S.C. ~ 1030 prohibits
unauthorized access to a federal interest computer with intent to defraud.
Intent to defraud has the same meaning as in the wire fraud statute above.
A federal interest computer is defined as "one of two or more computers
used in committing the offense, not all of which are located in the same
state," as well as computers exclusively for the use of a financial
institution or the United States Government, among others defined in the
statute. This section also prohibits unauthorized access to financial
records and information contained in consumer reporting agency files.
25. Access device fraud: 18 U.S.C. ~ 1029 prohibits the
unauthorized possession of 15 or more unauthorized or counterfeit
"access devices" with intent to defraud, and
- 16 -
trafficking in authorized access devices with an intent to defraud and
an accompanying $1,000 profit to the violator or loss to the victim.
These prohibitions also apply to members of a conspiracy to commit
these offenses. Intent to defraud has the same meaning as in the wire
fraud statute above. "Access devices" includes credit cards, long
distance telephone authorization codes and calling card numbers, voice
mail or computer passwords, and PINS (personal identification
numbers). An "unauthorized access device" is any access device
obtained with the intent to defraud, or is lost, stolen, expired,
revoked, or cancelled.
26. Other offenses: other federal statutes violated in this case may
include 18 U.S.C. ~ 1962 and 1963 which prohibit the commission of two or
more acts of racketeering (including two or more acts in violation of 18
U.S.C. ~ 1343 and/or 1029), and permits forfeiture of the
instrumentalities used or obtained in the execution of a crime; and 18
U.S.C. ~ 371, the federal conspiracy statute.
PROBABLE CAUSE
BULLETIN BOARD SYSTEM 312-528-5020
27. CI 404-235 has accessed a public electronic bulletin board at
312-528-5020 over three dozen times between 4/7/89 and 12/31/90. The
most recent access was on 4/28/90. In the "Phone Phun" subsection of
the BBS, CI 404-235 has regularly seen messages posted by users of the
BBS, which contain long distance carrier customer
- 17 -
authorization codes, references to hacking, and to credit cards and
credit bureaus. This affidavit is in support of a search warrant for
two premises where evidence of the operation of the BBS is expected to
be found. CI 404-235 provided to affiant copies of messages posted to
the BBS, including the following:
Numb 12 (54r4q9kl-12)
Sub miscellaneous...
From DON THOMPSON (#689)
To all
Date 03/17/89 03:55:00 PM
o.k.:
1999: 322300 342059
366562 344129
549259 549296
492191 496362
422000 549659
28. In the above message, "1999" refers to the last four digits of
the local access number assigned to Starnet, a long distance network owned
by ITT Metromedia Communications. To use such codes, a caller dials the
local access number, the customer authorization code, and the area code
and number to be called. Marty Locker, ITT Security, verified that the
local access number 950-1999 is Starnet's (Starnet's authorization codes
and six digits long). Loss figures on the above are unknown.
29. On 3/20/89, user #452 "Blue Adept" replies to a previous message,
as follows:
- 18 -
Numb 25 (54r4q9kl-25)
Sub Reply to: Reply to: Legal expenses
>From BLUE DEPT (#452)
To all
Date 03/20/89 08:42:00 AM
1999 is starnet. they've busted several people I know.
they live to bust people. mainly with extraordinarily
large fines. I've heard of them taking it to court
though. first person they busted was the
Diskmaster/Hansel. really cool guy. hacked em 300
times with the applecat and they busted him. he didn't
"Hacked em 300 times" refers to the number of timers that
"Diskmaster/Hansel" is supposed to have attempted to hack out a Starnet
customer authorization code. "Applecat" is the name of a modem (computer
communications device) and related software program which automates the
code-hacking process.
Numb 69 (54r4q9kl-69)
Sub loop
>From JOE FRIDAY (#120)
To all
Date 03/25/89 07:10:00 PM
IF ANYONE HAS A LOOP FOR THE 404 AREACODE I WOULD APPR.
IT VERY MUCH!! IF THERE ARE ANY REAL PHREAKS THAT STILL
DO HACK ALOT LEAVE I THINCK YOU MIGHT BENEIFIT FROM IT.
18002370407-8010464006ACN-
8205109251-
IF ANYONE STILL GETS INTO LMOSE LEAVE ME A MESSAGE..
30. On 4/17/90 Mark Poms, Director of Security, Long Distance
Service of Washington D.C., verified the following: 1)
1-800-237-0407 is his company's assigned 1-800-line number.
Authorization code 8010464006 has suffered $6, 287.22 in fraud
- 19 -
losses, and 8205109251 has suffered $970.34 in fraud losses.
31. In the above message, "LOOP" refers to a telephone company "loop
around test line". Hackers commonly exchange information on loops, in
order to be able to communicate with each other without divulging their
home telephone numbers. If two hackers agree to call a loop number at a
certain time, they loop allows them to speak with each other -- neither
hacker needs to know or to dial the other's telephone number. "LMOSE"
refers to a type of computer system (LMOS) operated by Bell regional
operating companies (local telephone companies). This computer system
contains data such as subscriber records, and the LMOS system is solely
for the use of telephone company employees for the purpose of maintaining
telephone service. (Explanations provided by Bellcore computer security
technical staff member David Bauer.)
Numb 136 (56r5q9kl-136)
Sub Suicide?
>From THE RENEGADE CHEMIST (#340)
To All
Date 04/18/89 05:33:00 PM
9501001
074008
187438
057919
068671
056855
054168
071679
- 20 -
32. On 3/20/90 Karen Torres, MidAmerican Communications, a long
distance carrier which a local access number of 950-1001 as valid
MidAmerican customer authorization codes. She advised that all but the
invalid code were terminated "due to hacking".
950-1001
074008 Valid code, no loss
187438 Valid code, no loss
057919 Invalid
068671 Valid code, no loss
056855 Valid code, no loss
054168 Valid code, no loss
071697 Valid code, no loss
Numb 109 (53r3q0k2-109)
Sub Reply to: Reply to: Reply to: Reply to:
Reply to: John Anderson
>From BRI PAPE (#22)
To ALL...
Date 06/28/89 05:31:00 AM
ANOTHER valid code..
AND A DIVERTER...
215-471-0083..(REMAIN QUIET)
33. 950-0488 is the local access number for ITT Metromedia
Communications, according to Marty Locker, ITT Security. Fraud,
losses, if any, on this customer authorization code are unknown.
34. On 4/16/90, Kathy Mirandy, Director of Communications,
Geriatrics and Medical Center Incorporated,
- 21 -
United Health Care Services, in Philadelphia, PA, verified that
1-215-471-0083 is her company's telephone number. She stated that
between 12/28/88 nand 5/15/89, her company suffered a fraud loss of
$81,912.26 on that number. In the above message,
"diverter" refers to a common hacker/phone phreak term for a means of
placing telephone calls through a telephone facility which belongs to
someone else. The hacker "diverts" his call through the other
facility, and if the outgoing "diverted" call is a long distance call,
the owner of the facility is billed for the call as though it
originated from the victim telephone facility.
35. On 7/3/89, CI 404-235 accessed the BBS and observed the
following message, a copy of which was provided to the affiant:
Numb 137 (56r3q0k2-137)
Sub dib.
>From POWER ASSIST (#524)
To *
Date 07/02/89 12:01:00 AM
Divertors: 1800 543 7300
543 3300
I'm not sure if this is a 800 to 800 : 800 777 2233
36. On 4/18/90 Delores L. Early, Associate General Counsel of the
Arbitron Company, Laurel, Maryland, verified that 1-800-543-7300 is
listed to her company. She advised that her company suffered a direct
fraud loss by October, 989 of $8,100 on that line, as well as
additional expenses in for form of the installation of "an elaborate
security procedure to prevent this
- 22 -
type of fraudulent use," and lost employee time in identifying and
correcting the problem. "800 to 800" refers to whether the "divertor"
posted in the above message can be used to call out to another 800
number.
Numb 113 (53r6q0k2-113)
Sub Codes
>From BLUE STREAK (#178)
To ALL
Date 07/26/89 05:05:00 AM
Here is a code:
1800-476-3636
388409+acn
950-0266
487005
8656321
6575775
oops first one is 4847 not 487
Blue Streak.
Blee blee blee thats all pholks.
37. On 4/2/90. Dana Berry. Senior Investigator, Teleconnect (a
division of Tele*Com USA, a long distance carrier), verified that 1-800-
476-3636 code 388409 is her company's authorization code and it has
suffered a fraud loss of x176.21 {transcrib. note: portion of dollar
figure (first digit) is illegible on copy of affidavit}
38. On 4/20/90, Christy Mulligan, ComSystems Security, whose company
is assigned the local access number 950-0266, verified the following:
- 23 -
1) 4847005 $2,548.75 loss due to fraud
2) 8656321 $2,000.00 loss due to fraud
3) 6575775 $ 753.61 loss due to fraud
Numb 122 (57r3qlk2-122)
Sub TRW
>From NEMESIS TKK (#311)
To Garth
Date 09/30/89 04:01:00 AM
I have no ideas about accessing TRW through
any type of network, but,m you cal dial TRW directly
(although you will probably want to code out..Even if
format has changed or anything in the past 5 years.. its
still db idpw first, ast, etc...So anyway, if you do
know how to use it,you can get at it from that number.
39. In the above, "Nemesis" gives a telephone number in area code 602
(Arizona) for TRW. "Code out" refers to using a stolen customer
authorization code ("if only to save yourself the fone bill") to call the
TRW number. The format for getting in to the TRW computer that he gives
Marianne Birkinshaw, TRW investigator advised that the telephone number
posted in the message is "a legitimate telephone number into TRW's
database".
Numb 138 (57r4q2k2-138)
Sub 5
>From Chris X (#134)
To PEOPLE WHO HAVE OR HACK CODEZ
Date 01/22/90 05:54:00 PM
- 24 -
Dear Anyone,
I am in desperate need of a code. SOMEONE
PLEASE Post a code with a dialup and the format the code
must be entered. I will be ever so greatful. PLEASE
HELP!!!
Max Man - Chris X
40. In the above, user #134 asks for a code (customer authorization
code), "dialup" (the local access or 800 number through which the code may
be used), and the format (the order in which code, area code and number
must be dialed in order to place a call on the particular network).
Numb 146
Sub Here's your code beggar
>From POWER ASSIST (#524)
To beggars
Date 01/23/90 12:40:00 AM
950-0266
6552513 1564844
probably die before you use it.
-PA
41. On 4/19/90, John Elerick, ComSstems Security, verified that the
codes posted with his company's local access number (950-0266) in the
above message are valid; 6552513 has suffered $185.31 in fraud loss, and
it" refers to the code -- customer authorization codes "die" when they are
deactivated or cancelled by the carrier.
- 25 -
42. On 1/26/90, CI 404-235 again accessed the BBS and observed the
following message, a copy of which was provided to the affiant:
Numb 147 (50r5q2k2-147)
Sub ALL
>From THE SILENCER (#269)
To ALL
Date 01/25/90 08:26:00 PM
YO...UMM...WHO ASKED FOR CARDS? hahahahah that is
pretty pathetic..god. If you want Credit Cards get
your own. One step closer to safe carding....getting
cc's off bbs's is the most disgusting thing I've ever
heard...use TRW..use
CBI...trash...steal...pickpocket....but dont get em off
a bbs...jeez..
0266 working:1593527
lets hope that this dies real fast so the REAL phreaks
will be left alone by the leacherz...heheheh
- Silencer
43. In the above message, "carding" is a common hacker/phone phreak
term which refers to the fraudulent use of credit cards or credit card
numbers to obtain merchandise which will be billed to the cardholder.
"The Silencer" advises "all" users on the BBS to use TRW, or CBI (both
national credit bureaus) or to "trash" (the practice of obtaining credit
card numbers and related information from receipts or carbons discarded in
trash -- sometimes also referred to as "dumpster diving"), steal or
pickpocket, but not to get them (credit cards) from a bulletin board
system. He then gives the a ComSystems code identified by the the last
four digits (0266) of the ComSystems local access number. "Leacher"
is a common hacker insult for those BBS
- 26 -
users who copy codes, credit cards, or software from a BBS but do not
contribute their share.
44. On 4/13/90, John Elrick, ComSystems Security, verified that
1593527 is a valid customer authorization code which has suffered $27,
353.34 in fraud loss.
45. It should be noted that in message #138 above, dated 1/22/90,
Chris X asked for codes. On 1/26/90 the following followup
message was noted by CI 404-235:
Numb 149 (50rq2k2-149)
Sub Credit Card's for Codez
>From Chris X (#134)
To ALL
Date 02/26/90 07:43:00 AM
Okay,
Tell ya what. I will exchange any amount of credit
cards for a code or two. You name the credit limit you
want on the credit card and I will get it for you. I do
this cause i go to ganitorial work at night INSIDE the bank
when no one is there..... heheheheheh
46. On 1/30/90, Zimmerman left a message on the BBS for CI 404-235,
stating that he "will be ready to exchange your codez for cards. I have
got 2 right now. 1 witch contains a $1500 credit limit and the other
containing a $2200 credit limit. I will 'steal' some more when I go to
the bank this weekend. Talk to ya tomorrow..." On 1/31/90 CI 404-235
gave Chris X Sprint Customer authorization code 25259681433275,
provided to affiant by U.S. Sprint Regional Security Manager R.E.
Sandquist for this purpose. On 3/18/90 in a computer-to-computer
- 27 -
conversation (not on the BBS), Chris X gave CI 404-235 a list of
ten (10) credit card numbers with names, addresses, credit limits, and
expiration dates. All of the credit cards appear to be issued in
Illinois. Zimmerman told CI 404-235 that all of the cards "belong" to
Consumers Co Op Credit Union.
47. On 4/28/90, CI 404-235 again accessed the BBS and provided
printouts of messages which he observed on the BBS. In one, dated
3/27/90, "Scott Sxxxxx", user #160, offered to trade "virgin" credit
cards (newly acquired and not yet used for fraudulent purposes) for AT&T
cards (calling card numbers), PBX's (see Definition section above) or
numbers that will call overseas. In a message dated 4/17/90, "SLI FOLKS",
user #572, stated that he was calling from Edmonton, Canada, "using a
stolen account on Datapac for this call" (Datapac is a data communications
carrier). He tells "all" users that he has access to phone rooms for two
apartment buildings "which gives me access to several hundred phone lines.
new bpox that lets me get free LD on someone elses line frommy house. So
I hope you guys can teach me some stuff." On 4/24/90, Chris X
left another message to "anyone" offering to trade credit cards and codes
for information on how to get "information on a non-published person. It
can be found if you have a persons phone number and want a name and
address or vice-versa." (He is referring to obtaining non-published
subscriber information maintained by the telephone companies.)
- 28 -
48. In attempting to located the BBS which operates on telephone
number 312-528-5020, affiant has discovered several significant facts
which appear to indicated that an attempt has been made to disguise the
actual location of the BBS. These facts, and the sources for them, are
detailed below. In summary, the BBS telephone line is listed to an
address as one of its facilities, the BBS telephone line ends at an
Illinois Bell junction box where an non-Illinois Bell (unauthorized) line
leads from the BBS line to an apparent retail/office structure at another
address. The BBS telephone bills are sent to a post office box opened in
the corporate name, but the applicant, who is not listed as an officer of
the corporation, described himself in a police report as "self-employed".
A second, unlisted, telephone line, billed to the post office box
applicant's home address, is installed at the retail/office structure
where the non-Illinois bell (BBS) line also leads.
49. Illinois Bell telephone records show that the BBS telephone
number 312-528-5020 is subscribed to by Mxxx Xxxxxx, Inc., xxxx West
Belmont, xxxx xxx, Chicago, Illinois. The bills for this service are
sent in the name of Mxxx Xxxxxx, Inc., at P.O. Box xxxx, Chicago,
Illinois, 60618-0169. The BBS line was installed on December 1, 1982.
50. In April of 1989, Sgt. Abigail Abraham, Illinois State Police,
conducted an investigation of the bulletin board
- 29 -
system at telephone number 312-528-5020. She checked directory
assistance, and both white and yellow-page telephone directories:
although she found several telephone numbers and address for Micro
Repair, Inc., 312-528-5020 and xxxx West Belmont were not among them.
She investigated the purported BBS site, and determined that xxxx West
Belmont, xxxx xxx, Chicago, Illinois, does not exist. She reported
that at xxxx W. Belmont, there is a structure which would incorporate
the address of xxxx W. Belmont. Sgt. Abraham had a telephone company
repairman check the physical junction pole: they discovered that the
312-528-5020 line ran from the phone via a non-Illinois Bell
(unauthorized) connection to a building at xxxx N. Clybourn, Chicago,
Illinois. This building appears to be a retail/office structure, at
which, according to SA Conway, Secret Service Chicago field office, as
of 4/16/90 "there is nothing to indicate that there are any businesses
operating out of xxxx N. Clybourn, Chicago, Illinois." It is a one
story section of a larger one-and-two story building which is "V"
shaped, fronting on both Clybourn and Belmont Avenues. The third leg
of the larger building (southeast side) fronts on a parking lot, with
a fenced courtyard section off the parking lot. The xxxx address is
approximately the last thirty feet at the south end of the Clybourn
side of the building.
- 30 -
51. Illinois Bell records show that a non-published telephone line is
installed at xxxx N. Clybourn, which is 312-xxx-xxxx. Per Sgt. Abraham,
the subscriber is Bruce Xxxxxxxxxxx, xxxx N. Lawndale, Chicago, Illinois and
the bills are mailed to Fred Xxxxxxxxxxx at the same address. Telephone
service for 312-xxx-xxxx was installed at xxxx N. Clybourn on January 1,
1982.
52. On April 26, 1989, Sgt. Abraham wrote down all of the vehicle
license plates parked in the parking lot next to xxxx N. Clybourn and
those parked immediately in front of it. PTxxxx, which was a 1987, four-
door Ford, was registered to Bruce Xxxxxxxxxxx, xxxx N. Lawndale, Chicago,
Illinois.
53. On 4/5/90, the Secret Service office in Chicago was notified by
the Illinois Department of Revenue that there are not business
licenses for xxxx N. Clybourn, Chicago, Illinois, nor are there any
licenses issued to Bruce Xxxxxxxxxxx.
54. On 4/2/90 the Illinois Secretary of State, Corporation Division,
advised that Martin and Wendy Gilmore are the only officers for Micro
Repair listed on its Illinois Articles of Incorporation.
55. On 4/3/90, the Chicago Postal Inspector's Office informed the
Secret Service office in Chicago that the billing address for telephone
number 312-528-5020 (the BBS) is Post Office Box xxxx and is open in the
name of Mxxx Xxxxxx. The name of the person who made the application for
the post office box is Bruce Xxxxxxxxxxx, xxxx N. Lawndale, Chicago, Illinois,
- 31 -
telephone number 312-xxx-xxxx. Identification used to open the
box was Illinois Driver's License exxx-xxxx-xxxx (per the Illinois
Secretary of State this license is that of Bruce Xxxxxxxxxxx), and according
to Sgt. Abraham, his license address is also xxxx N. Lawndale.
56. To the rear of the property where xxxx N. Clybourn is located,
there is an antenna and a satellite dish. SA William P. Conway of the
Chicago field office contacted the Coast Guard for assistance in
determining the latitude and longitude of the satellite antenna. On
4/3/90, the Coast Guard Air Operations Duty Officer at the Glenview Naval
Air Station, Chicago, Illinois, advised that the Belmont/Western/Clybourn
intersection, Chicago, Illinois, has a latitude of 41 degrees, 56 minutes,
9 seconds north, and a longitude of 87 degrees, 41 minutes, 5 seconds
west. With that information, SA Conway was able to obtain assistance from
the Federal Communications Commission in determining the owner of the
satellite antenna. Will Gray, of the Chicago FCC office, advised that the
FCC license for the antenna (which is mounted on a tower located in the
fenced courtyard section of the larger building of which xxxx N. Clybourn
is a part) is registered to the American United Cab Company at xxxx N.
Belmont. The satellite dish is affixed to the rear of xxxx N. Clybourn.
Mounted on the tower are two closed circuit cameras. The first camera is
located approximately 20 feet above the ground, the second camera is
approximately 45 feet above the ground.
- 32 -
57. Chicago Police Department General Offense Report #Mxxxxxx, dated
3/13/89, lists Bruce Xxxxxxxxxxx as the victim, with the address of
occurrence listed as xxxx N. Clybourn, Chicago, Illinois. Xxxxxxxxxxx
reported that his car window was broken by two subjects. Per this police
report, Xxxxxxxxxxx states that he watched on a closed circuit security
camera as the two subjects entered the parking lot adjacent to xxxx N.
Clybourn, and broke his automobile window. Xxxxxxxxxxx told the officers
that the cameras are used for parking lot security, due to "breakins".
This incident took place at 2:30 PM. The report lists Xxxxxxxxxxx's
residence address as xxxx N. Lawndale, Chicago, Illinois, his home phone
number as 312-xxx-xxxx (that telephone number is listed to Fred Xxxxxxxxxxx
at the xxxx N. Lawndale address, according to Sgt. Abraham), and his work
phone number as 312-xxx-xxxx (the unlisted line billed to his residence).
He stated that he is self-employed.
58. On 4/5/90, the Chicago Office of the Secret Service requested
Rolonie Kwasny, Security Supervisor, Illinois Bell Telephone to verify
that there are no other authorized or unauthorized telephone lines into
xxxx N. Clybourn other than 312-528-5020 and 312-xxx-xxxx.
59. On 4/6/90, Kwansy notified the Chicago Office that early on that
date the xxxx N. Clybourn address was checked. The larger building of
which xxxx N. Clybourn is part, is serviced by 13 working phone lines
through the box attached to the Belmont Side of the building, which also
services the xxxx address.
- 33 -
60. The only authorized phone line to the xxxx address is 312-xxx-xxxx
(the number Bruce Xxxxxxxxxxx gave as his business number in the police
report). The only other phone line (unauthorized) into the xxxx address
is bulletin board number 312-528-5020, the line which leads from the
junction box to the building. Kwasny advised that this type of hookup
required no special knowledge.
61. Affiant has interviewed Sandquist, Mehnert, and CI 404-235, all
of whom have operated electronic bulletin boards themselves. All three
advised affiant that the sysop of a BBS must continuously perform a great
many maintenance or "housekeeping" chores necessary to operation of the
BBS. A sysop's maintenance functions include constantly making changes on
the BBS, such as adding or removing users, raising or lowering users'
level of access, removing files or programs uploaded to the BBS (added to
the system by a user). If a user places a virus or logic bomb which could
disrupt the functioning of the BBS, for example, on the sysop's computer,
the sysop can remove it.
62. Since many BBS's (including this one) operate 24 hours a day,
for the convenience of sysops, BBS software allows many of these
functions to be performed from what is called "remote" locations,
I.e., by the sysop using another computer, over the telephone line to
the BBS. If the BBS is operating at a
- 34 -
business address, for example, the sysop can perform his maintenance
functions at night or any other time from his residence or from any
other location where he has a computer, modem, and telephone
communication to the BBS. BBS users commonly communicate directly
with the sysop on the BBS, either in "chat" mode or by leaving him
electronic mail (see Definitions section, above). A BBS sysop is
essentially "on call" during the entire time the BBS is in operation,
to solve equipment/software problems or interruptions to the operation
of the BBS, for the supervision of users, and to communicate with
them. Operating a BBS is extremely time-consuming, according to
Mehnert, Sandquist, and CI 404-235.
63. CI 404-235 advised affiant that, when he logs on to the BBS, he
sees a screen in which the first two lines advised that connection has
been made to the BBS, the third line lists the baud rates, or speeds, at
which a user may communicate with the BBS, and the fourth line states "On
line since 12/10/83". This indicates that approximately one year after
the 312-528-5020 number was subscribed to by Bruce Xxxxxxxxxxx, the BBS began
operating. As of 4/29/90, all attempts to locate any residence for Bruce
Xxxxxxxxxxx other than that listed on his driver's license, auto
registration, post office box application, and subscriber records for
telephone number 312-xxx-xxxx, have been negative. Therefore, it appears
that his residence address is xxxx N. Lawndale, Chicago, Illinois.
- 35 -
64. The telephone bills for the unlisted line (312-xxx-xxxx) which is
installed in the xxxx N. Clybourn building where the unauthorized BBS line
(312-528-5020) leads, are mailed to the same address, xxxx N. Lawndale,
Chicago, Illinois, to Fred Xxxxxxxxxxx.
65. If the sysop is accessing the BBS from his residence, it is
likely that evidence of the sysop's identity and evidence relating to the
operating of the BBS will be found on a computer system at the residence,
or on diskettes, printouts, and other records at the residence. The
telephone bills for unlisted number are also likely to be found at the
residence, along with financial records such as cancelled checks or
receipts, which will assist in identifying the individual who paid them.
66. At the xxxx N. Clybourn address, evidence of the connection of
the BBS equipment to the 312-528-5020 telephone line, and evidence
relating to the operation of the BBS, are expected to be found. Entry
into the premises at this location, and physical inspection, are necessary
in order to determine whether the 312-xxx-xxxx line is also connected to
the BBS.
67. Based upon all of the foregoing, affiant believes that evidence
of violations of 18 U.S.C. ~~ 1343, 1030, 1029, 1962, 1963, and 371, will
be found at xxxx N. Lawndale, Chicago, Illinois, and at xxxx N. Clybourn,
Illinois, such evidence consisting of:
- 36 -
68. Electronic data processing and storage devices, computers and
computer systems including central processing units; internal and
peripheral storage devices such as fixed disks, floppy disk drives and
diskettes, tape drives and tapes, optical storage devices or other memory
storage devices; peripheral input/output devices such as keyboards,
printers, video display monitors, optical readers, and related
communications devices such as modems; together with system documentation,
operating logs and documentation, software and instruction manuals.
69. Telephone equipment such as lineman's handsets, memory
telephones, automatic dialers, programmable telephone dialing or
signalling devices, electronic tone generating devices.
70. Records pertaining to ComSystems, ITT and other long distance
companies' access numbers and customer authorization codes; credit card
numbers; telephone numbers for computer bulletin boards, voice mail
systems, and corporate computer systems; PBX codes and related telephone
numbers; records and information related to the unauthorized access into
computer systems or to the sale, sharing, or other distribution of long
distance companies' access numbers and customer authorization codes,
credit card numbers, including financial records, receipt of payments,
worksheets, correspondence, memoranda, computer bulletin board downloads
or messages, and other documentation.
71. Records pertaining to Mxxx Xxxxxx Inc., to Post
- 37 -
Office box number xxxx, telephone bills for 312-528-5020 and to
312-xxx-xxxx from 1982 to the present date, bank account records
including statements and cancelled checks for Bruce Xxxxxxxxxxx from 1982
to the present date, business records relating to the occupancy of the
xxxx N. Clybourn premises, including rent/mortgage payment receipts,
rental or mortgage contracts, utility bills and proof of payment, and
records pertaining to the purchase, ownership, and maintenance of the
BBS computer system and software.
72. All of the above records, whether stored or on paper, on magnetic
media such as tape, cassette, disk, diskette, or on memory storage devices
such as optical disks, programmable instruments such as telephones,
"electronic address books", programmable wristwatches, calculators, or any
other storage media, together with the indicia of use, ownership,
possession or control of all of the above property or records, including
bills, letters, identification, personal effects, memoranda, and other
documentation.
73. Since much of the above-described evidence is likely to be found
in electronic form or machine-readable media which cannot be read or
analyzed by affiant in its present form,
- 38 -
affiant requests authorization to seize, listen to, read, review, and
maintain the above described property and records and to convert the
above records to human-readable form as necessary.
(Signature/G. Kirt Lawson)
Affiant
Subscribed and Sworn before me this 30th day of
APRIL, 1990.
(signature) Cynthaia M. Penumire {??illegible)
Notary Public
My Commission Expires (illegible)
9865e/
- 39 -
---end of documents-----