The LOD/H Technical Journal, Issue #4: File 10 of 10. NETWORK NEWS AND NOTES ---------------------- The Network News and Notes file contains reprints of articles that are of interest to the majority of our intended readers. In this installment we borrowed heavily from the CFCA (Communications Fraud Control Association) Communicator since the newsletter deals specifically with issues relevant to our readers. The CFCA is "a nonprofit educational organization founded in 1985 to help the telecommunications industry combat fraud." Overall, do not let the titles mislead you. Every article contains interesting and we hope useful information. Be sure to take the time and read into them before skipping. Some are a little old but better late than never. If anyone comes across any articles of interest, we would like to know about them. One more note, all comments within brackets [], are remarks made by one of the TJ editors. The first two articles, as was stated in the Introduction, relate the various trouble some noted members of the community ran into. ______________________________________________________________________________ Source: The Wall Street Journal Issue: Wednesday, February 7, 1990 Title: Computer Hackers Accused of Scheme Against BellSouth Author: Thomas M. Burton CHICAGO--Federal grand juries in Chicago and Atlanta indicted four computer hackers in an alleged fraud scheme that authorities said could potentially disrupt emergency "911" telephone service throughout nine Southern States. The men, alleged to be part of a closely knit cadre of computer hackers known as the Legion of Doom, gained access to the computer system, controlling telephone emergency service of BellSouth Corp., the Atlanta-based telecommunications giant. BellSouth, through two subsidiaries, oversees phone service in Alabama, Mississippi, Georgia, Tennessee, Kentucky, Louisiana, Florida, and the Carolinas. The Chicago indictment said members of the Legion of Doom are engaged in disrupting telephone service by entering a telephone company's computers and changing the routing of telephone calls. The hackers in the group also fraudulently obtain money from companies by altering information in their computers, the indictment said. The hackers transferred stolen telephone-computer information from BellSouth to what prosecutors termed a "computer bulletin board system" in Lockport, Ill. In turn, the men planned to publish the computer data in a hackers' magazine, the grand jury charged. -----EDITOR'S NOTES: As always, ignorance and falsehoods are abound in most articles of this nature. For the record, NO TELEPHONE SERVICE WAS INTENTIONALLY DISRUPTED DUE TO THE ACCUSED MEMBERS. Furthermore, NO MONEY FROM COMPANIES WAS EVER FRAUDULENTLY OBTAINED BY ALTERING INFORMATION IN THEIR COMPUTERS. These are the typical WILD accusations made by law enforcement and further distorted by the media in such cases. As for the bbs is Lockport, Ill. well it was simply a legitimate information storage and retrieval system used by many, many people for legitimate purposes of information exchange. It would be very time consuming for the operator of said system to check every file on the system as it was a UNIX based system with a lot of disk space. The hacker magazine stated above is simply Phrack, Inc. put out by Knight Lightning and Taran King. More comments after next article. _____________________________________________________________________________ Source: ComputerWorld Issue: 1990 Title: Babes in high tech toyland nabbed Author: Michael Alexander CHICAGO--- The U.S. Justice Department escalated its ware against computer crime last week with two indictments against members of an alleged computer hacker group, who are charged with stealing a copy of a 911 emergency computer program from BellSouth Telephone Co., among several other crimes. In a seven-count indictment returned in Chicago, Robert X, 20 also known as "The Prophet", is alleged to have used a computer to steal a copy of a computer program owned and used by BellSouth that controls emergency calls to the police, fire, ambulance and emergency services in cities throughout nine Southern states. According to the indictment, after X stole the program -- valued at $79,449 -- he uploaded it to a computer bulletin board. The Chicago indictment further alleges that Craig Y, 19, also known as "Knight Lightning" downloaded the 911 program to his computer at the University of Missouri in Columbia, Mo., and edited it for publication in "Phrack", a newsletter for computer hackers. X and Y allegedly intended to disclose the stolen information to other computer hackers so that they could unlawfully access and perhaps disrupt other 911 services, the Chicago indictment charged. In a second indictment returned in Atlanta, X and two others were charged with additional crimes related to BellSouth systems. All four hackers allegedly are members of the Legion of Doom, described in the indictments "as a closely knit group of about 15 computer hackers", in Georgia, Texas, Michigan and several other states. BellSouth spokesmen refused to say when or how the intrusion was detected or how a computer hacker was able to lift the highly sensitive and proprietary computer program. "Hopefully, the government's action underscores that we do not intend to view this as the work of a mischievous prankster playing in a high-tech toyland", one spokesman said. A source within BellSouth said that much of what the hacker took was documentation and not source code. "They did not disrupt any emergency telephone service, and we are not aware of any impact on our customers", the source said. William Cook, an assistant U.S. attorney in Chicago, declined to comment on whether 911 service was actually disrupted. "It is a matter of evidence,", he said. Cook also said that while the two hackers are charged with carrying out their scheme between December 1988 and February 1989, the indictment came after a year-long investigation. Though Cook refused to say how the hackers were discovered or caught, it is believed that after the initial penetration by one of the hackers, an intrusion task force was set up to monitor subsequent security breaches and to gather evidence against the hackers. If convicted on all counts, X faces a prison sentence of up to 32 years and a maximum fine of $222,000, and Y faces a prison sentence of 31 years and a maximum fine of $122,000. The Atlanta indictment charged Robert X, Adam Z, 22 known as "The Urvile" and also "Necron 99", and Frank XYZ, 23 known as "The Leftist", with eight counts each of computer fraud, wire fraud, access code fraud and interstate transportation of stolen property, among other crimes. If convicted, each defendant faces up to five years imprisonment and a $250,000 fine on each count. The three illegally accessed Bellsouth computers and obtained proprietary information that they distributed to other hackers, the indictment alleged. ----EDITOR's NOTES: As is confirmed in this article, no telephone service was disrupted. The extent of BellSouth's inadequacy regarding security matters was not detailed in these articles. Here is a rundown of what may have possibly happened: BellSouth's SBDN (Southern Bell Data Network) which is a modified Telenet network that contains hundreds if not thousands of network nodes (individual systems) may have been accessed during which time the system that controls the entire network may have been possibly compromised. This would allow someone to access just about any system on the network, since Bellsouth consolidated most of their individual systems onto a large network (economically not a bad idea, but a security nightmare indeed). This may allow one to stumble onto systems dealing with 911. Since it may be interesting to learn how such a system operates and how the 'automatic trace' is accomplished, the documentation would be of some help. No need for any actual programs however. Possibly, maybe, an article paraphrased the operation of 911 and was possibly to be distributed through the Phrack, Inc. newsletter. The last names of those involved were omitted. Go look them up for yourself if you think its that important. Just for the record: KNIGHT LIGHTNING NEVER WAS A MEMBER OF LOD. Yet another error in the reporting...LOD has half the 15 supposed number of members. Another article followed the above one on the same page, by the same author: Last week's disclosure of an alleged hacker theft of highly sensitive BellSouth Telephone Co. documentation for a nine-state 911 emergency system was the second serious security breach of a telephone company network to come to light in as many months. In January, a trio of hackers was able to penetrate computer systems at Pacific Bell Telephone Co. and eavesdrop on conversations and perpetrate other criminal acts. [CW, Jan. 22]. Just how vulnerable are the nation's telephone systems to hacker attacks? Spokesmen for BellSouth and Pacific Bell insist that their systems are secure and that they and other telephone companies routinely assess their vulnerability to hackers. "Security is being constantly changed, every intrusion is studied, passwords are changed," said Terry Johnson, manager of media relations for BellSouth in Atlanta. Johnson however, declined to say how the hackers allegedly were able to lift the documentation to a 911 emergency communication services program. "It is a rather serious computer security breach," said Richard Ichikawa, a Honolulu based telecommunications consultant who specializes in designing and installing 911 emergency systems. Stealing documentation, as the Legion of Doom member is alleged to have done, many not be a particularly difficult task for a savvy hacker, he said. Taking the actual program, while certainly possible, would be much more challenging, however. The computer the controls enhanced 911 service is "quite isolated" from the calling public, Ichikawa said. A recently published report to Congress by the Office of Technology Assessment suggested that the security and survivability of the nation's communication infrastructure is at greater risk to hacker attacks than ever before. Business and government reliance on communications and information based systems has increased, thus much more is at stake when those systems fail, the report stated. The increased publicity of hacker attacks may help to curb attacks by hackers, said Sanford Sherizen, a security consultant at Data Security Systems, Inc., in Natick, Mass. Some law enforcement officials complain that the nation's telephone firms do not cooperate as readily as they would expect when attacks of this sort occur. "They [telecommunications providers] are the single biggest headache law enforcers have right now," said Gail Thackery, Arizona stat assistant district attorney. Regional Bell operating companies contacted last week disputed that assertion. _____________________________________________________________________________ Source: CFCA (Communications Fraud Control Association) Communicator Issue: February-March 1989 Title: But are LD networks safe? Spread over vast distances and segmented by switches guarded by their own passwords, long distance networks are generally safe from virus attacks. According to Henry Kluepfel, Bellcore district manager of Security Planning intruders can easily attain the same information that is available to vendors and service providers. "If passwords are not changed regularly, intruders can quickly wreak havoc". Scott Jarus, division director of Network Loss Prevention for Metromedia, and a member of CFCA's Board of Directors, says that users of "outboard" computer systems should not be assigned high level access to their company's switches or networks. "Non-proprietary hardware and software that handle such functions as billing collection and network database management are targets for unauthorized access and viruses", he says. Mr. Kluepfel says that once hackers have the documentation they can send details on how to crash the systems to hundreds of bulletin boards. "We found that many system administrators didn't realize manufacturers install rudimentary default passwords." Bellcore encourages using sophisticated codes and applying a variety of defenses. "Don't simply rely on a dialback modem, or a good password", says Mr. Kluepfel. "Above all, don't depend on a system to always perform as expected. And remember that new employees don't know the administrative measures the operator knows". Managers should advise clients on any needed internal analysis and investigations, and keep abreast of technological advances when planning their defenses. _____________________________________________________________________________ Source: Same as above Title: Secure those gray boxes After the FCC mandated that telcos provide test modes on the gray [or green (ed. note)] connection boxes usually found outside structures, there have been instances of persons surreptitiously clipping on handsets or snapping in modular connections (RJ-11) to make long distance calls on the residents' line. CFCA advises customers to padlock their boxes to deter such thievery. John Venn, manger of Electronic Operations at PacBell's San Francisco office, reports that the boxes they install have separate connections for company and customer use, so that users have the option of securing access to their portion. PacBell's side has a built-in lock, while customers have padlock hasps. _____________________________________________________________________________ Source: Same as above Title: Product Description: Pen-Link analysis software Author: Mike Murman Since 1986, Pen-Link, Ltd. of Lincoln Neb. has been producing software that supports telecom investigations. Last July, the company introduced an updated version of Pen-Link, a two-year-old program that accepts data from most Dialed Number Recorders (DNRs) manufactured today, pools that information into a common database structure, and allows the user to determine the calling patterns and the codes that have been compromised. In today's ever-expanding telecommunications environment there is a need for faster identification and documentation of abuser call patterns to assure successful prosecutions. In applications of DNRs for investigative purposes, Pen-Link programs have reduced the time normally needed to input, analyze and report call data by as much as 90 percent. The result is improved productivity and quicker response to customers' needs. The Pen-Link 2.0 program also provides several related features. First, it is a communications program, meaning that if you are using a DNR with modem capability or RS232 communication ports, the program can automatically load your call records into a PC, eliminating the time needed to key-in call record data. Second, Pen-Link has an autoload format section that takes call records you have transferred and puts them into a standard record format. This is an important feature, given that the program supports multiple types of DNR hardware that all have unique call data formats. In short, you can use any combination of DNRs in your investigations with Pen-Link and all data will be compatible. Furthermore, the program allows you the flexibility of purchasing new DNRs of any type, and not worry about duplicating your software expense or learning new software programs. [Notice how he keeps saying "you" in this article? (ed.)] Finally, Pen-Link enables you to analyze and report on your call record information. There are 15 different call analysis reports and 6 different graphic reports. If these reports do not meet your needs, the program has a report generator that allows you to customize your analysis and reports. Pen-Link is a dedicated program written in Turbo Pascal. The company elected to start from scratch and develop its own software, rather than simply adapting standard applications. There are two reasons for this approach: dedicated software programs run more efficiently, so that if a hacker is generating thousands of call records and you want to analyze and report this information, the program can provide a report much faster than if you were processing the data manually. The second reason behind this strategy is that users only need to learn and understand the options for the pop-up menu format. Pen-Link also supports color monitors. A manual editing feature allows you to enter your database and find specific records by the criteria you have selected; then review and edit the data. Manual editing also allows you to enter call data from old pen registers that only produce paper strips containing call information. Another feature, the utilities section, provides several options to manage call information stored in your computer. This allows you to archive information to disk, then reload it later when it is needed. If your data files become corrupted, you can reconstruct and reformat them by using the utilities section. And if you wish to use your call data information in another application program, Pen-Link's utilities allow you to create an ASCII text file of call information, which then can be read by these programs. Furthermore, the program can accept ASCII text files from other DNR software programs. The program calls for an IBM or compatible PC equipped with a hard drive, operating under MS-DOS 2.1 or higher. Pen-Link currently supports the following DNRs: JSI, Mitel, Racom, Voice ID, Hekimian, Bartec, Pamco, HDS, and Positive Controls. If you are using a DNR that is not listed, Pen-Link, LTD will program its software so it can automatically load call records from your equipment. The use of DNRs that automatically transfer call record data saves your security department considerable investigative time. Pen-Link's mission is to provide telcom security departments with a sophisticated investigative software tool that is easy to use, flexible and compatible. _____________________________________________________________________________ Source: Same as above Title: Extended Ky. case resolved A 21 year-old Kentucky man was successfully convicted October 27 on 14 counts of computer and toll fraud under a number of state statutes. The defendant, John K. Detherage, pleaded guilty to using his personal computer to identify authorization codes in order to place unauthorized long distance calls valued at $27,000. Detherage had been indicted a year earlier by an Oldham County grand jury on six felony counts related to the scam and two misdemeanor counts of possessing stolen personal identification and calling card numbers. He was later charged with two additional counts of possessing stolen PINs. Detherage originally was to have been tried in February 1988, but the case was postponed when he pleaded guilty. He was sentenced at the Oldham County Circuit Court at LaGrange to pay $12,000 in restitution, and relinquish all computer equipment and software to the court. His charges included theft of services over $100; theft of services; four counts of unlawful access to a computer, second degree; possession of stolen credit or debit cards, and six counts of unlawful access to a computer. Four other counts were dismissed. Kentucky has a number of statutes that can be applied to theft of telephone services. Chapter 514.060 addresses theft of services, while 514.065 describes the possession, use or transfer of a device for the theft of services. Theft of services is defined to include telephone service, and the defendant was charged with two counts under 514.060. Detherage was also charged with 10 counts (six felony and four misdemeanor) under Chapter 434.580, which relates to the receipt of stolen credit cards. Kentucky interprets computer crime as involving accessing of computer systems to obtain money, property or services through false or fraudulent pretenses, representations or promises. _____________________________________________________________________________ Source: Same as above Title: Industry Overview As major players in the telecom industry shore up the defenses on their telephone and computer networks, criminals [who, us?] are turning to smaller, less protected companies [its called survival of the fittest]. In 1988, the use of stolen access codes to make free long distance calls continued to be the favorite modus operandi among network intruders throughout the industry, although code abuse leveled off or declined among large carriers with well funded security organizations and substantial technical apparatus to defeat most toll and network fraud. However, some resellers and PBX owners are being victimized by fraud of all types, probably because most use access codes with only six or seven digits. Such vulnerable systems will continue to be used by abusers to route long distance calls overseas. Fraudulent calls placed on a compromised system quickly accumulate charges the system owner must eventually pay. Many PBX's also lack effective systems able to detect irregular activities and block fraudulent calls. Add to this the fact that several carriers may be handling the inbound and outbound WATS lines, and investigator's jobs can really become complex. The sharp increase in the abuse of voice store-and-forward systems, or voice mail, that began alarming owners and manufacturers early last year will continue through 1989. Last spring, traffickers began seizing private voice mail systems to coordinate drug shipments. Messages can be quickly erased when they are no longer needed. Dealers have been receiving mailbox numbers by pager, then calling in recorded messages from public telephones. No matter how long a security code may be, if intruders obtain an 800 number to a voice mail system they can program a computer and take the time to break it, because it won't cost them anything. Once accessed through a PBX, intruders can exchange stolen lists of long distance access codes, usually without the system owner's knowledge. The time it takes abusers to break into a voice mail system is proportionate to the number of digits in a security code. A four-digit code can, for example be beaten by a skilled computer operator in slightly over a minute. [Clarification, this is probably through the use of default security codes, not sequential or random scanning techniques. ed.] One problem is that voice mail customers don't often know what features to select when buying a system. And few manufactures take the initiative to advise customers of the importance of security. Another problem that has been around for several years, subscription fraud, will continue into 1989, although telcos have reduced it by making customer's applications more detailed and comprehensive [like requiring customers to supply their credit card numbers. This way if they skip town without paying and the credit card is valid and not maxed out, the phone company can still recover the money owned them. ed.], and by checking out potential customers more thoroughly. Dishonest subscribers use false identification and credit references to obtain calling cards and services, with no intention of paying. Intelligent software is available that aids switch and PBX owners in identifying, screening and blocking fraudulent calls. Another precaution is to add digits to access codes, because numbers of fewer than 10 digits cannot withstand today's intruders. A number of carriers have already gone to 14 digits. Some larger carriers have been sending technical representative out to reprogram PBX's, encourage customers to install better safeguards, and advise them to shut down their systems at night and on weekends. Customers should also expect to see billing inserts warning of the improved defenses against fraud. As more companies break into the international market they will need solid security safeguards to protect them against intrusions of their networks. A small interexchange carrier (IC) in Alabama was hit hard recently by "phone phreakers" soon after they opened overseas service. Other start-ups find themselves desperately trying to play catch up after blithely operating several years without a hitch. An IC with 30,000 customers in Southern California increased its seven-digit access codes to ten digits and it aggressively pursuing five groups of hackers its investigators uncovered after discovering that company-issued personal identification numbers were posted on computer bulletin boards. In the final analysis, one fact emerges: widespread cooperation among injured parties will ensure quicker results and conserve vital company resources. _____________________________________________________________________________ Source: PC Week April 10,1989 Title: Keep an Ear Out for New Voice Technology Author: Matt Kramer With the rise in digital transmission of voice and data, it's easy to assume that voice and data have merged into a muddle of indiscriminate material, with voice indistinguishable from data. After all, a bit's a bit, right? But, those people in the white lab coats keep coming up with new ways to use voice technology. The telephone companies are the ones poised to make the most of this technology. U.S. Sprint recently announced that it was experimenting with the use of "voice prints"--a recording of a verbal password that would be used to help identify authorized subscribers using their U.S. Sprint telephone charge cards, which would help cut down on hackers trying to steal telephone service. Subscribers would record a voice print of a verbal password. Then, when they were using their charge cards, they would repeat the passwords to verify their identities. Northern Telecom has embarked on its own efforts to bring voice-recognition technology to public telephone service. it is selling telephone companies a new billing service that uses voice-recognition technology to automate collect and third-number billing calls. Called the Automated Alternate Billing Service (AABS), the system calls the party to be billed and "asks" if the charges will be accepted. The Northern Telecom switch "listens" to the response and either completes the call or informs the calling party that the charges have been refused. Northern Telecom also plans to use voice technology to offer other features, such as allowing the system to announce the caller's name in the party's own voice and stating the call's origin, such as the name of a city, a university or an institution. The big draw for phone companies, of course, is reduction of personnel costs, since no human operator assistance is needed. That's an option for lots of corporate financial officers who have been attracted to automated-attendant phone systems because they can replace a bevy of switchboard operators. What would be interesting about the Northern Telecom technology is to see if it can be expanded to other gear, such as private branch exchanges, and if if can beef up the automated-attendant feature. Rather than require callers to punch a lot of buttons to get in touch with someone, perhaps voice recognition could be used to "listen" for a name and then direct the call to the appropriate party. That would be especially useful in situations where you don't know the exact extension of whomever you are calling. Trying to maneuver around an on-line telephone directory can be a real pain in the neck. At the same time, voice-recognition technology can be paired with voice mail so that users can access their voice mailboxes without having to punch in an identification number or password or to deal with a menu. It would be a lot easier to just say, "Read messages". There's still a lot of potential to be developed in voice technology. _____________________________________________________________________________ Source: PC WEEK May 15, 1989 Title: MCI to Provide Transition to ISDN Author: Matt Kramer MCI Communications Inc. hopes to give its customers a smoother transition to ISDN with new services that offer many of the technology's features without requiring costly upgrades to ISDN-compatible equipment. The communications company recently announced new Integrated Services Digital Network and "ISDN-equivalent" services that will provide MCI customers with network-configuration, control and management features, according to company officials. The equivalent services, which will be available this fall, run over existing in-band signaling channels. True ISDN services require a separate out-of-band D channel for signalling. MCI's full ISDN services are scheduled for delivery in the first quarter of next year. The equivalent services, while not providing the full ISDN feature set, are designed to introduce customers to the benefits of ISDN before requiring them to make the investment in ISDN-compatible telecommunications gear, officials said. "While they may not want to make that expenditure now, they certainly want to have ISDN-like services available", said Kevin Sharer, senior vice president of sales and marketing at MCI, in Washington. The equivalent products include the MCI 800 Enhanced Services Package, which allows customers with dedicated access lines to receive the number of the calling party just prior to receiving the call. This Automatic Number Identification (ANI) is then used to query a database to bring up a customer's account or other information, according to officials. Northern Telecom Inc. and Rockwell International Corp. have developed new software for their private branch exchanges that permits the switches to handle in-band ANI transmission. Some observers expect the equivalent services will be useful in the evolution from existing telecommunications to ISDN. "If all you need is ANI, then the equivalent services might be just what you want", said Claude Stone, vice president of product development at the First National Bank of Chicago and vice chairman of the national ISDN Users Forum. _____________________________________________________________________________ Source: A newspaper Date: Sometime in June Title: Sheriff's prisoners find handcuffs are a snap to get out of Author: unknown Ten jail prisoners who discovered an ingenious way to escape from handcuffs are sending alarms across the nation. Emergency bulletins will be sent to law enforcement agencies via teletype machines nationwide. On Friday, deputies were taking 10 prisoners from the jail downtown to another one in the city. All were handcuffed. "When the deputy opened the back of the van, all 10 guys were smiling and said, 'See what we did,'" the Sheriff said. Each prisoner held up his arms to show broken handcuffs. The culprit was a simple seat belt clip. The circular cuffs are connected with a chain, held tightly to each cuff by a swivel-head link that moves freely to ensure that the chain cannot be twisted when the wrists move. Seat belt clips typically have one or two holes, or slots, that lock them into place with the buckle. The prisoners learned that jamming the swivel-head on the clip stops the swivel head from turning freely. "A quick twist of the wrist, and the chain shears off at the cuff," the sheriff said. The sheriff ordered seat belts removed from jail vans. He also ordered that the prisoners in cruisers be handcuffed with their hands behind their back and the seat belts locked firmly across them. Deputies often handcuffed prisoners' hands in front of their bodies. But even if prisoners were cuffed behind their backs, it would not be difficult for them to manipulate the swivel head into a seat belt buckle and twist themselves free -- if they could reach the seat belt. "This is a danger to every law enforcement officer in the country", the sheriff said. Handcuff manufacturers contacted Friday are studying the possibility of redesigning the handcuffs by enlarging the swivel head or placing some type of shroud over it. "People in jail have 24 hours a day to figure a way out" said the sheriff. "Although only 10 people know the technique, I guarantee that the entire jail population will know how to do it before the day is up,". "The only people who won't know about it is law enforcement officers". The sheriff met Friday with representatives of several local and federal agencies. An FBI spokesman said the escape technique will be described in the FBI's nationally distributed LAW ENFORCEMENT BULLETIN. Although the sheriff was grateful to learn about the technique from prisoners who did not try to escape, he was not amused. He told deputies, "Charge them with destruction of county property. We'll see how funny they think that is." _____________________________________________________________________________ Title: Federal grand jury probes Cincinnati Bell wiretapping flap Source: Data Communications Issue: November 1988 Author: John Bush A federal grand jury in Ohio is investigating illegal wiretapping allegations involving two former employees of Cincinnati Bell who claim the telephone company ordered them for more than a decade to eavesdrop on customers. In addition, an attorney who filed a class-action lawsuit against Cincinnati Bell on behalf of the people and companies who were allegedly wiretapped, says he is trying to prove that the telephone company sold the information gained from the electronic surveillance. A Cincinnati Bell spokesperson denied the charges, saying they were trumped-up by the two former employees, who are seeking revenge after being fired by the telephone company. The lawsuit has been filed against Cincinnati Bell Inc. on behalf of Harold Mills, a former police lieutenant and former commander of the Cincinnati Vice Squad, as well as a number of other individuals and companies. Among the alleged victims mentioned in the complaint were Sen. Howard Metzenbaum (D-Ohio) and Proctor and Gamble Co. (Cincinnati, Ohio). Gene Mesh, the attorney who filed the lawsuit, believes the Cincinnati Bell case is not an isolated incident but a trend...an explosion of cancer that "this kind of thing [wiretapping] has developed its own markets." When asked if Cincinnati Bell was selling the information gained from tapping, Mesh said "we are proceeding along evidentiary lines to prove this." Thus far, the civil action hinges on the testimony of two former Cincinnati Bell employees, Leonard Gates, a supervisor, and Robert Draise, an installer who at one time worked for Gates. Their combined testimony states that, under the auspices of Cincinnati Bell, they conducted over 1,200 illegal wiretaps from 1972 to the present. According to Gates, as a result of the Proctor and Gamble wiretap, "we were into all of P&G's databases." In addition, both Gates and Draise claim to have been in on illegal wiretaps of General Electric Co.'s Aircraft Engines Division near Cincinnati. Draise also claims that he was ordered to identify all of GE's facsimile and modem lines for Cincinnati Bell. Neither Proctor and Gamble nor General Electric would comment. However Sen. Howard Metzenbaum's Washington, D.D., office says that the Senator "found the news shocking and is awaiting more information to see if it [the wiretap] actually happened. Meanwhile Cincinnati Bell maintains that the suit and allegations are merely Gates's and Draise's way of getting back at the phone company for having fired them. Cyndy Cantoni, a spokesperson for Cincinnati Bell, said that "we have heard the allegations that we wiretapped, but if Draise or Gates did any tapping, it wasn't done at Cincinnati Bell's request." Cantoni also cited a letter from Cincinnati Bell President Ray Clark that went out to all Cincinnati Bell employees in the wake of the publicity surrounding the wiretapping accusations. The letter stated that Gates had been warned in April 1985 against continuing an affair with an employee he had been supervising and who had accused him [Gates] of sexual harassment, according to Cantoni. The letter went on to say that Gates reacted to the warning with insubordination and threats and "carried on a campaign against the company." As a result, Gates was fired for insubordination, says Cantoni. Robert Draise was fired after he was convicted of misdemeanor wiretapping charges for tapping the phone line of a friend's girlfriend, Cantoni says. Cincinnati Bell is an independent telephone company that was allowed to keep the "Bell" trademark after divestiture, since it is older than AT&T, says Cantoni. [ End of Document ] [ End Of The LOD/H Technical Journal Issue #4 ]