Copy Link
Add to Bookmark
Report

Phuk Magazine Issue 02

eZine's profile picture
Published in 
Phuk Magazine
 · 20 Oct 2019

 
=============================================================================
PHUK MAGAZINE - Phile 0 of 10
=============================================================================

Welcome to the second issue of P/H-UK magazine, an ezine for the
Hackers & Phreakers in the United Kingdom.
Distrubition of PHUK#1 has gone excedingly well,please keep it
up ! Dr. Kaos has managed to upload PHUK#1 to a few BBS's and
apprently it has spread like wild fire since giving out the
first issure at the December 2600 meeting. The D.A! has been
able to distrubute PHUK#1 to a few eduacational establishments
through a few of his data courier agents. Also the D.A! has
cunningly spread it through covert means by leaving it on
computers in directorys called SEX , SEXGAMES AND PORN .
This is due to the fact the file is called PHUK01.ZIP which
sounds a little rude and and should get people to be a little
curious , who said a little anarchy does not work ! ;-)

Well on to the contents , this issure we have a report on
the 2600 SE meeting that was sent in by THE PRANKSTER which was
received on 01-04-95 with all the local gossip of the south east.
Also we have the second part of the BT MANUAL which I know you
have all be en waiting for.More answer phone antics by HILO , and
a lot more so I won't spoil the surprise !

STANARD DISCLAIMER
==================

THIS IS AN ALPHA COPY OF PHUK#2 ..... NO RESPONSIBILITY CAN
BE HELD FOR THE ACTIONS OF PHUK READERS WHO USE THE INFORMATION
WITHIN UNWISELY !! SO SAY THE PHREAKERS / HACKERS UNITED KINGDOM
EDITORIAL MANAGEMENT OR PHUKEM FOR SHORT <GRIN> ;-) .


=============================================================================
P / H - U - K -- C O N T E N T S
=============================================================================
0: INTRO: You're reading it!
-----------------------------------------------------------------------------
1: EDITORIAL: Time for revolution ?
-----------------------------------------------------------------------------
2: NEWSBYTES: UK News
-----------------------------------------------------------------------------
3: HACKING THE BASICS - Death's Apprentice !
-----------------------------------------------------------------------------
4: UK HACKER'S CONFERNCE:
-----------------------------------------------------------------------------
5: ANSWERPHONE - The Audioline 815 Digital Answer System - Hilo
-----------------------------------------------------------------------------
6: INTERNET SHOPPING AT THE LINK - Korporate Konsumer
-----------------------------------------------------------------------------
7: PHONE CARDS AROUND THE GLOBE - Korporate Mole
-----------------------------------------------------------------------------
8: BT Computer Security Manual Part 2 - Mrs. Brady of Doncaster
-----------------------------------------------------------------------------
9: Notes & Queries: A question & Answer Forum
-----------------------------------------------------------------------------
10: OUTRO: Next Issue .... Real soon now , we hope!!
-----------------------------------------------------------------------------


+++
EOF
=============================================================================
PHUK MAGAZINE - Phile 1 of 10
=============================================================================

-----------------------------------------
TIME FOR REVOLUTION ? - Phuk-Ed
-----------------------------------------

Well what do you know a second issue of PH-UK has finally arrived ,
isn't that amazing ! How things have changed since the last time an
issue was let loose on the computer underground . History will soon
be made when we have our first Hackers Conference in July , (Details
are in the ezine) , I can hardly wait what the media are going to say !

I mean , all those hackers and phreakers in the same location at the
same time in full view of the press and MI5 ... ;-) How will the
UK cope after such an event , what disasters are in the pipeline
to be blamed on electronic terrorism by teenage technocrats .
I can just see the the headlines in The Sun now .... but wait , what
does the UK have to fear . Are the any hackers and phreakers
actively doing what they do best ? If they are then they must
be very covert operations ! More like that there are few
hardcore hackers and phreakers playing with the system then you
would imagine . There are a few that are cloning cellular phones
but they are doing it for a profit and not for the sheer thrill
of it . What about computer penetrations then , no , nobody
there either due to the fact that a certain teenage hacker
got caught hacking the Penatagon and frightened off half of
the computer undergroud into states of paranoia . If you
want proof then look at the numbers going to the 2600
meetings !

Although it has been reported by CERT that hackers are loners
that do not work together sharing information on computer
penetration and other technical wizardary . If that is the
case how can all the hackers attending the event learn anything ?

I think it is time for change , time for us to work together
as brothers in the technilogical revolution that is happening
NOW ! Share the information people and let the UK really be a
nation that is just as advanced as the USA in our hacking and
phreaking exploits .


Phuk-Ed.

+++
EOF
=============================================================================
PHUK MAGAZINE - Phile 2 of 10
=============================================================================

------------
UK NEWSBYTES
------------

-- FIRST EVER 2600 SE MEETING RAIDED BY POLICE

The scene is set , saturday 18th of March there would be the
first 2600 meeting in the South East of London.Slowly members
of the phreaking and hacking community meet up at the Roebuck
pub.Alcholic beverages were consumed and hacking / phreaking
information was discussed openly ! (WOW !).
All was going fine until a small group of fruit machine
hackers disturbed the atmosphere by blantly and openly abusing
a lone fruit machine.Verbal obsenties and threats were showered
upon the confused bar staff , who looked on helplessly unwilling
to face a vilent confrontation.
The 2600 memebers tried to keep a low profile by drinking more
beer as they thought it would help. As each person tried to drink
ecah other under the table , the fruit machine hackers fled into
the night.
A fruit machine medic was called for and procceded to examine
said machine. After much probing and examination , he proclaimed
that yes , the machine had obviously benn tampered with !
It was at this point that unknowingly to the 2600 members the police
were called for.

When two police officers from the the nearby constabulury walked
through the door all 2600 members not suffering from mild cardiac
arrests , did what most people would have done in similiar
circumstances . More alchol was ordered very quickly . Statements
were taken from the bar staff concerned .
A finger was pointed in our direction by one of the police officers
and a hidden two finger salute was sent back.It seemed that a proper
communications protocol had been established . The police officer
kept pointing and we kept sending hidden binary.

Just as we thought we were going to be arrested one of the bar maids
jumped to our defence by saying we had nothing to do with said incident
and had been very good patrons of said establishment as we had
consumed large volumes of alcoholic beverages.
With this new piece of information the police officers duly left
and we drank more beer.

All in all the night had been a memorable event and yes we going
back next month ....hic ! We need the alchol to get over the
shock ....hic!

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

[from CTW, 20-03-95]

-- AMERICAN GIANT JOINS ELSPA AFTER HACKER BUST

AT&T , the global computer and communications firm , has become
an associate member of ELSPA , following a successful operation
by the trade body's crime unit which uncovered extensive telephone
calling card fraud . The operation , which led to two arrests in the USA
and one in the UK , began when ELPSA investigators discovered a cache
of over 50,000 stolen AT&T calling card numbers on a bulletin board .
Computer hackers were using the numbers to call all over the world , at
AT&T's expense , in order to download illegaly pirated material .

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

-- UK VERSION OF WIRED

Well I think you all know that there is a UK version of WIRED , but
correct me if you think differently but it sucks big time . I am sorry
but the UK issure does not cut the mustard and I doubt if I will
continue to buy the UK version but instaed I think I will stick with
the US one . If you have different views the write in and let us know
why you think it is worth a good read .

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

That's all for this ish, don't forget, NEWSBYTE exists on
contributions from its readers, so send your snippets, comments etc to
PHUK magazine at anon19143@anon.penet.fi, where we will do our best to
include them in the next issue.

+++
EOF
=============================================================================
PHUK MAGAZINE - Phile 3 of 10
=============================================================================

HACKING THE BASICS
------------------

So you want to be a hacker ? Silly question if you are reading this you
you must think , well I had to ask ! Okay , well where do you start ?
The equipment is useful I suppose or you would not be reading this phile
so you must know some thing about computers or at least the computer you
are using .
But to hack you need just a little more than the equipment , you also need
information and a lot of common sense !
For example , do you know your local hacker at work or in school ? You do !
Well how many times have you gone up to them and asked how do you hack or
how do you manage to do that . After a while they will get fed up and clam
up about information they might of shared with you . Your not the only one
who wants to know there is probabiliy a few dozen people who keep asking the
same old questions time after time . There is a simple solution to get on
side of your mentor , STOP ASKING DUM QUESTIONS ! Simple isn't it .
Okay , you might think well how do I learn if I don't have a hacker for a
teacher ?
READ A LOT OF BOOKS AND MAGAZINES !!!

Go to the library get out anything on hackers or hacking or general computer
books and read them and take notes on any thing you might think will come in
useful . Read computer related magazines , you might read some already if you
own a computer and look at the comms section , I know that during 1994 there
was a lot of Internet related information being written . Learn the jargon ,
do a lot of research , let your friends know that you are into computers and
to let you know if they hear of any computer related news in the press or on
TV .

Then at least you will be able to hold a decent conversation with your local
hacker and at least sound knowledgable .

Right how to hack without getting caught ! Simple DON'T HACK ! Sounds
stupid you think , well not really . Use a little bit of common sense , try a
hacker trainer , in the old days of computers there was a computer game
called SYSTEM 15000 for the ZX Spectrum and I know of a program for the Atari
ST called NAARJEK . The basic idea of the game is to hack your way in to a
computer system by any means neccessary . If you find that you get fed up
easily then hacking is not for you . The advantages of this is that you gain
experience of hacking without the risk of getting caught and two you will
not run up a huge phone bill learning some of the basics . There are other
computer hacking simulators about for other home computers or if you want
you could even write your own in BASIC or another computing language and
set a challenge to all you friends to break into the system . Get them to
write a hacking trainer that you can try your hand to get into their system .
At the very least it will get you programming and teach you part of the
HACKER ETHIC , " Always yield to the hands-on imperative ! "

Also you can try programs like MINIX or LINUX to learn UNIX and get a feel
of the UNIX operating system and you can also set it up to learn other
hacking skills .
There are also PC emulators so you can try the MS DOS / PC DOS operating
system and learn a few commands .

Right now you are ready for some real hacking , try your work or school
computer network system , put the things you have learned into practice
and try to gain entry or access to other computer users accounts or disk
areas . If you are at school or in a place of eduacation then you might
have a NIMBUS 186 network running . These are particular easy to abuse if
you already have an account on them as you can use a back door to your
classmates area ! (ASK ME AT THE 2600 MEETINGS IF YOU WANT TO KNOW MORE !)
Very handy if you are to lazy to do your own work then copy someone elses !

Well I think I will leave it there for now ! But I will say if you think you
can do better then this article then type it up and send it to PH-UK !

A FEW THINGS YOU MIGHT LIKE TO READ ! ( HINT !! )
-------------------------------------------------

THE HACKER'S HANDBOOK - A BIT DATED NOW BUT STILL A GOOD READ IF YOU
CAN FIND IT ! (E-BOOK)
APPROACHING ZERO - A GOOD READ TO TEACH YOU ABOUT THE RISKS OF
HACKING (E-BOOK)
SECRETS OF A SUPERHACKER - VERY AMERICAN ! BUT HAS A LOT OF GOOD INFO !

2600 THE HACKER QUARTERLY - HARD TO FIND <GRIN>

PHRACK - AVAILABLE ON THE INTERNET

( SEE THE D.A ! FOR THE E-BOOKS )


This phile is copyright of DEATH 'S APPRENTICE of H.A.D.E.S. , 1995

+++
EOF
=============================================================================
PHUK MAGAZINE - Phile 4 of 10
=============================================================================




ACCESS ALL AREAS
Hacking Conference

1st - 2nd July, 1995
(Saturday & Sunday)
King's College, London, UK


-------------------------------WHAT-IT-IS---------------------------------

The first UK hacking conference, Access All Areas, is to be run in London
later this year. It is aimed at hackers, phone phreaks, computer security
professionals, cyberpunks, law enforcement officials, net surfers,
programmers, and the computer underground.

It will be a chance for all sides of the computer world to get together,
discuss major issues, learn new tricks, educate others and meet "The
Enemy".

-------------------------------WHERE-IT-IS--------------------------------

Access All Areas is to be held during the first weekend of July, 1995 at
King's College, London. King's College is located in central London on
The Strand and is one of the premier universities in England.

-----------------------------WHAT-WILL-HAPPEN-----------------------------

There will be a large lecture theatre that will be used for talks by
computer security professionals, legal experts and hackers alike. The
topics under discussion will include hacking, phreaking, big brother and
the secret services, biometrics, cellular telephones, pagers, magstrips,
smart card technology, social engineering, Unix security risks, viruses,
legal aspects and much, much more.

Technical workshops will be running throughout the conference on several
topics listed above.

A video room, equipped with multiple large screen televisions, will be
showing various films, documentaries and other hacker related footage.

The conference facilities will also include a 10Mbps Internet link
connected to a local area network with various computers hanging off of it
and with extra ports to connect your laptop to.

------------------------------REGISTRATION--------------------------------

Registration will take place on the morning of Saturday 1st July from
9:00am until 12:00 noon, when the conference will commence. Lectures and
workshops will run until late Saturday night and will continue on Sunday
2nd July from 9:00am until 6:00pm.

----------------------------------COST------------------------------------

The price of admission will be 25.00 (approximately US $40.00) at the
door and will include a door pass and conference programme.

-----------------------------ACCOMMODATION--------------------------------

Accommodation in university halls of residence is being offered for the
duration of the conference. All prices quoted are per person, per night
and include full English breakfast.


SINGLE TWIN
WELLINGTON HALL 22.00 16.75


Special prices for British and Overseas university students, holding
current student identification, are also available - please call King's
Campus Vacation Bureau for details.

All bookings must be made directly with the university. They accept
payment by cash, cheque and credit card.

To making a booking call the following numbers...


KING'S CAMPUS VACATION BUREAU

Telephone : +44 (0)171 351 6011
Fax : +44 (0)171 352 7376

----------------------------MORE-INFORMATION------------------------------

If you would like more information about Access All Areas, including
pre-registration details then please contact one of the following...


Telephone : +44 (0)973 500202
Fax : +44 (0)181 224 0547
Email : info@phate.demon.co.uk


=============================================================================
PHUK MAGAZINE - Phile 5 of 10
=============================================================================

------------------------------------------------------
ANSWERPHONES - AUDIOLINE 815 DIGITAL ANSWERING MACHINE
------------------------------------------------------

Instruction manual for the Audioline 815 Digital Answering System

Remote Access
-------------

1. Dial the telephone number.

2. Listen to the OGM and subsequent beep , but instead of leaving a
message enter the remote access code , (depress for at least 3 seconds).
NOTE: You will not hear the OGM if the total recording time has
has been filled .

3. The 815 will replay your messages to you. Every 3 minutes the 815 will
automatically check that you are still listening by pausing and
prompting you to enter your access code . If you do not enter the code ,
the remote sequence will be terminated and the system will save the
messages and return to the answer mode .

Options at the end of the remote playback
-----------------------------------------

At the end of thw message playback you will hear a double beep followed
by a 10 second decision period.

1. To repeat you messages enter the remote access code .

2. To save the current messages hang up the phone .

3. To cancel current messages and rest the system ,WAIT FOR A SECOND BEEP ,
enter the remote access code and hang up the phone .

Turning on the system remotely
------------------------------

1. Call the system and allow it to ring for 16 times .

2. The system will respond with a continuous tone for about 3 seconds .

The system automatically switches to answering mode .

Of course that is all very well but what if you don't know the access
code , well it is a single digit and you will find it on the sticker
underneath the unit. Most people will leave the instruction manual to the
machine with the phone directories , logical huh ?


HILO

+++
EOF
=============================================================================
PHUK MAGAZINE - Phile 6 of 10
=============================================================================


Internet Shopping with DIXONS LINK
----------------------------------
You know that most LINK shops have modems & inet links available ...
.. no? well wander in when they're not too busy and browse ... or
maybe when they're busy ... whenever you get left alone to play with
their pc's and modems ...:)

Here's a couple of files off the machine in the local LINK ... not a
lot, but maybe useful to somebody out there. One is a 'global
internet dial access phone list', and the other is the set up strings
for loads of modems to dial into the internet. Hope its useful.

Korporate Konsumer



*****************************************************
* IBM Global Network Internet dial access phone list
*****************************************************
01-2144020 Austria Vienna
078-154643 Belgium Brussels
011-884-2870 Brazil Sao Paulo
1-604-380-2777 Canada Victoria
1-604-683-3416 Canada Vancouver
1-403-429-7125 Canada Edmonton
1-403-266-4013 Canada Calgary
1-306-525-4022 Canada Regina
1-204-956-4701 Canada Winnipeg
1-519-667-2225 Canada London
1-416-491-7112 Canada Toronto
1-613-233-4360 Canada Ottawa
1-514-931-0180 Canada Montreal
1-418-648-8684 Canada Quebec
1-902-492-8683 Canada Halifax
1-800-308-3173 Canada fee 800
90-4582133 Finland Helsinki
1-43051999 France Paris (east)
1-47760055 France Paris (west)
040-6301861 Germany Hamburg
030-7231021 Germany Berlin
0711-7800264 Germany Stuttgart
03-3505-5885 Japan Tokyo
020-6692333 Netherlands Amsterdam
079-219206 Netherlands Zoetermeer
66803850 Norway Oslo
93-4140122 Spain Barcelona
94-4157922 Spain Bilbao
981-266388 Spain La Coruna
91-5190938 Spain Madrid
91-4130003 Spain Madrid
98-5275755 Spain Oviedo
948-177809 Spain Pamplona
943-217577 Spain San Sebastian
95-4280710 Spain Sevilla
96-3616611 Spain Valencia
976-212018 Spain Zaragoza
08-6320224 Sweden Stockholm
01-433-0320 Switzerland Z≈rich
01179-292037 UK Bristol
0131-5570465 UK Edinburgh
0171-9280771 UK London (South Bank)
0161-9621452 UK Manchester
01926-497855 UK Warwick
1-404-885-5580 US Atlanta, GA
1-617-247-6754 US Boston, MA
1-303-442-0842 US Boulder, CO
1-312-245-0156 US Chicago, IL
1-214-620-9180 US Dallas, TX
1-810-827-7240 US Detroit, MI
1-713-993-7226 US Houston, TX
1-213-687-7247 US Los Angeles, CA
1-305-529-4700 US Miami, FL
1-612-338-3988 US Minneapolis, MN
1-212-644-4153 US New York, NY
1-201-265-0681 US Paramus, NJ
1-215-564-5918 US Philadelphia, PA
1-919-380-4300 US Raleigh, NC
1-314-621-9290 US ST. Louis, MO
1-415-979-0319 US San Fran, CA
1-206-382-0552 US Seattle, WA
1-813-877-1117 US Tampa, FL
1-202-293-5076 US Washington, DC
1-800-933-3997 US fee 800


******************************************************
* IBM Global Network Internet registration phone list
******************************************************
008-811-094 Australia Registration
0660-6832 Austria Registration
1-800-463-8331 Canada Registration
0800-1-1997 Belgium Registration
011-884-2870 Brazil Registration
8001-8278 Denmark Registration
0800-114465 Finland Registration
0590-8561 France Registration
0130-821202 Germany Registration
1-800-709-905 Ireland Registration
1678-72031 Italy Registration
060-228488 Netherlands Registration
0800-105765 New Zealand Registration
800-11783 Norway Registration
900-994443 Spain Registration
020-795181 Sweden Registration
155-9222 Switzerland Registration
0800-614012 United Kingdom Registration
1-800-933-3997 US Registration


NOW FOR THE MODEM SET UP LIST
-----------------------------


**********************************************
* IBM Global Network Internet dial modem list
**********************************************
Alliance V.32 AT&F AT&C1&D2\B1\C5\D0\N3\Q1\V0S7=60
Anchor 2400E AT&F ATE1Q0V1X4&C1&D2S7=30S0=0
Apex PCMCIA AT&F ATE0&K3
Apex V.32, V.32bis Data/Fax AT&F ATE0S11=50X4\N7\Q3\V2&C1&D2
Apex 9600 Data/Fax AT&F ATE0S11=50X4\N7\Q3\V2&C1&D2
Arima AT&F ATE0Q0V1&C1&D2&K3
AT&T DataPort 14.4 AT&F ATE0Q0V1X4&C1&D2&R0S11=50
AT&T Model 4000 AT&F ATE1Q0V1X1S7=60S0=0
ATI 2400etc AT&F1 AT&C1&D2X6S7=60S11=60S9=10S10=18
ATI 2400etc V.42 AT&F2 AT&C1&D2X6S7=60S11=60
ATI 9600etc AT&F2 AT&C1&D2X6S7=60S11=60
Avatech 2400E AT&F ATE1Q0V1X4&C1&D2S7=60S11=55S0=0
BSM Quik Com MNP AT&F AT\Q3\J0\N3%C1&C1&D2S7=60S0=0
Cardinal 2400 MNP AT&F AT\Q3\N3\J0\C1S0=0S7=60S11=55
Cermetek 2400 R/2400 SPC AT&F ATE1Q0V1X4S7=60S11=55S0=0
Codex 2264 AT&F AT&C1&D2*FL3*XC1*PT0&R0
Compaq Enhanced Int. V.42bis AT&F AT&C1&D2X4W1S7=60S11=60&Q5S46=2&K3S36=7
Compaq Enhanced Internal Modem AT&F AT&C1&D2X4W1S7=60&Q5S46=2&K3S36=7
CompuCom Speedmodem AT&F2 AT*H1\N3\Q3%C1&C1&D1S7=60S11=55S0=0
Default AT&F ATE0Q0S0=0V1X1&C1&D2
Digicom 9624LE AT&F AT*F3
Digicom DSI9624 AT&F AT*F3*E1&C1S0=0S7=60S11=55
Digicom DSI9624 Plus AT&F AT*F3*E9&C1S0=0S7=60S11=55
Eagle V.32 Data/Fax AT&F ATE0Q0V1X4&B0&C1&D2&M0&R2*F3
Everex Carrier 96/24 AT&F AT\Q3\N3\J0\V1\C1S7=60S11=55
Everex EV941 AT&F ATE1V1Q0X4&C1&D2&I1S7=60S11=55
Everex Evercom 24e AT&F ATE1Q0V1X4&C1&D2S7=60S11=55S0=0
Everex Evercom 24e+ (MNP 5) AT&F ATQ0V1X4&C1&D2\Q3\C1\N3\J0\V1
Forval IM14400 AT&F AT&C1&D2\J0\N3\Q3\V1S7=60S11=55
GVC Super Modem 2400 MNP-5 AT&F AT\V1%C1\C1\J0\N3\Q3S0=0S7=60S11=60
GVC Super Modem 9600 V.32 AT&F ATE1V1Q0X4&C1&D2%C1\C1\G0\J0\N3\Q3\V1S11=55S7=60
Hayes Personal Modem 2400 AT&F ATE1Q0V1X4&C1&D2S0=0
Hayes Smartmodem 2400/2400B AT&F ATE1Q0V1X4&C1&D2S7=60S11=55S0=0
Hayes Smartmodem Optima 144 + FAX 144 AT&F ATE0Q0V1W2X4&Q9S95=46
Hayes Smartmodem Optima 14400FX AT&F ATE0Q0V1W2X4&Q9S95=46
Hayes Smartmodem Optima 28800 AT&F ATB75E0Q0V1W2X4&D2&Q9S37=11S11=50S95=46
Hayes Smartmodem Optima 9600FX AT&F ATE0Q0V1W2X4&Q9S95=46
Hayes Smartmodem V Series 2400 AT&F AT&C1&D2S7=60S11=55
Hayes Smartmodem V Series 9600 V.32 AT&F AT&C1&D2S7=60S11=55
Hayes Ultima Smartmodem 14400 AT&F ATE0&D2
Hayes Ultra 14400 AT&F AT&C1&D2S7=60S11=55
Hayes Ultra 9600 AT&F AT&C1&D2S7=60S11=55
Hayes V Series 2400/2400B V.42 AT&F AT&C1&D2&K3S7=60S11=55&Q5S36=3
Hayes V Series 9600/9600B V.42 AT&F AT&C1&D2&K3S7=60S11=55&Q5S36=7
IBM (PNB) 9600 Internal AT&F ATE0Q0X4S11=50&C1
IBM 7855 (12000 bps) AT&F ATS0=0E0&M0&AP8&C1&S0#X2)N3)R2)A3)M14&B8N1S25=5
IBM 7855 (9600 bps) AT&F ATS0=0E0&M0&AP7&C1&S0#X2)N3)R2)A3)M14&B8N1S25=5
IBM PCMCIA AT&F ATL3
IBM MWave Windsurfer Adapter AT&F ATE0Q0S0=0V1X1&C1&D2\N2%C1
InfoMate 212X/PC AT&F ATE1Q0V1X1S7=60S11=55S0=0
Intel 2400B AT&F ATE1V1Q0X4&C1&D2S11=55
Intel 2400B MNP AT&F AT\Q3\N3\J0\V1\C1S11=55
Intel 2400EX MNP AT&F AT\Q3\N3\J0\V1\C1S11=55
Intel 9600EX AT&F AT\Q3\N3\J0\V1\C1S11=55S7=60
Intel 14400EX AT&F AT&C1&D2S0=0S11=55
Intel 144e external modem AT&F ATL0
Intel 144i internal modem AT&F ATL0
Intel SatisFAXtion Board AT&F AT\C1\N0S11=55
Maxwell Modem 2400PC AT&F ATE1Q0V1X1S7=30S0=0
MegaHertz 14.4 Data/Fax PCMCIA AT&F ATE0&D2S11=50
MegaHertz C5144 and C596FM AT&F1 ATE0
MegaHertz T3144 and T396FM AT&F1 ATE0
MegaHertz Z3144 and Z396FM AT&F1 ATE0
MegaHertz EasyTalk 2400 AT&F ATE1Q0V1X4&C1&D2S7=60S11=55S0=0
MicroCom AX/2400 MNP4 AT&F AT\J0\Q3\N3S0=0
MicroCom AX/2400c MNP5 AT&F AT&C1&D2M1\G0\J0\Q3\N3S0=0
MicroCom AX/9612c AT&F AT\J0\Q3\N3S0=0
MicroCom AX/9612c-AX/9624c AT&F AT\J0\Q3\N3S0=0
MicroCom AX/9624c AT&F AT\J0\Q3\N3S0=0
MicroCom QX 2400t AT&F AT&C1&D2\Q3\N3\V1%C3\C1\J0S7=60
Microcom QX/V.32c AT&F ATV1&C1\Q3\J0%C3&S0&D3X4
MultiTech MultiModem 224/224PC AT&F ATE1Q0V1X4&C1&D2S7=60S11=55S0=0
MultiTech MultiModem 224E/224EC AT&F ATQ0&E1&E4&E7&E13X4$SB9600$BA0$A1S11=55
MultiTech MultiModem 224E7 V.42bis AT&F ATQ0&E1&E4&E7&E13X4$SB19200$BA0$A1S11=55
MultiTech MultiModem V.32 AT&F ATB0&E1&E4&E7&E13X4$SB19200$BA0$A1S7=60S11=55S0=0
MultiTech MultiModem V.32 EAB V.42bis AT&F ATB0&E1&E4&E7&E13X4$SB19200$BA0$A1S7=60S11=55S0=0
NEC N2431/2431C AT&F AT&C1&D2&E1S7=60S11=55<C1T1Q
Novation Professional 2400 AT&F ATE1Q0V1X3YC0YF1YT0S7=45S0=0
Okidata CLP 296 AT&F AT&C1&D2\V1\Q3\J0\C1S7=60
Okidata Okitel 2400 Plus/2400B Plus AT&F AT&C1&D2\V1\N3\Q3\J0\C1S7=60S11=55
Okidata Okitel 2400/2400B AT&F ATE1Q0V1X4&C1&D2S7=60S11=55S0=0
Okidata Okitel 9600 AT&F AT&C1&D2\C1\J0&K3\N3\Q3
PNB (IBM) 9600 Internal AT&F ATE0Q0X4S11=50&C1
Practical Peripherals 2400SA AT&F ATE1Q0V1X4&C1&D2S7=60S11=55S0=0
Practical Peripherals 2400SA MNP AT&F ATE1Q0V1X4&C1&D2\Q3\N3\J0\V1S7=60S11=55
Practical Peripherals 2400SA V.42bis AT&F AT&C1&D2
Practical Peripherals PM14400FXMT AT&F ATE0Q0V1W2X4&C1&D2&Q9S95=46
Practical Peripherals PM14400FXSA AT&F ATE0Q0V1W2X4&C1&D2&Q9S95=46
Practical Peripherals PM9600FXMT AT&F ATE0Q0V1W2X4&C1&D2&Q9S95=46
Practical Peripherals PM9600SA V.32 AT&F AT&C1&D2S7=60S11=55S95=44
Practical Peripherals Practical 2400 AT&F ATE1Q0V1X4&C1&D2S11=55S0=0S7=60
Premier Innovations P2400 / P2400E AT&F ATS7=60
Prometheus 2400 MCT-24I Half-card AT&F ATE1Q0V1X4&C1&D2S7=60S11=55S0=0
Prometheus 9600 MNP AT&F AT*F3
Prometheus LineLink 144e AT&F2 AT&C1&D2
Racal-Milgo RMD 3221 AT&F ATX9&C1&D2*F2S7=60S11=55S0=0
Racal-Vadic 2400/PS AT&F AT*F2&C1&D2*E1S7=60S11=55
Racal-Vadic 2400LC AT&F AT&C1&D2*E1*F2*P1S7=60S11=55S7=60S11=55
Racal-Vadic 2400PA Model 2 AT&F AT&C1&D2X4*E1*L1*Q1*F2*P1S7=60S11=55
Racal-Vadic 2400VP AT&F AT&C1*C1&D2*E1*F2Y1S7=60*Q1S11=55
Racal-Vadic 9600VP AT&F AT&C1*C1&D2*F2Y1*Q1S7=60
Racal-Vadic 9632PA AT&F ATS7=60
Racal-Vadic LC2400PC AT&F ATS7=60S11=55
Stowaway 14.4 AT&F0 ATE0L3S11=50&C1&D2
Supra Fax V.32bis Internal Modem AT&F ATE0LW1X4S11=55
Supra Fax Modem V.32 AT&F2 ATE0
Supra Modem V.32bis AT&F2 ATE0LW1X4
Supra Modem 2400 AT&F ATE1Q0V1X4&C1&D2S7=60S11=55S0=0
Sysdyne MDM 24H AT&F ATE1Q0V1X4&C1&D2S7=60S11=55S0=0
Telebit Internal PC Card w/ MNP AT&F ATS11=60S51=5S58=2S66=1S95=2
TeleBit QBlazer 9600 AT&F ATE0X2&D2S58=2S59=3
Telebit T1000 AT&F ATS51=5S11=55S52=1S54=2S58=2S66=1S68=2S95=2S131=1
Telebit T1500 AT&F ATS11=60S50=6S51=254S52=1S131=1S58=2S66=1S97=1S106=1
Telebit T1600 AT&F ATS11=60S51=253&C1&D2L1X12S58=2S59=15
Telebit T2000 AT&F ATS51=5S11=55S52=1S53=1S58=2S66=1S68=2S95=2S110=1
Telebit T2500 AT&F ATS11=60S51=254S52=1S131=1S58=2S66=1S97=1S106=1
Telebit Trailblazer AT&F ATS11=60S51=5S52=1S53=1S58=2S66=1
Telebit Trailblazer Plus AT&F ATS11=60S51=5S52=1S53=1S58=2S66=1
Telebit Worldblazer AT&F ATE0&C1&D2S11=50S68=2S52=4S58=2S96=1
Twincom 14400 AT&F ATE0Q0V1W2X4&C1&K3&L0&D2&Q5&R0%C1
UDS Fastalk V.32/V.42 AT&F AT&C1&D2%B9600C%C1\C1\J0\N3\Q3
UDS V.3224/V.3225 AT&F AT&C1&D2%B6\N3\C1\J0\Q3\V1
Universal Data Systems Fastalk 2400 AT&F ATE1Q0V1X4&C1&D2S7=60S0=0
US Robotics 2400PC AT&F ATE1Q0V1X4&C1&D2S7=60S11=55S0=0
US Robotics Courier 2400 AT&F ATE1Q0V1X6&C1&D2S7=60S11=55S0=0
US Robotics Courier 2400e/ 2400e/ps AT&F ATX6&B6&H1&R2S7=60S11=55
US Robotics Courier 2400PC AT&F ATX6&B7&H1&R2S7=60S11=55
US Robotics Courier V.32bis with ASL AT&F ATE0S11=50&B1&D2&H1&R2
US Robotics Courier V.34 AT&F ATE0S11=50&B1&D2&H1&R2&A3
US Robotics Dual Standard AT&F ATX6&B1&H1&R2S7=60S11=55
US Robotics HST AT&F ATX6&B1&H1&R2S7=60S11=55
US Robotics HST V.42 AT&F ATX6&B1&H1&R2&M4&A3S7=60S11=55
US Robotics Sportster 14400 AT&F ATE0Q0V1X4S11=50&A3&B1&C1&D2&H1&K3&R2
US Robotics Sportster 2400/2400 PC AT&F ATE1Q0V1X6&C1&D2S7=60S11=55S0=0
US Robotics Sportster 9600FX AT&F ATE0Q0V1X4S11=50&A3&B1&C1&D2&H1&K3&R2
US Robotics TelePath 14.4 AT&F ATE0Q0V1X4&C1&D2&H1&R2
US Robotics V.32 AT&F ATX6&H1&R2&B1S7=60S0=0
US Robotics WorldPort 9600FX AT&F ATE0Q0V1X4S11=50&A3&B1&C1&D2&H1&K3&R2
Ven-Tel 212Plus AT&F ATE1Q0V1X1S7=60S11=55S0=0
Ven-Tel 2400 Plus II AT&F AT&C1&D2S7=60S11=55S0=0\N3\Q3%C1\C1\G0\J0\V1
Ven-Tel 9600 Plus / Plus II AT&F AT&C1&D2S7=60S11=55S0=0*S0%F2\N3\Q3%C1\V11
Ven-Tel Halfcard AT&F ATE1Q0V1X4S7=60S0=0
Ven-Tel Halfcard 24 AT&F ATE1Q0V1X4S7=30S0=0
Ven-Tel Pathfinder AT&F ATS51=5ATS11=55S52=1S53=1S58=2S66=1S68=2S95=2S110=1
Ven-Tel PCM2400E AT&F AT&C1&D2X4E1\N3\Q1\G1\V1S7=60S11=55
Viva 14.4 AT&F ATE0S0=0Q0V1X1&C1&D2
Zoom 2400 V.42bis AT&F AT&C1&D2S7=60S11=55S36=7S95=43
Zoom Modem PC 2400 AT&F ATE1Q0V1X4&C1&D2S7=60S11=55S0=0
Zoom V.32 14.4 AT&F AT&C1&D2
Zoom 9600 V.32bis AT&F AT&C1&D2


th...th...thats all ffolks!! - KK

+++
EOF
=============================================================================
PHUK MAGAZINE - Phile 7 of 10
=============================================================================

PHONE CARDS AROUND THE GLOBE
----------------------------

Here is a list of all the different types of phonecard in the world ...
it comes from an industry mag called "Card Technology Today", a DTP based
A4 magazine which costs a STAGGERING 249 UK Pounds per year for its
photocopied 18 pages !!! Seeing as though they print at the bottom of
EVERY page that "No part of this publication may be copied etc etc", I
thought I'd "contribute" their article on phone cards to PHUK magazine.

- Korporate Mole



COUNTRY SYSTEM SUPPLIERS COMMENTS

Albania - Alcatel Bell Trial Card
Algeria Smart Gemplus -
Andorra Smart Schlumberger -
Anguilla - GPT Caribbean Series
Antigua Magnetic GPT -
Antigua Smart GPT -
Ascension magnetic GPT, Datacard -
Argentina smart Schlumberger, Telefonica
Gemplus
Argentina Optical Landis & Gyr Provinox
Argentina Magnetic Urmet Telecom
Argentina Smart Gemplus Telecom
Aruba Optical Landis & Gyr -
Austria Optical Landis & Gyr -
Australia Magnetic - Payphonics
Australia Magnetic - Pay*Tels
Australia Optical - Telecom
Azerbaijan Smart Schlumberger, -
Alcatel Bell
Bahamas Smart Gemplus -
Bahrain Magnetic GPT -
Bangladesh Magnetic Urmet -
Belgium Optical Alcatel Bell -
Belgium Smart Alcatel Bell -
Benin Optical Landis & Gyr -
Bermuda Smart Gemplus -
Bolivia Magnetic Tamura -
Botswana Smart Solaic -
Brazil Inductive - -
Brazil Magnetic - Bus cardphone
Brunei Magnetic Ascom Autelca -
BVI (1) Magnetic GPT Caribbean Series
Burkina Smart Schlumberger -
Burkina Optical Landis & Gyr -
Burundi Optical Landis & Gyr -
Bulgaria - GPT Betkom
Cambodia Magnetic Amritsu -
Cameroon Smart Schlumberger, -
Gemplus
Cameroon Magnetic Ascom Autelca -
Canada - Landis & Gyr BTel
Canada Remote - Bell
Canada - - Phoneline Int.
Canada Magnetic - Calgary
Cayman I. - Datacard -
Cayman I. - GPT -
Cape Verde Optical Landis & Gyr Previously in use
Cape Verde Smart Schlumberger Now in use
CAR (2) Smart Schlumberger -
CAR Optical Landis & Gyr -
Chile Smart Gemplus -
Chile Magnetic Tamura -
China Magnetic GPT Shenda Telephone
China - - Shenzen
China - - Beijing
China - - Guangzhou
Cyprus Magnetic GPT -
Czech Smart GPT Prague CityCard
Colombia Magnetic Tamura Barranquilla
Colombia Smart Alcatel Bell Local Company
Congo Smart Schlumberger Braziville
Cook I. Magnetic GPT -
Costa Rica Magnetic GPT -
Costa Rica Smart Schlumberger -
Croatia Smart Amper, Gemplus -
Cuba Smart Schlumberger -
Curacao Optical Landis & Gyr -
Cyprus Magnetic GPT -
Denmark Smart - KTAS
Diego G. Magnetic Ascom Autelca Cable & Wireless
Djbouti Smart Schlumberger Chip in AFNOR Position
Dominica Magnetic GPT Caribbean Series
Egypt - Gemplus Africa Telecom
Egypt - Schlumberger Special Event Cards
Egypt Magnetic Amritsu -
Estonia - Landis & Gyr Estonian Telecom
Estonia Magnetic Alcatel Bell On Trial
EG (3) Smart Schlumberger Chip in AFNOR Position
Falkands - Datacard Cable & Wireless
Falklands Magnetic Alcatel Bell On Trial
Faroes - DZ Danmark -
Fiji Magnetic GPT Fintel (C&W)
Fiji Magnetic GPT Post & Telecom NZ
Finland Smart Avant Avant Electronic Purse
France Smart Solaic, Gemplus France Telecom,
Schlumberger Chip in ISO Position
France Smart Monetel -
France Smart Smart Ingeniere Private Cardphones
Fr.Poly Smart Schlumberger -
Gabon Smart Schlumberger -
Gabon Magnetic Ascom Autelca -
Gambia Smart Schlumberger, -
Gemplus
Gibraltar Optical Landis & Gyr -
Ghana Optical Landis & Gyr -
Ghana Smart Schlumberger -
GB Smart Delphic Cambridge Telephones, plan to
launch Cardphones & Chipcards
GB Smart GPT, Gemplus, BT start converting all card
Schlumberger and cashphones this year.
GB Optical Landis & Gyr BT, now being phased out.
GB Smart Siemens ACC, private site service
GB Magnetic GPT Mercury, being phased out
GB Magnetic Ascom Autelca Kite, took over from IPLS
GB - GPT BR Telecom, railway payphones
Greece Smart GPT, Gemplus -
Grenada Smart GPT Caribbean Series
Guatemala Smart Gemplus About to be introduced
Guernsey Smart GPT Guernsey Telecom
Guinea B. Optical Landis & Gyr -
Guinea C. Smart Schlumberger -
Hong Kong Remote GPT Telecom
Hong Kong Magnetic Ascom Autelca -
Hungary Smart GPT, Gemplus -
Iceland Smart Schlumberger Radiomidun, ship to shore use
Iceland Optical Landis & Gyr -
India Smart Aplab, Urmet SGS-Thomson Module
Indonesia Magnetic Tamura Indonesia Telkom
Iran Smart Solaic Square Centred Contact
Ireland Smart Gemplus, Telecom Eireann
Schlumeberger
Ireland Smart Gemplus Superphone, Ferries & Buses
Isle of Man Smart GPT -
Israel Optical Landis & Gyr Bezeq
Italy Magnetic Urmet -
Ivory C'st Magnetic Ascom Autelca CI Telecom
Jamaica Magnetic GPT -
Japan Remote - -
Japan Magnetic Tamuru, Anritsu NTT
Jersey - McCorquodale, GPT Jersey Telecom
Jordan Magnetic Ascom Autelca? PTT, withdrawn
Kazakhstan Smart Schlumberger AlmaAta, Trial card
S.Korea Magnetic Ascom Autelca -
Kuwait Magnetic GPT, Tamura -
Latvia - Alcatel Bell -
Lebanon Smart Schlumberger Chip in AFNOR Position
Libya Smart Gemplus Chip in AFNOR Position
Lithuania Magnetic Urmet -
Lux'bourg Smart Schlumberger, -
Gemplus
Macau Magnetic GPT CTM
Macedonia Smart Schlumberger -
Madagascar Smart Schlumberger -
Malaysia Magnetic GPT Uniphone, smart cards soon
Maldives Magnetic GPT -
Mali Optical Landis & Gyr -
Mali Smart Schlumberger -
Malta Smart Schlumberger -
Mauritius Optical Landis & Gyr -
Mexico Smart Monetel, Gemplus, Telmex
Schlumberger,
Anritsu
Mexico Smart Amper, Gemplus, Telnor
GPT
Micronesia Magnetic Tamura FSMTC
Micronesia Magnetic Tamura MTC
Monaco Smart Gemplus, Solaic, -
Schlumberger
Monserrat Magnetic GPT Caribbean Series
Morocco Smart Schlumberger Alfatel, field trial
Morocco Optical Landis & Gyr For GATT Meeting
Namibia Smart GPT -
N.Caledonia Smart Schlumberger Chip in AFNOR Position
N.Zealand - - Global Telecom Systems,
about to launch 1st cards
N.Zealand Remote GPT Telecom NZ
Netherlands Smart Solaic, Gemplus, PTT Telecom
SDU Payphones accept optical,
magnetic & smartcards
Netherlands Optical Landis & Gyr -
Nicaragua Smart Gemplus -
Niger Optical Landis & Gyr -
Nigeria Magnetic Ascom Autelca -
Nigeria Smart Schlumberger, AVE
Gemplus
Norway Smart Schlumberger, -
Gemplus
Norway Magnetic - Long Distance railcard
Oman Magnetic GPT -
Pakistan - Landis & Gyr Telecom Foundation
Pakistan Smart Schlumberger -
Pakistan Magnetic Urmet Telips, partnership with
Telefon & Int. Payphones
Papua N.G. Optical Landis & Gyr -
Peru Smart Solaic Telepoint
Peru Smart Gemplus Provincial Telco
Peru Magnetic Tamura -
Philippines Magnetic GPT Eastern Telecom
Philippines Magnetic DZ Danmark -
Poland Optical Landis & Gyr Trial Cards
Poland Magnetic Urmet Trial Cards
Poland Smart Schlumberger Trial Cards
Portugal Smart Schlumberger Telecom Portugal
Portugal Optical Landis & Gyr Telecom Portugal
Portugal Smart Schlumberger TLP
Puerto Rico - - Puerto Rico Telecom, mainly
for US islands
Puerto Rico Remote - Trescom, expected shortly
Qatar Magnetic Ascom Autelca -
Romania Smart Schlumberger Rom Telecom
Romania Smart Alcatel -
Romania Smart Gemplus Emcom
Romania Magnetic - Telefonica Romania, attendant
operated
Russia Smart Gemplus Moscow cellular Systems
Russia Smart Gemplus St. Petersburg, field trials
Russia Optical Landis & Gyr -
Russia Magnetic GPT Peterstar, owned with GPT
Russia Magnetic GPT Nakhoda
Russia Magnetic GPT Sakhalin Telecom
Russia - Alcatel Bell Combelga, installation soon
Sao Tome Optical Landis & Gyr -
San Marino - Urmet -
Saudi Magnetic GPT -
Senegal Smart Schlumberger,
Gemplus
Seychelles Optical Landis & Gyr Cable & Wireless
Singapore Smart Gemplus, GPT -
Sierra L. Magnetic Urmet -
Slovakia Smart GPT Slovakian Telecom
Solomon I. Magnetic GPT -
Sth. Africa Smart GPT Telkom SA
Sth. Africa Smart Solaic Transtel
Sth. Africa Smart - Telkor, International Payphone
Conference
Sth. Africa - - Transnet Railways
Slovenia Smart Gemplus -
Spain Smart - CabiTel
Spain Smart - Telefonica
Sri Lanka Optical GPT -
Sri Lanka Magnetic Anritsu Sri Lanka Telecom
St Helena Magnetic GPT -
St Lucia Magnetic GPT Caribbean Series
St Kitts Magnetic GPT Caribbean Series
St Martin Smart Gemplus Chip in AFNOR Position
St Vincent Magnetic GPT Caribbean Series
Sweden Optical Landis & Gyr Stena Link Ferries
Sweden Magnetic - -
Sweden Smart - Televerket
Switz'land Smart - From 1996
Switz'land Optical Landis & Gyr -
Syria Magnetic Urmet -
Taiwan Opticla Landis & Gyr -
Tanzania - Landis & Gyr Trial cards
Tchad Smart Gemplus, -
Schlumberger
Thailand Optical Landis & Gyr Field Trials
Thailand Smart GPT Lenso Phone, for International
Use.
Togo Magnetic GPT Rumoured to be changing to
smartcard
Tonga - GPT -
T&T (4) Magnetic GPT -
Tunisia Optical Urmet Field Trials
Tunisia Smart Schlumberger -
Turkey Magnetic Alcatel Bell -
Turkey Optical Landis & Gyr -
Turkey Smart Schlumberger Event Card
T&C (5) Magnetic GPT Caribbean Series
Ukraine Magnetic Ascom Autelca -
Uganda Magnetic Tamura -
UAE Magnetic Tamura -
Uraguay Magnetic Tamura -
USA Remote - ACI, small new company
USA Remote - AFSCOM, military
USA Smart Schlumberger Alaska, fish processing plants
USA Magnetic/ - Americtech, Known as Coinsavers
Remote
USA Remote - Ameratel, launch soon
USA Remote - American Public & Private Comms
USA Remote - Amerivox
USA Remote - AT&T
USA Remote - Bell Atlantic
USA Magnetic - Bell South
USA Remote - Cable & Wireless
USA Remote - Cardcaller, maybe withdrawn
USA Remote - CCT, minor player
USA Smart Schlumberger Comsat, ship to shore
USA Remote - Communications Gateway Network
USA Remote - Connect 1 Comms
USA Remote - Conquest 6, debit card
USA Remote - DCD Comms, dialback service
USA Magnetic Tamura FSMTC
USA Remote - Fone America
USA Remote - Global Telecomms Solutions
USA Remote - Gophone/Actionline, uses
Amerivox system
USA Magnetic Tamura GTE Hawaii
USA Remote - Metromedia Comms Corp
USA Magnetic Tamura MTC. Nt. Marianna Islands
USA Magnetic Tamura NYNEX
USA Remote - Peoples Telephone Co, prompts
in 12 languages
USA Remote - Phoneline USA
USA Remote - Phonetime
USA Remote - Quest Comms
USA Remote - Select Net
USA Remote - Sprint
USA Magnetic Tamura Teleconcepts
USA Remote - Renewal through credit card
debit
USA Remote - Telekey, uses 9 languages
USA Remote - Timemachine, uses autorenewal
USA Remote - Teletext, uses 9 languages
USA Remote - Varetic Telecom
USA Smart Gemplus US West
USA Smart Schlumberger US South
USA Remote - Western Union
USA Remote - Worldwide Comms
UN - - Telepax, cards for peace
related projects
Uzbekistan Smart Schlumberger -
Vatican Magnetic Urmet -
Vanuatu Smart Schlumberger -
Venezuela Smart Solaic, Gemplus CANTV
Venezuela Smart Solaic Yellow Pages
Vietnam - - Telecom Australia
Vietnam Smart Schlumberger Trials in Hanoi
Vietnam Magnetic Sapura Hanoi City PTT
W&F (6) Smart Schlumberger Chip in AFNOR Position
Yemen Magnetic Ascom Autelca TeleYemen


(1) British Virgin Isles
(2) Central African Republic
(3) Equatorial Guinea
(4) Trinidad & Tobago
(5) Turks & Caicos
(6) Wallace & Fortuna


+++
EOF
=============================================================================
PHUK MAGAZINE - Phile 8 of 10
=============================================================================

------------------------------------------
British Telecom - Computer Security Manual
------------------------------------------
Mrs. Brady, of Doncaster
------------------------

Sent to us anonymously by someone who wishes only to be known by
the name of Mrs. Brady of Doncaster .
Run in PHUK as a three part series, here is the second part of
British Telecom Computer Security manual right up to the bits about
personal computers and software and data ... which should make you
all look forward to the next issue of PHUK magazine for the final part
of this classified manual !

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Personal computers

Contents

5.1 Introduction . . . . . . . . . . . . . . . . . 5-2
5.1.1 Use outside BT premises . . . . . . . . . . . . 5-2

5.2 Personal security responsibility. . . . . . . . 5-3

5.3 PC and data access security . . . . . . . . . . 5-4
5.3.1 Keylocks . . . . . . . . . . . . . . . . . . . 5-4
5.3.2 Password protection . . . . . . . . . . . . . . 5-5
5.3.3 Removable disks and cassettes . . . . . . . . . 5-6
5.3.4 Protection of data in memory. . . . . . . . . . 5-6
5.3.5 Hard copy (printouts) . . . . . . . . . . . . . 5-7

5.4 Security of software. . . . . . . . . . . . . . 5-8

5.5 Personal computer communications. . . . . . . . 5-8
5.5.1 Public network access . . . . . . . . . . . . . 5-8
5.5.2 Use of PC as a computer terminal. . . . . . . . 5-9

5.6 Contingeny planning . . . . . . . . . . . . . . 5-10
5.6.1 Archiving and backup. . . . . . . . . . . . . . 5-10

5.7 Flle Servers. . . . . . . . . . . . . . . . . . 5-12

5.1 Introduction

Personal Computers (PCs) are often sited in open plan offices and, as such, are
accessible by many people. In general, PCs and their peripherals can be removed
more easily than other types of computer. Due to these two facts, PCs are more
vulnerable than equipment housed in purpose built accommodation, for example
dedicated computer centres, and so require additional provisions for their
protection.
The following threats are more likely:

o the theft of PC or peripherals,
o the theft or damage to the information stored on the PC,
o accidental or malicious physical damage, and
o the possibility of screens displaying sensitive information being overlooked.

Some deterrent against theft can be offered by clearly marking equipment with
the name and office address of the person responsible for the equipment. The
serial numbers of the equipments should also be recorded.
PC users should pay careful attention to the environment of the machine:

o ensure vents on the PC are not blocked by printout, manuals etc.
o eating, drinking and smoking while using a PC can cause damage to the machine
and should therefore be avoided.

When choosing a site for the machine in an open plan office, ensure that
consideration has been given to the confidentiality required for data on the
machine. In particular ensure that visitors or people outside a building cannot
overlook the screen if sensitive information is displayed.

5.1.1 Use outside BT premises

There are dangers in using PCs outside BT premises, for example, on trains or at
home. These threats include the increased possibility of theft, the likelihood of
onlookers and potential damage by extending access to inexperienced users. An
unprotected communications link may also present a security risk. Managers
must consider carefully whether the risks involved are justified.

POLICY 5.1: USE OF BT COMPUTING EQUIPMENT OUTSIDE BT
PREMISES

Privacy marked or commercially sensitive information shall not be processed
on portable computers anywhere other than BT premises unless the computer
or the information stored therein is adequately protected.

5.2 Personal security responsibility

Fundamental to good security is control. Control of access and resources can only
be achieved by co-ordination. For this reason it is important to distinguish
between the person responsible for a personal computer (PC) and those that use it.
Although the actual assignment of responsibilities for personal computers is a
local management issue, the following issues shall be addressed by the person
nominated as responsible for the PC:

o Physical security of the PC,
o Controlling the access of individuals to the PC,
o Ensuring that users are aware of their responsibilities,
o Controlling external access to the PC (LANs, PSI N etc),
o Backup of software (see contingency planning section),
o Maintain a list of the software and hardware,
o Co-ordinate maintenance engineers access,
o Regular audit of PC hardware and software against licences held.

The users of the PC should be made aware of their responsibilities by the person
who controls the PC. Authorisation should only be granted if the proposed user
accepts the responsibilities in writing.
The responsibilities of the users must include:

o To use only legitimate authorised and licensed socware from a proven source,
o To ensure that no sensitive data is put on the hard disk (unless it is equipped with
appropriate protection),
o To ensure that they take backups of their data at appropriate intervals,
o To read and abide by the guidance of the Computer Security Manual and the
Information Security Code.

Where the person responsible for the machine is also the user of the machine, the
duties of audit and checking outlined above fall upon that individual's line manager
or nominated representative.

POLICY 5.2: CONTROL OF PERSONAL COMPUTERS

Every personal computer shall have a named individual who is responsible for
controlling its use.

The owner must maintain a list of sensitive data in a secure place, in addition to
the list of applications. The degree of compromise should local data be lost must
be known.
Any user who stores sensitive data on servers used by the PC must never assume
that backups are being done. It is incumbent upon the user to verify the server
conditions.

5.3 PC and data access security

Many PCs are sited in open-plan offices and there may be no particular physical
security measures to restrict access to the processor, network features or
peripherals. For this reason, care needs to be exercised over the use of the PC and
access to the data. The criteria for choosing suitable controls should be the
sensitivity of the data processed, and the physical environment (who may have
physical access to the PC).

To assess the sensitivity of the data it is necessary to consider the effect of a loss
of confidentiality (to competitors, to the press, to other employees etc.); the effect
of inaccurate data or incomplete data, and the effect if data on the PC were
unavailable. The implications of the Data Protection Act and other legislation and
regulatory issues should also be considered.
The security principles to be borne in mind are:

o Need to know,
o Need to modify,
o Individual responsibility, and
o Accountability.

To enforce these security principles access to the PC, and more importantly to
data must be controlled. It is important to segregate data into compartments so as
to ensure that the security principles can be enforced. This can be achieved by use
of removable disks, or by encryption of individual files on a hard disk.

While it is not always practicable for PCs to be locked in a room if they operated
unattended, access to their contents must be restricted. Without adequate
protection, the PC, the data it is processing, and networks to which it may be
connected are at risk not only from unauthorised access but also accidental or
deliberate corruption.

An unprotected and unattended PC is vulnerable to being used to run
unauthorised software, for example games, which may carry a computer virus.
Some security can be achieved by:

o provision of key locks to safeguard internal pre-set hardware,
o physical locks to prevent use of the floppy disk drive,
o hardware-based password protection invoked during the startup procedure,
o an add-in hardware assisted access control protection device,
o hardware-based data encryption,
o removable hard-disks.

5.3.1 Key locks

A PC may have a key lock built into it. Some of these locks give a degree of
security by disabling the processor power unit. Others may simply disable the
screen or keyboard.

There is also a (somewhat limited) range of external locks for most PCs. These
locks can be fitted over the mains and auxiliary power switches to the processor
thus preventing unauthorised operation of the computer and providing safeguards
against theft of hard disks, plug-in cards and the system unit.

Lockable devices may also be fitted over, or into, the floppy disk unit so guarding
against loading of unauthorised software.

5.3.2 Password protection

There are numerous proprietary packages available which control access to the
PC operating system and disk storage by means of a user ID and password
system. Some of these packages depend on the installation of a plug-in card within
the PC, others are totally software-controlled. In some cases encryption of files on
the hard disk is an option, however the following points must be considered
before using this facility:

o whether or not the password protection can be circumvented,
o whether the method of encryption (the algorithm) is strong enough,
o whether the danger exists that encrypted files could accidentally or deliberately
become corrupted and irretrievable.

For technical guidance, refer to Chapter 10 for contacts.

5.3.2.1 Protection of data on non-removable disks

Files resident on fixed disks are particularly vulnerable. Unless an encryption
system approved by the Director of Security and Investigation is used or the PC is
protected by other suitable means, sensitive data must not be stored on
non-removable disks.

 
Many application programs used on personal computers use the (often larger and
faster) non-removable disk to temporarily store user data automatically, even if the
file being edited is being held on removable media After processing, the
temporary files are deleted from the disk; the data, however, remains intact until
the space it is occupying is ovenvritten by another file. Many word-processing
packages and similar programs produce back-up files and these also need to be
erased.

PCs on which has been loaded unknown or unauthorised software are particularly
vulnerable to attack by a Trojan Horse which may copy software or sensitive data
in a way that is unobserved and unknown by the usual PC user. Trojan Horse
software is often distributed by means of a computer virus.

Files deleted from disks, for example with the DOS DELETE command can be
easily recovered as only the directory entry is amended to indicate the disk space
is free for reuse; the data remains intact on the disk until it is overwritten. To
completely delete a file it must be erased by overwriting it with zeros or a random
data pattern. For increased privacy, this may need to be performed several times
in succession. There are third-party programs available to do this.

Files stored on file servers, such Novell's Network Operating System (NOS),
when deleted, are actually moved to a 'deleted' directory, still accessible by system
administrators. These files are not fully deleted until the Deleted directory space
is exhausted. Administrators should set up procedures for the automatic deletion
of these files. Copies may also exist on backup tapes.

Should a non-removable disk, or a PC containing a non-removable disk, require
maintenance, special precautions may be necessary to render unusable any
information contained on the disk. If an approved encryption system is used on a
non-removable disk, the privacy marking then applies only to the encryption key
protecting that information. If the information is very sensitive, it may be
appropriate to destroy the disk using destruction procedures approved by the
Director of Security and Investigations. See also Software And Data: Disposal Of
Media for policies on this subject.

POLICY 5.3: STORAGE OF DATA ON NON-REMOVABLE DISKS

Any personal computer fitted with a non-removable disk and containing privacy
marked information shall be handled and stored accordingly. IN
CONFIDENCE data shall be protected by an approved software access control
and IN STRICTEST CONFIDENCE data protected by a hardware based access
control and encryption system approved by the Director of Security and
Investigation.

POLICY 5.4: SENSITIVE DATA PROCESSED ON A PERSONAL COMPUTER

When using a personal computer with a non-removable disk to process
sensitive information, even if the data is held on a removable disk, the
non-removable disk shall be assumed to contain sensitive information, and be
treated appropriately.

5.3.3 Removable disks and cassettes

All disks and cassettes must be put away when not in use. To guard against
extraneous magnetic influences they should be stored away from any electrical
equipment. Any removable media which contain sensitive information should be
clearly labelled with the appropriate privacy marking. If sensitive information is
being held they must be locked away in a suitable cabinet or drawer appropriate to
its privacy marking. Lockable plastic disk cases by themselves are not sufficient
protection.

CSM Policy 7.17: MARKING OF MEDIA applies.

5.3.4 Protection of data in memomy

Random Access Memory (RAM) is the PC's working memory. It holds the
programs currently running and the data currently being processed.
Frequently-accessed data on a floppy or non-removable disk may be loaded into
RAM to improve access time. When the PC is powered off, RAM is normally
erased. On some PCs, however, data in RAM is saved when the power is turned
off, and can be reloaded when the power is turned on again.

Some multitasking Operating Systems (OSs), such as UNIX in all its variants,
OS/2 and Microsoft Windows manage virtual memory areas on a per process
basis. When free memory becomes low on such systems, parts of memory are
written out to a special disk area managed by the OS. The data remains on disk
and can be accessed by persons familiar with the OS.

Some OSs also generate memory dumps when the system malfunctions, at which
point some, if not all, of memory is written out to disk before the system goes
down. It may, under certain circumstances, be advantageous to make this
information available to vendor representatives to help debug the problem, but the
security implications associated with doing this must be assessed.

If sensitive data is held on a PC and the operating system uses virtual memory, or
RAM, is saved when the PC is powered off, then the person responsible must
protect the PC in accordance with Policies 5.3 and 5.4.

POLICY 5.5: RANDOM ACCESS MEMORY

Where there is a possibility that an unauthorised person may have gained
access to an unattended Personal Computer, it shall be switched off to clear
volatile memory.

PCs containing non-volatile memory shall be protected as though they
contained a non-removable disk.

5.3.5 Hard copy (printouts)

Where resources such as printers are shared, or several are available, special
precautions should be effected to ensure privacy marked material is not seen by,
or delivered to an inappropriate person.

Printout should always have the appropriate privacy marking clearly displayed at
the top and bottom of each page and handled in accordance with the appropriate
rules in the Information Security Code. Partial printouts, perhaps resulting from
failures or aborted print runs, should be disposed of in accordance with their
intended privacy marking. Note that many printers contain a memory which holds
information used for printing. In the event of failure during a print this information
may remain in memory until the printer is powered off.

Because some personal computers (and dumb terminals) offer the facility to take a
printed copy of the contents of the screen (for example, screen dumps or print
screen), each screen displayed should contain the sensitivity marking for that
information.

It should be noted that most laser printers hold a copy of the last printed page on
the laser printer drum and that it is a relatively easy task to read this page of
information directly from the drum.Therefore, whenever particularly sensitive
information is printed on is type of device, the user should consider printing a
full page of non-sensitive text in order to overwrite the previous page.

POLICY 5.6: MANAGEMENT OF PRINTERS

A Procedure shall be prepared and implemented when a shared or networked
printer is used for producing privacy marked material.

Printing over networked printers introduces additional possibilities for the
compromise of sensitive information. The network, comprising both the hardware
and software, maintains buffers for information to be printed. In some cases the
data remains in the buffers after printing has occurred. The buffers may be
accessed by unauthorised users or by mistake and data compromised. Sensitive
information should only be printed to approved print locations where an analysis
has been done on the security risks.

5.4 Security of software

Only legitimate (licensed) authorised copies of software from reputable sources
supplied by a secure distribution mechanism should be used on PCs.

Any software from colleges etc, legitimately used by BT students, for instance,
should be checked for hazardous code before loading as this is a potential source
of viruses or untrustworthy software.

Computer games are recognised as a source of computer viruses and their use is
explicitly forbidden.

POLICY 5.7: PUBLIC DOMAIN AND OTHER UNTRUSTWORTHY
SOFTWARE

Public domain and other untrustworthy software shall not be held or used on
BT's personal computers. Exemptions to this policy may only be granted by the
Director of Security and Investigation if there is a proven operational need.

POLICY 5.8: GAMES

Games shall not be used on BT's personal computers. Games must not be
loaded onto BT's personal computers except where they come as part of a
legitimate business sofhvare package and there is no facility for not installing
the games. Exemptions to this policy may only be granted by the Director of
Security and Investigation if there is a proven business need.

5.5 Personal computer communications

PCs are capable of connection by means of modem cards and interface cards to
the PSTN, Local Area Networks and other computers by various means. The
connection of a PC to a network introduces additional threats to both the PC and,
in some instances, the network. Although the chapter on Networks and
Communications covers this topic in depth, this section considers the subject in
the context of personal computers.

5.5.1 Public netvork access

In general communication sessions controlled externally to the PC from the public
network should be avoided. Where network access is unavoidable, strict controls
should be applied.

5.5.2 Use of PC as a computer terminal

Most PCs are capable of emulating various types of terminal, either by the use of
sohware packages or the installation of an extension board. When used in this
mode the PC appears to the mainframe processor as if it were the appropriate
terminal type but it also retains the capabilities of a PC.
As a consequence of the above, three major threats to security arise as follows:

1 programmable interrogation,
2 storage playback capability,
3 bridging of communication capability to other systems.

5.5.2.1 Interroga1ion and storage

Fixed mode (dumb) terminals can only interrogate and search authorised
transactions at a rate which is limited by the human operator. The results would
normally have to be transcribed from the VDU or printed on a slave printer. A PC,
on the other hand, could be programmed to carry out a range of interrogations,
examine the resultant responses and store the details of any transactions which
satisfy predetermined criteria.

Once a procedure is established this exchange can take place at speeds which are
limited only by the speed of the communications interface and a great deal of
information could be sifted in a short period. When used legitimately this is
considered to be a authorised use of PC power. However the security of the
system may rely to some extent on the (perhaps limited) rate at which information
can be extracted.

5.5.2.2 Connection to other systems

Suitably equipped PCs could connect to a mainframe computer and a public access
or BT-private network at the same time. Although the capability may seem
attractive to the PC user, the administrator of the mainframe computer might view
the potentially increased user community that may gain access to his system with
some trepidation. It could be the view that, if incorrectly managed, such a PC
could act as a switch or slave processor in order to connect the two. Thus an
unanticipated method of communication could be established which would allow
remote access from an unauthorised location and so constitute a breach of
security particularly if the PC were left on all day.

Similar concerns might be raised if the PC were to be simultaneously connected to
two networks, for example, the PSTN and a BT internal network.

It will be frequently both convenient and operationally legitimate to substitute a
PC for a terminal device in order to limit the items installed on the desk-top and to
streamline procedures. In recognition however of the risks to security, any
proposal to substitute a PC for a terminal device must have the approval of the
appropriate network or systems administration. They, in turn, must satisfy
themselves with regard to the additional risks which might arise as a consequence
of either enhanced interrogation or extended communication.

POLICY 5.9: PCs USED AS TERMINALS FOR SYSTEMS

A PC shall be used as a terminal for a BT system if, and only if, the use of a PC
has been permitted in the Security Policy Document of that system.

POLICY 5.10: PCs CONNECTED TO SYSTEMS

A PC shall not be connected to more than one system at a time unless approval
has been granted by the administrators of those systems.

5.6 Contingency planning

The business is dependent for its functions on information of which a greater
amount is being stored and processed on PCs. There is now, therefore, a business
imperative to ensure that information on PCs is available when the business needs
it. PC users should evaluate the needs of the business process supported by
information on PCs, and ensure that these requirements can be met, even if there
is a computer or disk failure.

Mistakes are made and machines can fail, either potentially leading to corruption
of data or software. Measures must be taken so that when corruption does occur,
service can be restored with the minimum of inconvenience and cost to the
business. The following are measures can be taken to reduce the impact of such a
failure.

5.6.1 Archinng and backup

Data and/or software should periodically be copied to removable media for one of
several reasons:

o in order to ensure that data is not lost in the event of a failure (BACKUP),
o to free up the space occupied when the information is no longer required for
immediate access (ARCHIVE), or
o because the information must be retained for some time to meet legal obligations
(ARCHIVE).

The software and hardware products needed to achieve the above are usually
identical; only the strategy of their use changes. Neither a backup nor archive is of
any value unless it can be demonstrated that the information can be recovered
reliably.

Data held on non-removable disks should be backed-up regularly, perhaps daily or
weekly depending on usage and criticality. The backup might be of the whole
system or only of those parts that have recently changed - an 'incremental backup'.
The copy should be stored either off-site or in a fire resistant cabinet, suitable for
its level of sensitivity.

There are four methods by which archive or backup copies of a system can be
taken:

Utility software
Most PCs have a software facility on the system disk to back-up and restore files to
and from a floppy disk. The process is time consuming but there is no other cost
except that of the floppy disks used.

Note there are compatibility problems between differing versions of the DOS
BACKUP and RESTORE utility programs such that may it impossible to restore
files written using one version of BACKUP using a version of RESTORE from a
different vendor or different version of DOS. For this reason, it is advisable that a
copy of the RESTORE program is kept with the backup or archive.

2 Third-party archive sofare
Off the shelf software is available that enables files to be copied onto floppy disks
or a tape streamer. This software is often considerably faster than using the utility
software that came with the operating system, it is more flexible, and usually more
reliable. There is a small charge for this software.

3 Tape streamer
This is a separate item of equipment and often is supplied with the software to
drive it. Though the cost of a tape streamer is not insignificant, it can usually be
justified in the savings in time and floppy disks. Remember that a complete backup
of an 80% full 40Mb hard disk will use well over 30 720Kb floppies or in excess of
60 360Kb floppies. The task may take over an hour and is often used as the excuse
why a backup was not taken after the disk crashed!

A tape streamer is essential equipment where several users share a file-server on a
LAN. The capital cost can be spread amongst all of the LAN users, and all user
files can be copied at once.

4 External disk drives
External disk drives are available for many machines and can be used as a means
of archiving. Though fast, they are sometimes neither rugged nor particularly
economical. Iis situation may change with the introduction of high capacity
floppy disk drives.

Should any of the information copied for backup or archive purposes be in
encrypted form, it is prudent to retain a copy of the cryptographic key so that the
information can be recovered. The cryptographic key should be kept securely
because it may be used to gain access to both the backup/archive and the original
information still on the PC.

5.7 File Servers

File Servers on Local Area Networks pose similar security problems to PCs, due
to the fact that they are often sited in open plan offices, are small and are
accessible by many people. If privacy marked information is held on a LAN server
then precautions must be taken to safeguard that data.

POLICY 5.11: FILE SERVER SECURlTY

File servers shall be protected in accordance with the sensitivity of the
information they contain, either through physical access controls, or through
logical controls. Policies 4.6 and 5.3 refer.

User access to computers

Contents

6.1 Introduction . . . . . . . . . . . . . . . . . . . 6-3

6.2 Regulating access to computers. . . . . . . . . . . 6-3
6.2.1 Identification and authorisation principles . . . . 6-3
6.2.2 Logical access control packages . . . . . . . . . . 6-4
6.2.3 Siting of terminals . . . . . . . . . . . . . . . . 6-4
6.2.4 Intelligent terminals . . . . . . . . . . . . . . . 6-4

6.3 Identification . . . . . . . . . . . . . . . . . . 6-4
6.3.1 User identification . . . . . . . . . . . . . . . . 6-5
6.3.2 Terminal identification . . . . . . . . . . . . . . 6-5

6.4 Passwords . . . . . . . . . . . . . . . . . . . . . 6-6
6.4.1 Password management . . . . . . . . . . . . . . . . 6-6
6.4.2 Password selection. . . . . . . . . . . . . . . . . 6-6
6.4.3 System passwords. . . . . . . . . . . . . . . . . . 6-7
6.4.4 Password secrecy. . . . . . . . . . . . . . . . . . 6-7
6.4.5 Dual passwords. . . . . . . . . . . . . . . . . . . 6-7
6.4.6 Preprogramming of passwords . . . . . . . . . . . . 6-7
6.4.7 Computer storage of passwords . . . . . . . . . . . 6-8
6.4.8 Password change . . . . . . . . . . . . . . . . . . 6-8
6.4.9 Administrator control of passwords. . . . . . . . . 6-8
6.4.10 Manufacturer's installed UIDs and passwords . . . . 6-9
6.4.11 Software maintenance by third parties . . . . . . . 6-9
6.4.12 Password transmission . . . . . . . . . . . . . . . 6-9

6.5 Limitations of password security. . . . . . . . . . 6-10
6.5.1 Weaknesses . . . . . . . . . . . . . . . . . . . . 6-10
6.5.2 Random one-time passwords . . . . . . . . . . . . . 6-10
6.5.3 Challenge systems . . . . . . . . . . . . . . . . . 6-10

6.6 Logging on. . . . . . . . . . . . . . . . . . . . . 6-11
6.6.1 Welcome screens . . . . . . . . . . . . . . . . . . 6-11
6.6.2 Silent logon . . . . . . . . . . . . . . . . . . . 6-11
6.6.3 Log on security . . . . . . . . . . . . . . . . . . 6-12
6.6.4 Prescribed warning screen . . . . . . . . . . . . . 6-12
6.6.5 Log on failure conditions . . . . . . . . . . . . . 6-12
6.6.6 Repeated log on attempts. . . . . . . . . . . . . . 6-12
6.6.7 Recording access attempts . . . . . . . . . . . . . 6-13
6.6.8 Last access . . . . . . . . . . . . . . . . . . . . 6-13
6.6.9 Unauthorised access . . . . . . . . . . . . . . . . 6-14

6.7 Logging off . . . . . . . . . . . . . . . . . . . . . . 6-14
6.7.1 Terminal inactivity . . . . . . . . . . . . . . . . . . . . 6-14
6.7.2 Prolonged activity . . . . . . . . . . . . . . . . . . . . 6-14

6.7.3 Link interruption . . . . . . . . . . . . . . . . . . 6-14

6.8 User privileges . . . . . . . . . . . . . . . . . . . 6-15
6.8.1 Privilege table establishment . . . . . . . . . . . . 6-15
6.8.2 Facility privileges . . . . . . . . . . . . . . . . . 6-15
6.8.3 Function privileges . . . . . . . . . . . . . . . . . 6-16

6.9 Access to user files. . . . . . . . . . . . . . . . . 6-16
6.9.1 Implementation of logical access controls . . . . . . 6-16
6.9.2 Default privileges. . . . . . . . . . . . . . . . . . 6-17
6.9.3 Password control of file access . . . . . . . . . . . 6-17
6.9.4 Encryption of files . . . . . . . . . . . . . . . . . 6-17

6.10 Customer access to BT computers . . . . . . . . . . . 6-17

6.11 Contractors . . . . . . . . . . . . . . . . . . . . . 6-18
6.11.1 Software development by third parties . . . . . . . . 6-18
6.11.2 Operational activities by third parties . . . . . 6-19

6.1 Introduction

The Computer Misuse Act 1990, has been in force in the United Kingdom since
August. This law makes the unauthorised access to, and misuse of computer
facilities a criminal offence.

No amount of legislation will actually prevent unauthorised access and misuse of
facilities. This chapter offers guidance on methods that may be employed to
reduce or eliminate unauthorised access.

Access to computers by users, in contrast to system operators and maintainers will
normally be via a terminal device. It can vary from a simple Visual Display Unit
(VDU), a sophisticated Personal Computer (PC), or a workstation. In order to
regulate access, it is essential that controls are exercised which are capable of
identifying both the source and origin of each session.

POLICY 6.1: COMPUTER MISUSE ACT 1990

It is a criminal offence for an unauthorised person to attempt to access systems
or information within systems, or to attempt to exceed the computer facilities
and privileges granted to them. Wherever possible, BTwill prosecute using the
Computer Misuse Act 1990.

6.2 Regulating access to computers

Logical access control and associated audit trails and logs provide essential
deterrents against abuse of privilege by authorised system users.

The unauthorised testing of the security controls of an operational system is
expressly forbidden.

POLICY 6.2: OPERATIONAL SYSTEM PENETRATION TESTING

The testing of the security controls of an operational system shall only be done
under strictly controlled conditions. All testing shall be carried out in
accordance with a written schedule. Prior approval of the Director of Security
and Investigation shall be obtained.

6.2.1 Identification and authorisation principles

To prevent unauthorised individuals attempting to access computer systems,
identification and authentication controls of users are necessary. The most
common practice is to use identifiers and passwords when logging onto the
computer system. Other methods such as keys, badges, and smart cards can also
be used effectively. Other techniques are possible (for example,
challenge-response systems) using some form of personal token. Specialist advice
should be sought on the security characteristics of proposed systems prior to their
adoption.

6.2.2 Logical access control packages

For some major operating systems, special purpose access control packages are
available. These provide degrees of protection by ensuring that all users are
positively identified and only granted access to the system resources and files for
which they have previously been authorised.

The packages frequently complement the standard operating system by exploiting
hooks or by the replacement of standard routines and log details of all accesses for
later analysis. They may or may not identify that the data has been seen or
changed.

Before implementing any security enhancement package it should be thoroughly
evaluated to ensure it meets the operational requirement.

6.2.3 Siting of terminals

Terminal devices must be sited so that they cannot be easily overlooked by
unauthorised individuals. This is especially important when it is necessary to site
terminals in reception areas, telephone shops or other public places. Customer
information displayed on a screen which can be overlooked by the public or even
unauthorised employees potentially constitutes a breach of Data Protection
Legislation, Section 45 of the Telecommunications Act 1984, and the Code of
Practice on Disclosure of Customer Information. The inadvertent disclosure of
logon details may also result.

When it is operationally necessary to site a terminal in a public area, it must be
screened so that it can only be viewed by authorised employees. If this is not
practical then serious consideration must be given to the benefits derived weighed
against the possible risk of irregular divulgence of information displayed on the
screen.

The communication links for terminals in public places should be adequately
protected from the threat of tampering and rerouting.

POLICY 63: SITING OF REMOTE TERMINAL

Terminals in public view but not for public access shall be sited carefully, and
particular attention shall be given to their physical security and
communications links.

6.2.4 Intelligent terminals

Special care must be taken if ever a 'dumb' terminal is replaced by one with local
processing power, for example, a personal computer. Iis subject is covered in
detail in the chapter on Personal Computers.

6.3 Identification

Identifiers are used to keep track of, and control the use of system resources.
Users and terminals may both have identifiers which can be used for the purposes
of auditing.

6.3.1 User identification

Each user of a computer system should have an exclusive user identification
(UID).

o UIDs are used to uniquely identify users and their associated characteristics
(access rights, capabilities, time based access and control privileges) to permit the
correct allocation of resources,

o UIDs provide a means of recording system usage

o UIDs should be allocated to individual users to permit unambiguous identification
in the interests of accountability. They should not be shared among groups of
individuals and may be constant as long as the user is authorised on the system

o UIDs are not usually confidential (indeed in some systems users can obtain lists of
UIDs) and security must never depend solely on the user's ability to provide a
valid UID.

POLICY 6.4: UNIQUE USER IDENTIFIER

Each user of a multi-user system shall be uniquely identifiable to that system.

A network of computers that allows remote processes access to information on
any of the networked computers must also maintain unique user identification
for users, unless other means of security are implemented, for example by
disabling the facility for cross-machine recognition of UIDs. Separate UID
naming strategies for each machine can greatly assist in ensuring uniqueness.

6.3.2 Terminal identification

Each terminal authorised to access the system may also have a Terminal
Identification (TID) built into it which is automatically communicated to the host
during log on. The system may then check that an attempted access comes from a
bona fide source at the correct physical location, and by comparing the signalled
TID with the UID of the user, may confirm an appropriate match.

TIDs should not be implemented alone since this does not assist accountability.
Moreover as a security measure they are rather limited. It is difficult to engineer
an unmodifiable TID into a terminal and TIDs may also become known in which
case they can be simulated.

Terminal identification can also be by means of physical access controls such as
locks or removable badges and keys. In this case a code may be transmitted
automatically by the terminal over the communications link at the beginning of
every message. Any badges or keys must be removed when the terminal is not in
use and securely stored.

POLICY 6.5: TERMINAL IDENTIFERS IN A NETWORK

In the design of systems, the use of terminal identities shall be considered
where technically feasible.

On some systems, source identification uniquely identifying the device and user,
for example, based on Kerberos, can be implemented. These systems provide a
very secure mechanism for forming a closed network of systems and users.

6.4 Passwords

The knowledge of a password is sometimes used as corroborating evidence that
the accessor is entitled to the facilities associated with a particular UID.
Passwords must be allocated on an individual basis and not be shared.

6.4.1 Password management

To afford reasonable protection against unauthorised access, passwords should be
a minimum of six characters long, with at least one non-alphabetic. Passwords
used for system privileges should contain at least eight characters. It is desirable
that the system software should check for too simple a combination such as all the
same characters. There is an advantage in allowing a range of password lengths
(down to the prescribed minimum) since this makes searching by adversaries
harder.

POLICY 6.6: PASSWORD MANAGEMENT

Passwords to systems shall be properly managed so that:

o They are not easily guessable,

o They are changed at least every 90 days,

o They are at least 6 characters long for user access and at least 8 for system
privilege access,

o Preferably they consist of all the possible character set,

o They contain at least one non-alphabetical character,

o They cannot be easily changed back to previously used passwords,

o They cannot be easily exhaustively searched (unless denial of service is a
threat),

o They are not echoed to screens or paper,

o They are not written down, except if treated with appropriate security levels to
protect their confidentiality, integrity and accountability, and where there is a
valid business reason

o Not related to the UID,

o They are not related to the identity of the user.

6.4.2 Password selection

Users should be permitted to select their own passwords since these are more
easily remembered but users must be warned against guessable or predictable
values. The system should check that all passwords are not one of the 'standard'
or guessable words that an adversary would try, for example, password the same
as the UID.

Meaningful terms such as SYS or SYSTEM, initials, Christian names, car
registration numbers and the names of spouses are all popular choices for
password and are worthless from a security viewpoint, as are certain popular
words such as FRED.

The more common or computer-relevant meaningful words of the English
language are also to be avoided. There are surprisingly few of them - perhaps only
4000, and many cases exist of hackers breaking a system by simply trying a few
hundred of the most likely words one after another.

Password strength is greatly enhanced by the selection of non-meaningful
character combinations. An adversary is far less likely to guess a password such as
XAC/9 than ANDREW although initial memorisation may be more difficult.

6.4.3 System passwords

An extra level of security is obtained if users are required to enter a system
password prior to and as well as their own selected application password. System
passwords provide the additional facility of rapid lock-out of groups of users if
need be.

System passwords must never be used as a substitute for personal passwords.
They must be chosen in line with the password generation guidelines and be
controlled by the systems administrator.

6.4.4 Password secrecy

Users must be properly briefed on the importance of the correct use of passwords
and that they have a responsibility to safeguard them.

All passwords should be assumed to be as valuable as the system or information to
which it can be used to gain access. If the password is written down, the text
should be protected accordingly. A password should not be disclosed to others
nor should it ever be entered at a terminal when others are in a position to watch
so closely as to deduce the password.

When a password is used to gain access to a system or entered for the purposes of
password change, the password text must be obscured either by overprinting, in
the case of hardcopy local echo terminals, or the echo suppressed where
full-duplex communications are used between the terminal and the host.

6.4.5 Dual passwords

Under some circumstances, business transactions might be so important that no
one individual may be permitted to initiate the transaction by themselves. If these
transactions are actually carried out by computer then a way must be found to
ensure that two people are present to 'authorise' the transaction and be
responsible for it. One approach is to ensure that system accounts that have the
privilege to initiate such transactions need two passwords to access them. An
alternative approach might be to have one long password formed by the
concatenation of two shorter passwords. Other schemes could be devised.

6.4.6 Preprogramming of passwords

Storage of preprogrammed passwords or entire logon sequences on intelligent
terminals or function keys or stored files is extremely dangerous practice and is
forbidden unless the circumstances have been agreed by the Director of Security
and Investigation. Any brief unauthorised access to the terminal or stored data will
then permit the password to be compromised.

POLICY 6.8: PREPROGRAMMING OF PASSWORDS

The automation of entire logon sequences is expressly forbidden except with
the permission of the Director of Security and Investigation.

6.4.7 Computer storage of passwords

Users' passwords should be under their own control and should not be available
from the system to anybody else including operational or maintenance staff.

To this end it is highly desirable that the computer logon procedures use one-way
encrypted password files. This means that passwords are stored in irreversibly
encrypted form within the computer.

Passwords entered by users at logon are encrypted using the same algorithm, and
the two encrypted forms are checked for a match to prove authentication.

The encryption algorithm must however be strong and guidance must be sought
from The Director of Security and Investigations, since some password encryption
systems have been found to be very weak indeed.

6.4.8 Password change

The system should ensure that all passwords (individual and system) are changed
regularly. Passwords should be changed at least every 90 days.
Password change may be enforced by:

o forcing users to change their passwords after a given period, or
o allowing users to change their passwords at will ess desirable since less reliable),
o or preferably both.

The change of existing passwords should involve a verification of the user's
identity on the basis of the existing password and double entry of the proposed
new password as a check against input errors. The system should not permit an
old password to be used again until at least a certain number of different new
passwords have been registered.

Where forced password change is not implemented the system should record the
date of last change to permit identification of users not complying with security
requirements. If there is a possibility that a password has been compromised, it
must be changed immediately.

6.4.9 Administrator control of passwords

It should be possible for the system administrator to force a user's password to a
value of the administrator's choosing in the event that a user genuinely forgets his
or her password. However neither the administrator nor anybody else should be
able to obtain the value of a current password from the computer.

As an alternative, stronger security is obtained (at slightly greater administrative
cost) if password forcing is simply not allowed. In this case forgetting a password
compels full reauthorisation.

POLICY 6.21: UID EXPIRY

When a UID remains unused for greater than 60 days, it shall be disabled.

6.4.10 Manufacturer's installed UIDs and passwords

Manufacturer's installed UIDs and passwords present at equipment and software
delivery must be changed to user-selected values as soon as practicable since the
manufacturer's choice of values may be standard and well known.

It is also essential that passwords are changed after every visit by the
manufacturer or computer servicing agency to remove the danger of passwords
becoming known to contractors. Care must be taken when the system is reloaded
and upgraded that any manufacturers passwords are not reinstated.

POLICY 6.9: MANUFACTURERS PASSWORDS

Manufacturer installed passwords shall be removed and replaced with new
passwords in operational systems.

6.4.11 Sofware maintenance by third parties

Systems requiring access for software maintenance by non-BT personnel should
not permit total system software and data file eedom to the contractor.
Maintenance should only be possible at agreed times and under BT supervision.
Sensitive data should, if necessary, be removed from the system prior to
maintenance.

Some computer vendors encourage remote access to their customers computer
systems via the PSTN for the purposes of fault diagnosis. If this option is taken,
access must be very strictly controlled since large quantities of information could
easily be made available, perhaps by means of uncontrolled software dumps.
Access to the system should be controlled manually, for example using a port
configured for outward dialled calls only with incoming calls barred. Special care
must be taken to change passwords after maintenance sessions by contractors.

POLICY 6.10: REMOTE ACCES FOR MAINTENANCE PURPOSES

Remote access for diagnostic or preventative maintenance purposes shall be
strictly controlled so as to protect the security of the system.

6.4.12 Password transmission

Passwords used to protect information of a given sensitivity must be afforded at
least the same protection and preferably a higher level of protection than the
information and processes to which they give access. This is particularly important
when accessing a system remotely across a public network. Distribution of
passwords must be done in a way which ensures that disclosure en route would
not result in a compromise of the system on which the password would be used. In
particular, electronic mail systems must not be used for distribution of passwords.

6.5 Limitations of password security

Most experts no longer regard traditional password practices as fully secure. This
section outlines their limitations and indicates favoured methods of enhancing
security

6.5.1 Weaknesses

The advice concerning minimum password length, secrecy and frequency of
change should be viewed as the minimum requirements. Unless users are
strongly encouraged (or forced) to employ highly random passwords they will
tend only to select passwords from a total of about 4000 English words.

Even if passwords are highly random the fact that they are used more than once
represents a security weakness since any person obtaining a password value (by
line tapping, by watching the operator key in the value, by finding a written
copy...) can then penetrate the system freely until that password is changed.

These weaknesses can be overcome by both using truly random passwords, and
changing passwords every access.

6.5.2 Random one-time passwords

This can be achieved by adopting one-time password procedures whereby each
user is given a list of random password values which must be used once only each
and in the given order. However, this would involve writing down passwords
which is contrary to good practice.

In certain systems, the distribution of such lists may be acceptable, but generally
the challenge system of the next paragraph is to be preferred.

6.5.3 Challenge systems

In a challenge system, random one-time passwords are obtained by providing
each user with a Personal Identification Unit (PIU) usually resembling a pocket
calculator. On attempted access with a valid UID, the host generates a random
number or challenge value which it sends to the user. The user must then enter
the value manually on their PIU. The PIU then performs a complex mathematical
operation on this number and displays the result on its display. The user then
transcribes this number to the terminal which, in turn, is sent to the host for
checking. If the check is successful, the host can be reasonable certain that the
user has the correct PIU in his possession and access can be granted.

Each PIU should use a different cryptographic key to permit identification of an
individual user. The PIU will work correctly only in conjunction with its associated
UID. Attempts to use the PIU with an alternative or incorrect UID will result in an
incorrect response being generated. To prevent unauthorised system access
should a PIU fall into the wrong hands the user may also be required to enter a
secret Personal Identification Number (PIN) into the PIU prior to keying in the
challenge value.

The access thus depends on something:

o possessed by the user (the PIU), and

o known by the user (the PIN).

The algorithm should be cryptographically strong so as to prevent analysis of the
method by an adversary.

Alternative types of PIU, which generate a new one-time password every minute or
so, obviate the need for a challenge-response sequence, are also available.
Biometric devices are becoming more commercially available and are worthy of
consideration for sensitive systems, they are however rather costly for widespread
use.

POLICY 6.11: USER AUTHENTICATION DEVICES

In the design of systems, the use of user authentication devices should be
considered and documented.

6.6 Logging on

No user should be able to log onto a system containing high integrity,
commercially sensitive, or privacy marked information without first executing a
security dialogue, such as a correct entry of a valid UID and matching password
(or equivalent). This ensures full identification and authentication and permits
logging for subsequent accountability.

6.6.1 Welcome screens

The initial screen (traditionally called the "Welcome" screen) displayed before
successful completion of the security dialogue should be designed to reveal the
minimum amount of information about the system.

POLICY 6.12: WELCOME SCREENS

Text displayed before logon shall provide only the minimum amount of
information for access authorisation.

6.6.2 Silent log on

No system facilities, not even the 'HELP' command, should be available to the
user prior to successful completion of these steps. Security is appreciably
enhanced by adopting log on procedures which give no help to potential
adversaries.

POLICY 6.13: SILENT LOGON

Other than a minimal prompt for user ID and password, no additional help shall
be given when logging on to BT multi-user, administration or management
systems. Failure of a logon sequence shall not identify which part of the logon
process failed.

6.6.3 Log on security

The logon procedure should be fully secure. No trap-door method shall be
possible by, for example, through use of zero-length, excessive length UIDs or
passwords, or by control, escape or break signals.

6.6.4 Prescribed warning screen

As soon as access has been successfully achieved, the following screen should be
displayed by all BT multi-user, administration and management systems
processing high integrity, commercially sensitive, or privacy-marked material.

British Telecommunications plc

COMPUTER NAME

WARNING: You have accessed the COMPUTER NAME operated by BT. You are required to
have a personal authorisation from the system administrator before you use this
computer and you are strictly limited to the use set out in that written
authorisation, Unauthorised access or use of this system is prohibited.
Unauthorised access to or misuse of a computer constitutes an offence under the
Computer Misuse Act 1990.

If you understand this message and have been authorised to use this system
please type YES. Otherwise type NO to terminate this access.

Are you authorised to use this computer? <Yes/No>

POLlCY 6.14: PRESCRIBED WARNING SCREEN AND AUTHORISATION

A prescribed warning screen shall be displayed immediately after an accessor
successfully completes the logon sequence. The system administrator shall set
up procedures to provide written authorisation to users stating their access
privileges.

6.6.5 Log on failure conditions
Logon must not be permitted if:

o the UID is invalid,
o the UID is barred,
o the password is invalid,
o the UID and password combination is invalid,
o the claimed UID is already active unless it is a system requirement,
o the logon would contravene local policy, for example, time of day restrictions.

6.6.6 Repeated log on attempts

The rate at which an adversary can make log on attempts must be limited to
prevent exhaustive searching of UID and password combinations.
Such an attack can be rendered imoractical bv compelling:

o a modest time delay (eg. two seconds) between each individual access attempt
made on any given port, and
o a substantial time delay (eg. one minute) every few attempts (eg. three).

This may be accomplished by including an attempt counter in the log on
procedure such that no more than three attempts may be made subject only to the
modest time delay, after which attempts from that port are disabled for a
substantial time delay. The preferred option is that the link is actually
disconnected and the user compelled to obtain reconnection.

A stronger measure would be to permanently disable the UID or port with
appropriate messages being sent to system log and the system administrator. In
such cases the UIDs should be taken out of service automatically after a
predefined number of consecutive unsuccessful access attempts - perhaps three.
Before the locked-out UID can be used again, an approach has to be made to the
Systems Administrator who will decide, if necessary in consultation with the
Application Manager, whether to reactivate the original UID or issue a new one.
This strategy is recommended for consideration only for High Impact Systems
because an adversary may abuse the feature to disable all UID and/or ports
causing a 'Denial of Service' problem. The running of verification utilities against
system critical commands should be considered prior to reinstatement of the UID.

POLICY 6.15: TERMINAL OR UID LOCKOUT

When a terminal or UID is repeatedly misused in an attempt to breach a
system, the terminal or UID shall be disabled and an alarm given. The period
during which the terminal or UID is disabled must be commensurate with the
impact of Denial of Service.

6.6.7 Recording access attempts

Where possible all access attempts (whether or not successful and whether or not
exceeding the counter limit) should be recorded on the system log. Alarms to the
system manager may also be raised in real-time depending on the sensitivity of the
system following repeated logon failures. The record should indicate the
attempted UID, the time of the event and the link involved but should not record
the attempted passwords.

Exceptional events (such as apparent exhaustive trialling of password on a
particular UID) should be so recorded as to come rapidly to the attention of
supervisory personnel. The log must be scrutinised at frequent intervals for any
evidence of unauthorised access attempts. Any unusual logged events must be
investigated.

POLICY 6.16: SECURE ALARMS

Security alarms shall be used to inform the system administrator when an
attempted breach of security has been detected.

6.6.8 Last access
On successful logon the user should be informed of the time and date of last
access, and of any unsuccessful access attempts since then.

6.6.9 Unauthorised access

Any (suspected or known) unauthorised access attempt or criminal activity should
be reported immediately to the BT Investigation Department Help Desk and line
management. Further investigatory action should await specialist advice from
BTID.

POLICY 8.8: REPORTING OF SECURITY INCIDENTS applies.

6.7 Logging off

6.7.1 Terminal inactinty

The system should include an activity sensing feature to identify terminals which,
although logged on, appear to have been abandoned. These are a security risk
since an adversary finding such a terminal unattended could employ it with all the
access rights of the previous user. If no input is detected after a certain timeout
(eg. five minutes) the system should log the terminal off automatically.

This may be undesirable for some very limited facilities, such as batch processing
or program development, in which case longer timeouts may be associated with
specific UIDs.

PCs should have approved security programs installed on them such that, if no
user activity has been detected for a period of time, the program will lock the PC
terminal and require a password entry to be reactivated. is must be done
especially for PCs logged into a server system. Such programs should also blank
out the actual contents of the display (it may be replaced by some other display)
until the PC has been reactivated through the password. Screen blanking options
that only jumble the contents of the screen should not be used. Preferably, the
blanking of data should be combined with a screen saver function, which reduces
the display duty cycle significantly, to help prolong the life of the display.

POLICY 6.17: TERMINAL OR UID TIMEOUT

When a port or UID remains dormant for a period of time, it shall be disabled.
Terminal timeout shall also occur when a terminal remains logged onto a
system, but remains unused for a period of time. The screen shall be cleared of
any display when the forced logoff occurs.

6.7.2 Prolonged activity

The system should require users present on the system for prolonged periods
(hours rather than days) to reenter their log on sequence (UID and password) .
This is to ensure that the authorised user is still present and that the
communication link has not been hijacked by an adversary.

6.7.3 Link interruption

The system should similarly automatically log off and clear down completely and
immediately the session with any terminal whose communications path is
interrupted. Many terrninals have a carrier detection light to show at the
communications path is open and the failure of this may indicate an interruption.

POLICY 6.18: LOG OFF WHEN COMMUNICATION SESSION IS
INTERRUPTED

Precautions shall be taken during the design of systems to ensure that active
sessions are aborted if a failure in communications occurs.

6.8 User privileges

It is usually a requirement that user capabilities still be restricted after log on. This
is to prevent unauthorised use of computer facilities and unauthorised access of
system software and data to which the user is not entitled. It is generally
accomplished by establishing a set of 'privileges' associated with each UID such
that users are not permitted to perform functions or access data except as
indicated in their privilege tables. Controls shall ensure this by such means as
password controls, access control lists, labelling of data fields.

POLICY 6.19: DATA ACCESS CONTROLS

Processing capability and data shall be accessible only by authorised staff with
the appropriate privileges.

6.8.1 Privilege table establishment

The default condition of all privilege tables should be that corresponding to no
privileges. Privilege tables must be under the ultimate control of user
management who must authorise all changes.

6.8.2 Facility privileges
Privileges speciing the computer facilities available to users should be controlled
only by system administrator staff. Facility privileges include:

o I/O device allocations,
o available storage volume,
o maximum job size,
o financial budget and its consumption.

This restriction must be applied with particular rigour to security privileges. It
must not be possible under any circumstances for an ordinary user to redefine
himself as a system operator or system administrator for example or obtain access
to their data files or facilities or obtain access to security-related software such as:

o operating systems,
o password control software,
o system log software,
o access control software,
o time restrictions.

Where a job consists of several tasks run in sequence, the authority of the user
should be checked at each task and not solely on the first one.

Staff whose job is to run a limited set of programs should not have the facility to
edit, read or write programs. Menu-driven software may be helpful to ensure this.

POLICY 6.20: ADMINISTRATION OF PRIVILEGES

Privileges shall be administered only by the system administrator (or
equivalent role) .

6.8.3 Function privileges

Privileges defining the computer functions available to users should also be
controlled by system administration staff only. Procedures for the replication of
user privileges should only allow the minimum to be created appropriate with the
users authority. Users should only be permitted to use those commands required
in the normal course of their duties.

6.9 Access to user files

Privileges defining the rights of users to access each other's data files may be
exclusively under system administrator control, especially on high risk systems.
However, on less sensitive systems discretionary control is frequently all that is
required whereby each user controls the access of others to his own data files. In
general systems developers should not have access to live files.

6.9.1 Implementation of logical access controls

In this context 'access' may imply any of a number of operations (eg read, write,
delete, modify, execute...) and it is essential that each of these should be
separately specifiable. In any case there is implied the creation of a more or less
detailed set of access restrictions for each user data file and the existence of
special system control software for enforcement.

There may also be a need for user identification control within applications, for
example to test for the maintenance of separation of duties.

Software development tools, for example, compilers, program libraries, source
code etc, should not be available on operational systems. If they are present, their
use must be strictly controlled.

It is important that as much as possible of the control procedure should be
performed automatically by the system and in a 'user friendly' and efficient
manner. User acceptance and co-operation cannot be obtained otherwise and the
security system will be viewed as an enemy by those it is intended to serve with
the result that users will tend to avoid and circumvent its protective measures
where possible.

Most Operating Systems implement some form of access control but the degree of
real security obtained varies dramatically from one system to another.

6.9.2 Default privileges

The preferable default privilege is that no user other than the file owner can
access (read, write, etc.) any given file unless given explicit authority to do so by
the owner.

6.9.3 Password control of file access

A limited degree of control may be obtained by password protection of files such
that access is only available to users who know the correct password. Separate
control of the different types of access (read, write, etc.) is then not generally
possible, and the overall degree of security is much poorer than the fully
specifiable, fully managed systems indicated above.

This is partly because of user reluctance to undertake the burden of the additional
passwords especially when all the issues concerning randomness and regular
change of password are taken into account.

6.9.4 Encryption of files

Files may also be encrypted by users to obtain a degree of protection rather
higher than password control since simple access to the file no longer yields
useful information.

6.10 Customer access to BT computers

As communications technology becomes more and more sophisticated, and
external companies become more demanding in the flexibility and management of
the BT services which they use, BT is required to offer management and
administrative services to its customers. The risks associated with this are well
known and understood within the security community. However, systems
implementors and administrators are not always aware of these. Systems which
provide customer access are vulnerable in a number of areas, specifically the risk
of access to system facilities which are beyond their anticipated privilege profile.
Ihis can lead to:

Compromise of the BT system
Compromise of connected networked systems
Compromise of other customers data

Where customers are given access to a BT system, the system must be designed
in a way that separates the customer access facility from the system's internal BT
facilities. Where access to the system is initially regulated by the standard
operating system User ID/password system, access to the internal BT facilities
must be via a strong authentication method, preferably based upon a token or
one-time password system.

Customers place a high degree of trust in the service BT provides. It is the
responsibility of systems implementors to consider the impact of failure upon a
customer. Depending upon the risks it may be beneficial to provide access upon
strong authentication techniques.

When customers are given access to BT Service Management Systems, used by
other customers, or holding sensitive information about other customers,
processes or contracts undertaken by BT, then the Service Management System
shall be considered to be a "high impact" system and subject to accreditation by
the Director of Security and Investigation. (See section 2.8)

POLICY 6.21: SENSlTIVllY OF SYSTEMS WlTH CUSTOMER ACCESS

Systems providing customer access are deemed to be HIGH IMPACT systems
where there is a connection between that system and other BT systems.

POLICY 6.22- AUIHENTFICATION ON SYSTEMS VVlTH CUSIOMER
ACCESS

Access to non-customer facilities on a system providing customer access shall
be via strong authentication methods.

6.11 Contractors

6.11.1 Software development by third parties

Development of applications for BT by external companies should adhere to the
same standards of development practice that we expect of internal developments.
The quality assurance of the system is a crucial issue, particularly for systems
which are of an operational or mission critical nature. Assurance standards should
be quoted in terms of the Information Technology Security Evaluation Criteria
(ISEC) levels, which should be specified at the start of the project.

There are greater risks associated with software produced by external companies,
where the level of direct BT supervision is likely to be minimal. The introduction
of Trojan horse code is not easy to detect without extensive analysis of the
program code.

On-line systems need to be afforded protection from development people, and
segregation of roles is a key element of this. Development contractors need to be
separated from live environments.

Default access to live data is not permitted. Access to live data in support of the
contract should be for specific activities and must be monitored. Access must be
withdrawn immediately following completion of the activity, or between phases of
it.

POLICY 6.23: CONTRACTOR ACCESS TO DATA

Third Party Contractors used for development of systems shall not have direct
access to on-line BT systems or live data, unless such facilities are absolutely
necessary for execution of the contract. In this case, the contract shall specify
the security requirements to protect BT's information.

Operational activies by third parties

BT has used outside contractors and agents for carrying out work for many years.
Examples of this are building maintenance and other non-communications related
activities. Increasingly, activities are being transferred to outside specialists.
However, over the last decade, almost all of our activities and functions have been
computerised and have become highly integrated with other systems. Therefore,
outsourcing of an activity has to be viewed against the threats to BT as a whole
from such a scheme.

POLlcY 6.24: OUTSOURCING

Proposals to outsource a process, to be carried out without direct BT
supervision off BT premises, and which requires electronic access to BT
information, must be supported by a Security Policy Document. If the process
involves on-line access to a BT system processing information at Sensitivity
level 2 or higher, the system must be accredited in accordance with Policy 2.7

Software and data

Contents

7.1 Introduction. . . . . . . . . . . . . . . . 7-2

7.2 Software installation and maintenance . . . 7-2
7.2.1 Software changes. . . . . . . . . . . . . . 7-2
7.2.2 Protection of production systems. . . . . . 7-2
7.2.3 Software copyright. . . . . . . . . . . . . 7-3
7.2.4 System backup . . . . . . . . . . . . . . . 7-4
7.2.5 Failures and recovery . . . . . . . . . . . 7-4

7.3 Log faciliffes and system data. . . . . . . 7-4
7.3.1 Log facilities. . . . . . . . . . . . . . . 7-4
7.3.2 Logging system activity . . . . . . . . . . 7-5
7.3.3 Logging user activity . . . . . . . . . . . 7-5
7.3.4 Checking logs . . . . . . . . . . . . . . . 7-5
7.3.5 Retention of logs and journals. . . . . . . 7-6
7.3.6 Condition records . . . . . . . . . . . . . 7-6
7.3.7 Storage of logs in microfiche form. . . . . 7-6
7.3.8 Encryption of system data . . . . . . . . . 7-7
7.3.9 Back-up copies. . . . . . . . . . . . . . . 7-7

7.4 Data sensiffvity
7.4.1 Data ownership. . . . . . . . . . . . . . . 7-7

7.5 Storage . . . . . . . . . . . . . . . . . . 7-8
7.5.1 Write protection. . . . . . . . . . . . . . 7-8
7.5.2 Labelling . . . . . . . . . . . . . . . . . 7-8
7.5.3 Documentation . . . . . . . . . . . . . . . 7-9
7.5.4 Extraneous magnetic influences. . . . . . . 7-9

7.6 Disposal of media . . . . . . . . . . . . . 7-9
7.6.1 Magnetic media. . . . . . . . . . . . . . . 7-9
7.6.2 Disposal of computer equipment. . . . . . . 7-11
7.6.3 Documents, printout and consumables . . . . 7-11

7.7 Computer viruses. . . . . . . . . . . . . . 7-11
7.7.1 Vulnerability of systems. . . . . . . . . . 7-12
7.7.2 What a computer virus does. . . . . . . . . 7-12
7.7.3 Detection of computer viruses . . . . . . . 7-13
7.7.4 Group policy on computer viruses. . . . . . 7-13
7.7.5 Guidance. . . . . . . . . . . . . . . . . . 7-14

7.1 Introduction

It is a security objective that software and data are correct complete and available
to authorised users. Full use should be made of the security features provided by
the operating system to achieve this objective. If software needs to be written,
security and audit requirements should be considered at the system design stage.
Users must ensure that the Statement of Requirements document contains a
definition of security requirements and access restrictions.

7.2 Software installation and maintenance

7.2.1 Software changes

All software modifications to a computer system must be authorised and fully
recorded. The modification log should be held by the system administrator.
Emergency patches (those that are not scheduled) must be properly documented
and reviewed by the appropriate authority within one working day.

Checks should be implemented to ensure that only one change is carried out at a
time. If development pressure compels the packaging of changes in order to
minimise the system testing overheads, the checking must be even more vigilant.

Expert personnel should check all new and modified software for correctness and
completeness with special regard to the possibility of security flaws. It should also
be verified to ensure that it functions according to design, that it does not
adversely affect other functions in the system and that no unauthorised changes
have been made to the system. These checks should be conducted on an off-line
system and not on operational machines.

 
Verification should be performed after all software changes and on a regular basis.

While full verification testing of the type outlined above is not always possible due
to operational constraints, use of unverified software provided by a third party
represents an unknown quantity from a security viewpoint, especially in cases
where the source code is not available. In any case assurances must be obtained
from the supplier about the integrity of the software and especially about the
removal of undeclared commands incorporated for debugging purposes.

It is preferable that user software should be written in a high level language. Only
compiled programs should be released. Source code should only be available to
the programmer creating or amending the program or for the verification of the
validity of any changes; this applies equally to operational Job Control Language
text. Job Control Language which cannot be compiled should be held in a discrete
library store with controlled access.

7.2.2 Protection of production systems

Ideally the software development cycle should involve a separation of
Development, Test and Production environments. These three areas often have
quite different security requirements. As far as technical restraints and costs
permit, they should be isolated from each other. Technical and procedural

controls should be applied to the promotion of software from Development to Test
and from Test to Production environments. Special care should be taken to protect
the integrity of code accepted into Production use.

POLICY 7.1: VERSION CONTROL OF SOFTWARE

Software shall be subject to version control to ensure that only current and
approved software is in use on an electronic system.

POLICY 7.2: PROTECTION OF DATA IN SYSTEM TESTING

Live data shall not be used in system testing. Test data derived from, and
traceable to, live data shall be afforded a similar level of protection to the
original source.

POLICY 7.3: SOFTWARE OF UNKNOWN INTEGRlTY

Unless a trustworthy method has been used to create and distribute software
then the integrity of the software shall be considered to be unknown and shall
not be used on BT systems.

POLICY 7.4: LIMITED USE OF DEVELOPMENTAND MAINTENANCE
SOFTVVARE

Software that can be used to modify existing programs on systems (such as
editors and compilers) shall be restricted in their use to authorised staff. Any
such software that is not needed for operational reasons shall be removed.

POLICY 7.5: EMERGENCY ACCESS TO PRODUCTION SYSTEMS

Emergency access to Production systems, using powerful utilities, for the
purpose of data repair shall be subject to rigorous change control and every
access of this nature must be recorded.

7.2.3 Softvare copyright

The Copyright, Designs and Patents Act 1988 expressly accords computer
programs the same copyright protection as written documentation. When BT
owns the copyright in a computer program because it was written in-house or
under a contract assigning copyright to BT, it is BT policy to mark the program
appropriately. Details on how to mark information are contained within the
Information Security Code.

POLICY 7.6: COPYRIGHT OF BT SOFTWARE

All software written in BT, or written for BT under a contract which provides for
ownership of copyright by BT, shall be clearly marked so as to identify BT as
the owner of copyright in such software.

POLICY 7.7: COPYRIGHT IN NON-BT SOFTWARE

Copyright law restrictions prohibiting the unauthorised copying, modification
or unlicensed use of software and software documentation, in which the
copyright is not owned by BT, shall be respected at all times.

Unless BT has been granted an appropriate licence by the copyright owner,
software and software documentation in which the copyright is owned by anyone
other than BT, must not be copied, modified or used in BT. Where BT has a
licence, the terms of the licence, including any limitations on copying, modifying
or using such software and software documentation must be complied with at all
times. Copyright markings applied by the copyright owner must not be removed
(unless expressly permitted under the licence).

7.2.4 System backup

Interruptions to normal working may be caused by such events as fires, hardware,
software or environmental failures and malicious damage.

POLICY 7.8: SYSTEM BACKUP

Copies of the current versions of the system software, data, and accompanying
documentation shall be safely stored and available so as to enable a quick and
controlled recovery in case of a processing interruption.

7.2.5 Failures and recovery

All abnormal program terminations should be monitored by the system to permit
control to be passed to system recovery routines when necessary. Any software
failure must be documented and investigated as this may be an indication of a
breach in security.

There should also be controls to ensure the validity of the software itself.

POLICY 7.9: RECOVERY FROM PROCESSING FAILURES

The planning of systems shall take into account the need to detect failures of
software and hardware and provide recovery features such that the integrity of
the data shall not be compromised.

7.3 Log facilities and system data

System data is the information used by the operating system and application
software to control and monitor access to system resources by users. Logs kept by
the system form a large component of system data.

7.3.1 Log facilities

A system log is required to identify users who have invoked transactions so as to
assign accountability. The logs should reflect both system performance and user
activity and each event on the system log should have an associated reference
number and be time-stamped.

It is essential that log hard copy and log software, eg reporting programs for logs
held on disk or tape, should be afforded maximum protection from unauthorised
modification and should be unaffected by system restarts etc. Hard copy logs
should be kept for critical system logs. The pages of a hard copy log should be
pre-numbered so that it may readily be checked for completeness.

7.3.2 Logging system activity

System activity should be recorded on the log to include matters such as:
- processing software errors,
- program aborts,
- crashes,
- machine failures,
- restarts
together with information about causes.

7.3.3 Logging user actinty
Monitoring user activity is especially dependent on the existence of a user activity
log and may be regarded as an audit trail for the detection of unauthorised activity
and identification of its origination. The user activity log should record such
events as the following and include for each record any relevant information such
as date, time, physical access point or port, UID, and nature of the attempt:

o all system log on attempts (successful or unsuccessful),
o all log off events,
o all attempts by users to access system facilities outside their range of privilege,
o all attempts by users to access data files belonging to other users in contravention
of system access controls,
o all attempts by users to employ commands outside their range of privilege
o all use of high level privilege.

The log should particularly include all security-relevant events, that is, interaction
and attempted interaction with the security system such as:

o password changes (although without logging password values)
o access to restricted or critical system tables
o modification of privilege lists

POLICY 7.10: ELECTRONIC SYSTEM ACTIVlTY RECORDS

An audit log of the system activity shall be maintained and regularly reviewed
so as to identify abnormal system or user activity. Activity records shall be kept
of events on all High Impact Systems, particularly of any activity which might
be abnormal. Abnormal activity shall raise an alarm.

7.3.4 Checking logs

While it may be impracticable to scrutinise an entire system log by hand, a regular
spot check must be made on random samples of the log and on periods of
unusually high logon activity, or access at abnormal hours. Project documentation
should give precise instructions regarding the checking of system logs.

The use of a software tool to separate unusual log entries from routine and
non-contentious information which would enable a more careful scrutiny to be
made, should be considered. Specialist audit packages, data test equipment are
examples.

POLICY 7.11: CHECKING OF LOGS

System logs shall be regularly checked so as to detect unauthorised system
activity. The use of automated techniques shall be considered.

POLICY 7.12: CONTROL OF AUDIT TOOLS

The automated tools used to analyse the system log files shall be protected and
subject to management and control procedures.

7.3.5 Retention of logs and journals

The length of the retention period should take into account audit and legal
requirements, error recovery and investigation of any unusual occurrences.

7.3.6 Condition records

Hard copy logs of important system parameters, data modifications, and details
pertaining to hardware and software conditions, must be securely maintained by
the system administrator. Iis permits a comparison to the system state after
events such as software updates, fix or patch insertions and system restarts to
verify that no accidental or unauthorised changes have been made. Parameters to
be verified include:

o billing options,
o access control features,
o user privilege profiles,
o audit trails,
o configuration management.

This inforrnation can be used to provide legally submissable evidence concerning
the correctness of the system in the pursuance of Section 69 of the Police And
Criminal Evidence Act (1984).

POLICY 7.13: LOGGING OF FAULT REPORTS

A log shall be kept of fault reports by users, and hardware and software
maintenance on systems.

POLICY 7.14: AUDlTS AND JOURNALS

All audit and journals of system activity shall be retained or archived for a
reasonable amount of time in the event that the information is required for
evidential purposes.

7.3.7 Storage of logs in microfiche form

Special precautions must be taken to preserve the usefulness of logs as evidence if
they are processed onto microfiche. The people responsible for the operation of
the process and the subsequent storage must provide clear evidence that there
can have been no interference with the logs during the process, or with the
subsequent microfiche.

7.3.8 Encryption of system data

Particularly sensitive files and data such as password listings should be given
extra protection by being encrypted by the system. Passwords in particular should
be one-way encrypted such that the original data cannot be recovered under any
circumstances.

7.3.9 Back-up copies

A system backup must be taken by system management personnel at regular
intervals, the frequency of which will reflect the importance of the system and the
impact of a system failure. The backup data should be stored securely
o£ premises. Current copies of all on-site system images should be kept in
approved locked, fire-resistant cabinets.

A definitive copy of important data files must be securely maintained and used by
system management to detect unauthorised changes to such things as access
control mechanisms, user rights profiles, backup controls and audit mechanisms.
Any file amendments must be logged.

POLICY 7.15: BACKUP OF SENSITIVE DATA

Sensitive information shall be backed up by a cycle of copies, devised so that
the system can be brought into service after any accidental or deliberate
erasure of data.

7.4 Data sensitivity

Systems that perform security functions, or which safeguard commercially
sensitive information whereby the failure to protect the confidentiality, integrity,
availability of that information would cause:

o a substantial loss to BT,
o a substantial gain to a competitor,
o severe embarrassment to BT,
o serious loss of confidence in BT, or
o a serious reduction of BT's standing in the community, or relationships generally,

are called HIGH IMPACT SYSTEMS.

7.4.1 Data ownership
Data ownership is an essential element in safeguarding BT's commercially
sensitive information. The Data Owner is responsible for identifying the value and
sensitivity of their data. This decision must be respected by all users and systems.
Ownership conveys both responsibility for, and authority to:

o judge the value and importance of the information,
o assign a sensitivity level,
o specify operational controls and permitted uses,

o communicate control and protection requirements to users and custodians.

POLICY 7.16: DATA OWNERSHIP

All data shall have an owner who is responsible for deciding its sensitivity.

7.5 storage
It is essential that software and data stored on magnetic or equivalent media
should be properly handled, stored and protected so as to ensure the accuracy and
completeness of all records. A full set of all software and data must be retained and
filed for backup and recovery purposes.

7.5.1 Write protection
Where possible all storage media should be write-protected prior to shipping and
at all times when not active in the system.

7.5.2 Ibelling
Magnetic media should be labelled with a unique identifier and the relevant
privacy marking if appropriate. Methods of marking may be:

1 Magnetic tape spools - attaching marked labels to the front flange, and/or the
edge of their protective canisters, and/or the front of any suspension rings used to
support the tape spools during storage.
2 The front and back faces of cassettes and spines of protective boxes should be
clearly marked.
3 Removable magnetic disks and disk packs should be marked on the top of the
disk or pack or labels fixed to the top and side of the storage covers.
4 Floppy disks should be labelled on one side as specified by the manufacturer. If
disks are kept in boxes, the front and back of these should also be marked.
5 A log should be kept of their use with the following information included:

o system name and reference number,
o date and time of last use,
o present privacy status,
o other corresponding tapes or disks,
o name or initials of the person responsible for their use.

POLICY 7.17: MARKING OF MEDIA

Media shall be marked to indicate the most sensitive information on the media
in accordance with the Information Security Code. Where a medium is shared
it should be treated as containing the highest sensitivity level that may be
stored upon it.

POLICY 7.18- MARKING OF DATA

Data shall be marked in accordance with the Information Security Code.

7.5.3 Documentation

Systems specifications, program listings, details of test data etc. for systems
containing sensitive information must be accorded a similar degree of protection
as that of the computer held data. They should be marked with the appropriate
privacy marking, locked away when not in use and spare copies held securely
either in a fire-resistant safe or at another location.

7.5.4 Extraneous magnetic influences

Magnetic media may be corrupted accidentally simply by being in the wrong
location. Most electronic and electrical equipment generates a magnetic field
either of a permanent nature or specifically when powered up. Such magnetic
fields can both corrupt and erase data stored on disks and tapes.

Floppy disks are much more prone to corruption from magnetic sources than hard
disks and it is recommended that when not in use they should be stored away
from office electrical equipment such as electronic typewriters, printers,
computers or telephones.

7.6 Disposal of media

7.6.1 Magnetic media

Magnetic and optical media holding sensitive information requires precautions to
be taken before its reuse or disposal. Media which is damaged may be read easily
by sophisticated equipment. Even magnetic media which is overwritten many
times using seemingly complex patterns may be read using specialist techniques.
Details of the secure destruction facility may be found in chapter 10.

POLICY 7.19: ERASURE AND DESTRUCTION OF MEDIA

Where media is to leave the boundary of a system, or there is a requirement to
change a disk drive, or other vise dispose of media, one of the following rules
shall be applied.

A - Destruction of media, using facilities approved by the Director of Security
and Investigation.

B - Overwriting of media, using a technique approved by the Director of
Security and Investigation.

C - Reformatting, using a fail safe operating system low level format facility.

D - Release permitted, but only to reputable companies with which BT has a
non-disclosure agreement.

E - Bulk erasing (degaussing), using equipment approved by the Director of
Security and Investigation.

X - This option is not permitted.

The sensitivity level refers to the highest sensitivity of the information that has
ever been stored on the media.

Fixed Disks

Sensitivity level Damaged disks Trade in disks

>3 A A
3 A A
2 D B
1 D B/C

Removable Media

Disposal Disposal Reuse Reuse
Sensitivity level damaged good on same within
media media system BT

>3 A A c x
3 A A C B
2 A C/E C/E B
1 E C/E - -












If in the opinion of the system owner, the cost to BT of destroying media
outweighs the value of the information, the system owner may seek approvel from
DSecI to take alternative action. Also. see chapter 13 of the ISC.

7.6.2 Disposal of computer equipment

Computer systems which are withdrawn from service pose a serious threat to BT
if they are not processed properly before disposal. All systems to be disposed of by
BT must have the disk formatted or destroyed according to policy 7.19. No
software must reside on the hard disk of any machines which are disposed of,
apart from the operating system. Entitlement to these must be documented at the
time of the transfer. All master copies of software should be either retained or
returned to the local computer administration unit for re-allocation. Managers
should note the possible conflict of interest associated with the local scrapping and
subsequent sale to BT people. If equipment is to be locally scrapped, the
procedure for doing this must be documented and all records must be made
available for audit and scrutiny.

POLICY 7.21: DISPOSAL OF COMPUTER EQUPMENT

No computer equipment containing non-volatile data storage capabilities that
has been used for processing IN STRICTEST CONFIDENCE information shall
be disposed of as surplus equipment until it has been examined by a person
approved by the Director of Security and Investigation to ensure that all
sensitive inforrnation has been removed.

7.6.3 Documents, printout and consumables

IN STRICTEST CONFIDENCE waste must be disposed of under direct BT
supervision by burning, shredding using a Director of Security and Investigation
approved shredder, or by using a disintegrator.

IN CONFIDENCE waste including personal and other sensitive data must be
destroyed by burning, shredding, or disintegration. For large quantities of IN
CONFIDENCE material, use can be made of the approved sensitive waste paper
collection services.

POLICY 7.22: DESTRUCTION OF PRINTER-BASED MATERIAL

Sensitive media shall be destroyed in accordance with the Information Security
Code.

7.7 Computer viruses

A computer virus is an element of executable software that can be transferred
between programs, or between computers, with or without the knowledge of the
users. When triggered by an event determined by the perpetrator of the virus, it
can carry out any of a wide range of unauthorised activities. Examples include
infecting other programs or the operating system, sending infected messages to
other systems, deleting files. Furthermore, these unauthorised events may occur
while giving the impression that the computer is functioning normally.

These actions can be malicious or benign, but in any event they breach the
integrity of the system. Given BT's dependency on computerised systems for
business-critical activities, it is essential that the integrity of such systems is
maintained.

7.7.1 Vulnerability of systems

Computer systems can be designed with built in capabilities to resist viruses. This
may be achieved by erecting logical compartments enforcing strict segregation of
the operating system, and the program areas and data areas of each user. Another
measure is to prohibit terminals that have media entry capability or can be
connected to untrusted networks.

While these restrictions may pary solve the problems for defence systems, they
are onerous, impractical and too expensive for most commercial of fice systems, IT
systems and network management systems. Because most commercial computer
systems are vulnerable to viruses, the primary protection depends mainly on
management policy and the active co-operation of the users to ensure that viruses
are not introduced into systems. However, many of the working practices that
have evolved with the Personal Computers encourage virus propagation.
Borrowing or lending disks containing programs or utilities is typical example.

Downloading of software from the public databases and bulletin boards is
particularly risky.

7.7.2 What a computer virus does

A virus does two things. Firstly it has a mechanism to propagate itself For
instance the perpetrator of the computer virus may attach it to a commonly run
program or routine. Having carried out the legitimate function of the program, the
virus takes control and attaches a copy of itself onto other programs that are
resident, either directly or by altering the operating system. Thus once a
computer has been infected it may infect the programs on any other floppy disk
placed in its environment. These in turn may infect any other computer in which
the infected disk is placed.

Unless strict precautions are taken, advanced viruses are capable of causing
infection to remote computers via networking facilities.

The second feature of the virus is its function. The function can consist of any
activity that can be performed by the computer. The virus function can be
triggered by any detectable event, eg: a time, a date, execution of a particular
routine, receipt of a message, deletion of a file or cancellation of a UID.

In short, a computer virus is self-replicating software used to propagate a Trojan
Horse or Logic Bomb.
7.7.3 Detection of computer viruses

In the event of discovering a virus the Local Computing Help Desk should be
contacted immediately for advice. For most parts of the business, this will be the
GCS Help Desk. The suspect machine and disks which have been used on the
machine should not be used further until the Help Desk has been contacted.
Programs are now becoming available for most popular machines that claim to be
able to prevent, detect or eradicate virus infections. These tools may certainly help
to detect the presence of viruses. Unfortunately the indeterminate nature of
computer viruses makes an absolute guarantee of detection virtually impossible.
Nevertheless, virus detection tools should be regarded as a contributory factor in
maintaining computer system integrity.

The prevention of virus attack demands a fundamental shift of behavioural pattern
on the part of users of micro- and mini-systems. Many of the procedures that have
evolved to help and assist colleagues now need to be reconsidered in the context
of possible attack by computer viruses. For instance, operating system, program
or utility disks must not be borrowed or lent. Manufacturers source disks must be
securely protected, not left inside the instruction manual in the open. Transit
disks, that is those containing data files, should not be bootable or contain any
executable files. Except when being written to at the beginning of the transfer
process, the disks should be write- protected.

7.7.4 Group policy on computer viruses

BT attaches considerable importance to the integrity of its computer systems,
particularly those systems that provide applications that are critical to the smooth
functioning of the Business. The recent emergence of computer viruses presents a
serious threat to BT s computer systems.

POLICY 7.23: VIRUSES: RESPONSIBILITY OF USERS

It is the personal responsibility of each individual to ensure that viruses are not
introduced into any BT system, or customers' system, that they come into
contact with.

POLICY 7.24: VIRUSES: POLICY FOR HIGH IMPACT SYSTEMS

Detailed procedures on combating virus attacks shall be prepared for the
security of systems for which the impact of security failure is high. These
policies are to be submitted to Director of Security and Investigations for
concurrence.

POLICY 7.25: VIRUS DETECTION

All disks inserted into customers' PCs must be virus checked before hand,
using approved virus detection software, or be certified as being virus free by
the manufacturer.

7.7.5 Guidance

Utilities are available for many popular machines that claim to be able to prevent,
detect or eradicate computer viruses. While their rigour and scope is unproven,
they may certainly help detect the presence of viruses. Nevertheless, the primary
objective is to avoid infection in the first place by means of careful operating
procedures.

The following steps should be followed by users to reduce the possibility of any
system being infected by computer viruses:

1 Reduce the risk by only using software that is sourced directly from reputable
manucturers and for which there is a customer/supplier contract that identifies
a requirement for quality so%ware.

2 Machine-readable media containing master copies of operating systems, programs
or utilities should be locked away securely at all times.

3 Computers containing executable copies of operating systems, programs and
utilities should be kept within a local secure perimeter, else some means of logical
access control should be deployed to prevent malicious infection.

4 Operating system and program media should never be lent, borrowed or
exchanged (except where the highest levels of personal trust prevail) .

5 Machine-readable media used for data file exchange should contain only the data.
Media should be inspected for executable files.

6 Machine-readable media should not be exposed to systems whose integrity is
unknown, for example, systems at home or university systems.

7 Public-domain programs shall not be downloaded, and in particular, computer
games should not be held or played on BT machines. Where games arrive as a
part of a software package they should be erased.

8 All incoming and outgoing machine-readable media should be checked for known
viruses. The preferred method of doing this is on a standalone machine, dedicated
to that purpose (commonly called a sheep-dip PC). For further information on the
approved high integrity product, please refer to section 11.

+++
EOF
=============================================================================
PHUK MAGAZINE - Phile 9 of 10
=============================================================================

---------------
Notes & Queries
---------------

Note: Notes & Queries is the section where the readers send in any
questions, problems etc that they might have, and other readers can
send in the answers. We want YOU the reader to send your
questions and answers to us, at anon93143@anon.penet.fi .

Let me start off with some feedback that PHUK has got.

Dear PHUK,
First of all , loved the first issure of PHUK , its
about time there was something decent to read in the UK , well
done , look forward to reading the next one.

You asked what the difference was between "Breach of confidentiallity"
and "Hacking" , well , after consultation with my legal expert it
appears that Breach of confidentiallity is to do with the trust
that an employer gives to his employee in terms of access to data ,
(not necessarily computer data ).
Hacking is the activity of unauthorised access to computers via
any means. Usually hacking is done at a remote location rather than
on site as the " BT Hacker " did . As far as I can see , he didn't
hack anything , he just used the computer as part of his job and
leaked dodgy data to the press.
Keep up the good work.

Regards
HILO.

Well thanks for the praise , your cheque is in the post ! ;-) Phuk-Ed.

Now for some queries .

Q: Does anyone know what frequencies the secrurity people use at
the Troc , or does anyone know of some really interesting
frequencies I could scan for ?

A: Well readers , I will wait for your answers - Phuk-Ed .

Q: Who do I ask to find out about the 2600 SE meeting ?

A: Any one who knows about it , ok only joking the the details
are as follows.

LOCATION: ROEBUCK PUB IN LEWISHAM
TIME : FROM 8PM ONWARDS
DATE : 2Oth MAY 1995 OR ROUGHLY
3 SATURDAYS AFTER THE FIRST
FRIDAY OF THE MONTH


+++
EOF
=============================================================================
PHUK MAGAZINE - Phile 10 of 10
=============================================================================


-----
OUTRO
-----

Well this issure is finally finished and I hope you enjoyed it !
Hopefully there has been a general round up of the phreaking / hacking
scene as it is happening in the UK .

Although if you think a certain topic has not been covered the why not
submit an article for PH-UK and it will go in the next issure .
The only way this E-zine is going to survive is by people sending us
snippets of news, articles, code, numbers, hints, tips and
general ideas to keep the ball rolling.

Send all articles, flames, Letters of Comment etc etc to PHUK
magazine, anon93143@anon.penet.fi, OR speak to any of the PHUK crew
at any London 2600 meeting .........

Anyhow, next month we have the following goodies for you ....we hope !

Green Boxing - DrKaos & TheGoat
BT Computer Security Manual Part III
Tracing people - Death's Apprentice
Something on Novell Networks ...
Some trash from BT wastebins ....
Mecury Mailboxes ....
UK News ....


- Phuk-Ed

+++
EOF

.

← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT