767 lines
36 KiB
Plaintext
767 lines
36 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Volume 3, Issue #3.11 (April 4, 1991) **
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|||
|
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
|
|||
|
POETICA OBSCIVORUM REI: Brendan Kehoe
|
|||
|
|
|||
|
USENET readers can currently receive CuD as alt.society.cu-digest.
|
|||
|
Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
|
|||
|
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on
|
|||
|
FIDOnet. Anonymous ftp sites: (1) ftp.cs.widener.edu (or
|
|||
|
192.55.239.132) (back up and running) and (2)
|
|||
|
cudarch@chsun1.uchicago.edu E-mail server:
|
|||
|
archive-server@chsun1.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source is
|
|||
|
cited. Some authors, however, do copyright their material, and those
|
|||
|
authors should be contacted for reprint permission. It is assumed
|
|||
|
that non-personal mail to the moderators may be reprinted unless
|
|||
|
otherwise specified. Readers are encouraged to submit reasoned
|
|||
|
articles relating to the Computer Underground. Articles are preferred
|
|||
|
to short responses. Please avoid quoting previous posts unless
|
|||
|
absolutely necessary.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Contributors assume all
|
|||
|
responsibility for assuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
CONTENTS THIS ISSUE:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: From the Mailbag
|
|||
|
File 3: SUNDEVIL ARREST ANNOUNCED 4/13/91
|
|||
|
File 4: Northern District (Ill.) Press Release on Len Rose
|
|||
|
File 5: Letter to AT&T Cancelling Long-Distance Carrier Service
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: Moderators' Corner
|
|||
|
Date: April 4, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.11: File 1 of 5: Moderators' Corner ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
IN THIS FILE:
|
|||
|
1. CASE UPDATES (Ripco, Len Rose, Hollywood Hacker)
|
|||
|
2. SUN DEVIL PROSECUTIONS
|
|||
|
3. BYTES ON SUN DEVIL AND EFF
|
|||
|
|
|||
|
++++++++++++
|
|||
|
Case Updates
|
|||
|
++++++++++++
|
|||
|
|
|||
|
>>RIPCO: The Ripco case has not been forgotten. Counsel for Dr. Ripco
|
|||
|
is holding strategies close to the vest, and because the seizure of
|
|||
|
the BBS is alleged by the Secret Service to be part of an on-going
|
|||
|
investigation, things move even more slowly. CuD filed an FOIA
|
|||
|
request to the Secret Service for information on Ripco, and the
|
|||
|
response was:
|
|||
|
|
|||
|
With regard to Ripco, we regret to inform you that we cannot
|
|||
|
comply. according to the Freedom of Information Act, there
|
|||
|
are no records or documents available to you.
|
|||
|
|
|||
|
Persuant to 5 U.S.C. 552 (b) (7) (A), this file is being
|
|||
|
exempted since disclosure could reasonably be expected to
|
|||
|
interfere with enforcement proceedings. The citation of the
|
|||
|
above exemption is not to be construed as the only exemption
|
|||
|
which may be available under the Freedom of Information Act.
|
|||
|
|
|||
|
>>LEN ROSE: Len Rose will be sentenced in May. We are concerned about
|
|||
|
the posts we have seen on the nets and in news stories that continue
|
|||
|
to construe this as a hacking case. Mike Godwin underscored this
|
|||
|
point in a post in RISKS Forum (#11.40):
|
|||
|
|
|||
|
What makes it unreasonable to claim that Rose is a hacker is
|
|||
|
the fact that he had authorized access to every system he
|
|||
|
wanted to use. There was no question of unauthorized
|
|||
|
intrusion in Len's case.
|
|||
|
|
|||
|
It bears a lot of repeating that Len pled guilty to
|
|||
|
unauthorized possession of Unix source code, not to computer
|
|||
|
fraud or unauthorized access.
|
|||
|
|
|||
|
>>THE HOLLYWOOD HACKER: Stuart Goldman, dubbed "The Hollywood Hacker" by
|
|||
|
Fox News, is still facing state felony charges in California for
|
|||
|
accessing a computer to which Fox claims he lacked proper
|
|||
|
authorization. On the surface, this case seems to illustrate the
|
|||
|
dangers of the broad language of the California computer abuse laws
|
|||
|
that can make what should require an apology or, at worst, be a low
|
|||
|
order misdemeanor, a felony charge. We have been waiting for somebody
|
|||
|
to give us evidence to counter the impression that this case was a set
|
|||
|
up and an abuse of law, but to date all that we've seen continues to
|
|||
|
support the preliminary judgment that this is a case of vindictive
|
|||
|
prosecution, *not* hacking.
|
|||
|
|
|||
|
+++++++++++
|
|||
|
First Sun Devil Prosecution
|
|||
|
+++++++++++
|
|||
|
|
|||
|
Barbara and John McMullen's Newsbytes reprint below (File #3)
|
|||
|
summarizes the first prosecutions announced from Operation Sun Devil.
|
|||
|
Baron M. Majette, a teenager when the alleged offenses occured, was
|
|||
|
charged with three counts of fraudulent schemes and artifices and
|
|||
|
three counts of conspiracy under Arizona law. For those wishing
|
|||
|
information on the case, the case number (Maricopa County) is CR
|
|||
|
91-02526: State of Arizona vs. Baron M. Majette aka Doc Savage, aka
|
|||
|
Samuel Savage.
|
|||
|
|
|||
|
The original search affidavit for the search on May 7, 1990, cites "CI
|
|||
|
404-235," a "volunteer, paid" Secret Service informant, as the primary
|
|||
|
source of the goverment's information. "CI 404-235" was also the
|
|||
|
informant responsible for providing information that led to the raid
|
|||
|
on RIPCO. In CuD 3.02, we reported that the Secret Service indicated
|
|||
|
that this informant ran a sting board that we identified as THE DARK
|
|||
|
SIDE (run by a sysop known as THE DICTATOR who continues to call
|
|||
|
boards around the country.
|
|||
|
|
|||
|
+++++++++++++++++++
|
|||
|
BYTE's Jerry Pournelle on Operation Sun Devil and the EFF
|
|||
|
+++++++++++++++++++
|
|||
|
|
|||
|
Jerry Pournelle, noted science fiction author and computer columnist, hands
|
|||
|
out his annual "Orchid and Onion" awards in the April 1991 issue of BYTE
|
|||
|
magazine. (pp 91 -101) Two of this year's 'awards' are of interest to CuD
|
|||
|
readers:
|
|||
|
|
|||
|
_The Big Onion_
|
|||
|
And the Onion of the Year, with Garlic Clusters, goes to
|
|||
|
Special Agent Tim Foley of the Chicago office of the U.S.
|
|||
|
Secret Service. While I have good reason to know that many
|
|||
|
Secret Service people are conscientious and highly competent,
|
|||
|
Mr. Foley's actions in Austin, Texas, regarding Steve Jackson
|
|||
|
Games no only exceeded his authority, bu weren't even half
|
|||
|
competently done.
|
|||
|
All told, a sorry chapter in the history of the Secret
|
|||
|
Service, and no service at all to those genuinely concerned
|
|||
|
with electronic fraud and computer crimes.
|
|||
|
|
|||
|
_The Big Orchid_
|
|||
|
The Orchid of the Year goes to Mitch Kapor, for funding the
|
|||
|
Electronic Freedom Foundation and providing legal help and
|
|||
|
support to Steve Jackson, whose business was nearly ruined by
|
|||
|
the Secret Service in Austin. I hold no brief for electronic
|
|||
|
thieves and snoops, but many of last year's government
|
|||
|
actions were worse than the disease.
|
|||
|
Thanks, Mitch, from all of us.
|
|||
|
|
|||
|
Source: BYTE Magazine April 1991 Vol 16, Number 4 pp 92,93
|
|||
|
|
|||
|
+++++++++
|
|||
|
THE EFFECTOR
|
|||
|
+++++++++
|
|||
|
|
|||
|
The first copy of the EFF's hardcopy newsletter, THE EFFECTOR, came
|
|||
|
out and the content and form are great! Highlights include a history
|
|||
|
of the EFF by John Perry Barlow and Mitch Kapor's summary of the goals
|
|||
|
of EFF (yes, he *explicitly* states that the EFF unequivocally opposes
|
|||
|
unauthorized computer trespass). To get on either the hardcopy or net
|
|||
|
mailing list, drop a note to eff@well.sf.ca.us
|
|||
|
|
|||
|
++++++++++++++
|
|||
|
PHRACK Index
|
|||
|
++++++++++++++
|
|||
|
|
|||
|
Timothy Newsham compiled a complete index for PHRACK. It's about 50 K
|
|||
|
and is available from the CuD ftp sites and Ripco BBS.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Ah, Sordid
|
|||
|
Subject: From the Mailbag
|
|||
|
Date: 4 April, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.11: File 2 of 5: From the Mailbag ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: John Mignault <AP201058@BROWNVM.BITNET>
|
|||
|
Subject: Eagle's Nest Bust
|
|||
|
Date: Fri, 29 Mar 91 15:01:10 EST
|
|||
|
|
|||
|
>Date: Fri, 29 Mar 91 10:38:56 EST
|
|||
|
>Reply-To: PMC-Talk <PMC-TALK@NCSUVM.BITNET>
|
|||
|
>Sender: PMC-Talk <PMC-TALK@NCSUVM.BITNET>
|
|||
|
>From: Editors of PmC <PMC@NCSUVM.BITNET>
|
|||
|
>Subject: Impounding Computers
|
|||
|
>To: John Mignault <AP201058@BROWNVM.BITNET>
|
|||
|
>
|
|||
|
>From: Christopher Amirault <amirault@csd4.csd.uwm.edu>
|
|||
|
>Subject: Boston Eagle's Nest bust
|
|||
|
>Date: Wed, 27 Mar 91 13:55:51 CST
|
|||
|
>
|
|||
|
>I haven't seen anything about this on any lists, so if you want to post
|
|||
|
>it elsewhere, feel free.
|
|||
|
>
|
|||
|
>In the March 11-17, 1991 edition of _Gay Community News_, the paper
|
|||
|
>reported that Alden Baker was arrested March 1 on rape charges. Baker
|
|||
|
>was the monitor of a list called "Boston Eagle's Nest," which allowed
|
|||
|
>for the sharing of various s&m stories, fantasies, etc.
|
|||
|
>
|
|||
|
>The Middlesex County MA DA's office has seized the computer, and there
|
|||
|
>is some concern that the mailing list on it will be made public or be
|
|||
|
>handed over to the FBI or something. Needless to say, this could be
|
|||
|
>the start of something bad.
|
|||
|
>
|
|||
|
>I haven't heard any more news (I don't subscribe to GCN), but I would
|
|||
|
>be interested to hear any other info people can get.
|
|||
|
>
|
|||
|
>I don't know if you've heard anything about this (first I've heard of it), but
|
|||
|
>this seems to put a new slant on underground activity, in that it's not so much
|
|||
|
>hacker-oriented as it is concerned with obscenity issues...
|
|||
|
|
|||
|
John Mignault
|
|||
|
ap201058@brownvm.brown.edu
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: hkhenson@CUP.PORTAL.COM
|
|||
|
Subject: Letter to San Jose Mercury News on Len Rose
|
|||
|
Date: Fri, 29 Mar 91 23:00:28 PST
|
|||
|
|
|||
|
March 25, 1991
|
|||
|
|
|||
|
San Jose Mercury News
|
|||
|
|
|||
|
Dear Editor:
|
|||
|
|
|||
|
Last Friday's Washington Post bylined story, "'Hacker' pleads guilty
|
|||
|
in AT&T case" presented only the prosecutor's and ATT's side of an
|
|||
|
issue which has serious implications for the press.
|
|||
|
|
|||
|
The "crime" for which Leonard Rose, Jr. faces a year and a day in jail
|
|||
|
was that of creating a simple example of how a few-hundred-line login
|
|||
|
program (a program which allows access) for ATT's Unix system could be
|
|||
|
modified to collect passwords, and sending this example over state
|
|||
|
lines to the editor of Phrack, an electronic magazine.
|
|||
|
|
|||
|
Whether Len's example was to instruct criminals on how to obtain
|
|||
|
continued access after an initial breakin, or if it was to warn system
|
|||
|
operators to look for modified login programs, his intent is not an
|
|||
|
issue. Either case is protected under the First Amendment, or mystery
|
|||
|
stories would be illegal.
|
|||
|
|
|||
|
Pointing out security weaknesses in Unix is certainly a legitimate
|
|||
|
function of the press. The entire phone system and countless other
|
|||
|
life- or property-critical computers use this operating system,
|
|||
|
designed to be portable (runs on many types of computers) and not
|
|||
|
secure. ATT, of course, prefers that discussion of weaknesses in Unix
|
|||
|
be suppressed by getting the government to call them "interstate wire
|
|||
|
fraud." To enlist the computer-ignorant, but long, arm of the law,
|
|||
|
they inflated the value of a few hundred lines of trivial code to
|
|||
|
$77,000, just as Southern Bell inflated the value of a document
|
|||
|
available for $13 to over $79,000 in a related case the government
|
|||
|
lost against Craig Neidorf, the editor of Phrack.
|
|||
|
|
|||
|
The big difference between the cases was that Neidorf had parents who
|
|||
|
were able to mortgage their house for the six-figure legal bills, and
|
|||
|
Rose had been reduced by ATT and the legal system to abject poverty.
|
|||
|
In both cases the message has been sent: "face jail time or financial
|
|||
|
ruin if you expose phone company documents to the press."
|
|||
|
|
|||
|
Sincerely,
|
|||
|
|
|||
|
H. Keith Henson
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: The Works BBS Admin <works!root@UUNET.UU.NET>
|
|||
|
Subject: Is hacking the same as Breaking and Entering?
|
|||
|
Date: Mon, 01 Apr 91 17:58:17 EDT
|
|||
|
|
|||
|
In response to the question: "Is computer hacking the same as B&E?"
|
|||
|
|
|||
|
Not by far. Breaking and entering has malicious intent, and usually is
|
|||
|
solely to steal things and/or hurt something. Hacking although
|
|||
|
portrayed negatively in the press is not like this at all. It is
|
|||
|
merely looking around at what is in various systems, and learning from
|
|||
|
it. Occasionally someone deletes a file by mistake. A bad apple
|
|||
|
meanders in from the the cold and does some harm, but the majority of
|
|||
|
hackers (in my opinion) are not trying to hurt anything, and only
|
|||
|
allow themselves a little room to look at, and possible a small chair
|
|||
|
to sit in from time to time... Say you find an unknown account
|
|||
|
mysteriously pop up? Why not find out who it is, and what they are
|
|||
|
looking for first, because as odds go, if they got in there once,
|
|||
|
they can do it again, no matter what you do.
|
|||
|
|
|||
|
So Breaking and Entering cannot even be classified in the same manner
|
|||
|
at all.
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: Dave Ferret <works!LC1%das@HARVUNXW.BITNET>
|
|||
|
Subject: Computers and Freedom of Speech
|
|||
|
Date: Tue, 02 Apr 91 23:35:48 EDT
|
|||
|
|
|||
|
In response to an article in CuD 3.09 on computer publications...
|
|||
|
|
|||
|
What gives people the right to censor and deem something illegal in
|
|||
|
the electronic media when paper, TV, radio, and the spoken word is
|
|||
|
perfectly legal and protected by the first amendment.
|
|||
|
|
|||
|
Q: Shouldn't electronic publications be protected under the same
|
|||
|
article of the constitution that allows free presses?
|
|||
|
|
|||
|
A: Most definitly. The question now is why aren't they?
|
|||
|
|
|||
|
I have no real clue but this is all I can fragment together... That
|
|||
|
people are afraid of people who are 'electronically' inclined and that
|
|||
|
if sensitive information reaches say 100 people on an electronic
|
|||
|
publication, what is to stop them from giving away all the inside
|
|||
|
secrets? Its the same old story. The egregious behavior of the
|
|||
|
authorities (Secret Service, et al) is ludicrous. Wouldn't the
|
|||
|
reprint in a written publication (hard copy) of PHRACK24 (The E911
|
|||
|
issue as it has been known so well for) be perfectly legal, except for
|
|||
|
possibly a small copyright infringement? (They shoved a lot more
|
|||
|
charges at him than copyright infringement... Mildly..)
|
|||
|
|
|||
|
So when does it change? Are computer publications covered? Look at
|
|||
|
2600, I'm sure they printed even more sensitive things in the past and
|
|||
|
I don't see anyone dragging them in... When will people realize we are
|
|||
|
entitled to freedom of speech. We have the right to say what we want,
|
|||
|
and disagree. That is what was guaranteed to us in the first amendment
|
|||
|
of the constitution. The question has been raised... Why are there
|
|||
|
different laws governing computers and the physical world? Is this
|
|||
|
double standard just? No, on both counts.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Reprint from Newsbytes (John and Barbara McMullen)
|
|||
|
Subject: SUNDEVIL ARREST ANNOUNCED 4/13/91
|
|||
|
Date: April 3, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.11: File 3 of 5: Sundevil Arrest Announced ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
PHOENIX, ARIZONA, U.S.A., 1991 APR 1(NB) -- The Maricopa County
|
|||
|
Arizona County Attorney's Office has announced the arrest of Baron
|
|||
|
Majette, 19, also known as "Doc Savage", for alleged crimes uncovered
|
|||
|
in the joint federal / state "SunDevil" investigation in progress for
|
|||
|
over a year.
|
|||
|
|
|||
|
Majette is charged with a number of felony crimes including the use
|
|||
|
of a telephone lineman's handset in March 1990 to tap into a Toys 'R
|
|||
|
Us telephone line to set up two conference calls between 15
|
|||
|
participants. According to the charges, each call lasted
|
|||
|
approximately 10 hours and cost $4,000. A spokesperson for the County
|
|||
|
Attorney's office told Newsbytes that a Tucson resident, Anthony
|
|||
|
Nusall, has previously pleaded guilty to being a participant in the
|
|||
|
conference Majette is also accused of illegally accessing TRW's
|
|||
|
credit data base to obtain personal credit information and account
|
|||
|
numbers of persons in the TRW database. He is alleged to have then
|
|||
|
used the information obtained to divert existing account mailings to
|
|||
|
mail drops and post office boxes set up for this purpose. He is also
|
|||
|
alleged to have additional credit cards issued based on the
|
|||
|
information obtained from the database. He is further alleged to have
|
|||
|
obtained cash, goods and services, such as airline tickets, in excess
|
|||
|
of $50,000 by using cards and account information obtained through
|
|||
|
entry into the TRW database.
|
|||
|
|
|||
|
It is further alleged that Majette stole credit cars from U.S. Mail
|
|||
|
boxes and used them to obtain approximately $10,000 worth of cash,
|
|||
|
goods and services.The allegations state that Majette acted either
|
|||
|
alone or as part of a group to perform these actions. A County
|
|||
|
Attorney spokesperson told Newsbytes that further arrests may be
|
|||
|
expected as result of the ongoing investigation.
|
|||
|
|
|||
|
While bail was set on these charges at $4,900. Majette is being held
|
|||
|
on a second warrant for probation violation and cannot be released on
|
|||
|
bail until the probation hearing has been held.
|
|||
|
|
|||
|
Gail H. Thackeray, former Assistant Attorney General for the State of
|
|||
|
Arizona, currently working with Maricopa County on the SunDevil
|
|||
|
cases, told Newsbytes "The SunDevil project was started in response
|
|||
|
to a high level of complaint of communications crimes, credit card
|
|||
|
fraud and other incidents relating to large financial losses. These
|
|||
|
were not cases of persons accessing computers 'just to look around'
|
|||
|
or even cases like the Atlanta 'Legion of Doom' one in which the
|
|||
|
individuals admitted obtaining information through illegal access.
|
|||
|
They are rather cases in which the accused alleged used computers to
|
|||
|
facilitate theft of substantial goods and services."
|
|||
|
|
|||
|
(Barbara E. McMullen & John F. McMullen/19910401)
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Gene Spafford <spaf@CS.PURDUE.EDU>
|
|||
|
Subject: Northern District (Ill.) Press Release on Len Rose
|
|||
|
Date: Fri, 29 Mar 91 19:10:13 EST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.11: File 4 of 5: Chicago Press Release on Len Rose ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Information Release
|
|||
|
US Department of Justice
|
|||
|
United States Attorney
|
|||
|
Northern District of Illinois
|
|||
|
|
|||
|
March 22, 1991
|
|||
|
|
|||
|
FRED FOREMAN, United States Attorney for the Northern District of
|
|||
|
Illinois, together with TIMOTHY J. McCARTHY, Special Agent In Charge
|
|||
|
of the United States Secret Service in Chicago, today announced the
|
|||
|
guilty plea of LEONARD ROSE, 32, 7018 Willowtree Drive, Middletown,
|
|||
|
Maryland to felony charges brought against him in Chicago and in
|
|||
|
Baltimore involving Rose trafficing with others in misappropriated
|
|||
|
AT&T computer programs and computer access programs between May 1988
|
|||
|
and February 1, 1990. Under the terms of plea agreements submitted to
|
|||
|
the United States District Court in Maryland, Rose will serve an
|
|||
|
agreed, concurrent one year prison term for his role in each of the
|
|||
|
fraud schemes charged.
|
|||
|
|
|||
|
In pleading guilty to the Baltimore charges, Rose admitted that on
|
|||
|
October 5, 1989, he knowingly received misappropriated source code(1)
|
|||
|
for the AT&T UNIX computer operating system from a former AT&T technical
|
|||
|
contractor. The UNIX operating system is a series of computer programs
|
|||
|
used on a computer which act as an interface or intermediary between a
|
|||
|
user and the computer system itself. The UNIX operating system, which is
|
|||
|
licensed by AT&T at $77,000 per license, provides certain services to
|
|||
|
the computer user, such as the login program which is designed to
|
|||
|
restrict access to a computer system to authorized users. The login
|
|||
|
program is licensed by AT&T at $27,000 per license.
|
|||
|
|
|||
|
In pleading guilty to the Chicago charges, Rose admitted that, after
|
|||
|
receiving the AT&T source code, he modified the source code governing
|
|||
|
the computer's login program by inserting a secret set of instructions
|
|||
|
commonly known as a "trojan horse." This inserted program would cause
|
|||
|
the computer on which the source code was installed to perform
|
|||
|
functions the program's author did not intend, while still executing
|
|||
|
the original program so that the new instructions would not be detected.
|
|||
|
The "trojan horse" program that Rose inserted into the computer
|
|||
|
program enabled a person with "system administrator" privileges to
|
|||
|
secretly capture the passwords and login information of authorized
|
|||
|
computer users on AT&T computers and store them in a hidden file. These
|
|||
|
captured logins and passwords could later be recovered from this
|
|||
|
hidden file and used to access and use authorized users' accounts
|
|||
|
without their knowledge. The program did not record unsuccessful login
|
|||
|
attempts.
|
|||
|
|
|||
|
In connection with the Chicago charge, Rose admitted that on January
|
|||
|
7, 1990, he transmitted his modified AT&T UNIX login program containing
|
|||
|
the trojan horse from Middletown, Maryland to a computer operator in
|
|||
|
Lockport, Illinois, and a student account at the University of
|
|||
|
Missouri, Columbia Campus.
|
|||
|
|
|||
|
In pleading guilty to the Chicago charges, Rose acknowledged that when
|
|||
|
he distributed his trojan horse program to others he inserted several
|
|||
|
warnings so that the potential users would be alerted to the fact that
|
|||
|
they were in posession of proprietary AT&T information. In the text of
|
|||
|
the program Rose advised that the source code originally came from
|
|||
|
AT&T "so it's definitely not something you wish to get caught with."
|
|||
|
and "Warning: This is AT&T proprietary source code. DO NOT get caught
|
|||
|
with it." The text of the trojan horse program also stated:
|
|||
|
Hacked by Terminus to enable stealing passwords.
|
|||
|
This is obviously not a tool to be used for initial
|
|||
|
system penetration, but instead will allow you to
|
|||
|
collect passwords and accounts once it's been
|
|||
|
installed. (I)deal for situations where you have a
|
|||
|
one-shot opportunity for super user privileges..
|
|||
|
This source code is not public domain..(so don't get
|
|||
|
caught with it).
|
|||
|
Rose admitted that "Terminus" was a name used by him in
|
|||
|
communications with other computer users.
|
|||
|
|
|||
|
In addition to these warnings, the text of Rose's trojan horse program
|
|||
|
also retained the original warnings installed in the program by AT&T:
|
|||
|
Copyright (c) 1984 AT&T
|
|||
|
All rights reserved
|
|||
|
THIS IS UNPUBLISHED PROPRIETARY
|
|||
|
SOURCE CODE OF AT&T
|
|||
|
|
|||
|
This copyright notice above does
|
|||
|
not evidence any actual or intended
|
|||
|
publication of the source code.
|
|||
|
|
|||
|
Inspection of this modified AT&T UNlX login source code by AT&T's UNIX
|
|||
|
licensing group revealed that the modified source code was in fact a
|
|||
|
"derivative work" based upon the standard UNIX login source code, which
|
|||
|
was regarded by AT&T as proprietary information and a trade secret of
|
|||
|
AT&T, which was not available in public domain software.
|
|||
|
|
|||
|
In pleading guilty to the federal charges in Chicago and Baltimore, Rose
|
|||
|
also acknowledged that, after being charged with computer fraud and
|
|||
|
theft in federal court in Baltimore, he became employed at Interactive
|
|||
|
Systems Inc. in Lisle, Illinois. He acknowledged that his former
|
|||
|
employers at Interactive would testify that he was not authorized by
|
|||
|
them to obtain copies of their AT&T source code which was licensed to
|
|||
|
them by AT&T. Rose further admitted that John Hickey, a Member of
|
|||
|
Technical Staff with AT&T Bell Laboratories in Lisle, Illinois,
|
|||
|
correctly determined that Rose had downloaded copies of AT&T source code
|
|||
|
programs from the computer of Interactive to Rose's home computers in
|
|||
|
Naperville. The computers were examined after they were seized by the
|
|||
|
Naperville Police Department, executing a State search warrant,
|
|||
|
|
|||
|
As part of the plea agreement charges filed by the DuPage County State's
|
|||
|
Attorney's Office will be dismissed without prejudice to refiling. The
|
|||
|
forfeited UNIX computer seized will be retained by the Naperville Police
|
|||
|
Department.
|
|||
|
|
|||
|
Commenting on the importance of the Chicago and Baltimore cases, Mr.
|
|||
|
Foreman noted that the UNIX computer operating system, which is involved
|
|||
|
in this investigation, is used to support international, national, and
|
|||
|
local telephone systems. Mr. Foreman stated, "The traffic which flows
|
|||
|
through these systems is vital to the national health and welfare.
|
|||
|
People who invade our telecommunications and related computer systems
|
|||
|
for profit or personal amusement create immediate and serious
|
|||
|
consequences for the public at large. The law enforcement community and
|
|||
|
telecommunications industry are attentive to these crimes, and those who
|
|||
|
choose to use their intelligence and talent in an attempt to disrupt
|
|||
|
these vital networks will find themselves vigorously prosecuted."
|
|||
|
|
|||
|
Mr. Foreman also stated that the criminal information filed in Chicago
|
|||
|
and a companion information in Baltimore are the initial results of a
|
|||
|
year long investigation by agents of the United States Secret Service in
|
|||
|
Chicago, Maryland, and Texas. Mr. Foreman praised the cooperation of the
|
|||
|
DuPage County State's Attorney's Office and the Naperville Police
|
|||
|
Department in the investigation. He also acknowledged AT&T's technical
|
|||
|
assistance to the United States Secret Service in analyzing the computer
|
|||
|
data seized pursuant to search warrants in Chicago, Baltimore and
|
|||
|
Austin, Texas.
|
|||
|
|
|||
|
TIMOTHY J. McCARTHY, Special Agent ln Charge of the United States Secret
|
|||
|
Service in Chicago, noted that Rose's conviction is the latest result of
|
|||
|
the continuing investigation of the computer hacker organization, the
|
|||
|
"Legion of Doom." This investigation being conducted by the United
|
|||
|
States Secret Service in Chicago, Atlanta, New York and Texas, and has
|
|||
|
resulted in convictions of six other defendants for computer related
|
|||
|
crimes.
|
|||
|
|
|||
|
Assistant United States Attorney William J. Cook, who heads the Computer
|
|||
|
Fraud and Abuse Task Force, and Assistant United States Attorneys
|
|||
|
Colleen D. Coughlin and David Glockner supervised the Secret Service
|
|||
|
investigation in Chicago.
|
|||
|
|
|||
|
----------
|
|||
|
(1) The UNIX operating system utility programs are written initially
|
|||
|
in a format referred to as "source code," a high-level computer
|
|||
|
language which frequently uses English letters and symbols for
|
|||
|
constructing computer programs. The source code was translated, using
|
|||
|
another program known as a compiler, into another form of program
|
|||
|
which a computer can rapidly read and execute, referred to as the
|
|||
|
"object code."
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: hkhenson@CUP.PORTAL.COM
|
|||
|
Subject: Letter to AT&T Cancelling Long-Distance Carrier Service
|
|||
|
Date: Tue, 2 Apr 91 16:51:03 PST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.11: File 5 of 5: Letter to AT&T Cancelling Service ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
%Moderator Comment: Individuals may or may not be able to change
|
|||
|
policies with their actions, but if enough people act things will
|
|||
|
change. Keith Hansen cancelled AT&T as his long distance carrier, and
|
|||
|
although it may seem a token gesture, if enough of us do it (including
|
|||
|
the moderators), perhaps AT&T will eventually get the message. Or,
|
|||
|
perhaps not, as cynics would argue. But, what can it hurt?
|
|||
|
|
|||
|
One observer remarked that AT&T and BellSouth/BellCorp are separate
|
|||
|
entities, and allusion to the Craig Neidorf trial may not be
|
|||
|
appropriate. But, as Craig Neidorf remarked, AT&T work closely
|
|||
|
together and in his case AT&T was well aware of the prosecution's
|
|||
|
evidence and could readily have intervened because of the close
|
|||
|
working relationship. As we will suggest in a forthcoming CuD article,
|
|||
|
AT&T in the past has hardly been reticent to challenge the limits of
|
|||
|
law when it served their purposes. Yet, when their own ox is gored,
|
|||
|
they seem to demand invocation of the full measure of criminal law and
|
|||
|
more. Keith's letter is an excellent model for those willing to follow
|
|||
|
his example.%
|
|||
|
|
|||
|
March 29, 1991
|
|||
|
|
|||
|
|
|||
|
Robert E. Allen
|
|||
|
Chairman of the Board
|
|||
|
ATT Corporate Offices
|
|||
|
550 Madison Ave.
|
|||
|
New York, NY 10022
|
|||
|
|
|||
|
Dear Mr. Allen:
|
|||
|
|
|||
|
As a loyal ATT long-distance customer all my life, I feel I
|
|||
|
owe you an explanation for canceling my ATT long-distance
|
|||
|
service.
|
|||
|
|
|||
|
I have never had a problem with ATT service, operators, or
|
|||
|
audio quality. I was more than willing to pay the small premium,
|
|||
|
and have been a heavy user of ATT long-distance services for the
|
|||
|
past 15 years. I am also a consultant in the computer business
|
|||
|
who has used Unix and its derivatives intermittently over the
|
|||
|
past 10 years. Outside of my technical work I have long been
|
|||
|
involved in legal and political issues related to high
|
|||
|
technology, especially space. One of my past activities involved
|
|||
|
the political defeat of an oppressive United Nations treaty. I
|
|||
|
have also taken substantial personal risks in opposing the
|
|||
|
organizations of Lyndon LaRouche. During the last three years I
|
|||
|
have been personally involved with email privacy issues.
|
|||
|
|
|||
|
Because of my interest in email privacy, I have closely
|
|||
|
followed the abusive activities of Southern Bell and the Secret
|
|||
|
Service in the Phrack/Craig Neidorf case and the activities of
|
|||
|
ATT and the Secret Service with respect to the recently concluded
|
|||
|
case involving Len Rose. Both cases seem to me to be attempts to
|
|||
|
make draconian "zero tolerance" examples of people who are--at
|
|||
|
most--gadflies. In actuality, people who were pointing out
|
|||
|
deficiencies and methods of attack on Unix systems should be
|
|||
|
considered *resources* instead of villains.
|
|||
|
|
|||
|
I consider this head-in-the-sand "suppress behavior" instead
|
|||
|
of "fix the problems" approach on the part of ATT and the
|
|||
|
government to be potentially disastrous to the social fabric.
|
|||
|
The one thing we don't need is a number of alienated programmers
|
|||
|
or engineers mucking up the infrastructure or teaching real
|
|||
|
criminals or terrorists how to do it. I find the deception
|
|||
|
of various aspects of ATT and the operating companies to obtain
|
|||
|
behavior suppression activities from the government to be
|
|||
|
disgusting, and certainly not in your long-term interest.
|
|||
|
|
|||
|
A specific example of deception is ATT's pricing login.c (the
|
|||
|
short program in question in the Len Rose case) at over $77,000
|
|||
|
so the government could obtain a felony conviction for
|
|||
|
"interstate wire fraud." Writing a version of login.c is often
|
|||
|
assigned as a simple exercise in first-semester programming
|
|||
|
classes. It exists in thousands of versions, in hundreds of
|
|||
|
thousands of copies. The inflation is consistent with Southern
|
|||
|
Bell's behavior in claiming a $79,000 value for the E911 document
|
|||
|
which they admitted at trial could be obtained for $13.
|
|||
|
|
|||
|
I know you can argue that the person involved should not
|
|||
|
have plead guilty if he could defend himself using these
|
|||
|
arguments in court. Unlike Craig Neidorf, Len Rose lacked
|
|||
|
parents who could put up over a hundred thousand dollars to
|
|||
|
defend him, and your company and the Secret Service seem to have
|
|||
|
been involved in destroying his potential to even feed himself,
|
|||
|
his wife, and two small children. At least he gets fed and
|
|||
|
housed while in jail, and his wife can go on welfare. All, of
|
|||
|
course, at the taxpayer's expense.
|
|||
|
|
|||
|
There are few ways to curtail abuses by the law (unless you
|
|||
|
happen to catch them on videotape!) and I know of no effective
|
|||
|
methods to express my opinion of Southern Bell's activities even
|
|||
|
if I lived in their service area. But I can express my anger at
|
|||
|
ATT by not purchasing your services or products, and encouraging
|
|||
|
others to do the same.
|
|||
|
|
|||
|
By the time this reaches your desk, I will have switched my
|
|||
|
voice and computer phones to one of the other long-distance
|
|||
|
carriers. My consulting practice has often involved selecting
|
|||
|
hardware and operating systems. In any case where there is an
|
|||
|
alternative, I will not recommend Unix, ATT hardware, or NCR
|
|||
|
hardware if you manage to buy them.
|
|||
|
|
|||
|
|
|||
|
Yours in anger,
|
|||
|
|
|||
|
|
|||
|
|
|||
|
H. Keith Henson
|
|||
|
|
|||
|
cc: Telecom Digest, comp.risk, etc.
|
|||
|
|
|||
|
|
|||
|
PS: My wife added the following:
|
|||
|
|
|||
|
I want you to try to understand something--a lesson that can
|
|||
|
be learned from these cases. We are no longer living in the
|
|||
|
Industrial Age, when a product could be made in "one-size-fits
|
|||
|
all," packaged, sold and used without modification or support,
|
|||
|
like a television. We face massive problems in the Information
|
|||
|
Age in protecting intellectual property, but we cannot simply
|
|||
|
transfer old-world, Industrial-Age police attitudes to these
|
|||
|
problems. Possessing a copy of my program without paying for it
|
|||
|
is not the same as stealing my television. If you modify my
|
|||
|
program and make it more usable to the community, I can still go
|
|||
|
on charging for the use of my program, but I can also incorporate
|
|||
|
your modifications, and charge for them--especially if I pay you
|
|||
|
something for the help. If you provide support for my programs
|
|||
|
(something every major hardware and software manufacturer has had
|
|||
|
to either severely curtail or--like IBM--abandon altogether
|
|||
|
without extra charges), then you have made my product more
|
|||
|
usable. This is what the so-called "hacker" culture is all
|
|||
|
about. I'm talking about ethical "hackers" here, not the media
|
|||
|
image of breakin artists or virus-spreading nerds whose only
|
|||
|
compensation is a malignant satisfaction in destroying computer
|
|||
|
systems. The "hacker" culture is really a native population of
|
|||
|
problem solvers whose pleasure is in tailoring products to their
|
|||
|
own and other's use, and often pushing back the limits on a
|
|||
|
product. Ethical hackers are willing to pay for their use of
|
|||
|
products (although it's absurd to charge such a support provider
|
|||
|
tens of thousands of dollars for source code when he has neither
|
|||
|
the equipment nor the desire to use source code *as a product*).
|
|||
|
And they are willing to help others to use them by providing
|
|||
|
support which ATT could not afford to provide if it charged twice
|
|||
|
the price for its products! This was the sort of "theft" Len
|
|||
|
Rose was involved in--custom tailoring of the ATT product,
|
|||
|
helping customers to use the programs, manipulation of software
|
|||
|
which he could not use himself in any way except to help others
|
|||
|
use it. Prosecuting Len Rose was like prosecuting a TV repairman
|
|||
|
as a thief because he was removing the television from the house
|
|||
|
to take it to his shop--except that unlike the TV repairman, Len
|
|||
|
Rose didn't even need to take it into the shop, and his having a
|
|||
|
copy of it could do nothing except benefit ATT.
|
|||
|
|
|||
|
In the long run, this inappropriate application of Industrial-Age
|
|||
|
concepts of ownership and prosecution is going to be lethal to
|
|||
|
you and everyone else in the same boat. While you think you are
|
|||
|
sending a signal that theft will not be tolerated, what you are
|
|||
|
actually doing is sending a signal that customer support,
|
|||
|
personal tailoring of programs and cooperation with ATT in
|
|||
|
producing a product usable by many more millions of people will
|
|||
|
not be tolerated. Your problem is partly that no official
|
|||
|
channels exist for appreciation and remuneration for the type of
|
|||
|
work Len Rose did as a consultant and support provider, not that
|
|||
|
"hackers" like him exist and flourish. (Unofficial channels
|
|||
|
obviously do exist for circulation of ATT materials, else where
|
|||
|
would he have obtained the source?--a local K-Mart?) And be
|
|||
|
aware that Len Rose was the least of your worries. Hackers much
|
|||
|
more powerful than he exist, and you have enraged them when you
|
|||
|
could have engaged their cooperation.
|
|||
|
|
|||
|
Sincerely,
|
|||
|
|
|||
|
Arel Lucas
|
|||
|
|
|||
|
********************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
**END OF CuD #3.11**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|
|||
|
|