818 lines
44 KiB
Plaintext
818 lines
44 KiB
Plaintext
|
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Volume 3, Issue #3.22 (June 21, 1991) **
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|||
|
ARCHIVISTS: Bob Krause / / Bob Kusumoto
|
|||
|
ARCHMASTER: Brendan Kehoe
|
|||
|
|
|||
|
+++++ +++++ +++++ +++++ +++++
|
|||
|
|
|||
|
CONTENTS THIS ISSUE:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: From the Mailbag
|
|||
|
File 3: Punishment and Control: Reply to Gene Spafford
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
CuD is available via electronic mail at no cost. Hard copies are available
|
|||
|
through subscription or single issue requests for the costs of reproduction
|
|||
|
and mailing.
|
|||
|
|
|||
|
USENET readers can currently receive CuD as alt.society.cu-digest.
|
|||
|
Back issues of Computer Underground Digest on CompuServe can be found
|
|||
|
in these forums:
|
|||
|
IBMBBS, DL0 (new uploads) and DL4 (BBS Management)
|
|||
|
LAWSIG, DL1 (Computer Law)
|
|||
|
TELECOM, DL0 (New Uploads) and DL12 (Electronic Frontier)
|
|||
|
Back issues are also available from:
|
|||
|
GEnie, PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
|
|||
|
Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
|
|||
|
(2) cudarch@chsun1.uchicago.edu;
|
|||
|
(3) dagon.acc.stolaf.edu (130.71.192.18).
|
|||
|
E-mail server: archive-server@chsun1.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source is
|
|||
|
cited. Some authors, however, do copyright their material, and those
|
|||
|
authors should be contacted for reprint permission. It is assumed
|
|||
|
that non-personal mail to the moderators may be reprinted unless
|
|||
|
otherwise specified. Readers are encouraged to submit reasoned
|
|||
|
articles relating to the Computer Underground. Articles are preferred
|
|||
|
to short responses. Please avoid quoting previous posts unless
|
|||
|
absolutely necessary.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Contributors assume all
|
|||
|
responsibility for assuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: Moderators' Corner
|
|||
|
Date: 21 June, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.22: File 1 of 3: Moderators Corner ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
+++++++++++++++++
|
|||
|
Three LoD members form Comsec Data Security
|
|||
|
+++++++++++++++++
|
|||
|
|
|||
|
Craig Neidorf sent over the following article announcing the formation
|
|||
|
of a security company by three former members of the Legion of Doom.
|
|||
|
The new company was not a sudden inspiration, but the result of
|
|||
|
considerable research and groundwork prior to the announcement.
|
|||
|
According to the partners, the Texas-based companies has already
|
|||
|
landed several significant contracts. When asked why anybody should
|
|||
|
hire ex-hackers, one commentator responded that security, like
|
|||
|
hacking, is just another form of puzzle-solving, and those who can
|
|||
|
find the holes are likely to those most-able to close them.
|
|||
|
|
|||
|
*****
|
|||
|
|
|||
|
From: TIME Magazine, June 24, 1991, page 13.
|
|||
|
|
|||
|
AFTER YOU'VE BEAT 'EM -- JOIN 'EM
|
|||
|
|
|||
|
After infiltrating some of America's most sensitive computer banks,
|
|||
|
is there any challenge left for a digital desperado? Only to go legit,
|
|||
|
say three former members of the notorious hacker group, the LEGION OF
|
|||
|
DOOM, who have quit the outlaw game to start Comsec Data Security. The
|
|||
|
Legionnaries claimed an 80% success rate in penetrating computer
|
|||
|
networks, and now they want to teach private industry to protect itself
|
|||
|
from the next generation of intruders. "You can't put a price tag on the
|
|||
|
information we know," says Scott Chasin, a Comsec partner. But they'll
|
|||
|
try.
|
|||
|
|
|||
|
(This article features a color photo of the three founding members:
|
|||
|
Erik Bloodaxe, Doc Holiday, and Malefactor.)
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Various
|
|||
|
Subject: From the Mailbag
|
|||
|
Date: 21 June, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.22: File 2 of 3: From the Mailbag ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: an288@CLEVELAND.FREENET.EDU(Mark Hittinger)
|
|||
|
Subject: Elaboration and Response to Computer Computing
|
|||
|
Date: Sun, 16 Jun 91 14:42:01 -0400
|
|||
|
|
|||
|
> These are D.W. James main points from his CuD 3.21 message:
|
|||
|
|
|||
|
1. College computing is still managed by centralized MIS, and in an
|
|||
|
unfavorable manner. They aren't dead yet.
|
|||
|
2. Centralized MIS has monopolistic control of the use of network
|
|||
|
bandwidth.
|
|||
|
3. College CC administrations dance to NSF's tune. (he who has the
|
|||
|
gold ect)
|
|||
|
4. Centralized MIS can arbitrarily stop something if it appears
|
|||
|
questionable.
|
|||
|
|
|||
|
Mark's comment:
|
|||
|
|
|||
|
(A seasoned MIS type would put extra effort into quietly stopping
|
|||
|
anything that a journalist or politician could construe as
|
|||
|
questionable! People should not be surprised by this, it is a
|
|||
|
standard reflex for a bureaucrat. I mentioned in my article that if
|
|||
|
they could not cover up a hacking event that they would exaggerate it
|
|||
|
instead. I know it is upsetting when something neat gets quietly
|
|||
|
axed, however, think of the damage that is done when the
|
|||
|
administrator is forced to exaggerate. They are forced because they
|
|||
|
feel a need to protect their job and reputation. We shouldn't really
|
|||
|
blame them too much, after all, it will be their red face on the TV
|
|||
|
if something in their domain makes the news!)
|
|||
|
|
|||
|
Here is my response (related to my CuD 3.20 article - renaissance ect)
|
|||
|
|
|||
|
I could write another article on the network thing by itself. It is
|
|||
|
true that computing administrations have moved towards selling
|
|||
|
networking as opposed to computing. It is kind of like "Custer's last
|
|||
|
stand" or should I say "job".
|
|||
|
|
|||
|
You know that the demand for bandwidth is growing at a rapid rate. It
|
|||
|
is growing far faster than the budget money to fund it. What is the
|
|||
|
result of these two factors? First, there are going to be more
|
|||
|
network disappointments such as the one mentioned by D.W. James, that
|
|||
|
is, the shutdown of various grey area network "services". Second, the
|
|||
|
available bandwidth will soon be so clogged as to render the service
|
|||
|
unusable. It is kind of like the old timesharing machines. No - I'm
|
|||
|
not broadcasting a death-of-usenet or death-of-internet message. I'm
|
|||
|
just saying that a squeeze is coming and it might be a good idea to
|
|||
|
get out of the way. It is just a natural process that we've seen
|
|||
|
before in the timesharing racket. People are transmitting images and
|
|||
|
sound now! Its not just ASCII for breakfast any more! Were the
|
|||
|
current production networks and hosts designed for this kind of thing?
|
|||
|
Our desktop machines (and what we want to do with them) have already
|
|||
|
outgrown yesterday's networks.
|
|||
|
|
|||
|
(So not only do we need a new multi-tasking DOS from Bill, and an
|
|||
|
elegant new BOX from Ken, we need a new NET. I was quite pleased
|
|||
|
with Apple's recent filing with the FCC for a personal radio net. Be
|
|||
|
ready, they are heading in the right direction. Wouldn't it just
|
|||
|
kill ya to see Apple make a bunch of money again?)
|
|||
|
|
|||
|
Technology can come to the rescue in networking too. It is just a
|
|||
|
cost issue more than anything else. Centralized computing was created
|
|||
|
when individuals could not afford computers. Centralized network
|
|||
|
management exists because yesterday's networks are too expensive for
|
|||
|
individuals to fund. Today there are alternatives to the network
|
|||
|
supplied by your college. You can totally bypass these guys today!
|
|||
|
It is just a matter of money and the costs are dropping like a rock.
|
|||
|
D.W. James says that MIS isn't dead, however, I argue the clock is
|
|||
|
sure ticking fast, and that was one of the points of my initial
|
|||
|
article. The case for MIS survival is hopeless. The case for hackers
|
|||
|
is that we'd better get busy thinking about what kind of 20 megabit
|
|||
|
UHF cellular network software we'll need on our used 50 mip laptop.
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: dalton.spence@CANREM.UUCP(Dalton Spence)
|
|||
|
Subject: can it happen in canada?
|
|||
|
Date: Wed, 5 Jun 1991 20:00:00 -0400
|
|||
|
|
|||
|
I am new to the electronic frontier, a greenhorn if you will. As a
|
|||
|
programmer of midrange IBM systems (S/36 and AS/400) for many years, I
|
|||
|
thought, sitting here in Canada, I was more objective about the events
|
|||
|
of the last year than most Americans could be. After all, it wasn't
|
|||
|
MY constitutional rights that had been threatened (YET). And since
|
|||
|
most of my career has been spent working for small software companies,
|
|||
|
the idea of unauthorized intruders in the systems I was working with
|
|||
|
frightened and repelled me. Fortunately, so far the systems I have
|
|||
|
worked on have been isolated from the outside world (much like I have
|
|||
|
been), so hackers have not been a problem (YET).
|
|||
|
|
|||
|
However, I will not become TOO complacent, since the government of
|
|||
|
Canada has a history of following the lead of the United States, even
|
|||
|
when it would serve us better NOT to. I am worried that the recent
|
|||
|
virus infestations of government computers, as described in the
|
|||
|
attached article from "Toronto Computes!" magazine (June 3, Vol. 7,
|
|||
|
#5, p. 3), may act as a catalyst for a crackdown on Canadian bulletin
|
|||
|
boards. Which would be a shame, since I am just getting the hang of
|
|||
|
using them.
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
VIRUSES INFEST FEDERAL GOVERNMENT
|
|||
|
|
|||
|
By LAWRENCE BRUNER
|
|||
|
|
|||
|
Virus infection in computers is growing out of control. They're
|
|||
|
doubling once every three months in the federal government, said a
|
|||
|
source who asked not to be identified.
|
|||
|
|
|||
|
She said there have been about 30 cases of virus infection in the last
|
|||
|
several months and there will probably be about 60 before the end of
|
|||
|
summer.
|
|||
|
|
|||
|
"We have to do something about it and if we don't we'll be swamped,"
|
|||
|
she said.
|
|||
|
|
|||
|
Viruses have occurred at the department of external affairs, the RCMP,
|
|||
|
the Supreme Court and Atomic Energy of Canada Ltd. But the viruses
|
|||
|
aren't concentrated in any departments or agencies, occurring randomly
|
|||
|
throughout the government, she said.
|
|||
|
|
|||
|
The viruses range from merely annoying to very damaging. In the
|
|||
|
annoying category is a virus that creates an on-screen ping pong ball
|
|||
|
about the size of a cursor. The ball bounces up and down the screen,
|
|||
|
but doesn't destroy any data. More damaging is the Stoned virus which
|
|||
|
freezes the system and displays the message, "Your disk has been
|
|||
|
stoned. Legalize marijuana."
|
|||
|
|
|||
|
In some cases the Stoned virus makes it impossible to reboot the
|
|||
|
system without purging all the software and loading back-up programs.
|
|||
|
Another virus called Dark Avenger destroys data. Most of the viruses
|
|||
|
infiltrate the federal government when a civil servant gets software
|
|||
|
from bulletin board systems.
|
|||
|
|
|||
|
"A civil servant might see some statistic or an article he needs on a
|
|||
|
BBS and then downloads it," said the source. One of the viruses was
|
|||
|
created by a 14-year-old boy living in Hull, Quebec, Ottawa's twin
|
|||
|
city, but most originate in the United States. Viruses are doubling in
|
|||
|
the U.S. government every two months, said the source.
|
|||
|
|
|||
|
"Things are bigger and better there, so more's happening. They have a
|
|||
|
bigger population and access to more things."
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: "William Vajk (igloo)" <learn@GARGOYLE.UCHICAGO.EDU>
|
|||
|
Date: Sun, 2 Jun 91 18:00:40 CDT
|
|||
|
Subject: Punishment and Control: Reply to Gene Spafford
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.22: File 3 of 3: Punishment and Control ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
In CUD 3.14, Gene Spafford wrote:
|
|||
|
|
|||
|
> There is little doubt that law enforcement has sometimes been overzealous
|
|||
|
> or based on ignorance. That is especially true as concerns computer-related
|
|||
|
> crimes, although it is not unique to that arena.
|
|||
|
|
|||
|
I am concerned that while computer related interests isn't the only area in
|
|||
|
which law enforcement has fallen so far short of the mark as to be noticeable,
|
|||
|
it is the basis for one of the first relatively large scale interactions
|
|||
|
between law enforcement and middle class. This is the reason for so many of us
|
|||
|
noting cases which have acquired a notoriety exceeding past norms where the
|
|||
|
investigation involved a lower class. Such treatments have been the usual fare
|
|||
|
for the economically disadvantaged, sometimes those culturally distinct (see
|
|||
|
the movie _Chinatown_ for an excellent example.) Complaints on their behalf
|
|||
|
haven't been nearly as widespread in spite of the similarities of the behavior
|
|||
|
by law enforcement. It isn't new. It is simply new to "us."
|
|||
|
|
|||
|
I have some serious reservations about the Chicago Police Department which
|
|||
|
has declared war on "gangs." Possibly other such declarations have been
|
|||
|
undertaken elsewhere as well. Just so we understand up front, I do not
|
|||
|
condone criminal behavior. But my understandings of these events is confounded
|
|||
|
by the difficulties I have in determining in advance of some criminal behavior
|
|||
|
or another just what actually constitutes a gang. How does one determine what
|
|||
|
is an Italian-American Sports Club, and which one is a sinister mob
|
|||
|
organization. How does one differentiate a group of young men, wearing
|
|||
|
identical attire while walking across town to play basketball in a park from
|
|||
|
another group, walking about their turf, and the Boy Scouts.
|
|||
|
|
|||
|
A discussion I just had with the Public Relations officer at the Chicago
|
|||
|
Police Department did little to help. The distinguishing characteristics
|
|||
|
are looser and far more evasive than those mentioned by Pastor Niemoeller.
|
|||
|
The PR officer told me they have something "better than an educated guess"
|
|||
|
on which to base whether or not an individual or small group is gang related;
|
|||
|
whether or not to question (should we call it harass) citizens within a
|
|||
|
community. In the end, we are permitting the police to use personal judgment
|
|||
|
in many ways. The personal judgment they have been using has now been brought
|
|||
|
into play in middle class communities. Guess what. We're complaining about it.
|
|||
|
|
|||
|
I am concerned that Spafford's comments can be read to be forgiving and
|
|||
|
conciliatory in nature where it regards errors made by professional law
|
|||
|
enforcement. Officer Nemeth in California (see CUD 3.15) has said that he's
|
|||
|
learning as he goes along. That's a hell of an answer to give some poor fellow
|
|||
|
who was attempting to access a published bbs number after you've broken two of
|
|||
|
his doors, confiscated his equipment, and subjected him to interrogation which
|
|||
|
assumed guilt instead of trying to develop information in a reasonable manner
|
|||
|
before using one of the most intrusive tactics permitted by law. There's an
|
|||
|
entire mentality which we see exercised in the modern prototypical police
|
|||
|
investigation. Officer Nemeth draws some conclusions of dubious worth even
|
|||
|
after knowing the facts and that there will be no prosecution, "Hopson and the
|
|||
|
other suspects should have given up after the first failed attempt" of trying
|
|||
|
to gain access to a computer. "The laws are funny. You don't have to prove
|
|||
|
malicious intent when you're talking about computer tampering. The first
|
|||
|
attempt you might say was an honest mistake. More than that, you have to
|
|||
|
wonder." ^^^^^^^^^ ^^^^^^^^^^^^^^
|
|||
|
|
|||
|
I suggest we put a rotary combination padlock on Nemeth's locker at work. Any
|
|||
|
time he misses getting it on the first try, he takes the day off....at his
|
|||
|
expense. But let's add a bit more realism. Someone should gently but
|
|||
|
erratically shake his arm to emulate a bit of line noise.
|
|||
|
|
|||
|
The prosecutor in the case, Stephen Brown, didn't believe the police
|
|||
|
overreacted in their investigation. "They had a legitimate concern." Is having
|
|||
|
a legitimate concern reason to secure search warrants and damage property?
|
|||
|
Aren't there any less intrusive investigatory techniques available? Of course
|
|||
|
there are. The police didn't know where to begin their investigation of this
|
|||
|
suspected criminal activity. I wasn't surprised at all to learn that PacBell
|
|||
|
security knew. Given the involvement of yet another telephone company, is
|
|||
|
the outcome, the overreaction, any surprise?????
|
|||
|
|
|||
|
We understand and feel compassion for one whose home has been violated by
|
|||
|
burglars. Often we hear that they no longer feel comfortable in their own
|
|||
|
home. Their inner feelings of security, something most of us take for granted,
|
|||
|
have been damaged, sometimes irreparably. It is obvious in hindsight that
|
|||
|
Nemeth's actions were unnecessary and counterproductive. I would not want him
|
|||
|
on the local police force in my town. I am most concerned regarding his
|
|||
|
ability to exercise judgment appropriate to the circumstances. But what is
|
|||
|
worse by far is that some consider his investigative techniques acceptable.
|
|||
|
|
|||
|
N.B. Police brutality doesn't begin at the end of a
|
|||
|
nightstick or hose. It begins with an attitude.
|
|||
|
|
|||
|
If you hire someone to write a bit of computer code for you which is to
|
|||
|
perform some specific function, do you accept their learning to do that
|
|||
|
task on the job and at your expense acceptable professionalism? I dare
|
|||
|
say you wouldn't. Had you hired them with the understanding that they are
|
|||
|
beginners and in training, then it would be considered acceptable.
|
|||
|
|
|||
|
Neither I nor any citizen in this nation has accepted the proviso that our
|
|||
|
law enforcement agents are beginners learning the trade as they go along.
|
|||
|
We demand the height of professionalism from them, each and every one. We
|
|||
|
have granted them the extremes of the use of deadly force. I, for one, don't
|
|||
|
take that lightly. I demand they be professionals and culpable for their
|
|||
|
actions, whether working on my behalf or not. Spafford talks about
|
|||
|
responsibility, let it begin with those who are PAID to be responsible and
|
|||
|
have been evading that duty, manufacturers of software and law enforcement.
|
|||
|
|
|||
|
Who pays them to be responsible? We all do.
|
|||
|
|
|||
|
> Reporting of some of these incidents has also been incorrect.
|
|||
|
|
|||
|
Yes, Gene. In article 5462@accuvax.nwu.edu you misspoke and assisted
|
|||
|
in proliferation of such incorrect reports :
|
|||
|
|
|||
|
"The information I have available from various sources
|
|||
|
indicates that the investigation is continuing, others
|
|||
|
are likely to be charged, and there MAY be some national
|
|||
|
security aspects to parts of the discussion that have
|
|||
|
yet to be disclosed."
|
|||
|
|
|||
|
Need I voice the obvious and ask how any "responsible" individual should
|
|||
|
handle errors they have made? Need I voice the obvious and ask a simple
|
|||
|
question. What has Gene Spafford done to correct errors he has made? Has
|
|||
|
his behavior in these matters met the criteria for responsibility he demands
|
|||
|
from others?
|
|||
|
|
|||
|
> Obviously, we all wish to act to prevent future such abuses,
|
|||
|
> especially as they apply to computers.
|
|||
|
|
|||
|
'To thine own self be true' seems so appropriate right about here. Did you
|
|||
|
wish to issue any corrections or retractions regarding some of your past
|
|||
|
articles ?
|
|||
|
|
|||
|
> However, that being the case does not mean that everyone accused under
|
|||
|
> the law is really innocent and the target of "political" persecution.
|
|||
|
|
|||
|
One of the elements common to propagandizing is to create a set of false issues
|
|||
|
which sound like something your opposition might have said. In this instance,
|
|||
|
I would appreciate most sincerely either having you repeat the source of such
|
|||
|
a statement (by someone other than an obvious lunatic) in these newsgroups, or
|
|||
|
to have you revise your statement into something more resembling the actual
|
|||
|
circumstances.
|
|||
|
|
|||
|
> That is certainly not reality; in some cases the individuals charged
|
|||
|
> are clearly at fault.
|
|||
|
|
|||
|
There are any number eventually found responsible and "at fault." I
|
|||
|
haven't seen much mention made of them on the networks. See below for
|
|||
|
one such case followed up. Is part of your problem, Gene, the fact that
|
|||
|
we haven't been flogging dead horses on the net; the fact we haven't been
|
|||
|
publishing news about those caught, prosecuted, and sentenced fairly? Given
|
|||
|
another [name deleted] mentality I am certain we could find a volunteer.
|
|||
|
|
|||
|
> By representing all of them as innocents and victims, you further
|
|||
|
> alienate the moderates who would otherwise be sympathetic to the
|
|||
|
> underlying problems. By trying to represent every individual charged
|
|||
|
> with computer abuse as an innocent victim, you are guilty of the same
|
|||
|
> thing you condemn law enforcement of when they paint all "hackers" as
|
|||
|
> criminals.
|
|||
|
|
|||
|
Really, this is a bit much. We presume innocence for all until they are
|
|||
|
actually adjudged guilty. They are thus, at most, represented as suspects
|
|||
|
until a verdict is handed down. But of course there are some folks who prejudge
|
|||
|
the outcomes and place articles on the network explaining the involvements
|
|||
|
of national security in the cases.........
|
|||
|
|
|||
|
Gaining momentum here, Gene? You laid the groundwork for a lie earlier,
|
|||
|
in true propagandist style, and rush in for the kill in this paragraph.
|
|||
|
Nowhere has anyone claimed every individual charged with computer abuse an
|
|||
|
innocent victim. The other case of computer abuse in Naperville, Illinois
|
|||
|
late last year had to do with an employee of Spiegel.
|
|||
|
|
|||
|
Michael H. Ferrell was charged with creating bogus invoices illegally
|
|||
|
collecting sizable sums of money. He was also charged with authorizing
|
|||
|
refunds to his credit cards using their cash registers. Although his scheme
|
|||
|
resulted in a computer tampering charge (because it is a relatively new and
|
|||
|
sexy action at the moment) he is more guilty in the ordinary sense of fraud
|
|||
|
laws designed to protect against abuse of trust. Abbreviated charges (press
|
|||
|
release) are available in CUD 3.00. He was found guilty (two of the charges
|
|||
|
were nolle pros) and sentenced as follows :
|
|||
|
|
|||
|
24 months probation
|
|||
|
|
|||
|
240 hours of public service work
|
|||
|
|
|||
|
restitution of $30,861.85
|
|||
|
|
|||
|
periodic imprisonment (weekends) for 6 weekends. Two to be served immediately,
|
|||
|
and four subject to future motion to vacate to be filed 2/26/1993.
|
|||
|
|
|||
|
Here's a guy who really stole something. Money, lots in fact.
|
|||
|
|
|||
|
> In particular, you portray Len Rose as an innocent whose life has been
|
|||
|
> ruined through no fault of his own, and who did nothing to warrant
|
|||
|
> Federal prosecution. That is clearly not the case. Len has acknowledged
|
|||
|
> that he was in possession of, and trafficking in, source code he knew was
|
|||
|
> proprietary.
|
|||
|
|
|||
|
I believe you would do well to look up the definition of the term (and
|
|||
|
charge) of trafficking. There were no monetary considerations or agreements.
|
|||
|
In fact, similar charges were brought against Neidorf. The fact that the case
|
|||
|
was dropped precluded a proper addressing of such issues as exchange of
|
|||
|
information (proprietary or not) without financial consideration. One of the
|
|||
|
original charges brought against Len involved the retransmittal by Neidorf of
|
|||
|
the same login.c program back to Len. Raises the same issue we are going to be
|
|||
|
examining regarding Express Mail where the U.S. Postal Inspectors are arresting
|
|||
|
recipients of packages known by the US Postal Service to contain contraband
|
|||
|
and delivered in spite of that knowledge.
|
|||
|
|
|||
|
Such a distancing by investigative and prosecutorial powers from rationality
|
|||
|
is quite troubling. If someone from LA were to express mail a reefer to
|
|||
|
Spaf, we might all be reading about a faculty member at Purdue arrested for
|
|||
|
possession of a controlled substance. Need we ask about the culpability of
|
|||
|
the sender?
|
|||
|
|
|||
|
Many other questions also have not been answered because of Len's plea
|
|||
|
bargain. It seems that AT&T source code (according to one of the Foley
|
|||
|
affidavits) bears legends which claim both proprietary rights and a
|
|||
|
copyright. You stipulate proprietary. The dual labeling of the original
|
|||
|
software should do a lot to remove it from consideration as truly proprietary
|
|||
|
information. The laws regarding copyrights require that all copyright material
|
|||
|
is subject to deposit at the Library of Congress, where any citizen has a
|
|||
|
right to read and review.
|
|||
|
|
|||
|
If this is the case, then possession is not illegal, because the text is
|
|||
|
protected from commercial exploitation by the copyright laws and Len should
|
|||
|
not have been charged with criminal. Copyright violation is a matter for civil
|
|||
|
suit. If someone makes 1000 copies of your newly released book and sends it to
|
|||
|
friends and associates, is it reasonable to expect a criminal prosecution by
|
|||
|
the U. S. Government, or will your publisher be required to undertake a civil
|
|||
|
suit for damages? Does it matter whether the copies are electronic or paper?
|
|||
|
|
|||
|
Furthermore, if he sends all 1000 copies across state lines in a single
|
|||
|
package, has he violated federal laws regarding stolen goods valued
|
|||
|
at over $ 5000? Each unit is valued at $29.95 by the publisher. Does the
|
|||
|
fact that he sent 1000 copies individually packaged across state lines negate
|
|||
|
that federal interest? And when one bears in mind that the laws were
|
|||
|
originally aimed at automobiles, the connotation assumes tangible goods
|
|||
|
of substantial value, not tidbits of some larger intellectual property
|
|||
|
which may or might not withstand as yet unresolved testing for proprietary
|
|||
|
status, notwithstanding questions regarding the cost/value haphazardly
|
|||
|
assigned for the sake of federal prosecution. Login.c, a program of some
|
|||
|
approximately 2000 lines of code, has a value in excess of $ 5000? Official
|
|||
|
representatives of AT&T have made such representations. The individual making
|
|||
|
such an assessment has obviously crossed to the other side of the looking
|
|||
|
glass and is presently enjoying tea with Alice and the Mad Hatter. In the end,
|
|||
|
of course, all the original charges were supplanted.
|
|||
|
|
|||
|
What would have happened had Len chosen to modify the login.c version which
|
|||
|
was written by David Ihnat and placed in the public domain? Which laws would
|
|||
|
then have been broken? The entire rationale supported by your article, Gene,
|
|||
|
falls apart into itty bitty pieces. Poor judgment alone is not a violation of
|
|||
|
any laws.
|
|||
|
|
|||
|
What would have happened if Len sent the modified AT&T login.c file across
|
|||
|
state lines in 10 line increments, to be recombined at the receiving end?
|
|||
|
The challenges many of us feel are appropriate to such understandings haven't
|
|||
|
been possible to date.
|
|||
|
|
|||
|
And finally, although by no means of least importance, the entire business
|
|||
|
of ownership of any single piece of AT&T software, whether source code
|
|||
|
or binaries needs to be examined. The ONLY owner is AT&T. Everyone who pays
|
|||
|
fees is licensed to use the software. Thus enters yet another dilemma.
|
|||
|
Possession is not licensed. Can possession be criminalized? Given this view,
|
|||
|
new questions arise. Use licensing concepts are not new nor are they unique.
|
|||
|
|
|||
|
> The login changes were the source of the fraud charge.
|
|||
|
|
|||
|
Perhaps you should reread the original 5 count indictment and examine the
|
|||
|
genesis of the adjustments the government made to the charges in the year plus
|
|||
|
from beginning to settlement. The government's actions aren't at all pretty.
|
|||
|
To say the real source of all charges is itself suspect would be an
|
|||
|
understatement. The government kept digging around and throwing stuff at the
|
|||
|
ceiling till something kinda stuck. And here's Gene Spafford pointing his
|
|||
|
finger saying "Aha!" Sure reminds me of Salem. In science, how one acquires
|
|||
|
data is just as important as the data itself. This doesn't change when it
|
|||
|
comes to human interactions and the law.
|
|||
|
|
|||
|
> It is certainly security-related, and the application of the law
|
|||
|
> appears to be appropriate.
|
|||
|
|
|||
|
There was a recent post made to the network regarding a serious security
|
|||
|
flaw in the Interactive port of Unix to the 80386 machine. The article
|
|||
|
and all the pertinent information was posted from abroad. If one reads
|
|||
|
the law to which you refer carefully, every system administrator whose system
|
|||
|
forwarded or displayed that article is chargeable and could be found guilty
|
|||
|
under the same law. Indeed, the author of the article probably could have
|
|||
|
been arrested had it originated here in the United States.
|
|||
|
|
|||
|
The law is erroneous in intent and stupid. It represents a feeble attempt to
|
|||
|
gloss over technological problems and solve them by social restrictions which
|
|||
|
are known not to work. The only workable solutions lie within the technology
|
|||
|
which contains the faults.
|
|||
|
|
|||
|
Admissions were made recently by AT&T regarding internal security. Several
|
|||
|
appear in the May 13, 1991 issue of BellLabs News. The document is copyright
|
|||
|
with all rights reserved so I won't quote from it. Bell Labs reports on a
|
|||
|
study run of their own internal terminals. They discovered inadequate
|
|||
|
protections exercised by employees affecting (infecting) about 15% of their
|
|||
|
sample. This comes from a company which lays claims to closely guarded
|
|||
|
proprietary software? I rather think that a false claim. I had a discussion
|
|||
|
with a former AT&T employee. Given these circumstances, it wouldn't be at all
|
|||
|
difficult for an ex employee (and there are plenty of them about now-a-days...
|
|||
|
some apparently still angry at their former employer) to enter a facility, log
|
|||
|
in to the internal networks, and purloin proprietary secrets.
|
|||
|
|
|||
|
Interestingly in the same issue is a discussion regarding the newer speed
|
|||
|
at which software is now being developed. One of the features is the
|
|||
|
reuse of software in segments. Perhaps something akin to production line
|
|||
|
tactics, with interchangeable parts. Comes right back around once more to
|
|||
|
there being but a single severely flawed Unix port for the 80386 CPU. If you
|
|||
|
have a security problem for one product, you'll have the same flaw in all of
|
|||
|
them. There are advantages and disadvantages to everything.
|
|||
|
|
|||
|
At the end of the included (CUD 3.14) article, Spafford discuss
|
|||
|
responsibility. It isn't as though manufacturers of software have exercised
|
|||
|
sufficient of the legally mandate "prudent man" behaviors when it comes to
|
|||
|
generating or safeguarding data and code. Almost adult children regularly
|
|||
|
access sensitive information in computers all over this country at will.
|
|||
|
Care to draw a conclusion regarding efforts by the industry to protect their
|
|||
|
information? There is a well known and established "attractive nuisance"
|
|||
|
consideration in liability actions. Culpability is thus shared by the
|
|||
|
careless. Historically courts have forgiven criminal trespass of juveniles
|
|||
|
and sustained lawsuits and judgments against those who are careless with
|
|||
|
things known to attract the juvenile mind. In all states it is a violation
|
|||
|
of the law to leave ones keys in the ignition of an automobile. In some
|
|||
|
states this provision is actually enforced with fines levied against
|
|||
|
offenders.
|
|||
|
|
|||
|
> By the comments Len made in the code, he certainly knew what he was
|
|||
|
> doing, and he knew how the code was likely to be used: certainly not
|
|||
|
> as a security aid. As somebody with claimed expertise in Unix as a
|
|||
|
> consultant, he surely knew the consequences of distributing this
|
|||
|
> patched code.
|
|||
|
|
|||
|
I don't give a nit. You and I and anyone familiar with system administration
|
|||
|
knows that it only takes moments to install a trap door if a reasonably
|
|||
|
knowledgeable individual has access to root privileges. This permits
|
|||
|
subsequent iterations of improvement, usually equally undetected. It doesn't
|
|||
|
take a Len_Rose_Modified_Code to achieve such goals. The self-evident
|
|||
|
question which arises out of reviewing the court documents relating
|
|||
|
to Len Rose is simply "why did they prosecute him?" Reading it all and
|
|||
|
understanding most of it, I still raise the question.
|
|||
|
|
|||
|
Other than an insult to AT&T's sensitivities, I don't understand all the
|
|||
|
hoopla associated with a relatively uninspired piece of what might best be
|
|||
|
called 'theftware.' It actually has about as much value in real terms as any
|
|||
|
other trophy. It has to do with the memory of acquisition. The swordfish on
|
|||
|
the wall it is hardly tradable, being of no worth to anyone other than the
|
|||
|
individual who worked to acquire it.
|
|||
|
|
|||
|
I'm not responding to the balance of your "Len Rose is an idiot and a
|
|||
|
criminal" tirade. You obviously do lack sufficient information to make the
|
|||
|
caliber of judgments you've attempted. It would be interesting to know what
|
|||
|
your reactions might be were to suddenly be privy to, at the very least, *all*
|
|||
|
those documents which constitute the complete court record to date. They are
|
|||
|
court records, and available. Would you undertake writing a computer related
|
|||
|
article, perhaps about an operating system, with as little to back up your
|
|||
|
opinions as you have regarding computer crimes?
|
|||
|
|
|||
|
Please note that my position in writing this article is not to support Len's
|
|||
|
cause to the exclusion of harsh realities. My interest in undertaking this
|
|||
|
discussion is directed towards promoting understanding of the irrationality of
|
|||
|
governmental behavior in this period of relative conservatism. I believe the
|
|||
|
pendulum is newly swung too far.
|
|||
|
|
|||
|
Gene, none of the issues you've been so freely spouting off about are as
|
|||
|
simple and straightforward as you imply. There are basically two levels of
|
|||
|
publicly available information. The first is press releases by law enforcement
|
|||
|
personnel, the second is the somewhat more complete court record. I really
|
|||
|
shouldn't have to point out that press releases by law enforcement have
|
|||
|
historically been highly skewed. Anyone can go back to some case or another
|
|||
|
which had a press release by the prosecutor, and then read what eventually
|
|||
|
transpired in court. Even if the individual discussed was guilty, there is
|
|||
|
invariably a wide gap between the realities of the case and the publicity
|
|||
|
statements made by prosecutors. And if one has the chance to interview those
|
|||
|
who were directly involved in the case (on both sides,) the conclusions tend
|
|||
|
to deviate even further from the understandings promulgated by the press
|
|||
|
releases originally issued by the prosecution.
|
|||
|
|
|||
|
I have many reservations about the way the prosecutions have been run,
|
|||
|
evidence handled, and the incestuous relationships between plaintiff,
|
|||
|
prosecutor, and expert witness. What, for example, isn't readily apparent
|
|||
|
in the published and court records in the Naperville case is the simple fact
|
|||
|
that that Interactive office might just as well be a department of the labs
|
|||
|
across the street. This is the old Lachman Associates, captive contractor to
|
|||
|
the labs. The very building occupied by Interactive is owned by Bell Labs,
|
|||
|
Murray Hill. I didn't know that till I visited the Du Page County Tax
|
|||
|
Collector's office (on a hunch.) The lab's grounds crews cross the street to
|
|||
|
mow the lawns. Therefore the plaintiff is AT&T. Every witness, including
|
|||
|
those expected to provide expert testimony on behalf of the government, are
|
|||
|
AT&T dependents for their livelihood. Sort of like getting into a dispute
|
|||
|
with a merchant in a town where you are the only outsider, and everyone else
|
|||
|
involved has a familial relationship.
|
|||
|
|
|||
|
But let's look even a bit deeper. Len was hired at Interactive to be on
|
|||
|
assignment across the street at the labs. Not only that, but he was
|
|||
|
interviewed at the labs by lab personnel. He was hired and started work on a
|
|||
|
Monday morning. Len was terminated on Friday morning. Friday afternoon, a man
|
|||
|
we all have heard about and a seemingly wannabe Telco employee, Tim Foley of
|
|||
|
the US Secret Service, arrived at at Len's apartment to question him and read
|
|||
|
him a Miranda warning. On Monday, local authorities (the Naperville Police
|
|||
|
Department with Foley's assistance) had secured a search warrant and an
|
|||
|
arrest warrant. One of these days I'm going to ask the question why the motion
|
|||
|
requesting AT&T assistance on the raid to search Len's Naperville apartment
|
|||
|
was approved by a judge but was undated. It COULD be pure oversight, but
|
|||
|
given the context of the rest of the story, everything has become highly
|
|||
|
suspect. At best, it was a very very bad procedural error.
|
|||
|
|
|||
|
Len was incarcerated on $ 50,000 bond. Interesting fact in itself, as the
|
|||
|
bond level for most local violent crimes is only about $ 10,000, to which bond
|
|||
|
was reduced on request by Len's attorney a week later. Vengeance by a
|
|||
|
prosecutor effectively under AT&T control, perhaps????
|
|||
|
|
|||
|
> I share a concern of many computer professionals about the application
|
|||
|
> of law to computing, and the possible erosion of our freedoms.
|
|||
|
> However, I also have a concern about the people who are attempting to
|
|||
|
> abuse the electronic frontier and who are contributing to the decline
|
|||
|
> in our freedoms.
|
|||
|
|
|||
|
Thus far, it seems most computer laws have been written at the behest of
|
|||
|
special interests instead of the public interest. The laws already inflict
|
|||
|
restrictions contrary to generally understood and accepted constitutional
|
|||
|
provisions. It seems that at every turn where a serious conflict has taken
|
|||
|
place and law enforcement became involved, the government has taken every
|
|||
|
possible action to prevent the constitutional challenges which are important
|
|||
|
to reforming and refining societal understandings of these issues.
|
|||
|
|
|||
|
> Trying to defend the abusers is likely to result in a loss of
|
|||
|
> sympathy for the calls to protect the innocent, too.
|
|||
|
|
|||
|
I cannot understand how anyone can make such a statement with a straight
|
|||
|
face. It is essential to our system of justice that even (especially)
|
|||
|
the obviously guilty get a good defense. If I were witness to my father's
|
|||
|
murder, I would demand the killer have a good defense team in spite of the
|
|||
|
fact I would do all in my power to see the person convicted.
|
|||
|
|
|||
|
Our system of justice is far from perfect, but it sure beats the dickens
|
|||
|
out of whatever might be considered second best. We're not going to be
|
|||
|
able to maintain our relative fairness is we go about spiffing down the
|
|||
|
defense to suit someone's set of prejudices. I am glad the American Nazi
|
|||
|
Party has the right to march in Skokie, in spite of the fact I detest their
|
|||
|
platform. So long as the worse of my enemies is treated fairly, there's a
|
|||
|
chance I too will receive fair treatment.
|
|||
|
|
|||
|
> However, I certainly do not want to ask people to rally around
|
|||
|
> the cases of Robert Morris or Len Rose as examples of government
|
|||
|
> excess, because I don't think they were, and neither would a
|
|||
|
> significant number of reasonable people who examine the cases.
|
|||
|
|
|||
|
I wonder if, upon reading the court documents in the Maryland case for Len
|
|||
|
Rose, you would consider the motions filed by Carlos M. Recio on May 21, 1990
|
|||
|
to be a reasonable understanding of the excesses exercised by the government.
|
|||
|
|
|||
|
Recio studied the case at that time and prepared, as Len's attorney, a
|
|||
|
voicing of serious concerns regarding the validity of the search warrant
|
|||
|
obtained by Foley et troupe. In fact, they exercised what we know as a
|
|||
|
'general warrant.'
|
|||
|
|
|||
|
"They seized Len Rose's Army medals from the master bedroom which were
|
|||
|
contained in a chest of drawers." It is clear they knew this seizure, as page
|
|||
|
3 of the inventory spells out "Bag w/ Misc Papers + Army Commendation Medals."
|
|||
|
Thus, it was no oversight or accident.
|
|||
|
|
|||
|
Recio continues:
|
|||
|
|
|||
|
"The SS searched through the Rose family photo albums, removing a picture of
|
|||
|
Len Rose and several photographs of computer equipment that he had taken for
|
|||
|
insurance purposes."
|
|||
|
|
|||
|
More evidence????? More excess?
|
|||
|
|
|||
|
"The SS seized the Rose family's files (mortgage, loans, credit card bills,
|
|||
|
army records, marriage paperwork, diplomas, resumes', etc.)."
|
|||
|
|
|||
|
I can see it now. Len's marriage paperwork was potentially additional evidence
|
|||
|
of criminality. Mortgage papers, more criminality....and so on with diplomas
|
|||
|
and army records.
|
|||
|
|
|||
|
Please bear in mind that the basis for requesting a search warrant was to
|
|||
|
determine whether or not Len Rose was indeed the individual known as
|
|||
|
"terminus" and that he was indeed the individual who had transmitted the
|
|||
|
login.c program to Neidorf. That was the crime for which the government
|
|||
|
was seeking evidence. What is very clear in the record is that the government
|
|||
|
did in fact embark on a witch hunt, overtly seizing all sorts of things totally
|
|||
|
unrelated to their case, as in the colonial examples of general warrants,
|
|||
|
attempting to build prosecutable offenses out of thin air.
|
|||
|
|
|||
|
It then became not "in the ordinary course" of an investigation that other
|
|||
|
issues surfaced, but as a direct result of the violation by the government
|
|||
|
of the very laws they are sworn to uphold.
|
|||
|
|
|||
|
The usual course for charges originating on such a basis is dismissal, because
|
|||
|
it is not in the best interest of the citizens or the state to reward law
|
|||
|
enforcement officers for violating the rights of the citizens in order to
|
|||
|
build a case for prosecution. In scientific rationale, evolutionary aspects
|
|||
|
eventually will soon resolve the issues. Law enforcement will learn to keep
|
|||
|
within guidelines while improving their conviction statistics, and if the
|
|||
|
criminal escape this time, and he repeats, it is likely he will be caught
|
|||
|
and better prosecuted in the next instance (by that recently improved law
|
|||
|
enforcement.) And if the criminal reforms as a result of the close call, of
|
|||
|
what benefit is incarceration or punishment?
|
|||
|
|
|||
|
Excessive? Actually yes, Gene, it was quite excessive. Now, to substantiate
|
|||
|
your claim, go find yourself a "significant" sized group of individuals
|
|||
|
prepared to take the time to seriously examine the Rose case, and when they're
|
|||
|
done, let's then compare results. In the meantime, if you really believe the
|
|||
|
case is important enough to elicit your commentary, read the documents proper
|
|||
|
and stop with reliance on second or third hand information.
|
|||
|
|
|||
|
Twice now, regarding the resultants of the E-911 case you've been long on
|
|||
|
assumptions, short on proof. Twice now, regarding the resultants of the E-911
|
|||
|
case you've been long on promises, short on results. Given this history, I
|
|||
|
ask, would a "responsible" man now seek truth and publish it, or retire
|
|||
|
from this discussion.
|
|||
|
|
|||
|
This article isn't so much a defense of Len Rose as it is an indictment of the
|
|||
|
prosecutions. I also feel it is necessary to point out in no uncertain terms
|
|||
|
that those who support law enforcement blindly do themselves and their
|
|||
|
community a disservice. There is little doubt that many well intentioned
|
|||
|
individuals serve us well in careers supporting the justice system. There
|
|||
|
has been movement by all branches at the federal level of law enforcement to
|
|||
|
assume guilt before investigation and to trample rights freely utilizing the
|
|||
|
immunity originally granted in order to protect officers making honest mistakes
|
|||
|
as a standard operating procedure instead of an exceptional circumstance.
|
|||
|
|
|||
|
The complaints on the net have, for the most part, been related to our own
|
|||
|
back yard. Computers are the baby here. Yet overall we see the same sorts
|
|||
|
of problems creeping into the justice system everywhere. Historically we have
|
|||
|
written our laws in such ways as to empower law enforcement personnel to
|
|||
|
capture criminals and bring them to trial while limiting offense to the
|
|||
|
sensibilities of the general population. The diverse thresholds of offense we
|
|||
|
have regarding police actions are based on our niche in society. Because I
|
|||
|
have become more concerned regarding police officers questioning long haired
|
|||
|
men at roadside, spread eagled against a rattletrap of a car, doesn't imply
|
|||
|
that my niche has changed. It does show that along with many others the level
|
|||
|
at which I take offense has changed with the incursion of similar tactics by
|
|||
|
police into the middle class middle aged community, the community to which I
|
|||
|
belong. The activities of this community haven't changed. The actions taken by
|
|||
|
the police have. We note, sadly, that finding or creating of "probable cause"
|
|||
|
is used to bring my neighbors personal and financial grief.
|
|||
|
|
|||
|
So beware, Gene Spafford. The past immunities offered by class and perhaps
|
|||
|
occupation are doing nothing for us these days. Nor is it enough to be
|
|||
|
squeaky clean. Nor is it enough to have the general appearance of being
|
|||
|
squeaky clean. You are now required to preemptively make every law
|
|||
|
enforcement officer whose path you cross believe you are squeaky clean. If you
|
|||
|
fail, you won't go to jail (probably) nor will you be fined (probably.) But it
|
|||
|
can cost a lot of money in legal defense to keep oneself out of jail and
|
|||
|
to maintain a void criminal record.
|
|||
|
|
|||
|
Bill Vajk
|
|||
|
|
|||
|
********************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
**END OF CuD #3.22**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|