778 lines
37 KiB
Plaintext
778 lines
37 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Sun May 10, 1992 Volume 4 : Issue 21
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Associate Editor: Etaion Shrdlu, Jr.
|
|||
|
Arcmeisters: Brendan Kehoe and Bob Kusumoto
|
|||
|
|
|||
|
CONTENTS, #4.21 (May 10, 1992)
|
|||
|
File 1--Police PR meets style v. substance
|
|||
|
File 2--BloomBecker's 5 points for crime policy
|
|||
|
File 3--The Forgotten Victims of the "Bill Cook" Raids
|
|||
|
File 4--A Forgotten Victim of the 1990 Raids
|
|||
|
File 5--Pay Craig's Legal Fees For 29 Cents?
|
|||
|
File 6--Online Debate Article
|
|||
|
File 7--Two Cornell Students Indicted in Virus Case
|
|||
|
|
|||
|
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
|||
|
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
|||
|
and DL0 and DL12 of TELECOM, on Genie in the PF*NPC RT libraries, on
|
|||
|
the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from
|
|||
|
ftp.eff.org (192.88.144.4), chsun1.spc.uchicago.edu, and
|
|||
|
ftp.ee.mu.oz.au. To use the U. of Chicago email server, send mail
|
|||
|
with the subject "help" (without the quotes) to
|
|||
|
archive-server@chsun1.spc.uchicago.edu. European distributor: ComNet
|
|||
|
in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source
|
|||
|
is cited. Some authors do copyright their material, and they should
|
|||
|
be contacted for reprint permission. It is assumed that non-personal
|
|||
|
mail to the moderators may be reprinted unless otherwise specified.
|
|||
|
Readers are encouraged to submit reasoned articles relating to
|
|||
|
computer culture and communication. Articles are preferred to short
|
|||
|
responses. Please avoid quoting previous posts unless absolutely
|
|||
|
necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Sat, 2 May 1992 18:18 CDT
|
|||
|
From: <BOEHLEFELD@WISCSSC.BITNET>
|
|||
|
Subject: File 1-- Police PR meets style v. substance
|
|||
|
|
|||
|
A late response, but regarding the discussion of the Fresno police
|
|||
|
press release (discussed in Cu Digest, #4.18):
|
|||
|
|
|||
|
I don't have a scientific sample, but I've looked at information from
|
|||
|
a variety of police/law enforcement agencies for several years as
|
|||
|
a journalist. I have only known one PIO who has had journalism
|
|||
|
training before entering law enforcement, and her time on the PIO
|
|||
|
desk was limited. Many of the releases I saw over the years included
|
|||
|
misspellings, grammatical and other errors. (So, too, did many of
|
|||
|
the police reports I have looked at over the years.) I have seen
|
|||
|
similar releases about LSD being circulated on stickers with cartoon
|
|||
|
characters, and about 'unsavory strangers' lurking in communities.
|
|||
|
|
|||
|
The sensationalism of the writing concerned me far more than the
|
|||
|
minor details of spelling or apparent lack of letterhead. I have
|
|||
|
a computer, I have a modem, I have children and I have an acquaintance
|
|||
|
who claims to run an x-rated bbs. I also manage to keep these elements
|
|||
|
of my life separated. But, if we acknowledge that the computer literacy
|
|||
|
of various members of our society ranges from none to much, and that
|
|||
|
many of us, likely, fall somewhere in between, I'm afraid hype of
|
|||
|
the kind this press release generates will not do much in ensuring
|
|||
|
that the potential benefits of personal electronic media will accrue
|
|||
|
to all of us. It seems fear tactics generate fear, not understanding.
|
|||
|
Sensationalism is not produced by 'the media' alone.
|
|||
|
|
|||
|
I think your response, which included reports of conversations
|
|||
|
you apparently had with Fresno police personnel, put the actual
|
|||
|
event in better perspective.
|
|||
|
|
|||
|
I'm not suggesting that every police department needs to hire a
|
|||
|
public relations specialist (though friends in PR probably would),
|
|||
|
but each of us who writes for public consumption would do well to
|
|||
|
consider how we get attention for an issue we believe is important.
|
|||
|
(The other recent post about preparing material for posting had
|
|||
|
some good advice.)
|
|||
|
|
|||
|
In other words: If you want to be believed, keep it simple. Keep
|
|||
|
it straight.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 4 May 1992 8:50:01 GMT
|
|||
|
From: NEELY_MP@DARWIN.NTU.EDU.AU(Mark P. Neely, Northern Territory
|
|||
|
Subject: File 2--BloomBecker's 5 points for crime policy
|
|||
|
|
|||
|
In response to: CuD 4.14 BloomBecker's Legal Guidelines at CV&SC Conference
|
|||
|
|
|||
|
BloomBecker's 5 points for a nationwide set of legal guidelines for
|
|||
|
computer crime are fundamentally flawed!
|
|||
|
|
|||
|
> 1. The creation of a $200 crime law deductible. Damages incurred below
|
|||
|
> that figure would not be the subject of criminal action.
|
|||
|
|
|||
|
"Damages" would presumably include the $$$ spent in wages for someone
|
|||
|
to inspect the system for maliciously inserted code. It would not be
|
|||
|
hard at all to run up a wages bill in excess of $200 in doing so.
|
|||
|
Ergo, _all_ computer intrusions would be the subject of criminal
|
|||
|
action.
|
|||
|
|
|||
|
One alternative is to set a realistically higher damages threshold for
|
|||
|
criminal proceedings, and allow the "victim" to seek a civil remedy
|
|||
|
against the alleged intruder.
|
|||
|
|
|||
|
> 2. The creation of a civil course of action for inadequate computer
|
|||
|
> security
|
|||
|
|
|||
|
This sounds, at first sight, quite fair. For instance, here in Darwin
|
|||
|
Australia, I can be given a ticket for failing to lock my car doors!
|
|||
|
This measure was introduced in an effort to raise public awareness of
|
|||
|
escalating car thefts, and to promote public responsibility for
|
|||
|
prevention (which is always better than any cure :)
|
|||
|
|
|||
|
But it is difficult to see how such a measure can be justly applied to
|
|||
|
computer security. My primary problem is the phrase "inadequate
|
|||
|
computer security". Locking my car door takes a bit of forethought
|
|||
|
and a second or two upon my exiting the vehicle. "Locking" a computer
|
|||
|
system would require considerable administration time and money.
|
|||
|
|
|||
|
I would also assume that the "inadequacy" of the security is to be
|
|||
|
measured in light of the data/system to be protected? Is the civil
|
|||
|
penalty to be applied to government and quasi-government systems?
|
|||
|
|
|||
|
Are personal computer operators/ BBS SysOps to be made subject to such
|
|||
|
a requirement?
|
|||
|
|
|||
|
> 3. The making of reckless computing a felony. "Reckless computing" is
|
|||
|
> classified as anything which could potentially cause damage.
|
|||
|
|
|||
|
Weird... Ctrl-C'ing at the right time could "potentially cause damage"
|
|||
|
by crashing the host machine. Causing a conflict of 2 TSR's at your
|
|||
|
end (thereby causing your machine to lock up) necessitating a reboot
|
|||
|
(and hence dropping the connection) could "potentially cause damage"
|
|||
|
to the host system.
|
|||
|
|
|||
|
Sorry..."reckless" as opposed to "intentional" conduct should NOT be
|
|||
|
the subject of criminal actions unless there is good grounds for doing
|
|||
|
so.
|
|||
|
|
|||
|
Recklessness in, for example, the area of driving a motor vehicle may
|
|||
|
justifiably be the subject of legal sanctions - but only because of
|
|||
|
the danger to life that it causes. I don't think there is an analogous
|
|||
|
justification in the area of computer misuse!
|
|||
|
|
|||
|
> 4. The making a careless computing a misdemeanor.
|
|||
|
|
|||
|
How do you distinguish "careless" and "reckless"? Does not "careless"
|
|||
|
computing have "the potential to cause damage"?
|
|||
|
|
|||
|
> 5. The enactment of greater protection against unreasonable search and
|
|||
|
> seizure.
|
|||
|
|
|||
|
Now that is something I would support.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 3 May 92 23:45 CDT
|
|||
|
From: uucp@DOGFACE.AUSTIN.TX.US
|
|||
|
Subject: File 3--The Forgotten Victims of the "Bill Cook" Raids
|
|||
|
|
|||
|
A little over two years ago, there was much in Texas that caught the
|
|||
|
interest of law enforcement personnel concentrating on computer crime.
|
|||
|
Two investigations in other parts of the country focused attention on
|
|||
|
individuals in the Austin and Dallas areas, the most well-known of
|
|||
|
whom is Steve Jackson, the owner of an Austin-based game publishing
|
|||
|
company.
|
|||
|
|
|||
|
In July of 1989, Secret Service agents were examining electronic mail
|
|||
|
records of a privately-owned computer system in Illinois owned by Rich
|
|||
|
Andrews. Those records, which contained the computer equivalent of a
|
|||
|
list of all mail sent through a particular post office, showed that a
|
|||
|
copy of a newsletter called "Phrack" had been sent to Loyd
|
|||
|
Blankenship, the managing editor at Steve Jackson Games, Loyd
|
|||
|
Blankenship, in late February of 1989. It had also been sent to
|
|||
|
thousands of others, but none of them were working on a book that, the
|
|||
|
Secret Service agents felt, romanticized computer crime.
|
|||
|
|
|||
|
The editor of the Phrack newsletter, a pre-law student at the
|
|||
|
University of Missouri/Columbia by the name of Craig Neidorf, made the
|
|||
|
activities of the telephone underground the focus of his publication.
|
|||
|
He gave space to individuals fascinated with the telephones in their
|
|||
|
lives, and with the technology that connected them. As phone company
|
|||
|
technology grew to depend upon computers, so did those who read the
|
|||
|
Bell Labs technical journals as if they were the sports page. The
|
|||
|
pages of Phrack came to include technical discussions of computer
|
|||
|
security issues.
|
|||
|
|
|||
|
Mr. Neidorf, thought the Illinois Secret Service and the Illinois U.S.
|
|||
|
Attorney-General's office, was up to no good. There was no difference
|
|||
|
in their minds between writing about the computer underground and
|
|||
|
participating in it. In the last days of January, 1990, Secret
|
|||
|
Service agent Timothy Foley conducted a formal interview with Mr.
|
|||
|
Neidorf in his college frat house. According to an affidavit sworn to
|
|||
|
by Agent Foley, the two discussed the author of an article in Phrack
|
|||
|
that contained a modified version of an element from an AT&T computer
|
|||
|
operating system. The article was penned (under a pseudonym) by
|
|||
|
Leonard Rose, Jr., a computer consultant who lived in Maryland at the
|
|||
|
time, the affidavit said.
|
|||
|
|
|||
|
Mr. Rose was not unknown to computer professionals and enthusiasts in
|
|||
|
Texas and around the country. His electronic mail and telephone
|
|||
|
records were enough to shift the Secret Service's interest to Texas.
|
|||
|
What follows is an informal chronology of the events between January
|
|||
|
of 1990 and today. It is incomplete, partly out of consideration for
|
|||
|
the wishes and privacy of some of the people with whom I spoke, and
|
|||
|
partly because of the troubled calm that people have felt after the
|
|||
|
departure of the current masters of Operation SunDevil.
|
|||
|
|
|||
|
1/90: Bell Communications Research security manager Henry M.
|
|||
|
Kluepfel dials into Loyd Blankenship's home BBS, the Phoenix
|
|||
|
Project, under his real name. By mid-February, he has seen
|
|||
|
and read an issue of Phrack on the system, copied a list of
|
|||
|
the system's users who might have read the newsletter, and
|
|||
|
called the Secret Service. According to Agent Foley's
|
|||
|
affidavits, what Kluepfel saw there was a threat to the
|
|||
|
business of Kluepfel's employer and other telephone
|
|||
|
companies.
|
|||
|
|
|||
|
2/90: Search warrants are given for the residences of Bob Izenberg
|
|||
|
(2/20), Loyd Blankenship (2/28) and Chris Goggans (2/28),
|
|||
|
and at the office of Steve Jackson Games (2/28). The SJG
|
|||
|
warrant is unsigned; the other warrants are signed by U.S.
|
|||
|
Magistrate Stephen H. Capelle on the day that they're
|
|||
|
served. Although the warrant specifies that only computer
|
|||
|
equipment and media may be seized as evidence, Secret
|
|||
|
Service interest goes farther afield. Several videotapes of
|
|||
|
public access programs are seized from one residence. Three
|
|||
|
hours after the raid at another, Secret Service agents have
|
|||
|
called Austin computer store owner Rick Wallingford at home,
|
|||
|
to verify that he sold a pinball machine to one of the
|
|||
|
warrant subjects. Prior to executing the warrants, Secret
|
|||
|
Service agents have gone to security personnel at the
|
|||
|
University of Texas to discuss the individuals, and to
|
|||
|
obtain driver's license information and physical
|
|||
|
descriptions. A subpoena is served at the University to
|
|||
|
obtain access to Chris Goggans' computer records. Public
|
|||
|
access computers attctc/killer (run by AT&T) and
|
|||
|
elephant/puzzle (run by Izenberg) cease operation. The
|
|||
|
former, which Secret Service agents claimed to have run "to
|
|||
|
monitor the hacker community" was closed by AT&T order. The
|
|||
|
latter was closed when the machine was seized under warrant.
|
|||
|
The Steve Jackson Games "Illuminati" BBS goes down when it
|
|||
|
is seized as evidence.
|
|||
|
|
|||
|
3/90: Semi-public access computer rpp386, in service since
|
|||
|
September of 1987, drops most user accounts and connections
|
|||
|
to other computers. Said its owner, John Haugh, "The
|
|||
|
investigation with SunDevil was starting to get too close.
|
|||
|
I knew Bill Kennedy, Bob Izenberg and Charlie Boykin. It
|
|||
|
seemed reasonable that my system would come under
|
|||
|
investigation." It didn't, and Mr. Haugh said that he has
|
|||
|
never been contacted by any law enforcement officials with
|
|||
|
regards to these matters.
|
|||
|
|
|||
|
4/90: Newsweek article "The Hacker Dragnet" by John Schwartz
|
|||
|
discusses the Steve Jackson Games raid, among other issues.
|
|||
|
|
|||
|
6/90: Steve Jackson is told by the Secret Service that his seized
|
|||
|
property can be picked up. Some of it is damaged, and one
|
|||
|
hard disk, some hardware and assorted papers are not
|
|||
|
returned.
|
|||
|
|
|||
|
9/90: Houston Chronicle article "War on Computer Crime Waged With
|
|||
|
Search, Seizure" by Joe Abernathy discusses Steve Jackson
|
|||
|
Games and Operation SunDevil. Agent Foley, on the phone in
|
|||
|
Chicago, refuses return of property seized from Izenberg
|
|||
|
residence.
|
|||
|
|
|||
|
1/91: Bill Kennedy gets a phone call from the Secret Service about
|
|||
|
his knowledge of Len Rose. He is told that he's not under
|
|||
|
investigation, and the Baltimore, Maryland Federal
|
|||
|
prosecutor confirms this.
|
|||
|
|
|||
|
4/91: Byte magazine columnist Jerry Pournelle gives his
|
|||
|
hall-of-shame "Onion of the Year" award to Agent Foley,
|
|||
|
saying, "Mr. Foley's actions in Austin, Texas, regarding
|
|||
|
Steve Jackson Games not only exceeded his authority, but
|
|||
|
weren't even half competently done."
|
|||
|
|
|||
|
5/91: Steve Jackson Games and the Electronic Frontiers Foundation
|
|||
|
file a civil suit against the Secret Service agents,
|
|||
|
Bellcore technical personnel and others for damages.
|
|||
|
|
|||
|
9/91: U.S. Magistrate Capelle grants Izenberg's motion to unseal
|
|||
|
the affidavit in support of search warrant filed by Agent
|
|||
|
Foley on behalf of the Secret Service.
|
|||
|
|
|||
|
Now: The Steve Jackson Games suit presumably continues. The
|
|||
|
Secret Service claims, in court documents, that all
|
|||
|
investigations which have not resulted in indictments are
|
|||
|
still in progress.
|
|||
|
|
|||
|
|
|||
|
WHO'S WHO
|
|||
|
|
|||
|
LOYD BLANKENSHIP: (aka The Mentor): Handed unsigned search warrant in
|
|||
|
Austin, TX on 3/1/90, pursuant to which the feds seized $10K of
|
|||
|
computer equipment. To this date, none of the equipment has been
|
|||
|
returned, and no charges or indictments have been made. Still works
|
|||
|
for Steve Jackson Games (who is in the middle of suing the government
|
|||
|
thanks to the EFF!). Now runs a usenet node out of his house
|
|||
|
(loydb@fnordbox.uucp).
|
|||
|
|
|||
|
CHRIS GOGGANS: Former employee of Steve Jackson Games. Unavailable
|
|||
|
for comment.
|
|||
|
|
|||
|
JOHN HAUGH: Computer consultant in Austin, TX. Owner/operator of
|
|||
|
rpp386 semi-public computer system. On computer
|
|||
|
criminals: "These are the people that are making it
|
|||
|
hard for us...Forcing the government to be
|
|||
|
investigating people in the first place."
|
|||
|
|
|||
|
BOB IZENBERG: Former operator of public access Unix site "elephant".
|
|||
|
Handed search warrant in Austin, TX on 2/20/90. U.S.
|
|||
|
inventory of seized property: minimum $34,000, give or take
|
|||
|
a $900 hammer. Court motion to unseal affidavit for search
|
|||
|
warrant granted early 9/91. No charges or indictments.
|
|||
|
Property not returned, pursuant to "ongoing investigation."
|
|||
|
Runs public access usenet site "dogface" at home.
|
|||
|
|
|||
|
BILL KENNEDY: Computer consultant in Pipe Creek, TX. Contacted by
|
|||
|
Secret Service agents over the phone at a friend's home. (It is a
|
|||
|
subject for speculation how it was known that he was at this
|
|||
|
particular friend's house. Monitoring of phone activity at Kennedy's
|
|||
|
home might have given this information.) During the half hour
|
|||
|
conversation, he was told that he was not under investigation, and was
|
|||
|
asked about his association with other individuals under scrutiny. A
|
|||
|
copy of a note which stated that he was not under investigation was
|
|||
|
faxed to him. Subsequent phone conversation with the Baltimore
|
|||
|
Federal prosecutor confirmed this. After Len Rose pled guilty,
|
|||
|
Kennedy was told that he would be flown to Baltimore to testify, but
|
|||
|
never was called upon to do so. He called the Baltimore Federal
|
|||
|
prosecutor back at this point and was told that they "were through
|
|||
|
with him." Of the investigation,
|
|||
|
and of former Chicago prosecutor William Cook, Kennedy said, "They may
|
|||
|
not have had enough live sacrifices to suit them... Cook was on a
|
|||
|
witch hunt: If they didn't have anything, they'd make some."
|
|||
|
|
|||
|
As mentioned earlier, there are names and events left unmentioned at
|
|||
|
individual request. It is difficult to convey the frustration, anger
|
|||
|
at various individuals, and desire to put it all behind that the named
|
|||
|
and un-named individuals with whom I spoke have expressed. As one
|
|||
|
said, "The emotional toll was pretty steep." But, hey, aren't we all
|
|||
|
safer? Wasn't it all worth it?
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 2 May, 1992 21:19:04 CDT
|
|||
|
From: anonymous@unixville.edu
|
|||
|
Subject: File 4--A Forgotten Victim of the 1990 Raids
|
|||
|
|
|||
|
One victim of the January, 1990 raids, has preferred to remain out of
|
|||
|
the public eye and has successfully kept a low profile. We'll call
|
|||
|
him "Joe." Joe ran Jolnet, a Unix public access BBS in Lockport,
|
|||
|
Illinois, about 30 miles southwest of Chicago across the river from
|
|||
|
Joliet. Joe reportedly discovered files on his system containing E911
|
|||
|
information purloined from BellSouth's computers by Legion of Doom
|
|||
|
member Robert Riggs (who used the handle "Robert Johnson"). Joe
|
|||
|
reported their existence to whom he believed to be the proper telecom
|
|||
|
authorities, which included providing access to Jolnet for Bellcore's
|
|||
|
Henry Kluepfel. They took no immediate action. Joe cooperated with
|
|||
|
the authorities, but ultimately had his equipment confiscated anyway.
|
|||
|
|
|||
|
The files Riggs obtained were related to BellSouth's E911 system, and
|
|||
|
from Jolnet he sent parts of them to others. Since 1988, the Secret
|
|||
|
Service had been investigating "computer intrusions," particularly a
|
|||
|
few Legion of Doom members. The arrest and indictment of Riggs led
|
|||
|
them to Craig Neidorf, who published a portion of the edited E911
|
|||
|
maintenance files in Phrack 24 under the sig of "The Eavesdropper." In
|
|||
|
January 18, 1990, The Secret Service and security personnel from
|
|||
|
Southwestern Bell and Bellcore found the Phrack file and a password
|
|||
|
cracking program called login.c among Craig Neidorf's posessions. They
|
|||
|
traced the login.c program back to Len Rose, and on February 1, 1990,
|
|||
|
they searched his premises in Maryland, where they found unauthorized
|
|||
|
Unix sourcecode in his possession. Not realizing how ballistic the
|
|||
|
Secret Service and AT&T would go over possession of unlicensed
|
|||
|
software, and threatened with major felony charges of transporting
|
|||
|
stolen property across state lines (18 USC 2314) and wire fraud (18
|
|||
|
USC 1030(a)(6), Len indicated that he sent a copy of the program to
|
|||
|
Joe.
|
|||
|
|
|||
|
The next day (February 2), Secret Service Special Agent Barbara Golden
|
|||
|
obtained a warrant to search Joe's house under 18 USC 2314 and 18 USC
|
|||
|
1030(a)(6). They would look for disks, documents, and anything else
|
|||
|
that seemed computer-related. Secret Service agents and various
|
|||
|
security officials wasted little time in trooping out to Joe's brown
|
|||
|
ranch house with the yellow trim. On February 3, they struck. Marty
|
|||
|
Flynn of AT&T Corporate Information Security valued the software Joe
|
|||
|
was suspected to have (which included UNIX SVR 3.1 and 3.2, and
|
|||
|
Starland 3.0 Network Software) at over $250,000. Flynn checked AT&T
|
|||
|
records and informed the agents that Joe held only a limited $100
|
|||
|
"Tool Chest" agreement. Joe's previous cooperation with Kluepfel for
|
|||
|
over a year was forgotten. Joe was raided and he lost much of his
|
|||
|
equipment, even though he was never indicted.
|
|||
|
|
|||
|
Joe's fall from grace--from cooperative citizen to victim--was another
|
|||
|
in the list of disrupted lives caused by the Secret Service and
|
|||
|
others. Those who were indicted paid a heavy price, but the
|
|||
|
victimization of those who are unindicted must not be forgotten.
|
|||
|
|
|||
|
The Players:
|
|||
|
|
|||
|
Joe, at last report, was employed, relatively happy, and just wanted
|
|||
|
to be left alone. He still did not have his equipment returned, and
|
|||
|
was not trying to get it.
|
|||
|
|
|||
|
Craig Neidorf has graduated from the University of Missouri and plans
|
|||
|
to go to law school.
|
|||
|
|
|||
|
Len Rose is completing the last few weeks of a one-year sentence in a
|
|||
|
community release center in Chicago.
|
|||
|
|
|||
|
Robert Riggs was released from prison in 1991 and periodically appears
|
|||
|
at conferences.
|
|||
|
|
|||
|
Henry Kluepfel, former Assistant U.S. Attorney William J. Cook, and
|
|||
|
Secret Service Special Agents Timothy Foley and Barbara Golden are
|
|||
|
defendants in a civil sought brought against them for reckless
|
|||
|
behavior in the subsequent raid on Steve Jackson Games.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 8 May 1992 15:27:50 -0500
|
|||
|
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 5--Pay Craig's Legal Fees For 29 Cents?
|
|||
|
|
|||
|
Craig Neidorf's legal fees, incurred from his defense against felony
|
|||
|
charges in the "PHRACK" case, remain high. He is paying them off
|
|||
|
bit-by-bit, but the process is slow.
|
|||
|
|
|||
|
For new readers, Craig was indicted by the U.S. Government on charges
|
|||
|
of wire fraud and theft as the result of publishing what federal
|
|||
|
prosecutor William J. Cook erroneously believed to be proprietary
|
|||
|
information. Because of the efforts of John Nagle, Sheldon Zenner
|
|||
|
(Craig's attorney) was able to show that the information published in
|
|||
|
Phrack was available in public documents for about $12.95 (see Bob
|
|||
|
Izenberg's post, above). The prosecution dropped the case even before
|
|||
|
it finished presenting it. Craig's "victory" exacted an emotional and
|
|||
|
financial toll. His legal expenses were in excess of $100,000 even
|
|||
|
after generous help from supporters.
|
|||
|
|
|||
|
Craig's case represented a landmark in the relationship of cyperspace
|
|||
|
and the law. It marked the beginning of the Electronic Frontier
|
|||
|
Foundation and Cud; it created an awareness of the need to fight for
|
|||
|
the same Constitutional protections in the electronic frontier as
|
|||
|
exist in more conventional realms; it stimulated involvement of a
|
|||
|
number of socially conscious persons from a broad spectrum of
|
|||
|
professions (e.g., Mitch Kapor, Dorothy Denning, Jim Warren, John
|
|||
|
Perry Barlow, Marc Rotenberg); it challenged (and reduced) what some
|
|||
|
saw as the abuse of power by law enforcement agents and prosecutors in
|
|||
|
pursuing "computer crime"; and it led to open public debates about
|
|||
|
over both the freedoms and the responsibilities of the new electronic
|
|||
|
world.
|
|||
|
|
|||
|
Craig was initially tempted to accept a plea-bargain. In some ways,
|
|||
|
this would have been more beneficial: He would have lower legal fees
|
|||
|
and it would not have been as disruptive to his life. He chose to
|
|||
|
fight on principle, and we have all benefited from his choice.
|
|||
|
|
|||
|
We can *ALL* help Craig for only a few minutes and a 29 cent stamp.
|
|||
|
Craig as been nominated for a Playboy Foundation award worth $5,000
|
|||
|
toward his legal fees. The award is for those who have contributed to
|
|||
|
protecting First Amendment rights, and Craig's contributions to
|
|||
|
stimulating public awareness of and action on such rights in
|
|||
|
cyberspace is undeniably significant. Here's the blurb for the award:
|
|||
|
|
|||
|
PLAYBOY FOUNDATION OPENS NOMINATIONS FOR 1992 HUGH M.
|
|||
|
HEFNER FIRST AMENDMENT AWARDS
|
|||
|
|
|||
|
"Established in 1979 by the Playboy Foundation to celebrate the
|
|||
|
25th Anniversary of Playboy Magazine, the awards program is
|
|||
|
designed to educate the public about First Amendment issues and
|
|||
|
to honor individuals who have made significant contributions to
|
|||
|
enhance and protect First Amendment rights of Americans."
|
|||
|
|
|||
|
Readers are encouraged to send a letter in support of Craig Neidorf's
|
|||
|
nomination to:
|
|||
|
|
|||
|
Jill Chukerman or Kris Farley
|
|||
|
Playboy Foundation
|
|||
|
680 North Lake Shore Drive
|
|||
|
Chicago, IL 60611
|
|||
|
|
|||
|
(312)751-8000
|
|||
|
|
|||
|
NOTE: THE DEADLINE FOR LETTERS IS MAY 22 !! The winners will be
|
|||
|
announced in September. Below is a rough draft of our own letter:
|
|||
|
|
|||
|
+++ cut here +++
|
|||
|
|
|||
|
9 May, 1992
|
|||
|
|
|||
|
|
|||
|
Jill Chukerman or Kris Farley
|
|||
|
Playboy Foundation
|
|||
|
680 North Lake Shore Drive
|
|||
|
Chicago, IL 60611
|
|||
|
|
|||
|
Dear Persons:
|
|||
|
|
|||
|
I am writing in support of Craig Neidorf's nomination for the Playboy
|
|||
|
Foundation's "Hugh M. Hefner First Amendment Award." Craig's
|
|||
|
contributions to enhance Constitutional protections of the First
|
|||
|
Amendment have been unique and substantial. At extreme personal cost,
|
|||
|
he chose to fight for a Constitutional principle he believed in, which
|
|||
|
ultimately led to an awareness by others of the need to protect the
|
|||
|
rights of electronic media.
|
|||
|
|
|||
|
While in highschool, Craig founded an electronic newsletter called
|
|||
|
PHRACK that was available to the public by means of a computer and a
|
|||
|
telephone modem. PHRACK published a variety of articles and news
|
|||
|
blurbs, authored by others, on computer culture. In 1989 (Craig was
|
|||
|
now a senior at the University of Missouri), PHRACK published a
|
|||
|
document that BellSouth (a regional Bell telephone company) asserted
|
|||
|
was "proprietary," and its publication, it argued, indicated theft and
|
|||
|
wire fraud. In early 1990, the U.S. Secret Service acted on these
|
|||
|
allegations. Craig was tried in July, 1990. The defense demonstrated
|
|||
|
that the material published in PHRACK was available to the general
|
|||
|
public for about $12.95, and the prosecution dropped the case.
|
|||
|
Although he "won," the victory disrupted his academic performance
|
|||
|
and resulted in over $100,000 in defense fees.
|
|||
|
|
|||
|
Craig could have accepted the advice of his friends, who argued that
|
|||
|
it would be both cheaper and less traumatic to accept a plea bargain
|
|||
|
than to fight his case in federal court. However, Craig recognized
|
|||
|
that there were a number of principles involved. He was especially
|
|||
|
concerned that a large corporation, aided by seemingly over-zealous
|
|||
|
law enforcement personnel, could produce a "chilling effect" on the
|
|||
|
rights to expression by intimidating and punishing those who published
|
|||
|
material it did not like. Craig chose to fight.
|
|||
|
|
|||
|
Craig's choice had substantial consequences. His case generated
|
|||
|
considerable interest among users of electronic media, and it seemed
|
|||
|
to many that Craig was being victimized unjustly for publishing in
|
|||
|
electronic form the type of material that would have been accepted in
|
|||
|
a more conventional paper format. In fighting for the principle of
|
|||
|
freedom of speech, Craig stimulated others to organize and participate
|
|||
|
in protecting and enhancing Constitutional liberties in the electronic
|
|||
|
frontier. Craig is a courageous pioneer who put principle before
|
|||
|
personal expediency. If not for his willingness to resist encroachment
|
|||
|
on First Amendment freedoms, there would not be the current interest
|
|||
|
in organizing to protect them in the electronic media.
|
|||
|
|
|||
|
Craig intends to enter law school and pursue his interest in civil
|
|||
|
liberties. His actions exemplify the spirit of the Award making him a
|
|||
|
most-deserving candidate, hope that you share the views of myself and
|
|||
|
others that he would be a worthy recipient.
|
|||
|
|
|||
|
If I can provide any further information, do not hesitate to contact
|
|||
|
me.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Sincerely,
|
|||
|
|
|||
|
Jim Thomas
|
|||
|
Professor, Sociology/Criminal Justice
|
|||
|
Northern Illinois University
|
|||
|
DeKalb, IL 60115
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 6 May 92 15:50:12 CDT
|
|||
|
From: Joe.Abernathy@HOUSTON.CHRON.COM(Joe Abernathy)
|
|||
|
Subject: File 6--Online Debate Article
|
|||
|
|
|||
|
This article appeared in the Washington report of the Sunday, May 3,
|
|||
|
Houston Chronicle. Please send feedback and further developments to
|
|||
|
Joe.Abernathy@houston.chron.com (800) 735-3820
|
|||
|
|
|||
|
Hungry candidates might share a byte
|
|||
|
Computer-based electronic communities emerge as political constituency
|
|||
|
|
|||
|
|
|||
|
By JOE ABERNATHY
|
|||
|
Copyright 1992, Houston Chronicle
|
|||
|
|
|||
|
A leading figure in computer communications is issuing a challenge
|
|||
|
this weekend for the major presidential candi dates to participate in
|
|||
|
the first national online political debate.
|
|||
|
|
|||
|
And a spokesman for at least one presidential hopeful - Democratic
|
|||
|
front-runner Bill Clinton - said the candidate likely would accept the
|
|||
|
invitation.
|
|||
|
|
|||
|
A spokeswoman for President Bush's campaign said no decisions will be
|
|||
|
made about any debates until after the primary season. Bush is
|
|||
|
expected to clinch the GOP nomination in state conventions this
|
|||
|
weekend in Maine and Wyoming.
|
|||
|
|
|||
|
"But depending upon how it's organized, as we get closer to the
|
|||
|
general election, it may be something we will consider,'' said Darcy
|
|||
|
Campbell, the Bush spokeswoman.
|
|||
|
|
|||
|
The debate would be a milestone in a year marked by firsts for a
|
|||
|
nascent electronic democracy movement.
|
|||
|
|
|||
|
Empowered by the ability to quickly reach an audience estimated at 8
|
|||
|
million to 15 million people, at little cost, organizers of this new
|
|||
|
political community envision the debate as a way to bring the major
|
|||
|
presidential candidates and media into potential personal contact with
|
|||
|
every citizen who owns a computer and a modem - the device that lets
|
|||
|
computers communicate via phone lines.
|
|||
|
|
|||
|
Online activist Jim Warren's proposal for the debate is being
|
|||
|
distributed to the campaigns of Clinton, Bush and the other most
|
|||
|
prominent candidate - prospective independent H. Ross Perot, as well
|
|||
|
as to Democrat Jerry Brown, Republican Patrick Buchanan and
|
|||
|
Libertarian Andre Marrou.
|
|||
|
|
|||
|
It calls for a panel of three reporters from major media outlets to
|
|||
|
communicate online with each candidate over the course of a week in a
|
|||
|
moderated newsgroup - an electronic roundtable set up for the purpose.
|
|||
|
|
|||
|
A parallel, unmoderated newsgroup would allow direct discussion of the
|
|||
|
issues by everyone online, while the journalists on the panel would be
|
|||
|
required to accept proposed questions from the online audience. Jeff
|
|||
|
Eller, campaign spokesman for Clinton, the governor of Arkansas, said
|
|||
|
Clinton likely would participate.
|
|||
|
|
|||
|
"I don't think that would be a problem at all,'' he said, adding that
|
|||
|
the campaign already has placed position papers and other information
|
|||
|
online. "Anything that brings more people into the system is a great
|
|||
|
idea.''
|
|||
|
|
|||
|
The Perot campaign did not respond to an interview request.
|
|||
|
|
|||
|
The debate proposal is the latest development in a series of events
|
|||
|
drawing attention to the emergence of computer-based electronic
|
|||
|
communities as a political constituency.
|
|||
|
|
|||
|
Notably, a proposal by Perot to organize electronic town meetings has
|
|||
|
set fire to an online grass roots movement to put him on the ballot as
|
|||
|
an independent. Democratic candidate Jerry Brown already has gone
|
|||
|
online for direct electronic give-and-take with potential supporters.
|
|||
|
|
|||
|
In California and Alabama, a number of major candidates have signed
|
|||
|
agreements to enact legislation to protect civil liberties such as
|
|||
|
free speech and privacy regardless of whether they are exercised on
|
|||
|
paper, on computer networks, or in media yet to be envisioned.
|
|||
|
|
|||
|
"This is the first time that 8 to 15 million people have been online
|
|||
|
out of all of history, and that suddenly provides a critical mass for
|
|||
|
political action,'' said Warren. "That provides an interesting
|
|||
|
constituency.
|
|||
|
|
|||
|
"Secondly, the candidates who have any awareness of modern technology
|
|||
|
realize that this is an essentially free opportunity to reach millions
|
|||
|
of voters, in a manner unrestricted by cost or sound bite editing or
|
|||
|
interviewers' reinterpretations.''
|
|||
|
|
|||
|
Warren is a member of the board of directors of the software firm
|
|||
|
Autodesk; a columnist for MicroTimes; the founder of the Infoworld
|
|||
|
newspaper; founding host of the PBS series Computer Chronicles; and
|
|||
|
organizer of the First Conference on Computers, Freedom & Privacy, a
|
|||
|
seminal event in giving shape to the online political community.
|
|||
|
|
|||
|
"National online interaction between citizens and their
|
|||
|
representatives by far will provide the most efficient and effective
|
|||
|
means of having legitimate representation and active citizen
|
|||
|
participation in the governmental process,'' he said, adding that this
|
|||
|
gives rise to a number of interesting considerations.
|
|||
|
|
|||
|
"A large percentage of the people who are online are well educated,
|
|||
|
affluent citizens who are often leaders within their communities. I
|
|||
|
think there are too many people online for government to successfully
|
|||
|
suppress what is developing, this communication mechanism that is
|
|||
|
developing so rapidly.
|
|||
|
|
|||
|
"One of its major advantages for legitimate candidates is that
|
|||
|
communications have to be long on information and short on useless
|
|||
|
emotional content ... which undoubtedly horrifies some politicians.''
|
|||
|
|
|||
|
Soaring sales of personal computers are likely to strengthen the new
|
|||
|
online electorate. Analysts say that 7 million personal computers were
|
|||
|
sold last year, bringing the number of home users to 20 million - plus
|
|||
|
60 million in business.
|
|||
|
|
|||
|
As many as 15 million people are linked on the global Internet
|
|||
|
computer network, with the number growing. The commercial service
|
|||
|
Prodigy now claims 1.5 million users, while CompuServe claims to reach
|
|||
|
980,000, and GEnie around 600,000.
|
|||
|
|
|||
|
Users of smaller scale community bulletin board systems represent a
|
|||
|
potentially even larger group, although it's hard to say where one
|
|||
|
begins and the next ends. Boardwatch magazine, which loosely monitors
|
|||
|
the field, estimates that there are several tens of thousands of such
|
|||
|
BBSs around the country. Each of them allows from a handful to several
|
|||
|
hundred personal computer users to call in and trade messages,
|
|||
|
computer software, and other information.
|
|||
|
|
|||
|
Current issues often are hot topics, the most recent example being the
|
|||
|
Rodney King verdict in Los Angeles, which is prominent in online
|
|||
|
conversation just as it is dominating national news.
|
|||
|
|
|||
|
In Washington, the chairman of the House Administrative Committee
|
|||
|
recently said that all House members will have, by next year, full
|
|||
|
interactive access to users of the Internet computer network, which is
|
|||
|
quickly eclipsing the academic and military worlds that gave birth to
|
|||
|
it.
|
|||
|
|
|||
|
While the new online electorate is likely to bring change, it is not
|
|||
|
supplanting traditional methods. Instead, computer-based conferencing
|
|||
|
is adding a new dimension to the traditional process by which a grass
|
|||
|
roots candidate is drafted.
|
|||
|
|
|||
|
Perot, who has not yet himself been spotted online, has become a
|
|||
|
beneficiary, as services such as the Whole Earth 'Lectronic Link
|
|||
|
(WELL) in San Francisco, the commercial Prodigy information service,
|
|||
|
and a "Perot for President'' bulletin board communicate strategy and
|
|||
|
rally potential supporters.
|
|||
|
|
|||
|
As the best known computer link of writers, thinkers and activists,
|
|||
|
the WELL has become the online focus of the intellectual issues raised
|
|||
|
by the Perot movement.
|
|||
|
|
|||
|
But the Prodigy service, with its broader presence among non-experts,
|
|||
|
has become the battle front, as Perot support ers frantically trade
|
|||
|
information on efforts to get his name placed on the ballots of all 50
|
|||
|
states.
|
|||
|
|
|||
|
One typical message recently posted to a Prodigy confer ence promoted
|
|||
|
a Perot rally in Houston.
|
|||
|
|
|||
|
In Colorado, meanwhile, the new "Online for H. Ross Perot'' bulletin
|
|||
|
board may offer a measure of the breadth of support.
|
|||
|
|
|||
|
"I want to send you $5,'' wrote Marjorie Darling, who is described as
|
|||
|
"about 80'' and got involved through Senior Net, an activity organized
|
|||
|
by Dave Hughes, an online activist who runs the Perot board.
|
|||
|
|
|||
|
"We hear the third candidate has only been a spoiler' and can never,
|
|||
|
or has never made it running for president,'' wrote Darling. "But none
|
|||
|
of those has been 'Ross Perot, Business Man.'
|
|||
|
|
|||
|
"You can make it!''
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 10 May 92 20:49:04 EDT
|
|||
|
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
|||
|
Subject: File 7--Two Cornell Students Indicted in Virus Case
|
|||
|
|
|||
|
TWO AT CORNELL INDICTED IN VIRUS CASE
|
|||
|
|
|||
|
Two Cornell University students now have been indicted for felonies in
|
|||
|
connection with the computer virus case that came to light last
|
|||
|
February at the Ithaca, N.Y., university.
|
|||
|
|
|||
|
David Blumenthal and Mark Pilgrim are accused of embedding a virus in
|
|||
|
three Apple Macintosh computer games that were sent from Cornell's
|
|||
|
computer center to an archive at Stanford University. Authorities say
|
|||
|
from there, the games were duplicated and wound up in computers across
|
|||
|
the U.S., Japan and Great Britain.
|
|||
|
|
|||
|
Blumenthal, 20, and Pilgrim, 19, who, in convicted, face a maximum
|
|||
|
four years in prison, were arrested in February on misdemeanor
|
|||
|
charges, which were increased to felonies because the virus is
|
|||
|
believed to have caused more than $1,000 in damage, said county
|
|||
|
District Attorney George Dentes.
|
|||
|
|
|||
|
Reprinted from A NETWORKER'S JOURNAL May 8, 1992
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.21
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|