1038 lines
53 KiB
Plaintext
1038 lines
53 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Fri July 17, 1992 Volume 4 : Issue 31
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Copy Editor: Etaion Shrdlu, Jr.
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Archivist in spirit: Bob Kusumoto
|
|||
|
Shadow-Archivist: Dan Carosone
|
|||
|
|
|||
|
CONTENTS, #4.31 (July 17, 1992)
|
|||
|
File 1--MOD Indictment (July, '92)
|
|||
|
File 2--Newsbytes Editorial on MOD Indictment
|
|||
|
|
|||
|
Back issues of CuD can be found in the Usenet alt.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
|||
|
libraries; from American Online in the PC Telecom forum under
|
|||
|
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
|
|||
|
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
|
|||
|
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source
|
|||
|
is cited. Some authors do copyright their material, and they should
|
|||
|
be contacted for reprint permission. It is assumed that non-personal
|
|||
|
mail to the moderators may be reprinted unless otherwise specified.
|
|||
|
Readers are encouraged to submit reasoned articles relating to
|
|||
|
computer culture and communication. Articles are preferred to short
|
|||
|
responses. Please avoid quoting previous posts unless absolutely
|
|||
|
necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: 17 Jul 92 16:43:21 CDT
|
|||
|
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 1--MOD Indictment (July, '92)
|
|||
|
|
|||
|
((Moderators' note: The following is the complete indictment of
|
|||
|
five MOD members (see CuD 4.30 for background)).
|
|||
|
|
|||
|
UNITED STATES DISTRICT COURT
|
|||
|
SOUTHERN DISTRICT OF NEW YORK
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - -X
|
|||
|
:
|
|||
|
UNITED STATES OF AMERICA :
|
|||
|
:
|
|||
|
- v - :
|
|||
|
:
|
|||
|
JULIO FERNANDEZ, a/k/a "Outlaw," : _INDICTMENT_
|
|||
|
JOHN LEE, a/k/a "John Farrington," :
|
|||
|
a/k/a "Corrupt," :
|
|||
|
MARK ABENE, a/k/a "Phiber Optik," :
|
|||
|
ELIAS LADOPOULOS, : 92 Cr.
|
|||
|
a/k/a "Acid Phreak," and :
|
|||
|
PAUL STIRA, a/k/a "Scorpion" :
|
|||
|
:
|
|||
|
Defendants :
|
|||
|
:
|
|||
|
- - - - - - - - - - - - - - - - - - - -X
|
|||
|
|
|||
|
_COUNT ONE_
|
|||
|
|
|||
|
Conspiracy
|
|||
|
The Grand Jury Charges:
|
|||
|
|
|||
|
_Introduction_
|
|||
|
|
|||
|
1. At all times relevant to this indictment:
|
|||
|
(a) MOD was a closely knit group of computer
|
|||
|
hackers located primarily in the New York City area. (The term
|
|||
|
"computer hacker" refers to someone who uses a computer or a
|
|||
|
telephone to obtain unauthorized access to other computers). The
|
|||
|
letters "MOD" had various meanings, among them "Masters Of
|
|||
|
Disaster" and "Masters of Deception."
|
|||
|
(b) At various times, the defendants JULIO
|
|||
|
FERNANDEZ, JOHN LEE, MARK ABENE, ELIAS LADOPOULOS and PAUL STIRA
|
|||
|
were members of MOD. Within MOD and in the course of their
|
|||
|
computer hacking activities, the defendants frequently identified
|
|||
|
themselves by their nicknames or hacking "handles." In
|
|||
|
particular, JULIO FERNANDEZ used the name "Outlaw," JOHN LEE used
|
|||
|
|
|||
|
- 1-
|
|||
|
|
|||
|
the name "Corrupt," MARK ABENE used the name "Phiber Optik,"
|
|||
|
ELIAS LADOPOULOS used the name "Acid Phreak," and PAUL STIRA used
|
|||
|
the name "Scorpion." JOHN LEE was also known to his associates
|
|||
|
as "John Farrington."
|
|||
|
(c) Southwestern Bell Telephone Company
|
|||
|
("Southwestern Bell") was a regional telephone company that
|
|||
|
provided local telephone service to millions of customers in
|
|||
|
Arkansas, Kansas, Missouri, Oklahoma and Texas. Southwestern
|
|||
|
Bell's telephone system was controlled and operated by numerous
|
|||
|
computers located throughout the above-named states, including
|
|||
|
telephone switching computers. The telephone switching computers
|
|||
|
operated by Southwestern Bell and other telephone companies were
|
|||
|
large computers that controlled call routing, calling features
|
|||
|
(such as call forwarding, call waiting and three-way calling),
|
|||
|
billing and other telephone services for tens of thousands of
|
|||
|
telephone lines each. Southwestern Bell's headquarters were
|
|||
|
located in St. Louis, Missouri.
|
|||
|
(d) BT North America Inc. was an international
|
|||
|
corporation that provided telecommunications services throughout
|
|||
|
the world. Among BT North America's businesses in the United
|
|||
|
States was the operation of a data transfer network called
|
|||
|
Tymnet. The Tymnet network was an international network through
|
|||
|
which customers could transmit electronic communications. The
|
|||
|
Tymnet network was controlled and operated by numerous computers
|
|||
|
located throughout the United States and elsewhere. BT North
|
|||
|
America's headquarters were located in San Jose, California.
|
|||
|
|
|||
|
- 2 -
|
|||
|
|
|||
|
(e) New York Telephone Company ("New York
|
|||
|
Telephone") was a regional telephone company that provided local
|
|||
|
telephone service to millions of customers in New York State.
|
|||
|
New York Telephone's telephone system was controlled and operated
|
|||
|
by numerous computers located throughout New York State. New
|
|||
|
York Telephone's headquarters were located in New York City.
|
|||
|
(f) Pacific Bell and U.S. West were regional
|
|||
|
telephone companies that provide telephone service to customers
|
|||
|
in, among other states, California and Idaho, respectively. One
|
|||
|
of the telephone switching computers operated by Pacific Bell was
|
|||
|
located in Santa Rosa, California. One of the telephone
|
|||
|
switching computers operated by U.S. West was located in Boise,
|
|||
|
Idaho.
|
|||
|
(g) Martin Marietta Electronics Information and
|
|||
|
Missile Group ("Martin Marietta") was an aerospace and
|
|||
|
engineering company located in Orlando, Florida. Martin Marietta
|
|||
|
operated a telephone switching computer that handled the
|
|||
|
company's telephone lines.
|
|||
|
(h) International Telephone and Telegraph Company
|
|||
|
("ITT"), was a telecommunications company. One of the ways that
|
|||
|
ITT provided telephone services to customers was to provide
|
|||
|
customers with personal identification numbers. Customers could
|
|||
|
dial local or toll free telephone numbers assigned to ATT, enter
|
|||
|
their personal identification numbers, and then obtain local and
|
|||
|
long distance calling services that would be charged to their
|
|||
|
accounts.
|
|||
|
|
|||
|
- 3 -
|
|||
|
|
|||
|
(i) Information America, Inc., was a computerized
|
|||
|
information service that provided subscribers with accesses to
|
|||
|
telephone numbers, addresses, business abstracts and other
|
|||
|
information regarding individuals and businesses throughout the
|
|||
|
United States. Information America's headquarters and its primary
|
|||
|
computer data base were located in Atlanta, Georgia.
|
|||
|
(j) TRW Information Services ("TRW") and Trans
|
|||
|
Union Corporation ("Trans Union") were credit reporting services
|
|||
|
that provided subscribers with access to credit reports and other
|
|||
|
information. One of the ways that subscribers could obtain
|
|||
|
credit information was to use a computer to access data bases
|
|||
|
maintained by TRW and Trans Union. TRW's primary data base was
|
|||
|
located in Anaheim, California. Trans Union's primary data base
|
|||
|
was located in Chicago, Illinois.
|
|||
|
(k) The Learning Link was a computerized
|
|||
|
information system operated by the Educational Broadcasting
|
|||
|
Corporation in New York City. The Learning Link computer
|
|||
|
provided educational and instructional information to hundreds of
|
|||
|
schools and educators in New York, New Jersey and Connecticut.
|
|||
|
Access to the Learning Link computer was limited to persons and
|
|||
|
institutions who subscribed to the service and paid a membership
|
|||
|
fee.
|
|||
|
(l) New York University ("NYU") was a large
|
|||
|
university located in New York City. NYU operated a computer
|
|||
|
system for faculty, students and other authorized users. One of
|
|||
|
the services provided by the NYU computer systems was to allow
|
|||
|
|
|||
|
- 4 -
|
|||
|
|
|||
|
authorized users to make local and long distance telephone calls for
|
|||
|
the purpose of connecting to other computers outside of NYU.
|
|||
|
Authorized users of the NY computer could obtain outdial service by
|
|||
|
accessing the NYU computer system and entering a billing code. The
|
|||
|
call would then be charged to the authorized users' account.
|
|||
|
(m) The University of Washington was a large
|
|||
|
university located in Seattle, Washington, The University of
|
|||
|
Washington operated numerous computers for use by faculty,
|
|||
|
students and other authorized users.
|
|||
|
(n) The Bank of America was a national Bank
|
|||
|
located in California and elsewhere. The Bank of America operated
|
|||
|
a data transfer network that was used to transmit electronic
|
|||
|
communications of Bank of America employees and others.
|
|||
|
|
|||
|
_The Conspiracy_
|
|||
|
|
|||
|
2. From in or about 1989 through the date of the filing
|
|||
|
of this Indictment, in the Southern District of New York and
|
|||
|
elsewhere, JULIO FERNANDEZ, a/k/a "Outlaw," JOHN LEE, a/k/a "John
|
|||
|
Farrington," a/k/a "Corrupt," MARK ABENE, a/k/a "Phiber Optik,"
|
|||
|
ELIAS LADOPOULOS, a/k/a "Acid Phreak," and PAUL STIRA, a/k/a
|
|||
|
"Scorpion," the defendants, and others known and unknown to the
|
|||
|
Grand Jury (collectively the "co-conspirators"), unlawfully,
|
|||
|
willfully and knowingly did combine, conspire, confederate and
|
|||
|
agree together and with each other to commit offenses against the
|
|||
|
United States of America, to wit, to possess unauthorized access
|
|||
|
devices with the intent to defraud, in violation of Title 18,
|
|||
|
United States Code, Section 1029(a)(3); to use and traffic in
|
|||
|
|
|||
|
- 5 -
|
|||
|
|
|||
|
unauthorized access devises with the intent to defraud, in
|
|||
|
violation of Title 18, United States Code, Section 1029(a)(2); to
|
|||
|
access federal interest computers without authorization, in
|
|||
|
violation of Title 18, United States Code, Section 1030(a)(5)(a);
|
|||
|
to intercept electronic communications, in violation of Title 18,
|
|||
|
United States Code, Section 2511(1)(a); and to commit wire fraud,
|
|||
|
in violation of Title 18, United States Code, Section 1343.
|
|||
|
|
|||
|
_Objects of the Conspiracy_
|
|||
|
|
|||
|
_Possession of Unauthorized Access Devices_
|
|||
|
|
|||
|
3. It was a part and object of the conspiracy that the
|
|||
|
co-conspirators unlawfully, willfully, knowingly and with the
|
|||
|
intent to defraud, would and did possess fifteen and more
|
|||
|
unauthorized access devices, to wit, the co-conspirators would
|
|||
|
and did posess fifteen and more unauthorized passwords, user
|
|||
|
identifications, personal identification numbers and other access
|
|||
|
devices that permitted access to computer systems, data bases and
|
|||
|
telephone services of Southwestern Bell, BT North America, New
|
|||
|
York Telephone, ITT, Information America, TRW, Trans Union, NYU
|
|||
|
and others, in violation of Title 18, United States Code, Section
|
|||
|
1029(a)(3).
|
|||
|
|
|||
|
_Use of Unauthorized Access Devices_
|
|||
|
|
|||
|
4. It was a further part and object of the conspiracy
|
|||
|
that the co-conspirators unlawfully, willfully, knowingly and
|
|||
|
with the intent to defraud, would and did use one or more
|
|||
|
unauthorized access devices during a one year period, and by such
|
|||
|
conduct obtain something of value aggregating $1,000 and more
|
|||
|
|
|||
|
- 6 -
|
|||
|
|
|||
|
during that period, to wit, the co-conspirators would and did use
|
|||
|
unauthorized access devices of Southwestern Bell, BT North
|
|||
|
America, New York Telephone, ITT, Information America, TRW, Trans
|
|||
|
Union, NYU and others in order to obtain information services,
|
|||
|
credit reporting services, telephone services and other things of
|
|||
|
value aggregating in excess of $1,000 during a one year period,
|
|||
|
in violation of Title 18, United States Code, Section 1029(a)(2).
|
|||
|
|
|||
|
_Unauthorized Access of Computers_
|
|||
|
|
|||
|
5. It was a further part and object of the conspiracy
|
|||
|
that the co-conspirators unlawfully, willfully, knowingly and
|
|||
|
intentionally would and did access federal interest computers
|
|||
|
without authorization, and by means of such conduct alter, damage
|
|||
|
and destroy information in such federal interest computers and
|
|||
|
prevent authorized use of such computers and information, and
|
|||
|
thereby cause loss to one or more others of a value aggregating
|
|||
|
$1,000 and more during a one year period, to wit, the co-
|
|||
|
conspirators would and did access computers belonging to
|
|||
|
Southwestern Bell, BT North America and others without
|
|||
|
authorization, and by means of such conduct altered telephone
|
|||
|
services, installed their own computer programs and made other
|
|||
|
modifications, thereby causing losses aggregating $1,000 and more
|
|||
|
during a one year period, in violation of Title 18, United States
|
|||
|
Code, Section 1030(a)(5)(A).
|
|||
|
|
|||
|
_Interception of Electronic Communications_
|
|||
|
|
|||
|
|
|||
|
6. It was a further part and object of the conspiracy
|
|||
|
that the co-conspirators unlawfully, willfully, knowingly and
|
|||
|
|
|||
|
- 7 -
|
|||
|
|
|||
|
intentionally would and did intercept, endeavor to intercept and
|
|||
|
procure other persons to intercept electronic communications, to
|
|||
|
wit, the co-conspirators would and did intercept, endeavor to
|
|||
|
intercept and procure other persons to intercept passwords, user
|
|||
|
identifications and other electronic communications as such
|
|||
|
communications were being transmitted over Tymnet and other data
|
|||
|
transfer networks, in violation of Title 18, United States Code,
|
|||
|
Section 2511(1)(a).
|
|||
|
|
|||
|
_Wire Fraud_
|
|||
|
|
|||
|
7. It was a further part and object of the conspiracy
|
|||
|
that the co-conspirators, unlawfully, willfully and knowingly,
|
|||
|
and having devised a scheme and artifice to defraud and for
|
|||
|
obtaining money and property by means of false and fraudulent
|
|||
|
pretenses, representations and promises, would and did transmit
|
|||
|
and cause to be transmitted by means of wire communications in
|
|||
|
interstate and foreign commerce, signs, signals and sounds for
|
|||
|
the purpose of executing the scheme to defraud, to wit, the co-
|
|||
|
conspirators would and did transmit and cause to be transmitted
|
|||
|
passwords, user identifications, personal identification numbers,
|
|||
|
telephone tones and other signs, signals and sounds for the
|
|||
|
purpose of executing a scheme to obtain telephone services,
|
|||
|
credit reporting services, information services and other
|
|||
|
services free of charge, in violation of Title 18, United States
|
|||
|
Code, Section 1343.
|
|||
|
|
|||
|
- 8 -
|
|||
|
|
|||
|
_Goal of the Conspiracy_
|
|||
|
|
|||
|
8. It was the goal of the conspiracy that the members
|
|||
|
of MOD would gain access to and control of computer systems in
|
|||
|
order to enhance their image and prestige among other computer
|
|||
|
hackers; to harass and intimidate rival hackers and other people
|
|||
|
they did not like; to obtain telephone, credit, information and
|
|||
|
other services without paying for them; and to obtain passwords,
|
|||
|
account numbers and other things of value which they could sell
|
|||
|
to others.
|
|||
|
|
|||
|
_Means and Methods of the Conspiracy_
|
|||
|
|
|||
|
9. Among the means and methods by which the co-
|
|||
|
conspirators would and did carry out the conspiracy were the
|
|||
|
following:
|
|||
|
(a) The co-conspirators formed the group MOD to
|
|||
|
further their computer hacking activities and to compete with
|
|||
|
other computer hackers in their quest for and access to and control
|
|||
|
of computer systems.
|
|||
|
(b) The members of MOD exchanged computer-related
|
|||
|
information among themselves including passwords, user
|
|||
|
identifications and personal identification numbers. The members
|
|||
|
of MOD also assisted each other in breaking into computer systems
|
|||
|
by sharing technical information regarding the configuration and
|
|||
|
security systems of target computers. The members of MOD agreed
|
|||
|
to share important computer information only among themselves and
|
|||
|
not with other computer hackers.
|
|||
|
|
|||
|
- 9 -
|
|||
|
|
|||
|
(c) The co-conspirators obtained passwords, user
|
|||
|
identifications and other unauthorized access devices through a
|
|||
|
variety of means including the following:
|
|||
|
(i) Data interception--The co-conspirators
|
|||
|
intercepted access codes as the codes were being transmitted over
|
|||
|
Tymnet and other data transfer networks. The co-conspirators
|
|||
|
were able to perform such interceptions on Tymnet by obtaining
|
|||
|
unauthorized access to Tymnet computers which controlled the
|
|||
|
transfer of electronic communications over the network. Using
|
|||
|
their unauthorized access to Tymnet computers, the co-
|
|||
|
conspirators monitored and intercepted information that Tymnet
|
|||
|
personnel and others using the Tymnet network were sending
|
|||
|
through the network, including user identifications and passwords
|
|||
|
used by Tymnet personnel and others.
|
|||
|
(ii) Social Engineering -- The co-
|
|||
|
conspirators made telephone calls to the telephone company employees
|
|||
|
and other persons, and pretended to be computer technicians or
|
|||
|
others who were authorized to obtain access devices and related
|
|||
|
information. The co-conspirators then caused the unwitting
|
|||
|
targets of their calls to furnish access devices and other
|
|||
|
proprietary information. The co-conspirators referred to this
|
|||
|
technique as "social engineering."
|
|||
|
(iii) Password Grabbing and Password Cracking
|
|||
|
Programs -- The co-conspirators wrote and used various computer
|
|||
|
programs that were designed to steal passwords from computers in
|
|||
|
which the programs were inserted. The co-conspirators maintained
|
|||
|
|
|||
|
- 10 -
|
|||
|
|
|||
|
other programs that were designed to"crack" encrypted passwords,
|
|||
|
that is, to take passwords that had been scrambled into a code
|
|||
|
for security purposes, and to break the code so that the
|
|||
|
passwords could be used to obtain unauthorized access to computer
|
|||
|
systems.
|
|||
|
(d) When the co-conspirators broke into computer
|
|||
|
systems, they installed "back door" programs to ensure that they
|
|||
|
would continue to have access to the computers. These back door
|
|||
|
programs were designed to modify computers in which they were
|
|||
|
inserted so that the computer would give the highest level of
|
|||
|
access ("root" access) to anyone using a special password that
|
|||
|
was known to the members of MOD. Some of these back door
|
|||
|
programs also included additional features that were designed to
|
|||
|
modify computers in which they were inserted so that (i) the
|
|||
|
computer would store the passwords of legitimate users in a
|
|||
|
secret file that was known to the members of MOD; (ii) the
|
|||
|
computer would display a message that read, in part, "This system
|
|||
|
is owned, controlled, and administered by MOD" to anyone who
|
|||
|
accessed the system using the password "MOD"; and (iii) the
|
|||
|
computer would be destroyed if anyone accessed the system using
|
|||
|
another special password known to the members of MOD.
|
|||
|
(e) The co-conspirators obtained free telephone
|
|||
|
and data transfer services for themselves and for each other by:
|
|||
|
(i) obtaining unauthorized access to telephone company computers
|
|||
|
and adding and altering calling features; and (ii) maintaining
|
|||
|
and exchanging personal identification numbers, passwords,
|
|||
|
|
|||
|
- 11 -
|
|||
|
|
|||
|
billing codes and other access devices that allowed them to make
|
|||
|
free local and long distance telephone calls as well as to
|
|||
|
transmit and receive electronic communications free of charge.
|
|||
|
(f) One of the ways that the co-conspirators
|
|||
|
obtained free telephone service by their access to telephone
|
|||
|
switching computers was to call forward unassigned local
|
|||
|
telephone numbers to long distance numbers or to pay per call
|
|||
|
services such as conference calling services. By setting up such
|
|||
|
call forwards the co-conspirators could make long distance and
|
|||
|
conferences calls for the price of a call to the local unassigned
|
|||
|
number.
|
|||
|
(g) The co-conspirators obtained information
|
|||
|
including credit reports, telephone numbers, addresses, neighbor
|
|||
|
listings and social security numbers of various individuals by
|
|||
|
obtaining unauthorized access to information and credit reporting
|
|||
|
services.
|
|||
|
|
|||
|
_Overt Acts_
|
|||
|
|
|||
|
10. In furtherance of the conspiracy and to effect the
|
|||
|
objects thereof, the co-conspirators committed the following acts
|
|||
|
among others in the Southern District of New York and elsewhere:
|
|||
|
(a) On or about November 28, 1989, members of MOD
|
|||
|
caused virtually all of the information contained within the
|
|||
|
Learning Link computer operated by the Educational Broadcasting
|
|||
|
Corporation to be destroyed, and caused a message to be left on
|
|||
|
the computer that said, in part: "Happy Thanksgiving you turkeys,
|
|||
|
|
|||
|
- 12 -
|
|||
|
|
|||
|
from all of us at MOD" and which was signed with the names "Acid
|
|||
|
Phreak," "Phiber Optik" and "Scorpion" among others.
|
|||
|
(b) On or about January 8, 1990, from his
|
|||
|
residence in Queens, New York, ELIAS LADOPOULOS, a/k/a "Acid
|
|||
|
Phreak," accessed a New York Telephone switching computer without
|
|||
|
authorization. During the call, LADOPOULOS issued commands to
|
|||
|
automatically call forward all calls received by one telephone
|
|||
|
number to another telephone number.
|
|||
|
(c) On or about January 24, 1990, at his college
|
|||
|
dormitory room in Farmingdale, New York, PAUL STIRA, a/k/a
|
|||
|
"Scorpion," possessed numerous password files containing hundreds
|
|||
|
of encrypted and unencrypted user identifications and passwords
|
|||
|
to telephone company computers and other computers.
|
|||
|
(d) On or about January 24, 1990, at his college
|
|||
|
dormitory room in Farmingdale, New York, PAUL STIRA, a/k/a
|
|||
|
"Scorpion," possessed a back door computer program and a password
|
|||
|
grabbing program. The back door program included a feature that
|
|||
|
was designed to modify a computer in which the program was
|
|||
|
inserted so that the computer would be destroyed if someone
|
|||
|
accessed it using a certain password.
|
|||
|
(e) On or about May 31, 1991, from his residence
|
|||
|
in Brooklyn, New York, JOHN LEE, a/k/a "John Farrington," a/k/a
|
|||
|
"Corrupt," obtained unauthorized access to a Southwestern Bell
|
|||
|
computer in St. Louis, Missouri.
|
|||
|
(f) On or about October 28, 1991, from his
|
|||
|
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw,"
|
|||
|
|
|||
|
- 13 -
|
|||
|
|
|||
|
obtained unauthorized access to a Southwestern Bell telephone
|
|||
|
switching computer in Houston, Texas and issued commands so that
|
|||
|
calls received by one telephone number would be automatically
|
|||
|
forwarded to another number.
|
|||
|
(g) On or about October 31, 1991, from his
|
|||
|
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw,"
|
|||
|
obtained unauthorized access to a U.S. West telephone switching
|
|||
|
computer in Boise, Idaho.
|
|||
|
(h) On or about November 1, 1991, from his
|
|||
|
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw,"
|
|||
|
called a New York Telephone technician. During the call,
|
|||
|
FERNANDEZ pretended to be another New York Telephone employee and
|
|||
|
convinced the technician to provide information regarding access
|
|||
|
to a New York Telephone switching computer in Mt. Vernon, New
|
|||
|
York.
|
|||
|
(i) On or about November 1, 1991, from his
|
|||
|
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw,"
|
|||
|
made multiple calls to a New York Telephone switching computer in
|
|||
|
Mt. Vernon New York. During the calls, FERNANDEZ call forwarded
|
|||
|
numbers and obtained detailed information regarding telephone
|
|||
|
services provided by the switch.
|
|||
|
(j) On or about November 5, 1991, from his
|
|||
|
residence in Brooklyn, New York, JOHN LEE, a/k/a "John
|
|||
|
Farrington," a/k/a "Corrupt," obtained a user identification and
|
|||
|
password by monitoring electronic communications on the Tymnet
|
|||
|
network. Later, on November 5, 1991, JOHN LEE called JULIO
|
|||
|
- 14 '
|
|||
|
|
|||
|
FERNANDEZ, a/k/a "Outlaw," and provided FERNANDEZ with the
|
|||
|
intercepted user identification and password.
|
|||
|
(k) On or about November 6, 1991, JOHN LEE, a/k/a
|
|||
|
"John Farrington," a/k/a "Corrupt," had a telephone conversation
|
|||
|
with MARK ABENE, a/k/a "Phiber Optik." During the conversation,
|
|||
|
LEE provided ABENE with the user identification and password that
|
|||
|
LEE had intercepted the previous day.
|
|||
|
(l) On or about November 6, 1991, JOHN LEE, a/k/a
|
|||
|
"John Farrington," a/k/a "corrupt," had a telephone conversation
|
|||
|
with another member of MOD, during which they discussed obtaining
|
|||
|
information from another hacker about how to alter TRW credit
|
|||
|
reports. LEE said that the information he wanted to obtain
|
|||
|
included instructions on how to add and remove delinquency
|
|||
|
reports, "to destroy people's lives. . .or make them look like
|
|||
|
saints."
|
|||
|
(m) On or about November 14, 1991, JULIO
|
|||
|
FERNANDEZ, a/k/a "Outlaw," and JOHN LEE, a/k/a "Corrupt," had a
|
|||
|
telephone conversation. During the conversation, FERNANDEZ and
|
|||
|
LEE discussed a lengthy list of institutions that operated
|
|||
|
computers, including government offices, private companies and an
|
|||
|
Air Force base. In the course of the conversation, FERNANDEZ
|
|||
|
said, "We've just got to start hitting these sites left and
|
|||
|
right."
|
|||
|
(n) On or about November 14, 1991, at his
|
|||
|
residence in Brooklyn, New York, JOHN LEE, a/k/a "John
|
|||
|
Farrington," a/k/a "Corrupt," obtained unauthorized access to
|
|||
|
|
|||
|
- 15 -
|
|||
|
|
|||
|
Trans Union's computerized data base and obtained credit reports
|
|||
|
on several individuals.
|
|||
|
(o) On or about November 22, 1991, at his
|
|||
|
residence in Brooklyn, New York, JOHN LEE, a/k/a "John
|
|||
|
Farrington," a/k/a "Corrupt," obtained unauthorized access to
|
|||
|
Information American's computerized data base and obtained
|
|||
|
personal information concerning several individuals.
|
|||
|
(p) On or about November 23, 1991, MARK ABENE,
|
|||
|
a/k/a "Phiber Optik," and JULIO FERNANDEZ, a/k/a "Outlaw," had a
|
|||
|
telephone conversation. During the conversation, ABENE gave
|
|||
|
FERNANDEZ advice concerning how to call forward telephone numbers
|
|||
|
on a certain type of telephone switching computer.
|
|||
|
(q) On or about November 25, 1991, JULIO
|
|||
|
FERNANDEZ, a/k/a "outlaw," and JOHN LEE, a/k/a "John Farrington,"
|
|||
|
a/k/a "Corrupt," obtained several hundred dollars from Morton
|
|||
|
Rosenfeld, a co-conspirator not named herein as a defendant, in
|
|||
|
exchange for providing Rosenfeld with information regarding how
|
|||
|
to obtain unauthorized access to credit reporting services.
|
|||
|
(r) On or about November 25, 1991, JOHN LEE, a/k/a
|
|||
|
"John Farrington," a/k/a "Corrupt," JULIO FERNANDEZ, a/k/a
|
|||
|
"Outlaw," and MARK ABENE, a/k/a "Phiber Optik," had a three way
|
|||
|
telephone conversation. During the conversation, LEE and
|
|||
|
FERNANDEZ provided ABENE with user identifications and passwords
|
|||
|
of Southwestern Bell and Information America.
|
|||
|
(s) On or about November 26, 1991, JOHN LEE, a/k/a
|
|||
|
"John Farrington," a/k/a "Corrupt," and MARK ABENE, a/k/a "Phiber
|
|||
|
|
|||
|
- 16 -
|
|||
|
|
|||
|
Optik," had a telephone conversation. During the conversation,
|
|||
|
LEE and ABENE discussed obtaining unauthorized access to
|
|||
|
Southwestern Bell computes and LEE provided ABENE with a series
|
|||
|
of Southwestern Bell user identifications and passwords. A short
|
|||
|
while later, ABENE called LEE and reported that one of the
|
|||
|
passwords worked and that he had obtained information from a
|
|||
|
Southwestern Bell computer.
|
|||
|
|
|||
|
(t) On or about November 27, 1991, ELIAS
|
|||
|
LADOPOULOS, a/k/a "Acid Phreak," had a telephone conversation
|
|||
|
with JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt." During
|
|||
|
the conversation, LADOPOULOS asked LEE to obtain personal
|
|||
|
information on an individual.
|
|||
|
(u) On or about November 27, 1991, from his
|
|||
|
residence in Brooklyn, New York, JOHN LEE, a/k/a "John
|
|||
|
Farrington," a/k/a "Corrupt" obtained unauthorized access to
|
|||
|
Information America's computerized data base and obtained
|
|||
|
personal information on the individual that ELIAS LADOPOULOS,
|
|||
|
a/k/a "Acid Phreak," had requested. LEE the called LADOPOULOS
|
|||
|
and gave him the information.
|
|||
|
(v) On or about November 30, 1991, JULIO
|
|||
|
FERNANDEZ, a/k/a "Outlaw," provided associates of Morton
|
|||
|
Rosenfeld with an account number and password for TRW. Between
|
|||
|
November 30, 1991, and December 2, 1991, Rosenfeld and his
|
|||
|
associates used the TRW account number and password to obtain
|
|||
|
approximately 176 credit reports on various individuals.
|
|||
|
|
|||
|
- 17 -
|
|||
|
|
|||
|
(w) On or about December 1, 1991, from his
|
|||
|
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw,"
|
|||
|
obtained unauthorized access to a Pacific Bell Telephone
|
|||
|
switching computer in Santa Rosa, California.
|
|||
|
(x) On or about December 1, 1991, from his
|
|||
|
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "outlaw,"
|
|||
|
obtained unauthorized access to a Southwestern ell telephone
|
|||
|
switching computer in Saginaw, Texas.
|
|||
|
(y) On or about December 4, 1991, from his
|
|||
|
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw,"
|
|||
|
obtained unauthorized access to a Martin Marietta telephone
|
|||
|
switching computer in Orlando, Florida. During the call,
|
|||
|
FERNANDEZ added a feature to one of the telephone numbers
|
|||
|
services by the switch.
|
|||
|
(z) On or about December 6, 1991, at his
|
|||
|
residence in Queens, New York, MARK ABENE, a/k/a "Phiber Optik,"
|
|||
|
possessed numerous proprietary technical manuals of BT North
|
|||
|
America, including manuals that described the operation of Tymnet
|
|||
|
computers and computer programs.
|
|||
|
(Title 18, United States Code, Section 371.)
|
|||
|
|
|||
|
- 18 -
|
|||
|
|
|||
|
_COUNT TWO_
|
|||
|
|
|||
|
_Unauthorized Access to Computers_
|
|||
|
|
|||
|
The Grand Jury further charges:
|
|||
|
11. Between on or about January 1, 1991 and on or about
|
|||
|
January 1, 1992, in the Southern District of New York and
|
|||
|
elsewhere, JULIO FERNANDEZ, a/k/a "Outlaw," JOHN LEE, a/k/a "John
|
|||
|
Farrington,"a/k/a "Corrupt," and MARK ABENE, a/k/a "Phiber
|
|||
|
Optik," the defendants, and others whom they aided and abetted,
|
|||
|
unlawfully, willfully, knowingly and intentionally did access
|
|||
|
federal interest computers without authorization, and by means of
|
|||
|
such conduct did alter, damage and destroy information in such
|
|||
|
federal interest computers and prevent authorized use of such
|
|||
|
computers and information and thereby cause loss to one or more
|
|||
|
others of a value aggregating $1,000 and more during a one year
|
|||
|
period, to wit, JULIO FERNANDEZ, JOHN LEE, MARK ABENE, and others
|
|||
|
whom they aided and abetted, accessed Southwestern Bell computers
|
|||
|
without authorization and by means of such conduct altered
|
|||
|
calling features, installed back door programs, and made other
|
|||
|
modifications which caused losses to Southwestern Bell of
|
|||
|
approximately $370,000 in the form of expenses to locate and
|
|||
|
replace computer programs and other information that hand been
|
|||
|
modified or otherwise corrupted, expenses to determine the source
|
|||
|
of the unauthorized intrusions, and expenses for new computers
|
|||
|
and security devices that were necessary to prevent continued
|
|||
|
unauthorized access by the defendants and others whom they aided
|
|||
|
and abetted.
|
|||
|
(Title 18, United States Code, Sections 1030(a)(5)A) and 2.)
|
|||
|
|
|||
|
- 19 -
|
|||
|
|
|||
|
_COUNT THREE_
|
|||
|
|
|||
|
_Possession of Unauthorized Access Devices_
|
|||
|
|
|||
|
The Grand Jury further charges:
|
|||
|
12. On or about December 6, 1991, in the Southern
|
|||
|
District of New York, JULIO FERNANDEZ, a/k/a "outlaw," the
|
|||
|
defendant, unlawfully, willfully and knowingly, and with the
|
|||
|
intent to defraud, did possess fifteen and more unauthorized
|
|||
|
access devices, to wit, JULIO FERNANDEZ possessed several hundred
|
|||
|
unauthorized user identifications and passwords of Southwestern
|
|||
|
Bell, BT North America, TRW and others with the intent to defraud
|
|||
|
said companies by using the access devices to obtain services and
|
|||
|
to obtain access to computers operated by said companies under
|
|||
|
the false pretenses that FERNANDEZ was an authorized user of the
|
|||
|
access devices.
|
|||
|
(Title 18, United States Code, Section 1029(a)(3).)
|
|||
|
|
|||
|
|
|||
|
_COUNTS FOUR THROUGH SIX_
|
|||
|
|
|||
|
_Interception of Electronic Communications_
|
|||
|
|
|||
|
The Grand Jury further charges:
|
|||
|
13. On or about the dates set forth below, in the
|
|||
|
Southern District of New York and elsewhere, JOHN LEE, a/k/a
|
|||
|
"John Farrington," a/k/a "Corrupt," the defendant, unlawfully,
|
|||
|
willfully, knowingly and intentionally, did intercept and
|
|||
|
endeavor to intercept electronic communications, to wit, on the
|
|||
|
dates set forth below, JOHN LEE did intercept and endeavor to
|
|||
|
intercept electronic communications, including user
|
|||
|
|
|||
|
-20 -
|
|||
|
|
|||
|
identifications and passwords, as the communications were being
|
|||
|
transmitted over the Tymnet network.
|
|||
|
_Count_ _Date of Interception_
|
|||
|
Four November 5, 1991
|
|||
|
Five November 12, 1991
|
|||
|
Six November 15, 1991
|
|||
|
(Title 18, United States Code, Section 2511(1)(a).)
|
|||
|
|
|||
|
|
|||
|
_COUNT SEVEN_
|
|||
|
|
|||
|
_INTERCEPTION OF ELECTRONIC COMMUNICATIONS_
|
|||
|
|
|||
|
The Grand Jury further charges:
|
|||
|
14. On or about December 1, 1991, in the Southern
|
|||
|
District of New York and elsewhere, JULIO FERNANDEZ, a/k/a
|
|||
|
"Outlaw," and JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt,"
|
|||
|
the defendants, unlawfully, willfully, knowingly and
|
|||
|
intentionally, did intercept, endeavor to intercept and procure
|
|||
|
others to intercept electronic communications, to wit, JULIO
|
|||
|
FERNANDEZ gave JOHN LEE a password that JOHN LEE used to
|
|||
|
intercept electronic communications as the communications were
|
|||
|
being transmitted over a data transfer network operated by the
|
|||
|
Bank of America.
|
|||
|
(Title 18, United States Code, Sections 2511(1)(a) and 2.)
|
|||
|
|
|||
|
- 21 -
|
|||
|
|
|||
|
_COUNTS EIGHT AND NINE_
|
|||
|
|
|||
|
_Wire Fraud_
|
|||
|
|
|||
|
The Grand Jury further charges:
|
|||
|
15. From in or about June 1991 through the date of the
|
|||
|
filing of this Indictment, in the Southern District of New York,
|
|||
|
JULIO FERNANDEZ, a/k/a "Outlaw," the defendant, unlawfully,
|
|||
|
willfully and knowingly and having devised and intending to
|
|||
|
devise a scheme and artifice to defraud and for obtaining
|
|||
|
property by means of false and fraudulent pretenses and
|
|||
|
representations, to wit, a scheme to obtain unauthorized access
|
|||
|
to NYU's computer system and to use an NYU Billing code that was
|
|||
|
not assigned to him to obtain free telephone connections to
|
|||
|
computers outside of NYU, did, for the purpose of executing such
|
|||
|
scheme, transmit and cause to be transmitted by means of wire
|
|||
|
communications in interstate commerce, writings, signs,and
|
|||
|
signals, to wit:
|
|||
|
|
|||
|
Destination Called
|
|||
|
_Count_ _Date of Call to NYU_ _From NYU Computer_
|
|||
|
8 November 29, 1991 Southwestern ell 5ESS
|
|||
|
telephone switching computer
|
|||
|
El Paso, Texas
|
|||
|
9 December 5, 1991 University of Washington
|
|||
|
computer system
|
|||
|
Seattle, Washington
|
|||
|
|
|||
|
(Title 18, United States Code, Section 1343.)
|
|||
|
|
|||
|
- 22 -
|
|||
|
|
|||
|
_COUNTS TEN AND ELEVEN_
|
|||
|
|
|||
|
_Wire Fraud_
|
|||
|
|
|||
|
The Grand Jury further charges:
|
|||
|
15. From in or about June, 1991 through the date of the
|
|||
|
filing of this Indictment, in the Southern District of New York,
|
|||
|
JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," the
|
|||
|
defendant, unlawfully, willfully and knowingly and having devised
|
|||
|
and intending to devise a scheme and artifice to defraud and for
|
|||
|
obtaining property by means of false and fraudulent pretenses and
|
|||
|
representations, to wit, a scheme to obtain unauthorized access
|
|||
|
to NYU's computer system and to use an NYU billing code that was
|
|||
|
not assigned to him to obtain free telephone connections to
|
|||
|
computers outside of NYU, did, for the purpose of executing such
|
|||
|
scheme, transmit and cause to be transmitted by means of wire
|
|||
|
communications in interstate commerce, writings, signs, and
|
|||
|
signals, to wit:
|
|||
|
|
|||
|
Destination Called
|
|||
|
_Count_ _Date of Call to NYU_ _From NYU Computer_
|
|||
|
10 November 21,1991 University of Washington
|
|||
|
computer system
|
|||
|
Seattle, Washington
|
|||
|
11 November 23, 1991 University of Washington
|
|||
|
computer system
|
|||
|
Seattle, Washington
|
|||
|
|
|||
|
(Title 18, United States Code, Section 1343.)
|
|||
|
|
|||
|
|
|||
|
(signed)
|
|||
|
_________________ ___________________________
|
|||
|
Foreperson OTTO G. OBERMAIER
|
|||
|
United States Attorney
|
|||
|
|
|||
|
- 23 -
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 14 Jul 92 22:02:12 PDT
|
|||
|
From: mcmullen@well.sf.ca.us
|
|||
|
Subject: File 2--Newsbytes Editorial on MOD Indictment
|
|||
|
|
|||
|
NEWSBYTES EDITORIAL
|
|||
|
|
|||
|
Second Thoughts On New York Computer Crime Indictments 7/13/92
|
|||
|
NEW YORK, N.Y., U.S.A., 1992 JULY 13 (NB) -- On Wednesday, July 9th, I
|
|||
|
sat at a press briefing in New York City's Federal Court Building
|
|||
|
during which law enforcement officials presented details relating to
|
|||
|
the indictment of 5 young computer "hackers". In describing the
|
|||
|
alleged transgressions of the indicted, United States Assistant
|
|||
|
Attorney Stephen Fishbein wove a tale of a conspiracy in which members
|
|||
|
of an evil sounding group called the "Masters of Destruction" (MOD)
|
|||
|
attempted to wreck havoc with the telecommunications system of the
|
|||
|
country.
|
|||
|
|
|||
|
The accused were charged with infiltrating computer systems belonging
|
|||
|
to telephone companies, credit bureaus, colleges and defense
|
|||
|
contractors --Southwestern Bell, BT North America, New York Telephone,
|
|||
|
ITT, Information America, TRW, Trans Union, Pacific Bell, the
|
|||
|
University of Washington, New York University, U.S. West, Learning
|
|||
|
Link, Tymnet and Martin Marietta Electronics Information, and Missile
|
|||
|
Group. They were charged with causing injury to the telephone systems,
|
|||
|
charging long distance calls to the universities, copying private
|
|||
|
credit information and selling it to third parties -- a long list of
|
|||
|
heinous activities.
|
|||
|
|
|||
|
The immediate reaction to the indictments were predictably knee-jerk.
|
|||
|
Those who support any so-called "hacker"-activities mocked the
|
|||
|
government and the charges that were presented, forgetting, it seems
|
|||
|
to me, that these charges are serious -- one of the accused could face
|
|||
|
up to 40 years in prison and $2 million in fines; another - 35 years
|
|||
|
in prison and $1.5 million in fines. In view of that possibility, it
|
|||
|
further seems to me that it is a wasteful diversion of effort to get
|
|||
|
all excited that the government insists on misusing the word "hacker"
|
|||
|
(The indictment defines computer hacker as "someone who uses a
|
|||
|
computer or a telephone to obtain unauthorized access to other
|
|||
|
computers.") or that the government used wiretapping evidence to
|
|||
|
obtain the indictment (I think that, for at least the time being that
|
|||
|
the wiretapping was carried out under a valid court order; if it were
|
|||
|
not, the defendants' attorneys will have a course of action.).
|
|||
|
|
|||
|
On the other hand, those who traditionally take the government and
|
|||
|
corporate line were publicly grateful that this threat to our
|
|||
|
communications life had been removed -- they do not in my judgement
|
|||
|
properly consider that some of these charges may have been
|
|||
|
ill-conceived and a result of political considerations.
|
|||
|
|
|||
|
Both groups, I think, oversimplify and do not give proper
|
|||
|
consideration to the wide spectrum of issues raised by the indictment
|
|||
|
document. The issues range from a simple black-and-white case of
|
|||
|
fraudulently obtaining free telephone time to the much broader
|
|||
|
question of the appropriate interaction of technology and law
|
|||
|
enforcement.
|
|||
|
|
|||
|
The most clear cut cases are the charges such as the ones which allege
|
|||
|
that two of the indicted, Julio Fernandez a/k/a "Outlaw" and John Lee
|
|||
|
a/k/a "Corrupt" fraudulently used the computers of New York University
|
|||
|
to avoid paying long distance charges for calls to computer systems in
|
|||
|
El Paso Texas and Seattle, Washington. The individuals named either
|
|||
|
did or did not commit the acts alleged and, if it is proven that they
|
|||
|
did, they should receive the appropriate penalty (it may be argued
|
|||
|
that the 5 year, $250,000 fine maximum for each of the counts in this
|
|||
|
area is excessive but that is a sentencing issue not an indictment
|
|||
|
issue.).
|
|||
|
|
|||
|
Other charges of this black-and-white are those that allege that
|
|||
|
Fernandez and/or Lee intercepted electronic communications over
|
|||
|
networks belonging to Tymnet and the Bank of America. Similarly, the
|
|||
|
charge that Fernandez, on December 4, 1991 possessed hundreds of user
|
|||
|
id's and passwords of Southwestern Bell, BT North America and TRW fits
|
|||
|
in the category of "either he did it or he didn't."
|
|||
|
|
|||
|
A more troubling count is the charge that the indicted 5 were all part
|
|||
|
of a conspiracy to "gain access to and control of computer systems in
|
|||
|
order to enhance their image and prestige among other computer
|
|||
|
hackers; to harass and intimidate rival hackers and people they did
|
|||
|
not like; to obtain telephone, credit, information, and other services
|
|||
|
without paying for them; and to obtain. passwords, account numbers and
|
|||
|
other things of value which they could sell to others."
|
|||
|
|
|||
|
To support this allegation, the indictment lists 26, lettered A
|
|||
|
through Z, Overt Acts" to support the conspiracy. While this section
|
|||
|
of the indictment lists numerous telephone calls between some of the
|
|||
|
individuals, it mentions the name Paul Stira a/k/a "Scorpion" only
|
|||
|
twice with both allegations dated "on or about" January 24, 1990, a
|
|||
|
full 16 months before the next chronological incident. Additionally,
|
|||
|
Stira is never mentioned as joining in any of the wiretapped
|
|||
|
conversation -- in fact, he is never mentioned again! I find it hard
|
|||
|
to believe that he could be considered, from these charges, to have
|
|||
|
engaged in a criminal conspiracy with any of the other defendants.
|
|||
|
|
|||
|
Additionally, some of the allegations made under the conspiracy count
|
|||
|
seem disproportionate to some of the others. Mark Abene a/k/a "Phiber
|
|||
|
Optik" is of possessing proprietary technical manuals belonging to BT
|
|||
|
North America while it is charged that Lee and Hernandez, in exchange
|
|||
|
for several hundred dollars, provided both information on how to
|
|||
|
illegally access credit reporting bureaus and an actual TRW account
|
|||
|
and password to a person, Morton Rosenfeld, who later illegally
|
|||
|
accessed TRW, obtained credit reports on 176 individuals and sold the
|
|||
|
reports to private detective (Rosenfeld, indicted separately, pled
|
|||
|
guilty to obtaining and selling the credit reports and named "Julio"
|
|||
|
and "John" as those who provided him with the information). I did not
|
|||
|
see anywhere in the charges any indication that Abene, Stira or Elias
|
|||
|
Lapodoulos conspired with or likewise encouraged Lee or Fernandez to
|
|||
|
sell information involving the credit bureaus to a third party
|
|||
|
|
|||
|
Another troubling point is the allegation that Fernandez, Lee, Abene
|
|||
|
and "others whom they aided and abetted" performed various computer
|
|||
|
activities "that caused losses to Southwestern Bell of approximately
|
|||
|
$370,000." The $370,000 figure, according to Assistant United States
|
|||
|
Attorney Stephen Fishbein, was developed by Southwestern Bell and is
|
|||
|
based on "expenses to locate and replace computer programs and other
|
|||
|
information that had been modified or otherwise corrupted, expenses to
|
|||
|
determine the source of the unauthorized intrusions, and expenses for
|
|||
|
new computers and security devices that were necessary to prevent
|
|||
|
continued unauthorized access by the defendants and others whom they
|
|||
|
aided and abetted."
|
|||
|
|
|||
|
While there is precedent in assigning damages for such things as
|
|||
|
"expenses for new computers and security devices that were necessary
|
|||
|
to prevent continued unauthorized access by the defendants and others
|
|||
|
whom they aided and abetted." (the Riggs, Darden & Grant case in
|
|||
|
Atlanta found that the defendants were liable for such expenses), many
|
|||
|
feel that such action is totally wrong. If a person is found uninvited
|
|||
|
in someone's house, they are appropriately charged with unlawful entry,
|
|||
|
trespassing, burglary --whatever th statute is for the transgression;
|
|||
|
he or she is, however, not charged with the cost of the installation
|
|||
|
of an alarm system or enhanced locks to insure that no other person
|
|||
|
unlawfully enters the house.
|
|||
|
|
|||
|
When I discussed this point with a New York MIS manager, prone to take
|
|||
|
a strong anti-intruder position, he said that an outbreak of new
|
|||
|
crimes often results in the use of new technological devices such as
|
|||
|
the nationwide installation of metal detectors in airports in the
|
|||
|
1970's. While he meant thi as a justification for liability, the
|
|||
|
analogy seems rather to support the contrary position. Air line
|
|||
|
hijackers were prosecuted for all sorts of major crimes; they were,
|
|||
|
however, never made to pay for the installation of the metal detectors
|
|||
|
or absorb the salary of the additional air marshalls hired to combat
|
|||
|
hijacking.
|
|||
|
|
|||
|
I think the airline analogy also brings out the point that one may
|
|||
|
both support justifiable penalties for proven crimes and oppose
|
|||
|
unreasonable ones -- too often, when discussing these issues,
|
|||
|
observers choose one valid position to the unnecessary exclusion of
|
|||
|
another valid one. There is nothing contradictory, in my view, to
|
|||
|
holding both that credit agencies must be required to provide the
|
|||
|
highest possible level of security for data they have collected AND
|
|||
|
that persons invading the credit data bases, no matter how secure they
|
|||
|
are, be held liable for their intrusions. We are long past accepting
|
|||
|
the rationale that the intruders "are showing how insecure these
|
|||
|
repositories of our information are." We all know that the lack of
|
|||
|
security is scandalous; this fact, however, does not excuse criminal
|
|||
|
behavior (and it should seem evident that the selling of electronic
|
|||
|
burglar tools so that someone may copy and sell credit reports is not
|
|||
|
a public service).
|
|||
|
|
|||
|
The final point that requires serious scrutiny is the use of the
|
|||
|
indictment a a tool in the on-going political debate over the FBI
|
|||
|
Digital Telephony proposal. Announcing the indictments, Otto G.
|
|||
|
Obermaier, United States Attorney for the Southern District of New
|
|||
|
York, said that this investigation was "the first investigative use of
|
|||
|
court-authorized wiretaps to obtain conversations and data
|
|||
|
transmissions of computer hackers." He said that this procedure was
|
|||
|
essential to the investigation and that "It demonstrates, think, the
|
|||
|
federal government's ability to deal with criminal conduct as it moves
|
|||
|
into new technological areas." He added that the interception of data
|
|||
|
was possible only because the material was in analog form and added
|
|||
|
"Most of the new technology is in digital form and there is a pending
|
|||
|
statute in Congress which seeks the support of telecommunications
|
|||
|
companies to allow the federal government, under court authorization,
|
|||
|
to intercept digital transmission. Many of you may have read the
|
|||
|
newspaper about the laser transmission which go through fiber optics
|
|||
|
as a method of the coming telecommunications method. The federal
|
|||
|
government needs the help of Congress and, indeed, the
|
|||
|
telecommunications companies to able to intercept digital
|
|||
|
communications."
|
|||
|
|
|||
|
The FBI proposal has been strongly attacked by the American Civil
|
|||
|
Liberties Union (ACLU), the Electronic Frontier Foundation (EFF) and
|
|||
|
Computer Professionals for Social Responsibility (CPSR) as an attempt
|
|||
|
to institutionalize, for the first time, criminal investigations as a
|
|||
|
responsibility of the communications companies; a responsibility that
|
|||
|
they feel belongs solely to law-enforcement. Critics further claim
|
|||
|
that the proposal will impede the development of technology and cause
|
|||
|
developers to have to "dumb-down" their technologies to include the
|
|||
|
requested interception facilities. The FBI, on the other hand,
|
|||
|
maintains that the request is simply an attempt to maintain its
|
|||
|
present capabilities in the face of advancing technology.
|
|||
|
|
|||
|
Whatever the merits of the FBI position, it seems that the indictments
|
|||
|
either would not have been made at this time or, at a minimum, would
|
|||
|
not have been done with such fanfare if it were not for the desire to
|
|||
|
attempt to drum up support for the pending legislation. The press
|
|||
|
conference was the biggest thing of this type since the May 1990
|
|||
|
"Operation Sun Devil" press conference in Phoenix, Arizona and, while
|
|||
|
that conference, wowed us with charges of "hackers" endangering lives
|
|||
|
by disrupting hospital procedures and being engaged in a nationwide,
|
|||
|
13 state conspiracy, this one told us about a bunch of New York kids
|
|||
|
supposedly engaged in petty theft, using university computers without
|
|||
|
authorization and performing a number of other acts referred to by
|
|||
|
Obermaier as "anti-social behavior" -- not quite as heady stuff!
|
|||
|
|
|||
|
It is not to belittle these charges -- they are quite serious -- to
|
|||
|
question the fanfare. The conference was attended by a variety of high
|
|||
|
level Justice Department, FBI and Secret Service personnel and veteran
|
|||
|
New York City crime reporters tell me that the amount of alleged
|
|||
|
damages in this case would normally not call for such a production --
|
|||
|
New York Daily News reporter Alex Michelini publicly told Obermaier
|
|||
|
"What you've outlined, basically, except for the sales of credit
|
|||
|
information, this sounds like a big prank, most of it" (Obermaier's
|
|||
|
response -- "Well, I suppose, if you can characterize that as a prank
|
|||
|
but it's really a federal crime allowing people without authorization
|
|||
|
to rummage through the data of other people to which they do not have
|
|||
|
access and, as I point out to you again, the burglar cannot be your
|
|||
|
safety expert. He may be inside and laugh at you when you come home
|
|||
|
and say that your lock is not particularly good but I think you, if
|
|||
|
you were affected by that contact, would be somewhat miffed"). One
|
|||
|
hopes that it is only the fanfare surrounding the indictments that is
|
|||
|
tied in with the FBI initiative and not the indictments themselves.
|
|||
|
|
|||
|
As an aside, two law enforcement people that I have spoken to have
|
|||
|
said that while the statement that the case is "the first
|
|||
|
investigative use of court-authorized wiretaps to obtain conversations
|
|||
|
and data transmissions of computer hackers.", while probably true,
|
|||
|
seems to give the impression that the case is the first one in which
|
|||
|
data transmission was intercepted. According to these sources, that
|
|||
|
is far from the case -- there have been many instances of inception of
|
|||
|
data and fax information by law enforcement officials in recent years.
|
|||
|
|
|||
|
I know each of the accused in varying degrees. The one that I know the
|
|||
|
best, Phiber Optik, has participated in panels with myself and law
|
|||
|
enforcement officials discussing issues relating to so-called "hacker"
|
|||
|
crime. He has also appeared on various radio and television shows
|
|||
|
discussing the same issues. These high profile activities have made him
|
|||
|
an annoyance to some in law enforcement. One hopes that this annoyance
|
|||
|
played no part in the indictment.
|
|||
|
|
|||
|
I have found Phiber's presence extremely valuable in these discussions
|
|||
|
both for the content and for the fact that his very presence attracts
|
|||
|
an audience that might never otherwise get to hear the voices of
|
|||
|
Donald Delaney, Mike Godwin, Dorothy Denning and others addressing
|
|||
|
these issues from quite different vantage points. While he has, in
|
|||
|
these appearances, said that he has "taken chances to learn things",
|
|||
|
he has always denied that he has engaged in vandalous behavior and
|
|||
|
criticized those who do. He has also called those who engage in
|
|||
|
"carding" and the like as criminals (These statements have been made
|
|||
|
not only in the panel discussion but also on the occasions that he has
|
|||
|
guest lectured to my class in "Connectivity" at the New School For
|
|||
|
Social Research in New York City. In those classes, he has discussed
|
|||
|
the history of telephone communications in a way that has held a class
|
|||
|
of professionals enthralled by over two hours.
|
|||
|
|
|||
|
While my impressions of Phiber or any of the others are certainly not
|
|||
|
a guarantee of innocence on these charges, they should be taken as my
|
|||
|
personal statement that we are not dealing with a ring of hardened
|
|||
|
criminals that one would fear on a dark knight.
|
|||
|
|
|||
|
In summary, knee-jerk reactions should be out and thoughtful analysis
|
|||
|
in! We should be insisting on appropriate punishment for lawbreakers
|
|||
|
-- this means neither winking at "exploration" nor allowing inordinate
|
|||
|
punishment. We should be insisting that companies that have collected
|
|||
|
data about us properly protect -- and are liable for penalties when
|
|||
|
they do not. We should not be deflected from this analysis by support
|
|||
|
or opposition to the FBI proposal before Congress -- that requires
|
|||
|
separate analysis and has nothing to do with the guilt or innocence of
|
|||
|
these young men or the appropriate punishment should any guilt be
|
|||
|
established.
|
|||
|
|
|||
|
(John F. McMullen/19920713)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.31
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|