809 lines
39 KiB
Plaintext
809 lines
39 KiB
Plaintext
|
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Volume 1, Issue #1.28 (Aug 12, 1990) **
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|||
|
ARCHIVISTS: Bob Krause / Alex Smith
|
|||
|
USENET readers can currently receive CuD as alt.society.cu-digest.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source is
|
|||
|
cited. It is assumed that non-personal mail to the moderators may be
|
|||
|
reprinted, unless otherwise specified. Readers are encouraged to submit
|
|||
|
reasoned articles relating to the Computer Underground.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent the
|
|||
|
views of the moderators. Contributors assume all responsibility
|
|||
|
for assuring that articles submitted do not violate copyright
|
|||
|
protections.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: A Conversation with Len Rose
|
|||
|
File 3: Len Rose's Indictment
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #1.28, File 1 of 4: Moderators' Comments ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Date: 9 August, 1990
|
|||
|
From: Moderators
|
|||
|
Subject: Moderators' Corner
|
|||
|
|
|||
|
++++++++++
|
|||
|
In this file:
|
|||
|
1) CRAIG NEIDORF Update
|
|||
|
2) PHRACK MAGAZINE CONTROVERSY
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++
|
|||
|
CRAIG NEIDORF DEFENSE FUND
|
|||
|
+++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Craig Neidorf has asked us to pass along a strong *THANK YOU* to everybody
|
|||
|
who supported him throughout his ordeal. He will be resuming college in
|
|||
|
the fall. Craig's diversion program does not restrict his freedom to
|
|||
|
associate with whom he wishes or to publish as he wishes. However, he has
|
|||
|
repeatedly and unequivocally emphasized that he has no plans to continue
|
|||
|
PHRACK. Craig must speak with a pre-trial officer once a month for the next
|
|||
|
year. The government cannot refile charges if craig is not arrested for a
|
|||
|
computer-related crime in the next 12 months.
|
|||
|
|
|||
|
Many people have asked how they can help contribute to Craig's legal
|
|||
|
expenses. Checks should be made out to the law firm of KATTEN, MUCHIN AND
|
|||
|
ZAVIS, and sent directly to his defense attorney:
|
|||
|
|
|||
|
Sheldon Zenner
|
|||
|
c/o Katten, Muchin and Zavis
|
|||
|
525 W. Monroe, Suite 1600
|
|||
|
Chicago, IL 60606
|
|||
|
|
|||
|
A note should be included indicating it is "for Craig Neidorf," and if the
|
|||
|
check has a line for memos, there should be an additional notation
|
|||
|
indicating "for Craig Neidorf."
|
|||
|
|
|||
|
+++++++++++++++
|
|||
|
PHRACK MAGAZINE CONTROVERSY
|
|||
|
+++++++++++++++
|
|||
|
|
|||
|
When PHRACK 31 appeared, some readers were highly critical because they
|
|||
|
felt the re-incarnation was a "rip-off" of the original. Others, with
|
|||
|
equal passion, defended retaining the name as a way respecting the
|
|||
|
tradition it has developed and of keeping it alive. Now that PHRACK 32 may
|
|||
|
be out soon, we invite readers to present, without flames, their position
|
|||
|
and their reasoning. We especially invite the new editors of PHRACK to
|
|||
|
present their side of the issue.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 11 August, 1990
|
|||
|
From: Jim Thomas
|
|||
|
Subject: Len Rose Interview
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #1.28: File 2 of 4: Len Rose Interview ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
The Len Rose case seems to present problems for many people. Some, who
|
|||
|
ordinarily support Constitutional rights, seem to have backed away from
|
|||
|
this case, perhaps because of the seriousness of the charges, or perhaps
|
|||
|
because his case does not seem as "pure" as those of some other defendants.
|
|||
|
Some people are also concerned that Len's brush with the law "taints" him.
|
|||
|
|
|||
|
We feel that Len's case deserves attention comparable to other recent
|
|||
|
cases. The charges in the indictment, as explained to us, are no more
|
|||
|
serious than those in the indictment's of others, and the charges do not
|
|||
|
seem to be as serious as the media depicts them. More importantly, the duel
|
|||
|
model process of justice that ostensibly guides criminal proceedings must
|
|||
|
be applied to all equally, whether the defendant is squeaky clean or a
|
|||
|
homicidal maniac. We are troubled by those who think that, because Len has
|
|||
|
had a previous legal problem, he is less deserving of legal help. Often, it
|
|||
|
is precisely those whose image is the most tarnished who are most at risk
|
|||
|
in the judicial process. If the issues are worthy and potentially affect
|
|||
|
others, then it is in everybody's interests to assure that justice is
|
|||
|
served.
|
|||
|
|
|||
|
CuD recently talked at length with Len about his current situation. We
|
|||
|
have not talked with Len's attorney nor have we seen copies of motions or
|
|||
|
of the evidence. Len's current attorney is a public defender who has been
|
|||
|
busy in the multiple calls we made daily for three days. He has not
|
|||
|
returned our calls. Those who have the time to try to obtain information
|
|||
|
from him may contact him at:
|
|||
|
|
|||
|
Jim Kraft (the attorney)
|
|||
|
Kraft, Balcerzak and Bartlett
|
|||
|
7050 Oakland Mills Road
|
|||
|
Columbia, MD 21046 (phone: 301-381-4646).
|
|||
|
|
|||
|
Len informs us that the case number is CR-90-0202, Federal Court, Baltimore.
|
|||
|
|
|||
|
*******************************************************************
|
|||
|
|
|||
|
WHO IS LEN ROSE?
|
|||
|
|
|||
|
Len Rose is a 31 year old computer programmer who lives in Pennsylvania.
|
|||
|
He has been married for 10 years and has a son, five years old, and a two
|
|||
|
year old daughter. He served six years in the army and, he informed us,
|
|||
|
received the highest peacetime medal and "held a top secret clearance until
|
|||
|
this happened." Len broke his leg in three places in early August during a
|
|||
|
fishing outing with his son when he fell off a 35 foot cliff, "but at least
|
|||
|
I kept my son from falling," he said. Prior to his arrest, Len operated
|
|||
|
his own computer system and was a computer consultant. One specialty area
|
|||
|
was Unix systems.
|
|||
|
|
|||
|
WHAT IS LEN CHARGED WITH?
|
|||
|
|
|||
|
Len told us that there are five counts against him under Title 18. Two are
|
|||
|
for computer fraud and three are for transporting allegedly stolen goods in
|
|||
|
excess of $5,000 across state lines. (See File 3, this issue, for a copy
|
|||
|
of the indictment).
|
|||
|
|
|||
|
According to Len, the two fraud counts were for allegedly altering
|
|||
|
"login.c," which is source code for unix login programs, which was modified
|
|||
|
to perform a trojan horse function to record login names and passwords and
|
|||
|
store them in a file system. Len said he wrote the program because
|
|||
|
somebody was attacking his own system, and he installed the program on his
|
|||
|
system to see what accounts were being attacked. He indicated that login.c
|
|||
|
is being valued in the indictment at $75,000, a value reminiscent of the
|
|||
|
inflated E911 file charges that federal prosecutors in Chicago charged was
|
|||
|
worth over $79,000. Under cross-examination, it was determined that the
|
|||
|
information in the E911 files could be obtained in a $13 manual. The other
|
|||
|
fraud count was for sending out a password scanner that he wrote himself
|
|||
|
that scans passwords and tries to decrypt them. "You can find more powerful
|
|||
|
programs n the net," he said, "such as Crypt Breakers Workbench and COPS,
|
|||
|
which are archived on uunet to name just two %sources%."
|
|||
|
|
|||
|
According to Len, "The things I wrote were so trivial, a first year
|
|||
|
computer science student could have written them. What it did was take a
|
|||
|
word out of a dictionary file and encrypt it, and it compared the encrypted
|
|||
|
form to the encrypted password in the password file. It was a very mindless
|
|||
|
program. I had written it a long time ago, and used it many times myself
|
|||
|
and when I was doing it for security %consulting%. That's all I used it
|
|||
|
for, on any system concerned with security. In fact, it was obsolete,
|
|||
|
because when ATT released system V 3.2 backin 1988, they stopped using the
|
|||
|
file /etc/password and went to the /etc/shadow which was only readable by
|
|||
|
the root account or super user accounts. This program %in question% can't
|
|||
|
be installed without being able to control the system. I couldn't be used
|
|||
|
by a normal user."
|
|||
|
|
|||
|
The three transportation counts apparently stemmed from multiple sendings
|
|||
|
of this file. He sent the program to an e-mail publication, but the
|
|||
|
program did not arrive intact, so he re-sent it, which, he said, was the
|
|||
|
basis of the second count. The final count, for the same program,
|
|||
|
occured because he deleted his own program and received a copy of the
|
|||
|
program he had previously sent.
|
|||
|
|
|||
|
Len related a story that sounded similar to SS Agent Timothy Foley's
|
|||
|
account of the initial questioning of Craig Neidorf. Len said he was
|
|||
|
originally asked about the E911 files, and that the agents told him that he
|
|||
|
was not in any trouble. Len said, "I told them everything I knew. I
|
|||
|
cooperated with them to the fullest extent possible, because I trusted
|
|||
|
them. I didn't try to hide anything. I told them everything, and they were
|
|||
|
after this 911 stuff. They said I wouldn't be prosecuted if I told them
|
|||
|
everything, but they did. They told me to tell them now and it won't
|
|||
|
matter, but if it came out later.....I told him about the source code."
|
|||
|
|
|||
|
Len emphasized that he did not steal the source code and that he used it
|
|||
|
only to learn Unix.
|
|||
|
|
|||
|
Contrary to some reports both in the media and circulating on the nets, Len
|
|||
|
adamantly denies ever being a member of the Legion of Doom, a denial
|
|||
|
confirmed by LoD members and a recent LoD listing of participants. "I never
|
|||
|
said I was a member of LoD, that was nothing out of my mouth. I never had
|
|||
|
any association with them, and only knew some of the people. I considered
|
|||
|
it a kids group, immature, and I never had any involvement with any group
|
|||
|
anywhere. I was not a joiner," he said.
|
|||
|
|
|||
|
WHAT WAS LEN'S PREVIOUS OFFENSE?
|
|||
|
|
|||
|
Because of the rumors circulating about an earlier offense, we asked Len to
|
|||
|
tell us what he could. The case has not yet been resolved, although it will
|
|||
|
be concluded within the next few days. It occured in 1989, and was
|
|||
|
unrelated to the current situation. It was a state offense for felony
|
|||
|
theft, which resulted from an attempt to recover computer equipment that he
|
|||
|
believed at the time to be rightfully his, and was the consequence of a
|
|||
|
dispute between himself and a company he felt had "ripped him off." On the
|
|||
|
streets, we called this "midnight repossession." "It was very stupid. I had
|
|||
|
never been n trouble before that and I am very ashamed," he said. The
|
|||
|
details of the case can be more fully elaborated after it is fully
|
|||
|
resolved.
|
|||
|
|
|||
|
WHAT'S LEN'S STATUS NOW?
|
|||
|
|
|||
|
The trial was originally scheduled for August 20, but it appears now that
|
|||
|
it may be postponed until February. Until then, Len has no computer
|
|||
|
equipment, and he said that the judge would not consider a motion to return
|
|||
|
it because the judge perceived that he could use it to commit further
|
|||
|
crime. As a consequence, Len has no source of income, and said that he has
|
|||
|
lost his home, his credit rating and credit cards, his business, and some
|
|||
|
of his friends. "I've lost everything." He is currently immobilized because
|
|||
|
of his leg fracture, and will be in casts of various types for at least
|
|||
|
eight weeks and may require surgery. His situation has put severe strains
|
|||
|
on his finances, psyche, and domestic life. He indicated that he could no
|
|||
|
longer afford to retain his original attorney, Carlos Recio of Deso and
|
|||
|
Greenberg in Washington, D.C., and was currently represented by a public
|
|||
|
defender. His income was slashed by one-twentieth, and he estimated he has
|
|||
|
barely made $5,000 this year. He lost his office and currently works from a
|
|||
|
single room in a friend's company. He feels that his reputation has been
|
|||
|
unjustifiably destroyed, largely by distorted media representations and
|
|||
|
rumors and added, "The press has been as damaging as the Secret Service."
|
|||
|
|
|||
|
If Len's account is accurate, then it would seem to raise many of the same
|
|||
|
questions addressed by the EFF, CuD, 2600 Magazine, and others interested
|
|||
|
in protecting the Constitutional rights of computerists. Len is not being
|
|||
|
charged with theft, but with violations that raise the definition of
|
|||
|
property, the legal rights of programmers, the status of source could that
|
|||
|
seems to be fairly accessible, and other evolving issues in the
|
|||
|
still-tenuous relationship between technology and law. It also raises the
|
|||
|
issue of "cruel and unusual punishment." If the summary of the indictment
|
|||
|
is correct, it would appear that the consequences resulting from Len's
|
|||
|
situation far exceed the crime, and any additional sanctions, especially if
|
|||
|
they involve incarceration, will be neither in the interests of Len, or,
|
|||
|
ultimately, of society. To deprive an individual who has been a
|
|||
|
contributing member to society of a means of livelihood would seem to serve
|
|||
|
little purpose in this or any other case. Some argue that the courts are
|
|||
|
the best forum to decide both the guilt/innocence and the fate of
|
|||
|
defendants. But, justice is not always served in the legal process,
|
|||
|
especially in the grey area of ambiguous laws enforced by technologically
|
|||
|
untrained investigators and prosecutors. Regardless of what one might
|
|||
|
think of Len's judgment in some of his behaviors, we must nonetheless ask:
|
|||
|
If Len's account is accurate, at what point does the punishment become too
|
|||
|
great? For Len Rose, the immediate goal is modest: "I just want to get my
|
|||
|
home back again."
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 12 August, 1990
|
|||
|
From: Moderators
|
|||
|
Subject: Len Rose Indictment
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #1.28: File 3 of 4: Len Rose Indictment ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Len Rose provided the following copy of his indictment, which we have
|
|||
|
edited only with a spell-checker. The five counts against Len seem quite
|
|||
|
general, and in many ways are similar both in style and substance to those
|
|||
|
filed against Craig Neidorf. The perhaps obligatory reference to the
|
|||
|
Legion of Doom is made in count one without establishing the defendant's
|
|||
|
connection to it, the value of the alleged "property" established as
|
|||
|
over $5,000 (Len informs us that the value is established at about $75,000)
|
|||
|
seems absurdly over-stated given the apparent nature of the "property" in
|
|||
|
question, he is being charged with sending a program that he wrote that is
|
|||
|
much less powerful than similar programs readily accessible to the public,
|
|||
|
and the charges themselves seem sufficiently vague and ambiguous that they
|
|||
|
could apply to many forms of knowledge or information.
|
|||
|
|
|||
|
We do not publish the indictment as a "Len Rose Issue." Instead, we suggest
|
|||
|
that the document below reflects the continued misuse of law as a means to
|
|||
|
control information. What is the precise nature of the information in
|
|||
|
question? Was it used by the defendant to defraud? Is there any evidence
|
|||
|
that he, or anybody else, intended to use it to defraud? The following
|
|||
|
indictment, like the indictment in the Neidorf case, seems vague, and from
|
|||
|
the trickles of information coming in, it seems that none of the evidence
|
|||
|
strongly supports any of the counts. If true, it seems like deja vous all
|
|||
|
over again.
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Subject: Len Rose Indictment
|
|||
|
Date: Sun, 12 Aug 90 15:29:14 -0400
|
|||
|
From: lsicom2!len@CDSCOM.CDS.COM
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
IN THE UNITED STATES DISTRICT COURT
|
|||
|
FOR THE DISTRICT OF MARYLAND
|
|||
|
|
|||
|
UNITED STATES OF AMERICA *
|
|||
|
* Criminal No.
|
|||
|
v. * - -
|
|||
|
*
|
|||
|
LEONARD ROSE, a/k/a/ "Terminus" * (Computer Fraud, 18 U.S.C.
|
|||
|
* S 1030(a) (6); Interstate
|
|||
|
* Transportation of Stolen
|
|||
|
* Property, 18 U.S.C. S 2314;
|
|||
|
* Aiding and Abetting, 18
|
|||
|
* U.S.C. S 2)
|
|||
|
Defendant. *
|
|||
|
* * * * * * * * *
|
|||
|
|
|||
|
|
|||
|
INDICTMENT
|
|||
|
|
|||
|
COUNT ONE
|
|||
|
|
|||
|
The Grand Jury for the District of Maryland charges:
|
|||
|
|
|||
|
FACTUAL BACKGROUND
|
|||
|
|
|||
|
1. At all times relevant to this Indictment, American Telephone & Telegraph
|
|||
|
Company ("AT&T"), through it's subsidiary, Bell Laboratories ("Bell Labs"),
|
|||
|
manufactured and sold UNIX (a trademark of AT&T Bell Laboratories)
|
|||
|
computer systems to customers throughout the United States of America.
|
|||
|
2. At all times relevant to this Indictment, AT&T sold computer programs
|
|||
|
("software") designed to run on the UNIX system to those customers. This
|
|||
|
software is designed and manufactured by AT&T;some software was available
|
|||
|
to the public for purchase, other software was internal AT&T software
|
|||
|
(such as accounting and password control programs) designed to operate
|
|||
|
with the AT&T UNIX system.
|
|||
|
3. At all times relevant to this indictment, computer hackers were individuals
|
|||
|
involved with gaining unauthorized access to computer systems by various
|
|||
|
means . These means included password scanning (use of a program that
|
|||
|
employed a large dictionary of words, which the program used in an attempt
|
|||
|
to decode the passwords of authorized computer system users), masquerading
|
|||
|
as authorized users, and use of trojan horse programs.
|
|||
|
4. At all times relevant to this Indictment, the Legion of Doom ("LOD") was
|
|||
|
a loosely-associated group of computer hackers. Among other activities,
|
|||
|
LOD members were involved in:
|
|||
|
|
|||
|
a. Gaining unauthorized access to computer systems for purposes of
|
|||
|
stealing computer software programs from the companies that owned the
|
|||
|
programs;
|
|||
|
b. Gaining unauthorized access to computer systems for purpose of using
|
|||
|
computer time at no charge to themselves, thereby fraudulently obtaining
|
|||
|
money and property from the companies that owned the computer systems;
|
|||
|
c. Gaining unauthorized access to computer systems for the purpose of
|
|||
|
stealing proprietary source code and information from the companies
|
|||
|
that owned the source code and information;
|
|||
|
d. Disseminating information about their methods of gaining unauthorized
|
|||
|
access to computer systems to other hackers;
|
|||
|
e. Gaining unauthorized access to computer systems for the purpose of
|
|||
|
making telephone calls at no charge to themselves, obtaining and using
|
|||
|
credit history and data for individuals other than themselves, .and
|
|||
|
the like.
|
|||
|
|
|||
|
5. At all times relevant to this Indictment, LEONARD ROSE JR. a/k/a
|
|||
|
"Terminus", was associated with the LOD and operated his own computer
|
|||
|
system, identified as Netsys. His electronic mailing address was
|
|||
|
netsys!len
|
|||
|
|
|||
|
COMPUTER TERMINOLOGY
|
|||
|
|
|||
|
6. For the purpose of this Indictment, an "assembler" is a computer program
|
|||
|
that translates computer program instructions written in assembly language
|
|||
|
(source code) into machine language executable by a computer.
|
|||
|
|
|||
|
7. For the purpose of this Indictment, a "compiler" is a computer program
|
|||
|
used to translate as computer program expressed in a problem oriented
|
|||
|
language (source code) into machine language executable by a computer.
|
|||
|
8. For the purpose of this Indictment, a "computer" is an internally
|
|||
|
programmed, automatic device that performs data processing.
|
|||
|
|
|||
|
9. For the purpose of this Indictment, a "computer network" is a set of
|
|||
|
related, remotely connected terminals and communications facilities,
|
|||
|
including more than one computer system, with the capability of
|
|||
|
transmitting data among them through communications facilities, such as
|
|||
|
telephones.
|
|||
|
|
|||
|
10.For the purposes of this Indictment, a "computer program" is a set of
|
|||
|
data representing coded instructions that, when executed by a computer
|
|||
|
causes the computer to process data.
|
|||
|
|
|||
|
11.For the purposes of this Indictment, a "computer system" is a set of
|
|||
|
related, connected, or unconnected computer equipment, devices, or software.
|
|||
|
|
|||
|
12.For the purposes of this Indictment, electronic mail ("e-mail") is a
|
|||
|
computerized method for sending communications and files between
|
|||
|
computers on computer networks. Persons who send and receive e-mail are
|
|||
|
identified by a unique "mailing" address, similar to a postal address.
|
|||
|
|
|||
|
13.For the purposes of this Indictment a "file" is a collection of related
|
|||
|
data records treated as a unit by a computer.
|
|||
|
|
|||
|
14.For the purposes of this Indictment, "hardware" is the computer and all
|
|||
|
related or attached machinery, including terminals, keyboard, disk drives,
|
|||
|
tape drives, cartridges, and other mechanical, magnetic, electrical, and
|
|||
|
electronic devices used in data processing.
|
|||
|
|
|||
|
15.For the purposes of this Indictment, a "modem" is a device that modulates
|
|||
|
and demodulates signals transmitted over data telecommunications
|
|||
|
facilities.
|
|||
|
|
|||
|
16.For the purposes of this Indictment, "software" is a set of computer
|
|||
|
programs, procedures, and associated documentation.
|
|||
|
|
|||
|
17.For the purposes of this Indictment, "source code" is instructions
|
|||
|
written by a computer programmer in a computer language that are used as
|
|||
|
input for a compiler, interpreter, or assembler. Access to source code
|
|||
|
permits a computer user to change the way in which a given computer
|
|||
|
system executes a program, without the knowledge of the computer system
|
|||
|
administrator.
|
|||
|
|
|||
|
18.For the purposes of this Indictment, "superuser privileges" (sometimes
|
|||
|
referred to as "root") are privileges on a computer system that grant
|
|||
|
the "superuser" unlimited access to the system, including the ability
|
|||
|
to change the system's programs, insert new programs, and the like.
|
|||
|
|
|||
|
19.For the purposes of this Indictment, a "trojan horse" is a set of
|
|||
|
computer instructions secretly inserted into a computer program so that
|
|||
|
when the program is executed, acts occur that were not intended to be
|
|||
|
performed by the program before modification.
|
|||
|
|
|||
|
20.For the purposes of this Indictment, "UNIX" (a trademark of AT&T Bell
|
|||
|
Laboratories) is a computer operating system designed by AT&T Bell
|
|||
|
Laboratories for use with minicomputers and small business computers,
|
|||
|
which has been widely adopted by businesses and government agencies
|
|||
|
throughout the United States.
|
|||
|
|
|||
|
COMPUTER OPERATIONS
|
|||
|
|
|||
|
21.For the purposes of this Indictment, typical computer operations are as
|
|||
|
described in the following paragraphs. A computer user initiates
|
|||
|
communications with a computer system through his terminal and modem.The
|
|||
|
modem dials the access number for the computer system the user wishes to
|
|||
|
access and, after the user is connected to the system, the modem
|
|||
|
transmits and receives data to and from the computer.
|
|||
|
|
|||
|
22.Once the connection is established, the computer requests the user's login
|
|||
|
identification and password. If the user fails to provide valid login and
|
|||
|
password information, he cannot access the computer.
|
|||
|
|
|||
|
23.Once the user has gained access to the computer, he is capable of
|
|||
|
instructing the computer to execute existing programs. These programs are
|
|||
|
composed of a collection of computer files stored in the computer's
|
|||
|
memory. The commands that make up each file and, in turn, each program, are
|
|||
|
source code. Users who have source code are able to see all of the
|
|||
|
commands that make up a particular program. They can change these commands,
|
|||
|
causing the computer to perform tasks that the author of the program did
|
|||
|
not intend.
|
|||
|
|
|||
|
24.The user may also copy certain files or programs from the computer he has
|
|||
|
accessed; if the user is unauthorized, this procedure allows the user to
|
|||
|
obtain information that is not otherwise available to him.
|
|||
|
|
|||
|
25.In addition, once a user has accessed a computer, he may use it's network
|
|||
|
connections to gain access to other computers. Gaining access from one
|
|||
|
computer to another permits a user to conceal his location because login
|
|||
|
information on the second computer will reflect only that the first
|
|||
|
computer accessed the second computer.
|
|||
|
|
|||
|
26.If a user has superuser privileges, he may add, replace, or modify existing
|
|||
|
programs in the computer system. The user performs these tasks by
|
|||
|
"going root"; that is, by entering a superuser password and instructing
|
|||
|
the computer to make systemic changes.
|
|||
|
|
|||
|
27. On or about January 13, 1989, in the State and District of Maryland, and
|
|||
|
elsewhere,
|
|||
|
|
|||
|
LEONARD ROSE JR. a/k/a Terminus
|
|||
|
|
|||
|
did knowingly, willfully, intentionally, and with intent to defraud,
|
|||
|
traffic in (that is, transfer, and otherwise dispose of to another, and
|
|||
|
obtain control of with intent to transfer and dispose of) information
|
|||
|
through which a computer may be accessed without authorization, to wit:
|
|||
|
a trojan horse program designed to collect superuser passwords, and by
|
|||
|
such conduct affected interstate commerce.
|
|||
|
|
|||
|
|
|||
|
18 U.S.C. S 1030(a) (6)
|
|||
|
18 U.S.C. S 2
|
|||
|
|
|||
|
|
|||
|
COUNT TWO
|
|||
|
|
|||
|
And the Grand Jury for the District of Maryland further charges:
|
|||
|
|
|||
|
1. Paragraphs 1 through 26 of Count One are incorporated by reference,
|
|||
|
as if fully set forth.
|
|||
|
2. On or about January 9, 1990, in the State and District of Maryland,
|
|||
|
and elsewhere,
|
|||
|
|
|||
|
LEONARD ROSE JR. a/k/a/ Terminus
|
|||
|
|
|||
|
did knowingly, willfully, intentionally, and with intent to defraud,
|
|||
|
traffic in (that is, transfer, and otherwise dispose of to another, and
|
|||
|
obtain control of with intent to transfer and dispose of) information
|
|||
|
through which a computer may be accessed without authorization, to wit:
|
|||
|
a trojan horse login program, and by such conduct affected interstate
|
|||
|
commerce.
|
|||
|
|
|||
|
|
|||
|
18 U.S.C. S 1030(a) (6)
|
|||
|
18 U.S.C. S 2
|
|||
|
|
|||
|
|
|||
|
COUNT THREE
|
|||
|
|
|||
|
|
|||
|
And the Grand Jury for the District of Maryland further charges:
|
|||
|
|
|||
|
1. Paragraphs 1 through 26 of Count One are incorporated by reference,
|
|||
|
as if fully set forth.
|
|||
|
2. That on or about May 13, 1988 in the State and District of Maryland,
|
|||
|
and elsewhere,
|
|||
|
|
|||
|
LEONARD ROSE JR. a/k/a/ Terminus
|
|||
|
|
|||
|
did cause to be transported, transmitted, and transformed in interstate
|
|||
|
commerce goods, wares, and merchandise of the value of $5000 or more, to
|
|||
|
wit: computer source code that was confidential, proprietary information
|
|||
|
of AT&T, knowing the same to have been stolen, converted, and taken by
|
|||
|
fraud.
|
|||
|
|
|||
|
18 U.S.C. S 2314
|
|||
|
18 U.S.C. S 2
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
COUNT FOUR
|
|||
|
|
|||
|
|
|||
|
And the Grand Jury for the District of Maryland further charges:
|
|||
|
|
|||
|
1. Paragraphs 1 through 26 of Count One are incorporated by reference,
|
|||
|
as if fully set forth.
|
|||
|
2. That on or about January 15, 1989 in the State and District of Maryland,
|
|||
|
and elsewhere,
|
|||
|
|
|||
|
LEONARD ROSE JR. a/k/a/ Terminus
|
|||
|
|
|||
|
did cause to be transported, transmitted, and transformed in interstate
|
|||
|
commerce goods, wares, and merchandise of the value of $5000 or more, to
|
|||
|
wit: computer source code that was confidential, proprietary information
|
|||
|
of AT&T, knowing the same to have been stolen, converted, and taken by
|
|||
|
fraud.
|
|||
|
|
|||
|
|
|||
|
18 U.S.C. S 2314
|
|||
|
18 U.S.C. S 2
|
|||
|
|
|||
|
COUNT FIVE
|
|||
|
|
|||
|
|
|||
|
And the Grand Jury for the District of Maryland further charges:
|
|||
|
|
|||
|
1. Paragraphs 1 through 26 of Count One are incorporated by reference,
|
|||
|
as if fully set forth.
|
|||
|
2. That on or about January 8, 1990 in the State and District of Maryland,
|
|||
|
and elsewhere,
|
|||
|
|
|||
|
LEONARD ROSE JR. a/k/a/ Terminus
|
|||
|
|
|||
|
did cause to be transported, transmitted, and transformed in interstate
|
|||
|
commerce goods, wares, and merchandise of the value of $5000 or more, to
|
|||
|
wit: computer source code that was confidential, proprietary information
|
|||
|
of AT&T, knowing the same to have been stolen, converted, and taken by
|
|||
|
fraud.
|
|||
|
|
|||
|
18 U.S.C. S 2314
|
|||
|
18 U.S.C. S 2
|
|||
|
|
|||
|
____________________
|
|||
|
|
|||
|
Breckinridge L. Wilcox
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 11 August, 1990
|
|||
|
From: Contributors
|
|||
|
Subject: CU In the News
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #1.28: File 4 of 4: The CU in the News ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Date: Sun, 29 Jul 90 17:36 CDT
|
|||
|
From: Anonymous
|
|||
|
Subject: Neidorf news coverage- Markoff article
|
|||
|
|
|||
|
"U.S. Drops Computer Case Against Student"
|
|||
|
(By John Markoff, New York Times, June 28, 1990, p. 7)
|
|||
|
|
|||
|
Federal prosecutors in Chicago yesterday dropped felony charges against a
|
|||
|
20-year-old college student in a computer crime case that has drawn national
|
|||
|
attention because of the civil liberties issues involved.
|
|||
|
|
|||
|
In a trial that began Monday, the Government had accused the student, Craig M.
|
|||
|
Neidorf of the University of Missouri, of publishing an internal telephone
|
|||
|
company document describing the emergency 911 system for nine states in the
|
|||
|
Southeast. The Government said he had obtained the document from another
|
|||
|
computer user who had stolen it electronically from the company, the BellSouth
|
|||
|
Corporation of Atlanta; Mr. Neidorf then published it in an underground
|
|||
|
computer newsletter that was distributed electronically on computer networks
|
|||
|
and electronic bulletin boards.
|
|||
|
|
|||
|
But an assistant United States Attorney, William J. Cook, said the government
|
|||
|
decided to drop the charges after learning that much information in the
|
|||
|
document was already publicly available.
|
|||
|
|
|||
|
"The value of the document was one of the factors in the prosecution," he
|
|||
|
said. "There were aspects of this document that we did not now were in the
|
|||
|
public domain. It was a question of the way the phone company portrayed the
|
|||
|
document.
|
|||
|
|
|||
|
Succession of Arrests
|
|||
|
|
|||
|
Mr. Neidorf did not plead guilty but acknowledged that he had received the
|
|||
|
BellSouth document and agreed to be placed in a program under which he could
|
|||
|
be prosecuted if he committed similar offenses in the future.
|
|||
|
|
|||
|
In recent months Federal and state law-enforcement officials have conducted a
|
|||
|
succession of raids around the nation and made six arrests in a campaign
|
|||
|
against young computer users who break into government and business data
|
|||
|
systems.
|
|||
|
|
|||
|
The crackdown drew angry opposition from civil liberties experts and some
|
|||
|
computer industry executives, who argued that the Government was overreacting
|
|||
|
and discouraging legitimate activities of law-abiding computer users.
|
|||
|
|
|||
|
A civil liberties organization, the Electronic Frontier Foundation, created by
|
|||
|
a computer industry executive, Mitchell D. Kapor, has spoken out in support of
|
|||
|
Mr. Neidorf.
|
|||
|
|
|||
|
Mr. Neidorf was accused of obtaining BellSouth's 911 document from Robert J.
|
|||
|
Riggs, 20, of Atlanta, one of three men who pleaded builty last month to
|
|||
|
gaining illegal entry to BellSouth computers. Mr. Riggs and Franklin Darden
|
|||
|
Jr., 23, face a maximum penalty of five years in prison and a $200,000 fine.
|
|||
|
The third man, Adam E. Grant, 22, faces a maximum penalty of 10 years in
|
|||
|
prison and a $250,000 fine.
|
|||
|
|
|||
|
Mr Riggs, testifying in the Chicago case on Thursday, said he had not acted in
|
|||
|
concert with Mr. Neidorf as the Government had charged.
|
|||
|
|
|||
|
** END **
|
|||
|
********************************************************************
|
|||
|
Date: Thu, 09 Aug 90 00:14:44 EDT
|
|||
|
From: Michael Rosen <CM193C@GWUVM>
|
|||
|
Subject: Craig Neidorf
|
|||
|
To: Computer Underground Digest <tk0jut2>
|
|||
|
|
|||
|
|
|||
|
SOURCE: Computerworld, 8/6/90, p. 8, by Michael Alexander (CW Staff):
|
|||
|
DIAL 1-800... FOR BELLSOUTH 'SECRETS'
|
|||
|
|
|||
|
Chicago - The attorney for Craig Neidorf, a 20-year-old electronic
|
|||
|
newsletter editor, said last week that he plans to file a civil lawsuit
|
|||
|
against Bellsouth Corp. as a result of the firm's "irresponsible" handling
|
|||
|
of a case involving the theft of a computer text file from the firm.
|
|||
|
|
|||
|
Federal prosecutors dismissed charges against Neidorf four days into the
|
|||
|
trial, after prosecution witnesses conceded in cross-examination that much
|
|||
|
of the information in the text file was widely available.
|
|||
|
|
|||
|
Neidorf, the co-editor of "Phrack," a newsletter for computer hackers, was
|
|||
|
accused by federal authorities of conspiring to steal and publish a text
|
|||
|
file that detailed the inner workings of Bellsouth's enhanced 911 emergency
|
|||
|
telephone system across nine states in the Southeast [CW, July 30].
|
|||
|
|
|||
|
"What happened in this case is that the government accepted lock, stock and
|
|||
|
barrel everything that Bellsouth told them without an independent
|
|||
|
assessment," said Sheldon Zenner, Neidorf's attorney.
|
|||
|
|
|||
|
One witness, a Bellsouth service manager, acknowledged that detailed
|
|||
|
information about the inner workings of the 911 system could be purchased
|
|||
|
from Bellsouth for a nominal fee using a toll-free telephone number.
|
|||
|
|
|||
|
A Bellcore security expert who was hired by Bellsouth to investigate
|
|||
|
intrusions into its computer systems testified that the theft of the file
|
|||
|
went unreported for nearly a year.
|
|||
|
|
|||
|
Last week, a Bellsouth spokesman said the firm's security experts delayed
|
|||
|
reporting the theft because they were more intent on monitoring and
|
|||
|
preventing intrusions into the company's computer systems. "There are only
|
|||
|
so much resources in the data security arena, and we felt that it was more
|
|||
|
urgent to investigate," he said.
|
|||
|
|
|||
|
He also disputed assertions that the document was of little value. "It is
|
|||
|
extremely proprietary and contained routing information on 911 calls
|
|||
|
through our nine-state territory as well as entry points into the system,"
|
|||
|
he said.
|
|||
|
|
|||
|
A QUICK ENDING
|
|||
|
|
|||
|
The case unraveled after Robert Riggs, a prosecution witness who had
|
|||
|
already pleaded guilty for his role in the theft of the document, testified
|
|||
|
that he had acted alone and that Neidorf had merely agreed to publish the
|
|||
|
text file in "Phrack."
|
|||
|
|
|||
|
Neidorf and his attorney agreed to a pretrial diversion, a program under
|
|||
|
which the government voluntarily dismisses the indictment but could
|
|||
|
reinstate it if Neidorf commits a similar crime within a year.
|
|||
|
|
|||
|
The case has stirred up national debate on the rights of computer users in
|
|||
|
the age of electronic information. The Electronic Frontier Foundation, a
|
|||
|
civil liberties group set up by Mitch Kapor, founder of Lotus Development
|
|||
|
Corp., may participate in the filing of a lawsuit against Bellsouth, said
|
|||
|
Terry Gross an attorney at the New York law firm of Rabinowitz Boudin
|
|||
|
Standard Krinsky & Lieberman.
|
|||
|
|
|||
|
"The Electronic Frontier Foundation is concerned by the irresponsibility of
|
|||
|
Bellsouth of claiming from the outset that this was confidential material
|
|||
|
when it should have known that it was not," Gross said.
|
|||
|
|
|||
|
**END OF ARTICLE**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Date: 28 Jul 90 10:41:47 EDT
|
|||
|
From: Moderators
|
|||
|
Subject: British Law and Modem User's Association of America (MUAA)
|
|||
|
|
|||
|
- London, England UK COMPUTER CRACKING BILL BECOMES LAW
|
|||
|
---------------
|
|||
|
|
|||
|
Having passed Parliament, the UK Computer Misuse Bill has now gained
|
|||
|
Royal Assent, becoming law. This Bill defines computer hacking (or to use
|
|||
|
a MUCH more appropriate term, computer Cracking) as the act of gaining
|
|||
|
unauthorized access into a computer system., and makes it punishable by
|
|||
|
fines and short prison terms. It also enables people to be prosecuted in
|
|||
|
England if either the offender OR the affected computer system was in
|
|||
|
England when the computer system was broken into.
|
|||
|
|
|||
|
Interestingly enough, a Price Waterhouse report says that theft or
|
|||
|
fraud were responsible for only 20 percent of reported security incidents
|
|||
|
in the UK, and that over 76 percent were due to human error, system
|
|||
|
failure, or natural hazards. However, over 65 percent of UK companies in
|
|||
|
their survey said that they had suffered financially from security
|
|||
|
failures....
|
|||
|
|
|||
|
*******************************************************************
|
|||
|
- Topeka, Kansas EFFORTS BEGIN TO LAUNCH LOBBYING GROUP FOR MODEM USERS
|
|||
|
|
|||
|
Alan Bechtold (President of the BBS Press Service) has begun efforts
|
|||
|
start the Modem User's Association of America (MUAA). If successful, the
|
|||
|
MUAA will be a non-profit organization that will engage in legal and
|
|||
|
Congressional Lobbying activities for modem users and operators of online
|
|||
|
services. It will also serve as a source of information on modem-related
|
|||
|
legislation being considered around the US (like the FCC's attempts to
|
|||
|
charge special fees for people to use modems)....
|
|||
|
|
|||
|
Most of the interest for the MUAA has come from places like Texas
|
|||
|
and Indiana, where telephone companies and state governments are trying to
|
|||
|
implement new rate structures that charge modem users higher rates for
|
|||
|
service. Bechtold is now trying to test the level of support for such an
|
|||
|
organization, via an effort to raise $10,000 in funds to begin the MUAA by
|
|||
|
the end of September. If that amount has not been raised by then, he has
|
|||
|
pledged to "tear up all the checks that I have received and continue on
|
|||
|
with other activities".
|
|||
|
|
|||
|
Interestingly, a Group based in Washington DC has offered to
|
|||
|
contribute legal and lobbying support for the MUAA, but only IF it gains
|
|||
|
enough support. Bechtold is considering these annual membership fees for
|
|||
|
the MUAA:
|
|||
|
|
|||
|
Individuals - $15 Commercial Bulletin Boards - $50
|
|||
|
Hobby Bulletin Boards - $25 Commercial Online Services - $100
|
|||
|
Makers of Telecommunications and/or Terminal Software - $200
|
|||
|
Modem and Computer Makers - $500
|
|||
|
|
|||
|
If you wish to obtain more information about the proposed MUAA, Alan
|
|||
|
Bechtold can be reached at 1-913-478-3157....
|
|||
|
|
|||
|
|
|||
|
|
|||
|
source:
|
|||
|
ST REPORT ONLINE MAGAZINE
|
|||
|
STR Publishing Inc.
|
|||
|
July 27, 1990, No.6.30
|
|||
|
|
|||
|
|
|||
|
********************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
**END OF CuD #1.28**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|