738 lines
36 KiB
Plaintext
738 lines
36 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Volume 3, Issue #3.17 (May 17, 1991) **
|
|||
|
** SPECIAL ISSUE: EXHIBITS FROM RIGGS'S SENTENCING MEMORANDUM **
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|||
|
ARCHIVISTS: Bob Krause / / Bob Kusumoto
|
|||
|
GAELIC GURU: Brendan Kehoe
|
|||
|
|
|||
|
+++++ +++++ +++++ +++++ +++++
|
|||
|
|
|||
|
CONTENTS THIS ISSUE:
|
|||
|
File 1: Moderator's Corner
|
|||
|
File 2: A Media Commentary on the RIGGS Sentencing
|
|||
|
File 3: Exhibits from the Atlanta 3 Sentencing Memorandum
|
|||
|
File 4: EXHIBIT A from Riggs' Sentencing Memorandum
|
|||
|
File 5: EXHIBIT E from Riggs' Sentencing Memorandum
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
USENET readers can currently receive CuD as alt.society.cu-digest.
|
|||
|
Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
|
|||
|
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
|
|||
|
Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
|
|||
|
(2) cudarch@chsun1.uchicago.edu;
|
|||
|
(3) dagon.acc.stolaf.edu (130.71.192.18).
|
|||
|
E-mail server: archive-server@chsun1.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source is
|
|||
|
cited. Some authors, however, do copyright their material, and those
|
|||
|
authors should be contacted for reprint permission. It is assumed
|
|||
|
that non-personal mail to the moderators may be reprinted unless
|
|||
|
otherwise specified. Readers are encouraged to submit reasoned
|
|||
|
articles relating to the Computer Underground. Articles are preferred
|
|||
|
to short responses. Please avoid quoting previous posts unless
|
|||
|
absolutely necessary.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Contributors assume all
|
|||
|
responsibility for assuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: Moderator's Corner
|
|||
|
Date: May 17, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.17: File 1 of 5: Moderators Corner ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
++++++++++++++++
|
|||
|
Information on subversive software wanted
|
|||
|
++++++++++++++++
|
|||
|
|
|||
|
(Gordon received a number of helpul replies from his earlier request,
|
|||
|
but for those who missed CuD 3.14, we reprint it again. Thanks to all
|
|||
|
those who responded).
|
|||
|
|
|||
|
Gordon is in the beginning stages of research for a technical paper on
|
|||
|
'subversive' software. The article will discuss software that has
|
|||
|
been written for unusual purposes and circumstances, not all of which
|
|||
|
may be legal. Examples in this "genre" would be 'Fuckin' Hacker',
|
|||
|
'Code Thief', and 'Receipt Writer'.
|
|||
|
|
|||
|
It would be helpful to gather as many examples as possible, from many
|
|||
|
different computer platforms. He is *not* seeking executable copies,
|
|||
|
but just the name and description of the program. Any additional
|
|||
|
historical information, such as author name, date, innovative
|
|||
|
features, etc would be a bonus. If you can recall having seen, used,
|
|||
|
or heard of any unusual software that you feel fits in this category
|
|||
|
He would appreciate it if you'd drop me a line. The article has not,
|
|||
|
as of yet, been slated for publication, but he will supply a finished
|
|||
|
copy to anyone who responds or requests one. The finished work may
|
|||
|
also appear in a future issue of CuD.
|
|||
|
|
|||
|
Thanks for your time and assistance! Gordon Meyer
|
|||
|
72307.1502@Compuserve.com GRMEYER (GEnie and Delphi) or via CuD at
|
|||
|
tk0jut2@niu.bitnet
|
|||
|
|
|||
|
+++++++
|
|||
|
New BBS
|
|||
|
+++++++
|
|||
|
|
|||
|
A new BBS, similar in goals and philosophy to FACE-TO-FACE (which
|
|||
|
crashed) began May 18. It's called FREE SPEECH (618-943-2399), and
|
|||
|
will be open to all callers. Computer security and law enforcement
|
|||
|
agents are welcome. The sysop (Crimson Death) aims to encourage
|
|||
|
discussion and debate of Constitutional, computer security, and other
|
|||
|
issues. It's running Emulex, HST compatible, and users are encouraged
|
|||
|
to upload news articles and related files.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Silicon.Surfer@unixville.edu
|
|||
|
Subject: A Media Commentary on the RIGGS Sentencing
|
|||
|
Date: Tue, 14 May 91 20:39 EDT
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.17: File 2 of 5: Media Comment on Riggs Sentencing ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Here is an article I recently saw in the May/June 1991 issue of
|
|||
|
Contingency Journal. The author seemed very glad of the judges
|
|||
|
decision of restitution for Bell South by the computer hackers (I bet
|
|||
|
the author would have approved of dismemberment of their hands also).
|
|||
|
According to the story's bio sketch, the author is an attorney with 20
|
|||
|
years of experience, including 10 years in computer security at a
|
|||
|
major financial institution.
|
|||
|
|
|||
|
It is interesting to note that the author states that one of the
|
|||
|
schemers published the information in a hacker's newsletter. But the
|
|||
|
author never mentions that the case against the publisher was dropped
|
|||
|
by the government, nor does the author correct the slur that the
|
|||
|
publisher was in on the scheme (actually it was proved in court by the
|
|||
|
government's own witness that the publisher was not part or any way
|
|||
|
connected with the scheme). I only wish that the government would
|
|||
|
order restitution to the American taxpayer for what the S & L scheme
|
|||
|
will cost us in the next few years.
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
Restitution Ordered For Bell South Hackers
|
|||
|
By Michael H. Agranoff, Attorney
|
|||
|
|
|||
|
The law is beginning to respond effectively to the problem of computer
|
|||
|
hacking. In September 1988, three young men began implementing a
|
|||
|
scheme to steal proprietary data from Bell South Telephone Co.
|
|||
|
computers. They illegally gained access to Bell South from a home
|
|||
|
computer, downloaded the data and tried to disguise the fraud by using
|
|||
|
the IDs of legitimate users.
|
|||
|
|
|||
|
The stolen data was transferred on an interstate computer network and
|
|||
|
stored on a bulletin board system. It was made known to others in a
|
|||
|
hacker's newsletter published by one of the schemers.
|
|||
|
|
|||
|
If the fraud had continued, it could have disrupted telecommunication
|
|||
|
channels throughout the country, according to government prosecutors.
|
|||
|
The hackers were in a position to retrieve and modify credit
|
|||
|
information, eavesdrop on telephone conversations and worse.
|
|||
|
|
|||
|
Various charges of fraud, theft and conspiracy were lodged against the
|
|||
|
trio. They attempted to get the charges dismissed on technical
|
|||
|
grounds, were unsuccessful and pleaded guilty to a smaller number of
|
|||
|
charges.
|
|||
|
|
|||
|
A federal judge in Georgia imposed sentences last November. One
|
|||
|
hacker was given 21 months in prison and two years supervised
|
|||
|
probation.
|
|||
|
|
|||
|
The other two hackers were each given 14 months in prison. Seven of
|
|||
|
those months were to be served in a half-way house, where they must
|
|||
|
assist colleges and businesses in computer work. Following release,
|
|||
|
the hackers must each complete three years community service, to
|
|||
|
include 120 hours each year of computer-related work, during which
|
|||
|
time they may not own or access a computer, except for employment,
|
|||
|
without supervision approved by the court.
|
|||
|
|
|||
|
Each of the three hackers was also ordered to pay restitution to Bell
|
|||
|
South amounting to $233,880 per hacker. Readers may reflect upon this
|
|||
|
sentence. In trying to
|
|||
|
|
|||
|
protect the public interest and yet not be vindictive, the judge
|
|||
|
rendered (in this writer's opinion) a wise and thoughtful decision.
|
|||
|
Will it send the appropriate message to potential hackers throughout
|
|||
|
the country? Let us see.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: Exhibits from the Atlanta 3 Sentencing Memorandum
|
|||
|
Date: 15 May, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.17: File 3 of 5: Exhibits from Riggs' Sentencing ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
The author of the article above errs in the nature of the crime, the
|
|||
|
nature of the evidence, and omits that the sentence included restriction
|
|||
|
on computer use upon release. He seems to rely upon prosecutors' statements,
|
|||
|
and shows no awareness of the discussions surrounding the sentence of the
|
|||
|
case when he refers to the judge's "wise and thoughtful decision.
|
|||
|
There is not even a glimmering in the story that the sentence may be
|
|||
|
too harsh (quite the contrary, in fact), or that the sentencing
|
|||
|
memorandum may have been misleading.
|
|||
|
|
|||
|
When Riggs was sentenced late last fall to 21 months in a federal
|
|||
|
penitentiary for "hacking," the prosecution submitted a lengthy
|
|||
|
sentencing memorandum (reprinted in CuD 2.16) that was strongly
|
|||
|
criticized for its inaccuracies and what some saw as an inappropriate
|
|||
|
prejudicial attitude in both the tone and content (see CuD 2.17 for
|
|||
|
EFF and other responses). We, and presumably others, were informed
|
|||
|
that there was considerable information in attached documents that
|
|||
|
would justify the sentence and that we should be more patient. The
|
|||
|
Exhibits attached to the memorandum are now available, and they are
|
|||
|
less than compelling, filled with non-sequitor logic, and fail to add
|
|||
|
any new information that might reduce criticism of the sentence.
|
|||
|
|
|||
|
CONTENTS
|
|||
|
|
|||
|
The Government submitted five attachments to its sentencing memorandum
|
|||
|
that, in a separate motion, it requested to be sealed. These exhibits
|
|||
|
raise a few questions both about the justification for the sentence
|
|||
|
and the sentencing procedure itself. Two of the Exhibits follow the
|
|||
|
conclusion of this file. The original sentencing memorandum was
|
|||
|
reprinted in CuD 2.16.
|
|||
|
|
|||
|
EXHIBIT A (File #4, below) is a history of the Legion of Doom, taken
|
|||
|
from Phrack 31.
|
|||
|
|
|||
|
EXHIBIT B (not included here) is a collection of posts from Black Ice
|
|||
|
BBS. In 23 pages, the Exhibit provides a few score posts selectively
|
|||
|
abstracted from December 2, 1988 through March 12, 1989. The Exhibit
|
|||
|
includes the BBS's help screen, a user list, and information ranging
|
|||
|
from general one line comments to technical information, dialups and
|
|||
|
network addresses. Although some of the information boarders on what
|
|||
|
some might justifiably consider stretching beyond the limits of
|
|||
|
licitness, none of it provides evidence of a dangerous conspiratorial
|
|||
|
group bent on destroying the nation's telecom system. However, such
|
|||
|
information was blacked out of the Motion to Seal, so it is difficult
|
|||
|
to assess. But, from what can be inferred from the context, it seems
|
|||
|
that much of the "questionable" information is generally public and
|
|||
|
the rhetoric, rather than content, provides the logs' drama.
|
|||
|
According to the sentencing memorandum (p. 8), these logs appear to
|
|||
|
show that the callers knew that hacking was illegal, that they took
|
|||
|
precautions to avoid apprehension, and some posts make "frequent
|
|||
|
references to law enforcement and national security computer systems."
|
|||
|
Although the posts may reflect unacceptable behavior, the overall
|
|||
|
interpretation gleaned by the government stretches credibility.
|
|||
|
|
|||
|
EXHIBIT C consists of an electronic post in November, 1988, requesting
|
|||
|
the Riggs meet with the acting director of OCS, and 4 letters
|
|||
|
exchanged between Riggs and Georgia Tech's Office of Computing
|
|||
|
Services (OCS) and the Dean of Student Affairs From June 6, 1989 to
|
|||
|
June 19, 1989. In the first letter, the OCS indicated to Riggs that
|
|||
|
they possessed evidence that his account had been misused and asked
|
|||
|
Riggs to contact them. The second letter of two pages outlined
|
|||
|
specific allegations of Riggs' abuse. The third, from Riggs to the
|
|||
|
Director of the OCS, was a written apology. The final letter, from
|
|||
|
the office of the Dean of Student Affairs to Riggs was a letter
|
|||
|
saying, in essence, cool it in the future or else. According to the
|
|||
|
original sentencing memorandum (p. 9), the only reason for submitting
|
|||
|
these letters was to "indicate that Georgia Tech was very concerned
|
|||
|
about Grant's abuses of their system."
|
|||
|
|
|||
|
EXHIBIT D, a report of an earlier legal problem in North Carolina
|
|||
|
involving Riggs, was not included, presumably because he was a
|
|||
|
juvenile when it occured.
|
|||
|
|
|||
|
EXHIBIT E consists of five posts from various people taken from The
|
|||
|
Phoenix Project discussing Robert Morris. They are reproduced in File
|
|||
|
#5, below.
|
|||
|
|
|||
|
Even in the aggregate, the Government's exhibits are rather innocuous.
|
|||
|
The logic by which conclusions are drawn from the Exhibits presented
|
|||
|
is spurious as best, and--as is much of the rhetoric guiding arguments
|
|||
|
for questionable procedures (see Steve Jackson Games' suit against
|
|||
|
William Cook, Timothy Foley, Barbara Golden, et. al.)--represents
|
|||
|
claims for which empirical evidence to the the contrary was clearly
|
|||
|
present and known, or should have been known, to the prosecutors.
|
|||
|
|
|||
|
We in no way condone the activities to which the Atlanta 3 pled
|
|||
|
guilty. Nor do we condone many of the behavior of the type alleged in
|
|||
|
their original indictment. We do not believe that offenses in the
|
|||
|
cyberworld should go without response or, when appopriate, without
|
|||
|
sanctions. However, we also believe that questionable actions by law
|
|||
|
enforcement personnel should be equally subject to examination and
|
|||
|
response. The exhibits stage manage the allegations in a way that is
|
|||
|
discomforting. The sentencing memorandum and the Exhibits claiming to
|
|||
|
support it should be carefully examined for the subtle ways in which
|
|||
|
the "language of justice" serves unjust ends. Innuendo, fabrication,
|
|||
|
dubious logic, and unsubstantiated assertions in the guise of "facts"
|
|||
|
do not reflect well on those entrusted with protecting federal law and
|
|||
|
the Constitution.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: EXHIBIT A from Riggs' Sentencing Memorandum
|
|||
|
Date: 15 May, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.17: File 4 of 5: Exhibit A from Memorandum ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Exhibit A is a reprint from "Phrack 31" summarizing the history of the
|
|||
|
Legion of Doom. It reflects a "guilt by association" device, a
|
|||
|
rhetorical ploy without factual foundation that makes a series of
|
|||
|
leaps from a dangerous act to the possibility that the defendants
|
|||
|
*could* have committed such an act:
|
|||
|
|
|||
|
Aside from the hacker logic bomb threat, a June 1989
|
|||
|
intrusion into the BellSouth network also prompted the
|
|||
|
federal investigation. A computer hacker broke into the
|
|||
|
BellSouth network and rerouted calls from a probation office
|
|||
|
in Delray Beach, Florida to a New York Dial-A-Porn number.
|
|||
|
Although creative and comical at first blush, the rerouting
|
|||
|
posed a serious threat to the security of the telephone
|
|||
|
system. If a hacker could reroute all calls to the probation
|
|||
|
office, he or she could do the same to calls placed to this
|
|||
|
Court, a fire station, a police station or any other
|
|||
|
telephone customer in the country. Again, none of the three
|
|||
|
defendants are implicated in this dangerous prank, though an
|
|||
|
investigation of the intrusion ultimately led investigators
|
|||
|
to the illegal activities of the three defendants and other
|
|||
|
members of a self-proclaimed elite group of hackers called
|
|||
|
the Legion of Doom. The Legion of Doom is described in a
|
|||
|
hacker "magazine" article filed separately as _Government
|
|||
|
Exhibit A_. (Sentencing Memorandum, p. 3).
|
|||
|
|
|||
|
After an earlier allusion to logic bombs, which were unrelated to the
|
|||
|
Riggs case, the spectre of serious crimes are linked to the
|
|||
|
defendants. Next, an example in which none of the defendants were
|
|||
|
implicated is raised--the rerouting of a dial-a-porn number to a
|
|||
|
probation officer. Here, prosecutors move beyond the slippery slope
|
|||
|
thesis of behavior that suggests, by analogy, if you have a marijuana
|
|||
|
cigarette today you'll likely be a junkie by morning. Despite the
|
|||
|
DENOTED disclaimer of non-involvement, they phrase the language in
|
|||
|
such a way that it CONNOTES guilt by arguing that the possession of
|
|||
|
"forbidden knowledge" COULD allow one to commit potentially dangerous
|
|||
|
acts such as "jeopardizing the entire telephone industry" or "shutting
|
|||
|
down telephone service throughout the country" (p. 7 of Sentencing
|
|||
|
Memorandum).
|
|||
|
|
|||
|
The Exhibit provides nothing more than a brief history of the
|
|||
|
LoD and its members. For conspiracy theorists who see organized
|
|||
|
malevolence in any voluntary association of 2 or more people who
|
|||
|
defy conventional social norms, the document may seem significant.
|
|||
|
But, for some, the Fortune 500 would seem equally dangerous and
|
|||
|
conspiratorial. We do not claim that the LoD can stake claim to
|
|||
|
the moral high ground, but neither does our reading of the Exhibit
|
|||
|
A suggest a subversive group capable of threatening our social
|
|||
|
fabric. It hardly provides evidence that would justify a
|
|||
|
few years of incarceration.
|
|||
|
Judge for yourself:
|
|||
|
|
|||
|
++++ Begin Exhibit A
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
Volume Three, Issue Thirty-one, Phile #5 of 10
|
|||
|
|
|||
|
The History of The Legion Of Doom
|
|||
|
--- ------- -- --- ------ -- ----
|
|||
|
During the summer of 1984 an idea was formulated that would ultimately
|
|||
|
change the face of the computer underground forever. This particular
|
|||
|
summer, a huge surge of interest in computer telecommunications placed
|
|||
|
an incredibly large number of new enthusiasts on the national computer scene.
|
|||
|
This crowd of people all seeking to learn as much as possible
|
|||
|
began to put a strain on the nation's bulletin board scene, as the novices
|
|||
|
stormed the phonelines in search of knowledge. From out of this chaos
|
|||
|
came a need for learned instructors to help pass on their store of
|
|||
|
information to the new throngs.
|
|||
|
One of the most popular bulletin boards of the day was a system in New York
|
|||
|
state called Plovernet, which was run by a person who called himself
|
|||
|
Quasi-Moto. This BBS was so heavily trafficked, that a major long
|
|||
|
distance company began blocking all calls to its number (516-935-2481).
|
|||
|
The co-sysop of Plovernet was a person known as Lex Luthor. At the time
|
|||
|
there were a few hacking groups in existence, such as Fargo-4A and Knights of
|
|||
|
Shadow. Lex was admitted into KOS in early 1984, but after making a few
|
|||
|
suggestions about new members, and having them rejected, Lex decided to
|
|||
|
put up an invitation only BBS and to start forming a new group.
|
|||
|
Starting around May of 1984, Lex began to contact those people who he had
|
|||
|
seen on BBSes such as Plovernet and the people that he knew personally
|
|||
|
who possessed the kind of superior knowledge that the group he envisioned
|
|||
|
should have. Many phone calls and Alliance Teleconferences later, the
|
|||
|
group of individuals who made up the original Legion of Doom were compiled.
|
|||
|
They were:
|
|||
|
Lex Luthor
|
|||
|
Karl Marx
|
|||
|
Mark Tabas
|
|||
|
Agrajag the Prolonged
|
|||
|
King Blotto
|
|||
|
Blue Archer
|
|||
|
EBA
|
|||
|
The Dragyn
|
|||
|
Unknown Soldier
|
|||
|
The group originally consisted of two parts: Legion of Doom, and Legion
|
|||
|
of Hackers. The latter was a sub-group of the first, comprised
|
|||
|
of people who were more advanced in computer related subjects. Later on,
|
|||
|
as members began to all become more computer-based, the Legion of Hackers
|
|||
|
was absolved. (The name "Legion of Doom" came from the cartoon series
|
|||
|
"Superfriends," in which Lex Luthor, Superman's arch rival, led a group
|
|||
|
by the same name)
|
|||
|
The actual Legion of Doom bulletin board was quite ahead of its time.
|
|||
|
It was one of the first "Invitation-only" hacking based BBSes; it was the
|
|||
|
first BBS with security that caused the system to remain idle until
|
|||
|
a primary password was entered; and it was the first hacking BBS to deal
|
|||
|
with many subjects in close detail, such as trashing and social
|
|||
|
engineering. The BBS underwent three number changes and three different
|
|||
|
login procedures during its life. At its height, the BBS had over
|
|||
|
150 users and averaged about 15 posts per day. This may seem
|
|||
|
high when compared to contemporary BBSes, but this was a private system,
|
|||
|
with only very-competent users, so the quality of messages content was always
|
|||
|
high.
|
|||
|
There was always some confusion that falsely assumed since someone
|
|||
|
was on the LOD BBS, that they were a member of the group. In fact,
|
|||
|
only a handful of the total LOD membership were ever on the actual
|
|||
|
LOD BBS.
|
|||
|
The Legion of Doom also had special subboards created for its members on
|
|||
|
other BBSes after the home base BBS went offline. The first was on
|
|||
|
Blottoland, the next on Catch-22, followed by one on the Phoenix Project,
|
|||
|
and the last on Black Ice Private. The group's members have usually tried to
|
|||
|
keep a low profile publicly, and usually limited their trade of information
|
|||
|
to select private BBSes and personal telephone conversations. This adherence
|
|||
|
to privacy has always added to the LOD mistique. Since most people didn't
|
|||
|
know exactly what the group was involved in, or experimenting with, people
|
|||
|
always assumed that it was something far too detailed or sensitive to be
|
|||
|
discussed. For the most part, this was not true, but it did not help to
|
|||
|
diminish the paranoia of security personnel that LOD was after their
|
|||
|
company's systems.
|
|||
|
The group has undergone three distinct phases, each a result of membership
|
|||
|
changes. The first phase ended with the busts of Marx, Tabas, Steve Dahl,
|
|||
|
Randy Smith, X-man, and the abandonment by Agrajag and King Blotto.
|
|||
|
The group lay semi-dormant for several months, until a resurgence
|
|||
|
in the summer of 1986, in which several new members were admitted, and a new
|
|||
|
surge of would-be hackers appeared, ready to be tutored. This phase again
|
|||
|
ended in a series of busts and paranoia. The third phase basically revolved
|
|||
|
around Summercon of 1988, where several new members were admitted by those
|
|||
|
LOD members attending the festivites. The third phase is now at an end
|
|||
|
brought on by busts and related paranoia, again, two years after its onset.
|
|||
|
There is no indication that points to any resurgence in the future, but
|
|||
|
nothing is certain until summer.
|
|||
|
Since its creation, LOD has tried to put out informative files on a wide
|
|||
|
variety of topics of interest to its contemporaries. These files ranged from
|
|||
|
the first actual scanned directory of Telenet, to files on various operating
|
|||
|
systems. The LOD Technical Journal was to be a semi-regular electronic
|
|||
|
magazine comprised of such files, and other items of interest to the hacking
|
|||
|
community. Only three issues of the Technical Journal were produced. As
|
|||
|
the fourth issue was being pieced together, several members were raided, and
|
|||
|
work on it was abandoned.
|
|||
|
From the time it was formed continuing up to the present, the Legion of
|
|||
|
Doom has been quite a topic of controversy in the computer underground and
|
|||
|
with computer security professionals. The Legion of Doom has been
|
|||
|
called everything from "Organized Crime" to "a Communist threat to national
|
|||
|
security" to "an international conspiracy of computer terrorists bent
|
|||
|
on destroying the nation's 911 service." Nothing comes closer to the
|
|||
|
actual truth than "bored adolescents with too much spare time."
|
|||
|
LOD members may have entered into systems numbering in the tens of
|
|||
|
thousands, they may have peeped into credit histories, they may
|
|||
|
have monitored telephone calls, they may have snooped into files and
|
|||
|
buffered interesting text, they may still have total control over
|
|||
|
entire computer networks; but, what damage have they done? None, with
|
|||
|
the exception of unpaid use of CPU time and network access charges. What
|
|||
|
personal gains have any members made? None, with the exception of three
|
|||
|
instances of credit fraud that were instigated by three separate greedy
|
|||
|
individuals, without group knowledge.
|
|||
|
The Legion of Doom will long be remembered in the computer underground as
|
|||
|
an innovative and pioneering force, that consistently raised the collective
|
|||
|
level of knowledge, and provided many answers to questions ranging from the
|
|||
|
workings of the telephone system to the structure of computer operating
|
|||
|
systems. No other group dedicated to the persuit of computer and
|
|||
|
telecommunications knowledge has survived longer, and none probably will.
|
|||
|
The Legion of Doom 1984--1990
|
|||
|
------------------------------------------------------------------------------
|
|||
|
|
|||
|
Alumni of the Fraternal Order of the Legion of Doom (Lambda Omega Delta)
|
|||
|
Handle Entered Exited Location Reasons for leaving
|
|||
|
------------------------------------------------------------------------------
|
|||
|
Lex Luthor Early 84-- Florida
|
|||
|
Karl Marx Early 84--Late 85 Colorado Bust w/Tabas..College
|
|||
|
Mark Tabas Early 84--Late 85 Colorado Too numerous to list
|
|||
|
Agrajag the Prolonged Early-84--Late 85 California Loss of Interest
|
|||
|
King Blotto Early 84--Late 85 Ohio College
|
|||
|
Blue Archer Early 84--Late 87 Texas College
|
|||
|
EBA Early 84-- Texas
|
|||
|
The Dragyn Early 84--Late 86 Minnesota Loss of Interest
|
|||
|
Unknown Soldier Early 84--Early 85 Florida Bust-Toll Fraud
|
|||
|
Sharp Razor Late 84--Early 86 New Jersey Bust-Compuserve Abuse
|
|||
|
Sir Francis Drake Late 84--Early 86 California Loss of Interest
|
|||
|
Paul Muad'dib Late 84--Early 86 New York Modem Broke
|
|||
|
Phucked Agent 04 Late 84--Late 87 California College
|
|||
|
X-Man Late 84--Mid 85 New York Bust-Blue Boxing
|
|||
|
Randy Smith Late 84--Mid 85 Missouri Bust-Credit Fraud
|
|||
|
Steve Dahl Early 85--Early 86 Illinois Bust-Credit Fraud
|
|||
|
The Warlock Early 85--Early 86 Florida Loss of Interest
|
|||
|
Terminal Man Early 85--Late 85 Massachusetts Expelled from Group
|
|||
|
Dr. Who Early 85--Late 89 Massachusetts Several Reasons
|
|||
|
The Videosmith Early 86--Late 87 Pennsylvania Paranoia
|
|||
|
Kerrang Kahn Early 86--Mid 89 London, UK Loss of Interest
|
|||
|
Gary Seven Early 86--Mid 88 Florida Loss of Interest
|
|||
|
The Marauder Early 86--Mid 89 Connecticut Loss of Interest
|
|||
|
Silver Spy Late 86--Late 87 Massachusettts College
|
|||
|
Bill from RNOC Early 87--Late 87 New York Bust-Hacking
|
|||
|
The Leftist Mid 87--Late 89 Georgia Bust-Hacking
|
|||
|
Phantom Phreaker Mid 87-- Illinois
|
|||
|
Doom Prophet Mid 87-- Illinois
|
|||
|
Jester Sluggo Mid 87-- North Dakota
|
|||
|
Carrier Culprit Mid 87--Mid 88 Pennsylvania Loss of Interest
|
|||
|
Master of Impact Mid 87--Mid 88 California Loss of Interest
|
|||
|
Thomas Covenant Early 88--Early 90 New York Bust-Hacking
|
|||
|
The Mentor Mid 88--Early 90 Texas Retired
|
|||
|
Necron 99 Mid 88--Late 89 Georgia Bust-Hacking
|
|||
|
Control C Mid 88--Early 90 Michigan
|
|||
|
Prime Suspect Mid 88-- New York
|
|||
|
The Prophet Mid 88--Late 89 Georgia Bust-Hacking
|
|||
|
Phiber Optik Early 89--Early 90 New York Bust-Hacking
|
|||
|
** AKA **
|
|||
|
Randy Smith Poof!
|
|||
|
Dr. Who Skinny Puppy
|
|||
|
Kerrang Kahn Red Eye
|
|||
|
Phantom Phreaker ANI Failure / Psychedelic Ranger
|
|||
|
Doom Prophet Trouble Verify
|
|||
|
Thomas Covenant Sigmund Fraud / Pumpkin Pete
|
|||
|
Necron 99 The Urvile
|
|||
|
Control C Phase Jitter
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: EXHIBIT E from Riggs' Sentencing Memorandum
|
|||
|
Date: 15 May, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.17: File 5 of 5: EXHIBIT E from Memorandum ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
EXHIBIT E:
|
|||
|
|
|||
|
Exhibit E comes from The Phoenix Project, a BBS in Texas. The
|
|||
|
proseuctions' logic seems to claim that the six posts, five from 1990
|
|||
|
and one from 1988, show how carefully the CU followed the
|
|||
|
Morris case and and that the comments demonstrate that fear of
|
|||
|
harsh sentences would be a deterrent. In fact, the logs show
|
|||
|
no such thing.
|
|||
|
(The following were reproduced from the original Phoenix Project logs
|
|||
|
made available to us with the exception of the post of the December 8,
|
|||
|
1988, post, which was typed in from the sentencing memorandum).
|
|||
|
|
|||
|
++++++++++++ BEGIN EXHIBIT E
|
|||
|
|
|||
|
58/64: morris
|
|||
|
Name: The Mentor #1
|
|||
|
Date: Tue Jan 23 21:57:27 1990
|
|||
|
|
|||
|
Robert Morris was found guilty. If he's sentenced to do time, it'll be a
|
|||
|
*very* bad precedent.
|
|||
|
|
|||
|
<sigh>
|
|||
|
|
|||
|
Mentor
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Read:(1-64,^58),? :
|
|||
|
|
|||
|
59/64: BLackmail?
|
|||
|
Name: Erik Bloodaxe #2
|
|||
|
Date: Tue Jan 23 22:51:58 1990
|
|||
|
|
|||
|
Geez...I'd like to think myself above things like that...
|
|||
|
|
|||
|
In anycase, not everyone has GOOD sensitive information...(not all of us who
|
|||
|
ARE in this country have the balls to dig where that type of crap is...god I
|
|||
|
want to move to Australia!)
|
|||
|
|
|||
|
Maybe they'll kick me out of the country! Right...I'm not that important,
|
|||
|
although I would like to think that I am...hehe
|
|||
|
|
|||
|
hell, maybe it IS time to start doing all the terrible things I always had the
|
|||
|
capabilities to do on the internet...need to get some "Insurance"
|
|||
|
|
|||
|
maybe...who knows...
|
|||
|
|
|||
|
->ME
|
|||
|
|
|||
|
|
|||
|
|
|||
|
60/64: well
|
|||
|
Name: Phoenix #17
|
|||
|
Date: Wed Jan 24 01:29:23 1990
|
|||
|
|
|||
|
like i said... im open to better ideas.. coz i we do have sensitive ino...
|
|||
|
then no matter what we do with it... it will be termed blackmail..
|
|||
|
|
|||
|
Phoenix4
|
|||
|
|
|||
|
<and once you have publicised it.. youve played your cards.. andthen theyll
|
|||
|
mess you up real bad..>
|
|||
|
|
|||
|
|
|||
|
Read:(1-64,^61),? :
|
|||
|
|
|||
|
62/64: i understand...
|
|||
|
Name: Ravage #19
|
|||
|
Date: Wed Jan 24 14:34:03 1990
|
|||
|
|
|||
|
that the prosecution had a hard time showing malitous (sp!) intent. does
|
|||
|
anyone know if that is true? if it is true then i doubt he will get any
|
|||
|
time. probably a fine, community service, a probated time. what is the
|
|||
|
latest on the ccc guys? have they taken them out and shot them yet?
|
|||
|
|
|||
|
in my previous post i was refering to the publication, through tv,
|
|||
|
radio,and paper, of sensitive information held by organizations. it
|
|||
|
would not have to be identified as to sender. therer are plenty of
|
|||
|
underground, small town, press services (hey how about the gossip
|
|||
|
rags?) that would be ideal to send that kind of stuff to. not only
|
|||
|
that but what about the up wire? you could put it in que and it
|
|||
|
would go all over.
|
|||
|
|
|||
|
grey owl
|
|||
|
The Urvile #9
|
|||
|
11:46 am Thu Dec 08, 1988
|
|||
|
christ, i don't know c that well, now c++? fucking a.
|
|||
|
wheter you realize it or not, the virus will hurt us a tremendous amount
|
|||
|
in
|
|||
|
the future. somebody go kill morrison.
|
|||
|
even if the courts are lax on him, (which is the only silver lining ican
|
|||
|
think
|
|||
|
of), then security on all systems is going to increase. we don't need
|
|||
|
that.
|
|||
|
not one bit. think about the hacker of tomorrow. how the fuck are they
|
|||
|
gong
|
|||
|
to learn? fuck, how are we going to get in a system that we've
|
|||
|
just dug
|
|||
|
up
|
|||
|
(no tricks, no, the brute force method).
|
|||
|
fuck life.
|
|||
|
|
|||
|
+++++++++++++ END EXHIBIT E
|
|||
|
|
|||
|
The government reproduced sequential messages #58-62 from January
|
|||
|
23-24, 1990, but excluded message #61. We obtained it from the
|
|||
|
original logs. It reads:
|
|||
|
|
|||
|
++++ Start Post #61
|
|||
|
|
|||
|
61/64: Morris Convicted
|
|||
|
Name: Phiber Cut #34
|
|||
|
Date: Wed Jan 24 04:43:24 1990
|
|||
|
|
|||
|
If RTM get's jail time we should all be suprised. What he did was morrally
|
|||
|
and ethically wrong, and he fucked upt and will now have to pay the piper.
|
|||
|
However, hej is a very bright person and should not be put in a jail cell
|
|||
|
with a bunch of hardended ass f**king criminals!
|
|||
|
|
|||
|
Hopefully he'll get some sort of community service and a fine, and this will
|
|||
|
be enough to kkeep him from fucking up the network in the future.
|
|||
|
|
|||
|
+++++ End Post #61
|
|||
|
|
|||
|
Exhibit E is used as evidence that "hackers" would be deterred by a
|
|||
|
substantial sentence, and the Morris case is used as evidence that
|
|||
|
hackers followed it closely. But, several fallacies underlie this
|
|||
|
assumption:
|
|||
|
|
|||
|
1) It is not unusual for computer hobbyists to follow news about their
|
|||
|
interests. Morris's worm affected many on the nets, and most were
|
|||
|
aware of his action. Contrary to the claim that "Computer bulletin
|
|||
|
board services (BBS's) around the country were buzzing about the
|
|||
|
Morris case" (Sentencing Memorandum, p. 20), there was surprisingly
|
|||
|
little discussion on most boards other than a simple mention and some
|
|||
|
brief discussion. On The Phoenix Project, from which the logs for the
|
|||
|
exhibits were taken, the discussion was intermittent over a several
|
|||
|
day period, and the exhibit lists only 5 following the conviction.
|
|||
|
One post was actually taken from December, 1988, over a year before
|
|||
|
the Morris conviction. Such a dubious selection of posts to try to
|
|||
|
magnify a the prosecutors' interpretation of them is disingenuous at
|
|||
|
best.
|
|||
|
|
|||
|
2) The exhibits totally distort the context of the discussions. We
|
|||
|
are curious about the omission of post #61 of January 24, 1990.
|
|||
|
Perhaps it was omitted because the poster explicitly condemns Morris's
|
|||
|
action as unethical, and this post contradicts the point the
|
|||
|
prosecution is trying to make. In fact, the general tenor of posts
|
|||
|
about the Morris incident reflected strong condemnation. But,
|
|||
|
prosecutors, to the contrary, ignore this and their distortion
|
|||
|
borders on blatant fabrication. While this may be "good lawyering," it
|
|||
|
does little to instill respect for the integrity of or confidence in
|
|||
|
those who fabricate. The CU did not consider Morris a "hacker," and
|
|||
|
he was never held up as hero or role model. "Hackers," like most
|
|||
|
others, are as hostile (if not more so) to those who create or spread
|
|||
|
viruses as law enforcement. Viruses, as Cliff Stoll once suggested (in
|
|||
|
a quote taken out of context by the media) are like razor blades in
|
|||
|
the sand. Because "hackers" spend considerable time on the beaches of
|
|||
|
the cyberworld, they have little sympathy for those cyber-vandals who
|
|||
|
trash systems. If the prosecutors had been intellectually honest,
|
|||
|
they would have explained that the meaning of the posts was couched in
|
|||
|
a hostility for Morris's actions tempered by their understanding that
|
|||
|
prison was not an appropriate sentence. In fact, even the selective
|
|||
|
quotes from Exhibit E indicate that the fear that viruses might
|
|||
|
tighten up security is based on the value that one must *never* trash
|
|||
|
a system.
|
|||
|
|
|||
|
3) The prosecution claims that "Clearly, the (Morris) sentence had
|
|||
|
little effect on defendants Grant, Riggs, and Darden" (Sentencing
|
|||
|
Memorandum, p. 20). This is outrageously irresponsible. The memorandum
|
|||
|
states that their activities occured from September, 1987, through
|
|||
|
July 21, 1989. The Morris incident first made the news in November,
|
|||
|
1988, when the virus was released. The verdict occured in January,
|
|||
|
1990. MORRIS'S SENTENCE was handed down in MAY of 1990. The
|
|||
|
prosecution seems to have discovered a revolutionary new approach to
|
|||
|
causality and chronological sequencing: Riggs, et. al, are expected to
|
|||
|
have learned in 1987-1989 from events that wouldn't occur until 1990!
|
|||
|
|
|||
|
Mike Godwin (CuD 2.17) and others have raised serious criticisms about
|
|||
|
the sentence of Riggs especially. The Exhibits were not available at
|
|||
|
the time of those criticisms. However, now that they are public, the
|
|||
|
sentences appear even more unjust. Worse, the logic by which they were
|
|||
|
justified by the prosecution's exhibits strike us as gross hyperbole.
|
|||
|
More simply, drawing from the definition of police lying by Hunt and
|
|||
|
Manning (Symbolic Interaction, "The Social Context of Police Lying,"
|
|||
|
14(1): 51), a strong case might be made that the prosecution LIED!
|
|||
|
|
|||
|
********************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
**END OF CuD #3.17**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|
|||
|
|