114 lines
5.0 KiB
Plaintext
114 lines
5.0 KiB
Plaintext
|
- - - - - - - Begin message from: NBaheti.es@Xerox.COM
|
||
|
Return-Path: <@SIMTEL20.ARPA:NBaheti.es@Xerox.COM>
|
||
|
Received: from SIMTEL20.ARPA by MARLBORO.DEC.COM with TCP; Sun 23 Mar 86 15:19:4
|
||
|
1-EST
|
||
|
Received: from Xerox.COM by SIMTEL20.ARPA with TCP; Sun 23 Mar 86 13:19:00-MST
|
||
|
Received: from Catawba.ms by ArpaGateway.ms ; 23 MAR 86 12:18:40 PST
|
||
|
From: NBaheti.es@Xerox.COM
|
||
|
Date: 23 Mar 86 15:18:37 EST
|
||
|
Subject: Crazy Users - READ THIS
|
||
|
To: RCPM-SYSOPS@Simtel20.ARPA,RCPMSYSOPS@Simtel20.ARPA
|
||
|
cc: NBaheti.es@Xerox.COM
|
||
|
Message-ID: <860323-121840-2300@Xerox>
|
||
|
|
||
|
The following file was uploaded to my system under the name of
|
||
|
BADUSER.TXT. The only thig is that the SysOps NAME isnot included
|
||
|
in the file anywhere. Please pass this around and beware...
|
||
|
|
||
|
--Arun Baheti
|
||
|
NBaheti.es@Xerox.COM
|
||
|
--------------------------------------------------cut here
|
||
|
Date: 27-NOV-85 and afterwards
|
||
|
e
|
||
|
To: All Fido Sysops
|
||
|
Subject: Improper use of Fido and life threats
|
||
|
|
||
|
|
||
|
Fellow Sysops:
|
||
|
|
||
|
I had a user sign on and deposit a bomb. Fortunatly
|
||
|
it was de-fused by me prior to it going off. It is an IBM
|
||
|
BASICA program and will not run properly on the Rainbow
|
||
|
anyway.
|
||
|
|
||
|
The user used the following alias:
|
||
|
|
||
|
Name : Harry Blackstone
|
||
|
City : New York, NY
|
||
|
Password : Magic
|
||
|
|
||
|
He logged on to 102/110 on 17-NOV-85 at 3:55pm. The
|
||
|
program he deposited is called FUTR2.BAS. It attempts to
|
||
|
kill all files on A, B, C, & D drives. It is poorly
|
||
|
written, as though by a 6th grader. It is easy to spot. It
|
||
|
is about 2600 bytes long. Be aware of this user's name and
|
||
|
password. Spread this message around. Keep a log of where
|
||
|
and when you've seen him and his actions.
|
||
|
|
||
|
About one month later, on 19-DEC-85, he came back. He
|
||
|
saw a little note I had posted in my Free Message Area
|
||
|
about him and his program. He also noticed that I had
|
||
|
twitted him. He came back under the name of 'Blackstone
|
||
|
Harry'. He had info about a home I own and people that
|
||
|
is on file at the County Clerk's Office and free for all to
|
||
|
see. He said he was going to put a bullet into a relative's
|
||
|
head, and rape and sodimize another relative. Neither
|
||
|
relatives are alive today as they both passed away about 6
|
||
|
months ago. The house mentioned is not occupied by me but by
|
||
|
tennants. However the threat was REAL. The police have a
|
||
|
file on him. Other users have reported to me that they have
|
||
|
seen him. The FBI knows about and has a file on him. The
|
||
|
phone company knows about him. The FBI and the phone company
|
||
|
offered to set line traps for him. I accepted the offer.
|
||
|
|
||
|
One week later, he left messages containing Visa and
|
||
|
American Express card numbers on them. These were turned
|
||
|
over to the authoritys. He claimed to have broken into a
|
||
|
VAX 8600 and was trying to 'crash' it. Good luck. The FBI
|
||
|
was involved because interstate crime may have been
|
||
|
comitted. They since suspect that he is operating out of
|
||
|
the Los Angeles Area or has contacts here. In exchange for
|
||
|
phone line trapping I have agreed to prosecute him to the
|
||
|
fullest extent of the law if captured. He wants to use the
|
||
|
name Harry Blackstone. He gets upset if he cannot use it.
|
||
|
Please report any contact with him to either this Fido or
|
||
|
preferrably the FBI. I am all for a good joke, and it is
|
||
|
true that no harm was done so far by his program or him.
|
||
|
But threats like he made (if it is a 'he') cannot be
|
||
|
tolerated. Passing Visa card numbers around puts our Fidos
|
||
|
in jepordy as well. We are to a certian degree responsible
|
||
|
for whats on our boards.
|
||
|
|
||
|
A short time afterwards, he called my voice number and
|
||
|
posed as a beneficiary to a good cause. He wanted to come
|
||
|
collect a donation. The only donation he gets from me is Pb
|
||
|
in capsule form. It should be mentioned that he has called
|
||
|
at least one other local Fido here and made the same public
|
||
|
threat to me on that system.
|
||
|
|
||
|
One thing this proves is that as Sysops we all have to
|
||
|
be careful with other's uploads. Check everything, as I do.
|
||
|
Sometimes a machine language program will get through so
|
||
|
check these extremely carefully. The program STRING.COM
|
||
|
available everywhere will assist you in doing this.
|
||
|
|
||
|
If you are on any board and see Public Messages from
|
||
|
him before I do, please inform me immediatly. Ignore the
|
||
|
messages. If he causes you trouble, do as I did and call the
|
||
|
police, FBI and telephone company. You will be surprised as
|
||
|
I was to see that these people are very helpfull. Computer
|
||
|
crime is easy to trace if you have a log as we do and keep
|
||
|
your evidence updated. I will let everyone know how this
|
||
|
turns out, and ignore it if he never calls again and makes
|
||
|
no more threats. As for now, I keep my S & W loaded and
|
||
|
ready for use. The police agree with this concept. I will
|
||
|
not hesitate to use it if he finds my newer address and
|
||
|
comes here. My house is overlooked by 6 others higher than
|
||
|
it, and all neighbors are in tune to this message.
|
||
|
|
||
|
Good luck in catching this nerd on your system!
|
||
|
P.S. Forgive the terrible spelling!
|
||
|
|
||
|
- - - - - - - End forwarded message
|
||
|
--------
|