699 lines
36 KiB
Plaintext
699 lines
36 KiB
Plaintext
|
|
|
|
****************************************************************************
|
|
>C O M P U T E R U N D E R G R O U N D<
|
|
>D I G E S T<
|
|
*** Volume 1, Issue #1.24 (July 22, 1990) **
|
|
****************************************************************************
|
|
|
|
MODERATORS: Jim Thomas / Gordon Meyer
|
|
ARCHIVISTS: Bob Krause / Alex Smith
|
|
REPLY TO: TK0JUT2@NIU.bitnet
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views.
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
DISCLAIMER: The views represented herein do not necessarily represent the
|
|
views of the moderators. Contributors assume all responsibility
|
|
for assuring that articles submitted do not violate copyright
|
|
protections.
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
|
|
CONTENTS:
|
|
|
|
File 1: Moderators' Comments
|
|
File 2: Neidorf Trial: The First Day
|
|
File 3: Electronic Frontier Update (John Perry Barlow)
|
|
File 4: Press Release from Atlanta Prosecutor on LoD Guilty Pleas
|
|
File 5: CU in the News
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
********************************************************************
|
|
*** CuD #1.24, File 1 of 4: Moderators' Comments ***
|
|
********************************************************************
|
|
|
|
++++++++++
|
|
In this file:
|
|
1) Craig Neidorf's Trial
|
|
2) Revisions of 1986 Computer Crime Bill
|
|
|
|
+++++++++++++++++++++++++++++
|
|
CRAIG NEIDORF'S TRIAL
|
|
+++++++++++++++++++++++++++++
|
|
|
|
Jury selection for Craig Neiforf's trial began today (July 23). File #2
|
|
(this issue) contains a summary of events. Several CuDites (including the
|
|
moderators) will divide attending duties for the duration and will keep
|
|
readers informed. The trial is expected to last at least two weeks. The
|
|
prosecution is expected to take a week to develop its case, and the defense
|
|
will take at least a week to respond. The defense requested a jury trial,
|
|
and much of the strategy for both sides will be an attempt to educate the
|
|
jury without blowing them away with technical jargon. It also appears
|
|
that, as part of their plea agreement, at least one of the LoD defendants
|
|
will testify for the prosecution. Sentencing for the LoD defendants will
|
|
occur in September, giving great incentive to them for "cooperating"
|
|
against Neidorf. A source who interviewed an assistant attorney working on
|
|
the Atlanta case indicated that the proseuction will ask for the judge to
|
|
"depart downward" from the sentencing guidelines if there is "complete
|
|
cooperation" from Riggs on other cases.
|
|
|
|
++++++++++++++++++
|
|
Revisions of Title 18 / Federal Computer Abuse Act
|
|
+++++++++++++++++++
|
|
|
|
There is currently a move afoot to revise the federal computer fraud and
|
|
abuse statute of 1986. File 4 contains a news story describing the nature
|
|
of some of the proposed revisions. Any revisions that will further enlarge
|
|
the scope of prosecutable offenses is unacceptable, and CuD will watch the
|
|
progress and keep readers informed.
|
|
|
|
********************************************************************
|
|
>> END OF THIS FILE <<
|
|
***************************************************************************
|
|
|
|
------------------------------
|
|
|
|
********************************************************************
|
|
*** CuD #1.24: File 2 of 5: First day of the Neidorf Trial ***
|
|
********************************************************************
|
|
|
|
We have two separate reports from the opening day of Craig Neidorf's trial.
|
|
The first comes from Gordon Meyer, and the second from an anonymous
|
|
contributor.
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
|
|
TO: >INTERNET:TK0JUT2%NIU.BITNET@UICVM.UIC.EDU
|
|
RE: ARTICLE ON JURY SELECTION
|
|
|
|
7/23/90 Chicago, IL.
|
|
|
|
The jury selection in case # 90 CR 70 (United States v. Craig Neidorf) was
|
|
completed today. Although opening statements were also scheduled to begin
|
|
the selection of jurors, while not overly arduous, did perhaps take longer
|
|
than was anticipated. Courtroom observers were overheard remarking that
|
|
Judge Bua seemed to be a bit more cautious and in-depth in his questioning
|
|
than usual.
|
|
|
|
The Government was represented by a team of three attorneys, headed by Bill
|
|
Cook. Also in attendance was agent Foley of the US Secret Service. The
|
|
prosecution team brought along two "shopping carts" full of binders and
|
|
boxes of paper, along with an easel and several charts of some sort.
|
|
However none of this was utilized as the trial never proceeded to the
|
|
opening comments, which are now scheduled to begin at 10am tomorrow
|
|
morning. (Room 2503, Dirksen Federal Building. Jackson and Dearborn.)
|
|
|
|
Defendant Neidorf, dressed in a blue blazer and khaki pants, was seated
|
|
next to his attorney, Sheldon Zenner. (Who, by the way, looks a bit like
|
|
George Will.) Also in attendance, though seated in the gallery, were
|
|
Craig's parents, his grandparents, Dorothy Denning (who will be testifying
|
|
later in the trial), and several other lawyers and staff from Katten,
|
|
Muchin, and Zavis (the firm with which Zenner is associated).
|
|
|
|
Bua's opening remarks to the prospective jurors included a brief summary of
|
|
the charges and an admonishment that an indictment does not neccesary translate
|
|
into guilt. Bua's questions to each of the jurors, after they were called
|
|
to sit in the jury box for consideration, included the traditional "where
|
|
do you live" and "what magazines do you subscribe to" questions, but also
|
|
included specific inquiries into grievances or affiliation with Bell
|
|
South/AT&T/Illinois Bell, association with Craig's college fraternity
|
|
(ZBT), and use/knowledge of computers. Jurors were also queried as to
|
|
whether or not they had any idea what a computer bulletin board was, and if
|
|
they had ever used one.
|
|
|
|
The process of juror selection took over four hours and thirty minutes
|
|
(excluding recesses). During this time several people were excused from
|
|
the selection pool for various reasons. In Federal court the Judge queries
|
|
the jurors, with the counsel for each party communicating their "vote" via
|
|
written messages. Therefore, it is difficult to say for sure whether the
|
|
defense or prosecution wished to exclude which individuals. (It is also
|
|
possible that a potential juror be excluded for other reasons as well, such
|
|
as knowing a witness or something.) Never the less, it seemed quite
|
|
obvious why some people were not chosen. Some, for example, turned out to
|
|
be Bell South and/or AT&T stockholders. Another had a husband who worked
|
|
for Motorola Cellular (which has ties to Bell South Mobile). One man had
|
|
served on three juries, and one grand jury previously. And finally there
|
|
was Catholic priest who had studied Constitutional law, been involved in an
|
|
ACLU sponsored law suit against the state of Colorado, and been involved in
|
|
various other litigations.
|
|
|
|
Here then, is a thumbnail sketch of each jury member that was selected.
|
|
(The first six were selected and sworn in before lunch, the next six and
|
|
the alternates that afternoon.) The information here has been gleaned from
|
|
their selection interviews and is presented so as to get a better idea of
|
|
the "peers" that will judge Mr. Neidorf.
|
|
|
|
1. Male, white, mid to late 20's. Works in an orthopedic surgeons office.
|
|
Has computer experience in using SPSSx-PC, 1-2-3, and various other
|
|
number-crunching applications. Doesn't subscribe to any magazines.
|
|
|
|
2. Elderly white female. Retired, but used to work at a Hallmark store.
|
|
No computer experience.
|
|
|
|
3. Female, white, mid to late 40's. Teaches court reporting at a trade
|
|
school, has never worked as a court reporter. Has some computer
|
|
experience with word processing and spreadsheets.
|
|
|
|
4. Female, white. Middle aged. Former City Clerk (elected) of a Chicago
|
|
suburb. No computer experience. Subscribes to Readers Digest.
|
|
|
|
5. Male, White, late 30's. Passenger pilot for American Airlines.
|
|
Subscribes to Compute! magazine. Has a PC at home. The only juror to
|
|
have ever used a BBS (one set up by American for use by the pilots).
|
|
|
|
6. Female, Afro-American. Works as a school volunteer and a baby sitter.
|
|
Has used history teaching programs on Apple PC's at Malcom X College.
|
|
|
|
7. Female, Afro-American. Works in claims underwriting at CNA.
|
|
Experience in word processing and using LAN based PC's. Former Illinois
|
|
Bell and AT&T employee.
|
|
|
|
8. Female, Afro-American. Works for the Chicago Board of Education. Some
|
|
computer experience in the classroom (as a teaching tool). Holds an MS
|
|
degree in Special Ed.
|
|
|
|
9. Female, white, elderly. School teacher (1st grade). Classroom use of
|
|
computers. MA degree in education. Subscribes to Newsweek.
|
|
|
|
10. Male, Afro-American. 36 years old, lives with parents who are retired
|
|
postal workers. Employee of Trans-Union credit reporting company.
|
|
Programming exposure in BASIC and COBOL.
|
|
|
|
11. Female, white, early 20's. Lives with parents. Holds a BA in
|
|
education, studying for a Masters from North Western University. Teaches
|
|
Jr. High, has WP and some DTP use of computers but limited in other
|
|
knowledge.
|
|
|
|
12. Male, white, 30-ish. Chief engineer at a company the makes floor
|
|
trusses for construction sites. Has a BS in architectural engineering.
|
|
Has done a little programming. Uses CAD packages, spreadsheets. Had a
|
|
class in FORTRAN in college. Has used a modem to download files from
|
|
software manufacturers.
|
|
|
|
ALTERNATE JURORS
|
|
|
|
1. Female, white. Works as a systems analyst and LAN administrator.
|
|
Familiar with PC to Mainframe connections. Holds a BA in Special
|
|
Education and has about 20 hours of computer classes. Familiar with
|
|
Assembler, COBOL, and PL1 among other languages.
|
|
|
|
2. Female, white. Owns and operates a small hotel with her husband. Uses
|
|
a Macintosh for word processing but husband does most of the computer
|
|
stuff. Holds a BA from Northwestern. Subscribes to the New York Times.
|
|
|
|
3. Female, Afro-American. Works at the Christian League of Chicago.
|
|
Formerly a word processor at Montgomery Wards.
|
|
|
|
4. Male, white, early 50's. Elementary school principle. Former phys-ed
|
|
teacher. Access school district records using modem connection to
|
|
district computer, has used e-mail on the districts bulletin board. Holds
|
|
an MA in Education from Loyola University of Chicago.
|
|
|
|
Random Notes: Court begins at 9am on Monday, Wednesday, and Friday. 10pm
|
|
on Tuesday and Thursday (except today, things didn't get going until
|
|
10:00). Although Judge Bua was careful to pronounce each of the
|
|
prospective jurors last names correctly, he seemed to mispronounce
|
|
Neidorf's name differently every time he said it. "Neardorf", "Neardof",
|
|
and "Nierndon" were distinctly heard. I respectfully suggest that he learn
|
|
to pronounce it if not correctly, at least consistently wrong, lest the
|
|
jury think there is more than one person on trial. <grin>
|
|
|
|
Finally, a reporter from Channel 7 in Chicago was in and out of the
|
|
courtroom throughout the day. Reportedly a brief piece ran on the evening
|
|
news today but I wasn't home in time to catch it. I spoke to one of the
|
|
camera men waiting to get some film of Neidorf and he indicated that
|
|
something might appear on tuesday.
|
|
|
|
********************************************************************
|
|
|
|
++++++++++++
|
|
Anonymously contributed
|
|
++++++++++++
|
|
|
|
U.S. v. NEIDORF--an anonymous view
|
|
|
|
A seal high on the wall, the icon of justice, ornate and gothic, looms over
|
|
the courtroom. Light seeps out of the ceiling giving the illusion of
|
|
daylight, but like justice itself, the source remains invisible and
|
|
ominously cold, creating an impression of indifference to all who enter
|
|
these halls. Perhaps 50 people are seated on one side and a few on the
|
|
other side. They are the potential jurors. A handful of functionaries stand,
|
|
sit, or mill about. The judge, cool and stern, looks left, then right. A
|
|
law student from England is taking notes. "Fascinating, your process of
|
|
jury selection," he remarks. "What's this case about?" Somebody else is
|
|
sketching. A giant of a fellow, one would guess a pro football player, but
|
|
in fact, I learn, it is the CuD reporter, Gordon Meyer, sits impassively. A
|
|
television reporter from a local t.v. station hobbles about on crutches,
|
|
looking for people to interview. In front of the judge, to his right, a
|
|
youth and an older man sit, a notebook and a pitcher of icewater in front
|
|
of them. On the left sits a team of prosecutors, two shopping carts full
|
|
of documents, an easel for demonstrations, and smirks. The man in charge,
|
|
Bill Cook, is small, lithe, and tanned. He appears to be in his early 40s.
|
|
One can picture him in tennis whites, drinking gin and tonic, and
|
|
discussing political ambitions on the veranda of a country club.
|
|
|
|
The judge calls the prospective jurors, and takes care to pronounce their
|
|
names correctly. He continually mispronounces the defendant's name. The
|
|
judge asks the questions, the attorneys take notes. "Do you use a
|
|
computer?" "What kind of software to you use?" "Are you familiar with this
|
|
case?" (none were). The judge seems cautious, reserved. The attorneys
|
|
decide, on a "paper ballot," which prospects to retain or dismiss. About
|
|
half were dismissed. The panel was selected by 4 pm. Four alternates were
|
|
selected in about 45 minutes.
|
|
|
|
Thus begins the first day of the inquisition of Craig Neidorf. What will
|
|
happen in the next few weeks? The judge says that it could last from seven
|
|
to ten days. What is in all those documents the prosecution has made
|
|
dramatically visible? What kinds of things will they say? Will he take the
|
|
same kind of cheap shots he took against Shadowhawk, whom he prosecuted a
|
|
few years ago? They say, after all, this is the same prosecutor who, noting
|
|
that Mr. Zinn's crimes were committed with a computer, is reputed to have
|
|
said, "So if you had gun instead, then you'd be a murderer??"
|
|
|
|
Not without irony, the seal of justice looms over a scene in which the goal
|
|
of the prosecution seems not to be truth or fairness, but story-telling and
|
|
show. The drama of justice will be played out, verdicts will be announced,
|
|
these people will leave and others take their place. But, on this first
|
|
day, I cannot but wonder along with the British student, why we are all
|
|
here?
|
|
|
|
********************************************************************
|
|
>> END OF THIS FILE <<
|
|
***************************************************************************
|
|
|
|
------------------------------
|
|
|
|
********************************************************************
|
|
*** CuD #1.24: File 3 of 5: Electronic Frontier Fund Update***
|
|
********************************************************************
|
|
|
|
From: well!eff-news-request@apple.com
|
|
Subject: EFF mailing #1, take 2
|
|
To: eff-news@apple.com
|
|
Date: Mon, 23 Jul 90 13:33:58 PDT
|
|
|
|
|
|
THE ELECTRONIC FRONTIER FOUNDATION
|
|
One Cambridge Center, Suite 300
|
|
Cambridge, MA 02142
|
|
617/577-1385
|
|
617/225-2347 fax
|
|
eff@well.sf.ca.us
|
|
|
|
|
|
Saturday, July 21, 1990
|
|
|
|
|
|
Good people,
|
|
|
|
Greetings. Some of you who read Crime and Puzzlement when it first went
|
|
digital and offered immediate help in dealing with the issues raised therein.
|
|
It's been five weeks since I promised to get back to you "shortly." It is
|
|
now clear that we are operating on political rather than electronic time.
|
|
And political time, though not so ponderous as geologic time or, worse, legal
|
|
time, is hardly swift. The Net may be instantaneous, but people are as slow
|
|
as ever.
|
|
|
|
Nevertheless, much has happened since early June. Crime and Puzzlement
|
|
rattled all over Cyberspace and has, by now, generated almost 300 unsolicited
|
|
offers of help...financial, physical, and virtual. At times during this
|
|
period I responded to as many as 100 e-mail messages a day with the average
|
|
running around 50. (The voice of Peter Lorre is heard in the background,
|
|
repeating, "Toktor, ve haf created a *monster*.")
|
|
|
|
Well, we have at least created an organization. Lotus founder Mitch Kapor
|
|
and I have founded the Electronic Frontier Foundation, an endeavor for which
|
|
we have immodest ambitions. Descending from the Computer Liberty Foundation
|
|
mentioned in Crime and Puzzlement, the EFF has received initial (and
|
|
extremely generous) funding from Mitch, Steve Wozniak, and another Silicon
|
|
Valley pioneer who wishes to remain anonymous. We have also received many
|
|
smaller offers of support.
|
|
|
|
As you will see in the accompanying press release, we formally announced the
|
|
EFF at a press conference in Washington on July 10. The press attention was
|
|
lavish but predictable...KAPOR TO AID COMPUTER CRIMINALS. Actually, our
|
|
mission is nothing less than the civilization of Cyberspace.
|
|
|
|
We mean to achieve this through a variety of undertakings, ranging from
|
|
immediate legal action to patient, long-lasting efforts aimed at forming, in
|
|
the public consciousness, useful metaphors for life in the Datasphere. There
|
|
is much to do. Here is an abbreviated description of what we are already
|
|
doing:
|
|
|
|
* We have engaged the law firms of Rabinowitz, Boudin, Standard,
|
|
Krinsky & Lieberman and Silverglate & Good to intervene on behalf of Craig
|
|
Neidorf (the publisher of Phrack) and Steve Jackson Games. (For a digest of
|
|
the legal issues, please see the message following this one.) We became
|
|
involved in these particular cases because of their general relevance and we
|
|
remain alert to developments in a number of other related cases.
|
|
|
|
Despite what you may have read, we are not involved in these legal matters as
|
|
a "cracker's defense fund," but rather to ensure that the Constitution will
|
|
continue to apply to digital media. Free expression must be preserved long
|
|
after the last printing press is gathering museum dust. And we intend an
|
|
unequivocal legal demonstration that speech is speech whether it finds form
|
|
in ink or in ascii.
|
|
|
|
* We have funded a significant two-year project on computing and civil
|
|
liberties to be managed by the Computer Professionals for Social
|
|
Responsibility. With it, we aim to acquaint policy makers and law
|
|
enforcement officials of the civil liberties issues which may lie hidden in
|
|
the brambles of telecommunications policy. (A full description of this
|
|
project follows.)
|
|
|
|
* During the days before and after the press conference, Mitch and I
|
|
met with Congressional staffers, legal authorities, and journalists, as well
|
|
as officials from the White House and Library of Congress. Thus we began
|
|
discussions which we expect to continue over a period of years. These
|
|
informal sessions will relate to intellectual property, free flow of
|
|
information, law enforcement training and techniques, and telecommunications
|
|
law, infrastructure, and regulation.
|
|
|
|
Much of this promises to be boring as dirt, but we believe that it is
|
|
necessary to "re-package" the central issues in more digestible, even
|
|
entertaining, forms if the general public is to become involved in the
|
|
policies which will fundamentally determine the future of American liberty.
|
|
|
|
* Recognizing that Cyberspace will be only as civilized as its
|
|
inhabitants, we are working with a software developer to create an
|
|
"intelligent front end" for UNIX mail systems. This will, we hope, make Net
|
|
access so easy that your mother will be able cruise around the digital domain
|
|
(if you can figure out a way to make her want to). As many of you are keenly
|
|
aware, the best way, perhaps the only way, to understand the issues involved
|
|
in digital telecommunications is to experience them first hand.
|
|
|
|
These are audacious goals. However, the enthusiasm already shown the
|
|
Foundation indicates that they may not be unrealistic ones. The EFF could be
|
|
like a seed crystal dropped into a super-saturated solution. (Or perhaps
|
|
more appropriately, "the hundredth monkey.") Our organization has been so
|
|
far extremely self-generative as people find in it an expression for concerns
|
|
which they had felt but had not articulated.
|
|
|
|
In any case, we are seeing a spirit of voluntary engagement which is quite a
|
|
departure from the common public interest sensation of "pushing a rope."
|
|
|
|
You, the recipients of this first e-mailing are the pioneers in this effort.
|
|
By coming forward and offering your support, both financial and personal, you
|
|
are doing much to define the eventual structure and flavor of the Electronic
|
|
Frontier Foundation.
|
|
|
|
And much remains to be defined. We are applying for 501(c)3 status, which
|
|
means that your contributions to the Foundation will be tax deductible at the
|
|
time this status is granted. However, tax-exempt status also places
|
|
restrictions on the ability to lobby which may not be consistent with our
|
|
mission. Like many activist organizations, we may find it necessary to
|
|
maintain two organizations, one for lobbying and the other for education.
|
|
|
|
We are in the process of setting up both a BBS in Cambridge and a Net
|
|
newsgroups. None of this is as straightforward as we would have it be. We
|
|
have also just received an offer of production and editorial help with a
|
|
newsletter.
|
|
|
|
What can you do? Well, for starters, you can spread the word about EFF as
|
|
widely as possible, both on and off the Net. Feel free, for example, to
|
|
distribute any of the materials included in this or subsequent mailings,
|
|
especially to those who may be interested but who may not have Net access.
|
|
|
|
You can turn some of the immense processing horsepower of your distributed
|
|
Mind to the task of finding useful new metaphors for community, expression,
|
|
property, privacy and other realities of the physical world which seem up for
|
|
grabs in these less tangible regions.
|
|
|
|
And you can try to communicate to technically unsophisticated friends the
|
|
extent to which their future freedoms and well-being may depend on
|
|
understanding the broad forms of digital communication, if not necessarily
|
|
the technical details.
|
|
|
|
Finally, you can keep in touch with us at any of the above addresses. Please
|
|
pass on your thoughts, concerns, insights, contacts, suggestions, and, and
|
|
most importantly, news of relevant events. And we will return the favor.
|
|
|
|
|
|
Forward,
|
|
|
|
|
|
|
|
John Perry Barlow for The Electronic Frontier Foundation
|
|
|
|
********************************************************************
|
|
>> END OF THIS FILE <<
|
|
***************************************************************************
|
|
|
|
------------------------------
|
|
|
|
********************************************************************
|
|
*** CuD #1.24: File 4 of 5: Atlanta Press LoD Press Release***
|
|
********************************************************************
|
|
|
|
|
|
U.S. Department of Justice
|
|
United States Attorney
|
|
Northern District of Georgia
|
|
|
|
MONDAY, JUNE 9, 1990 Suite 1800 Richard Russell Building
|
|
5 Spring Street, S.W.
|
|
Atlanta, GA 30335
|
|
Telephone: (404) 331-6954
|
|
|
|
|
|
NEWS RELEASE
|
|
|
|
Joe D. Whitley, United States Attorney for the Northern District of
|
|
Georgia, and Dwight D. Ellison, Special Agent in charge, United States
|
|
Secret Service, Atlanta Field Office, announced today that three Atlanta
|
|
men pleaded guilty to charges involving a scheme to defraud Southern Bell
|
|
Telephone and Telegraph Company and BellSouth Advanced Network,
|
|
subsidiaries of Bellsouth, (collectively referred to as "BellSouth") out of
|
|
valuable proprietary information. The defendants are ADAM E. GRANT, a/k/a
|
|
The Urvile and a/k/a Necron 99, of Atlanta, Georgia, age 22; FRANKLIN E.
|
|
DARDEN, JR., a/k/a The Leftist, of Norcross, Georgia, age 24; and ROBERT J.
|
|
RIGGS, a/k/a The Prophet, of Atlanta, Georgia, age 22.
|
|
|
|
Between September 10, 1987 and July 21, 1989, according to the government,
|
|
all three defendants conspired to commit computer fraud, wire fraud, access
|
|
code fraud, and interstate transportation of stolen property under Title
|
|
18, United States Code, Sections 371, 1030, 1343, 1029, and 2314.
|
|
Defendants DARDEN and RIGGS pleaded guilty to one conspiracy count apiece.
|
|
Both face a maximum penalty of 5 years in prison and a $250,000 fine.
|
|
Defendant GRANT pleaded guilty to possessing 15 or more BellSouth access
|
|
devices with the intent to defraud. GRANT faces a maximum penalty of 10
|
|
years incarceration and a $250,000 fine. Sentencing is scheduled for
|
|
September 14, 1990, before United States District Court Judge J. Owen
|
|
Forrester.
|
|
|
|
According to the government's statement of what the evidence at trial would
|
|
have shown, defendants accessed various BellSouth computer systems without
|
|
authority and obtained valuable proprietary information which they
|
|
distributed to other "computer hackers." The defendants and others stole
|
|
valuable proprietary BellSouth information and positioning %sic% themselves
|
|
to significantly compromise telephone service in the four-state BellSouth
|
|
area and throughout the country. Defendants GRANT and DARDEN also monitored
|
|
telephone conversations by breaking into BellSouth computer systems.
|
|
|
|
According to the government's evidence, all three defendants were members
|
|
of an organization called "Legion of Doom," a closely knit group of over 15
|
|
computer hackers located in Georgia, Texas, Michigan, illinois, Florida,
|
|
New York, and other states. According to the government, the Legion of
|
|
Doom disrupted the telecommunications industry, monitored private telephone
|
|
lines, stole proprietary information, stole and modified credit
|
|
information, fraudulently obtained property from various companies, and
|
|
disseminated information that allowed other computer hackers to enter
|
|
BellSouth and non-BellSouth computer systems.
|
|
|
|
This indictment is the result of an investigation conducted by the Atlanta
|
|
field office of the Unite States Secret Service. Assistant United States
|
|
Attorney Kent B. Alexander prosecuted the case.
|
|
|
|
The United States Attorney commended Special Agents Bill Gleason and Bill
|
|
Conkell of the United States Secret Service, Atlanta Office, for their
|
|
outstanding work in investigating the case. The United States Attorney
|
|
also thanked BellSouth for their very helpful assistance and encouraged
|
|
other companies to report illegal computer intrusions to the government.
|
|
|
|
********************************************************************
|
|
>> END OF THIS FILE <<
|
|
***************************************************************************
|
|
|
|
------------------------------
|
|
|
|
********************************************************************
|
|
*** CuD #1.24: File 5 of 5: The CU in the News ***
|
|
********************************************************************
|
|
|
|
"An Espionage Law that may not Compute"
|
|
By George Lardner, Jr.
|
|
|
|
Source: The Washington Post National Weekly Edition, July 16-22, 1999: p. 34
|
|
|
|
The Bush administration is seeking a change in the federal computer
|
|
espionage law that would open the door to prosecution and conviction of
|
|
whistle-blowers and journalists as well as spies.
|
|
|
|
The Justice Department says the proposal would make the espionage law "more
|
|
useful." It would eliminate a provision in current law requiring proof of
|
|
espionage and make it a crime simply to use--or cause the use of--a
|
|
computer to obtain classified information without authorization.
|
|
|
|
The penalties would be the same as they are now. Violators would be subject
|
|
to 10 years in prison for a first offense, or "an attempt to commit such an
|
|
offense." Second offenders could be sent away for 20 years.
|
|
|
|
The proposal was submitted to Congress last month by Acting Assistant
|
|
Attorney General Bruce C. Navarro as part of a package of changes in the
|
|
computer fraud and abuse statute of 1986. It has drawn a frosty reception
|
|
from lawmakers with jurisdiction over the issue.
|
|
|
|
"It seems they want to make far more people spies than actually are," says
|
|
Democratic Rep. Charles E. Schumer of New York, chairman of the House
|
|
Judiciary subcommittee on criminal justice.
|
|
|
|
Under the current computer espionage law, it is a felony for anyone
|
|
knowingly to gain unauthorized access to a computer and obtain classified
|
|
information "with the intent or reason to believe that such information so
|
|
obtained is to be used to the injury of the United States, or to the
|
|
advantage of any foreign nation."
|
|
|
|
The Justice Department wants to drop the "intent or reason to believe"
|
|
clause.
|
|
|
|
Although the clause is a stable of traditional espionage laws dating back
|
|
to 1917, the Justice Department contents that it "has so narrowed the
|
|
application of the computer espionage provision as to render it virtually
|
|
usless." Taking it out, Justice officials say in a section-by-section
|
|
analysis, would establish a "new computer crime offense, which merely
|
|
requires proof that the person obtained certain information, and not that
|
|
he delivered it or transmitted it to any other person or government."
|
|
Prosecutors would then have "another weapon for combating the increasing
|
|
number of espionage cases."
|
|
|
|
Another part of the Justice Department package that drew criticism was a
|
|
provision that would define information in a computer, as well as computer
|
|
processing time, as "property."
|
|
|
|
"The thrust of that is to say that if you take information, that's property
|
|
and you can be accused of stealing," Schumer says. "I think that's very
|
|
dangerous. We need a law more finely honed than that."
|
|
|
|
Morton Halperin, Washington director of the American Civil Liberties Union
|
|
(ACLU), says the proposals call to mind the controversial 1985 prosecution
|
|
of former naval intelligence analyst Samuel Loring Morison, the first
|
|
person convicted under espionage laws for leaking documents "relating to
|
|
the national defense" to the news media.
|
|
|
|
Morison was found guilty of espionage and theft of government property for
|
|
leaking three spy satellite photographs that were classified secret to a
|
|
British magazine. He also was convicted on separate espionage and theft
|
|
charges for taking portions of two other Navy documents, also classified
|
|
secret, and keeping them in an envelope at his Crofton, Md. apartment.
|
|
|
|
Morison's lawyers contended that the sections of espionage law used in the
|
|
case were meant to apply only in a clandestine setting, to spies and
|
|
saboteurs, and not to disclosures to the news media. As for the theft
|
|
charges, they protested that making the law applicable to government
|
|
"information" would give the executive branch unbridled discretion to
|
|
control what the public may be told.
|
|
|
|
An advocate of bigger defense budges and a supporter of president Ronald
|
|
Reagan, Morison contended that he sent the magazine satellite photos, which
|
|
showed the first Soviet nuclear aircraft carrier under construction at a
|
|
Black Sea shipyard, primarily because he was interested in publicizing the
|
|
Soviet threat. He was sentenced to two years in prison.
|
|
|
|
Under the Justice Department's computer espionage proposal, it could be
|
|
even more dangerous to take the secrets from a computer than to get them on
|
|
paper. The bill would make it a crime to pluck from a computer any
|
|
"classified" information, even items stamped secret, because disclosure
|
|
would be embarrassing. That is a much broader category than documents
|
|
"relating to the national defense."
|
|
|
|
Halperin says the ACLU would strongly oppose any such change in the law.
|
|
"Given the amount of information that is classified and the degree to which
|
|
debate in the United States depends on that information, we have
|
|
consistently opposed criminalizing access to classified information by
|
|
private citizens, except where it involves transfer to foreign powers,"
|
|
Halperin says.
|
|
|
|
Justice Department officials acknowledge that their proposal would cover
|
|
whistle-blowers and journalists. "No one considered that in the drafting of
|
|
it," says Grace L. Mastalli, special counsel in Justice's Office of Policy
|
|
Development. But she says it was "probably not possible to narrow it
|
|
without destroying the purpose of the bill.
|
|
(End this story)
|
|
********************************************************************
|
|
|
|
Date: Thu, 19 Jul 90 00:34:48 EDT
|
|
From: Michael Rosen <CM193C@GWUVM>
|
|
Subject: stuff
|
|
To: Computer Underground Digest <tk0jut2>
|
|
|
|
From Computerworld, July 16, 1990, p. 6, by Michael Alexander.
|
|
|
|
CRIME DOESN'T PAY -- HACKERS DO
|
|
|
|
Three hackers pleaded guilty last week to their participation in a scheme
|
|
to steal documentation for an enhanced 911 emergency telephone system from
|
|
Bellsouth Corp.
|
|
|
|
The three are members of the Legion of Doom, a group of hackers that has
|
|
been involved in numerous computer-related crimes, federal prosecutors in
|
|
Atlanta and chicago said.
|
|
|
|
In Chicago, Robert J. Riggs, 21, pleaded guilty to interstate
|
|
transportation of stolen property and wire fraud charges. He faces up to
|
|
15 years in prison and fines of up to $500,000.
|
|
|
|
Riggs, along with Adam E. Grant, 22, of Atlanta and Franklin E. Darden, 24,
|
|
of Norcross, Ga., was also indicted in Atlanta last February for conspiracy
|
|
to commit computer fraud, wire fraud, access-code fraud and interstate
|
|
transportation of stolen property. Riggs and Darden each pleaded guilty to
|
|
one count of conspiring to commit computer fraud. Both face a maximum
|
|
penalty of five years in jail and a $250,000 fine. Grant pleaded guilty to
|
|
having 15 or more Bellsouth access codes with the intent to defraud.
|
|
|
|
Sentencing has been set for Sept. 14. "That is when the fireworks will
|
|
start," said Kent Alexander, assistant U.S. attorney in Atlanta. "There is
|
|
a distinct possibility that this may be one of the first instances of a
|
|
hacker [Riggs] going to jail."
|
|
|
|
In an indictment last February, federal authorities alleged that in
|
|
September 1988, Riggs and Craig Neidorf, an electronic newsletter
|
|
publisher, began a scheme to steal documentation to an enhanced 911 system
|
|
from Bellsouth. Riggs downloaded the text file in December 1988 and posted
|
|
it on a computer bulletin board in Lockport, Ill., the indictment said.
|
|
|
|
Neidorf allegedly retrieved the 911 program from the Lockport bulletin
|
|
board service, edited the document and reposted it on the bulletin board
|
|
for Riggs to review.
|
|
|
|
Neidorf has admitted to publishing an edited version of 911 documentation
|
|
along with information on how to alter telephone switching software so that
|
|
calls are put into an endless loop. He pleaded not guilty to the charges
|
|
and is currently set to go to trial next week. Neidorf contends that he
|
|
was not aware that the 911 documentation had been stolen, said Sheldon
|
|
Zenner, his attorney. "There is only one guy here who has not broken into
|
|
anything, and that is Craig Neidorf."
|
|
|
|
However, government documents asserted that Neidorf was involved in the
|
|
scheme from the outset. According to the plea agreement between Riggs and
|
|
federal authorities, Riggs contacted Neidorf and told him that he was
|
|
transferring a text file stolen from Bellsouth. Also, in an affidavit for
|
|
a search warrant, a U.S. Secret Service agent alleged that Neidorf admitted
|
|
to knowing that the 911 documentation was stolen. His edited version of
|
|
the Bellsouth 911 documentation contained a Bellsouth notice forbidding
|
|
disclosure of the text file's contents, the agent added. Riggs is expected
|
|
to testify for the prosecution.
|
|
|
|
(This article was written by Michael Alexander (CW Staff).
|
|
|
|
********************************************************************
|
|
|
|
------------------------------
|
|
|
|
**END OF CuD #1.24**
|
|
********************************************************************
|
|
! |