883 lines
39 KiB
Plaintext
883 lines
39 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 3, Issue #3.02 (January 16, 1991) **
|
||
** SPECIAL ISSUE: SECRET SERVICE STING BOARD AND INFORMANT **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas (this issues)
|
||
(Gordon Meyer on temporary re-location hiatus)
|
||
|
||
USENET readers can currently receive CuD as alt.society.cu-digest.
|
||
Anonymous ftp sites: (1) ftp.cs.widener.edu (2) cudarch@chsun1.uchicago.edu
|
||
E-mail server: archive-server@chsun1.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source is
|
||
cited. Some authors, however, do copyright their material, and those
|
||
authors should be contacted for reprint permission.
|
||
It is assumed that non-personal mail to the moderators may be reprinted
|
||
unless otherwise specified. Readers are encouraged to submit reasoned
|
||
articles relating to the Computer Underground.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
views of the moderators. Contributors assume all responsibility
|
||
for assuring that articles submitted do not violate copyright
|
||
protections.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
In Liam O'Flaherty's 1925 novel "The Informer," Gypo Nolan betrays a friend
|
||
to the police for 20 pounds. Few of the characters are particularly noble
|
||
or sympathetic, but O'Flaherty manages to show the complexity of human
|
||
frailty, moral quandry, brutality and compassion, as Gypo ultimately dies a
|
||
pathetic death seeking redemption for his betrayal.
|
||
|
||
Only with sadness do we present this first of several special issues on
|
||
federally created and rewarded betrayal, deceit, and informants in the CU.
|
||
We draw here from several public documents, including the seizure warrant
|
||
served on RIPCO BBS. We also use phone logs that we and others have
|
||
collected, copies of telephone bills and logs that corroborate certain
|
||
numbers, eye witness accounts, interviews, and other information that
|
||
establishes beyond doubt that the U.S. Secret Service, in cooperation with
|
||
the Arizona State's Attorney's Office, used a PAID INFORMANT to establish a
|
||
sting board and to capture message logs from a variety of BBSs and turn
|
||
them over to state and federal agents.
|
||
|
||
The primary hard evidence for establishing both the existence and the
|
||
identity of the informant was obtained by Glen Roberts, the publisher of
|
||
FULL DISCLOSURE, an interesting hard-copy magazine, and Bill Vajk, a
|
||
freelance writer and researcher who is active on the nets.
|
||
The full text should be on the CuD archive/ftp sites in a few
|
||
weeks.
|
||
|
||
As those who have been following the Dr. RIPCO saga recall, the warrant
|
||
authorizing the search and seizure of his equipment was sealed, and the
|
||
best efforts of attorneys and others failed to obtain a copy by requesting
|
||
it through official channels. Delays, denials, confusion, and apparent
|
||
misinformation seemed to stymie all formal requests. So, Bill and Glen took
|
||
the case number (90-M-187), trucked on down to the federal court on S.
|
||
Dearborn in Chicago, and went to work. They requested several case files
|
||
adjacent to the desired one (90-M-186, 90-M-188, etc) on the assumption
|
||
that the precise one they sought was likely to be among them. It was. So,
|
||
they plunked their coins into the zerox machine, duplicated the documents,
|
||
and shared them with the world.
|
||
|
||
For those who have not yet seen it, FULL DISCLOSURE is a newspaper that
|
||
covers topics that are not regularly covered in detail in the general
|
||
media. A significant focus is on privacy, electronic surveillance, and
|
||
related topics. Articles include coverage of the National Technical
|
||
Investigators Association annual conference, the latest in video
|
||
surveillance equipment, the JBR tape recorder and much more.
|
||
|
||
A sample issue is available free, or subscriptions are $18 for 12 issues.
|
||
FULL DISCLOSURE, Box 903-C, Libertyville, Illinois 60048.
|
||
|
||
In coming issues, FULL DISCLOSURE will include stories on the government's
|
||
paranoia in the RIPCO case, as reflect in the seizure warrant (available
|
||
ftp in about 7-10 days). CuD will focus primarily on the ethical,
|
||
ideological, and other implications of creating a paid informant class for
|
||
crimes that, while unacceptable, are arguably far "cleaner" than officially
|
||
purchased deception.
|
||
|
||
***************************************************************
|
||
** TRACING THE STINGBOARD: THE DICTATOR AND THE DARK SIDE **
|
||
************************************************
|
||
|
||
In piecing the public information available on the Secret Service documents
|
||
together with other sources, the Secret Service STING BBS, if the number
|
||
they provide is correct, accessed THE DARK SIDE in Phoenix, Arizona. A
|
||
self-proclaimed "hacker" known as THE DICTATOR identified himself publicly
|
||
as the sysop of the Dark Side. The Dictator introduced himself to others as
|
||
%name deleted% or as "%deleted%," and responded to "%deleted%" in various
|
||
forms of Electronic mail. The search affidavit signed by Special Agent G.
|
||
Kirt Lawson of the Secret Service (header indicating Maricopa County)
|
||
acknowledges several facts:
|
||
|
||
1. The U.S. Secret Service, in response to complaints of telephone
|
||
fraud, initiated an investigation into access abuses. The investigation
|
||
described in this document specified the rationale for searching/seizing
|
||
RIPCO BBS. The raid occured on May 8, 1990 in concert with other raids
|
||
across the country. The Secret Service announced to the media through
|
||
press conferences and releases that it was OPERATION SUN DEVIL.
|
||
|
||
2. The Secret Service, working out of Phoenix, established an undercover
|
||
BBS in Sept., 1988. The sysop was a "VOLUNTEER PAID CONFIDENTIAL
|
||
INFORMANT."
|
||
|
||
3. The informant was providing information *BOTH* to the Secret Service and
|
||
the Arizona Attorney General's office at least in 1989 and 1990, and the
|
||
Secret Service participated in STATE searchs.
|
||
|
||
4. The code number and address of the informant is provided, and he is
|
||
linked directly to the number of the BBS identified in the document as the
|
||
undercover sting board.
|
||
|
||
5. The Informant provided information taken from logs, conversations, and
|
||
other sources to the Secret Service.
|
||
|
||
The following sections of the affidavit detail this more fully: The CuD
|
||
crew did not type in this version of the documents, and there may be
|
||
typographical or other minor errors. We reproduce it here as we received
|
||
it.
|
||
|
||
+++++++++++++BEGIN SECTIONS OF AFFIDAVIT++++++++++++++++++++
|
||
|
||
BACKGROUND OF THE INVESTIGATION
|
||
|
||
14. Over the past several years, the U.S. Secret Service has received
|
||
and increasing number of complaints from long distance carriers, credit
|
||
card companies, credit reporting bureaus, and other victims of crimes
|
||
committed by computer hackers, phone phreaks, and computer bulletin board
|
||
users and operators (see Definitions section), which have resulted in
|
||
substantial financial losses and business disruption to the victims.
|
||
Because the persons committing these crimes use aliases or "handles", mail
|
||
drops under false names, and other means to disguise themselves, they have
|
||
been extremely difficult to catch. They also conspire with many others to
|
||
exchange information such as stolen long distance carrier authorization
|
||
codes, credit card numbers, and technical information relating to the
|
||
unauthorized invasion of computer systems and voice mail messaging
|
||
computers, often across state or national borders, making the
|
||
investigation of a typical conspiracy extremely complex. Many of these
|
||
persons are juveniles or young adults, associate electronically only with
|
||
others they trust or who have "proven" themselves by committing crimes in
|
||
order to gain the trust of the group, and use characteristic "hacker
|
||
jargon." By storing and trading information through a network of BBS's,
|
||
the hackers increase the number of individuals attacking or defrauding a
|
||
particular victim, and therefore increase the financial loss suffered by
|
||
the victim.
|
||
|
||
15. For all of the above reasons, the U.S. Secret Service established
|
||
a computer crime investigation project in the Phoenix field office,
|
||
utilizing an undercover computer bulletin board. The purpose of the
|
||
undercover BBS was to provide a medium of communication for persons
|
||
engaged in criminal offenses to exchange information with each other and
|
||
with the sysop (CI 404-235) about their criminal activities. The bulletin
|
||
board began operating on September 1, 1988 at 11:11 p.p., Mountain
|
||
Standard Time, was located at 11459 No. 28th Drive, Apt. 2131, Phoenix,
|
||
Arizona, and was accessed through telephone number (602) 789-9269. It was
|
||
originally installed on a Commodore personal computer, but on January 13,
|
||
1989 was reconfigured to operate on an Amiga 2000 personal computer.
|
||
|
||
16. The system was operated by CI 404-235, a volunteer paid
|
||
confidential informant to the U.S. Secret Service. CI 404-235 was facing
|
||
no criminal charges. Over the past eighteen months, information by CI
|
||
404-235 (see paragraph 16) has consistently proved to be accurate and
|
||
reliable. The Arizona Attorney General's office executed six search
|
||
warrants related to affiant's investigation in 1989 and 1990 (affiant
|
||
participated in three of these). Evidence obtained in those searches
|
||
corroborated information previously given to affiant or to George Mehnert,
|
||
Special Agent of the Arizona Attorney General's office by CI 404-235. In
|
||
over a dozen instances, CI 404-235's information was verified through
|
||
other independent sources, or in interviews with suspects, or by means of
|
||
a dialed number recorder (pen register). One arrest in New York has been
|
||
made as a result of CI 404-235's warning of planned burglary which did
|
||
occur at a NYNEX (New York regional Bell operating company) office.
|
||
Throughout this investigation, CI 404-235 has documented the information
|
||
provided to the affiant by means of computer printouts obtained from the
|
||
undercover BBS and from suspect systems, and consensual tape recordings of
|
||
voice conversations or voice-mail messages.
|
||
|
||
17. Because many of the criminal bulletin board systems require that
|
||
a new person seeking access to the telephone code or credit card sections
|
||
contribute stolen card information to demonstrate "good faith," when asked
|
||
to do so, CI 404-235 has "posted," (left on the system in a message)
|
||
Sprint, MidAmerican or ComSystems authorization codes given to affiant by
|
||
investigators at these companies for that purpose.
|
||
|
||
+++++++++++++++++++END SECTIONS OF AFFIDAVIT+++++++++++++++++
|
||
|
||
Drawing from the above information, the following suggests that The Dark
|
||
Side, The Dictator, and a person identifying as %name deleted% are the sting
|
||
board, the sysop, and the informant, respectively.
|
||
|
||
1. We have obtained telephone billings and computer telephone logs for
|
||
December, 1988 and through mid-1989 indicating that when one called (602)
|
||
789-9269, The Dark Side BBS was accessed. This suggests that the sting number
|
||
and The Dark Side were one and the same.
|
||
|
||
2. A person identifying himself as "The Dictator" called a number
|
||
of boards in 1988-1990 (among them The Central Office, The
|
||
Phoenix Project, Hackers' Den, Ripco, and others) and through 1990
|
||
continued to call such boards as Atlantis, Ripco, Face-to-Face,
|
||
BlitzKrieg, and others. In public and private messages on these
|
||
boards, The Dictator would typically include in his signature
|
||
both his name and his association with The Dark Side BBS:
|
||
|
||
++++ BEGIN EXAMPLE HERE +++++
|
||
|
||
From ->THE DICTATOR (#156)
|
||
Date ->01/12/90 11:08:00 PM
|
||
|
||
Hey %name deleted%...whats up?
|
||
|
||
Ask KL to give me a call and let me in on the details, (602-225-8581), or he
|
||
can leave me mail on Jolnet. I'd rather him call me, instead of having that
|
||
message pass through the Jolnet system.
|
||
|
||
Any ways... Ifits in Louie again this year, Im sure I can make it...let him
|
||
know..thanks.
|
||
|
||
|
||
The Dictator
|
||
The Dark Side BBS
|
||
|
||
+++++++++++End Example ++++++++++++++
|
||
|
||
The reference to "Louie" is to summercon.
|
||
The telephone number listed above was left on a public BBS (in a different
|
||
message) in the general message section by The Dictator in a public request
|
||
for another user to call him. It is also the number that others have given
|
||
us independently as one he gave them for voice contact. Hence, the number
|
||
appears directly and unequivocally linked to The Dictator. Attempts to
|
||
contact him through that number, however, reach a machine, and the person
|
||
who responds to that machine has, for several months, refused to return
|
||
calls collect or otherwise.
|
||
|
||
Even after allegations of his apparent role in the video tapes of Summercon
|
||
'88 surfaced, the dictator made no effort to hide his connection to The
|
||
Dark Side. He left the following in response to several callers bickering
|
||
among themselves over a Chicago BBS also known as "The Dark Side." He makes
|
||
it clear the two are separate entities:
|
||
|
||
++++ BEGIN EXAMPLE HERE +++++
|
||
|
||
%logged circa Sept 25, 1990%
|
||
|
||
From: THE DICTATOR Read: 27 times [1 Reply]
|
||
|
||
Subject: The Dark Side
|
||
|
||
What area code is "The Dark Side BBS" that you two are refering to? That
|
||
isnt the old "Dark Side Of The Moon" BBS is it? Just curious. I used to
|
||
run The Dark Side in 602, and its just a bit odd seeing the name pop up
|
||
with someone else as the SYSOP.. heheh
|
||
|
||
The Dictator
|
||
/s
|
||
shit
|
||
|
||
+++++++++++End Example ++++++++++++++
|
||
|
||
The Dictator of The Dark Side and the above messages as also linked to the
|
||
Secret Service informant by the nature of the logs he provided to them. We
|
||
will continue to provide details of the substance of the documents in
|
||
coming issues. However, messages printed in the Secret Service document
|
||
allude to private e-mail sent to "CI 404-235," and these can be traced to
|
||
The Dictator as the recipient by examining existing e-mail logs retained or
|
||
acquired by others.
|
||
|
||
The Craig Neidorf trial led to the revelation that the Secret Service had
|
||
video-taped parts of Summercon '88 in St. Louis surrepticiously. One
|
||
participant at Summercon who also viewed the tapes indicated that the tape
|
||
captured the events in The Dictator's room from an adjoining room. If
|
||
true, it indicated that advance cooperation and preparation were necessary
|
||
between the participant-informant and the tapers.
|
||
|
||
Why is it necessary to reveal the identity of the informant? We value
|
||
privacy and we have no wish to embarrass those who may be coerced into
|
||
performing unnatural acts for the government. However, if the Secret
|
||
Service are correct, their informant was a willing volunteer who was paid
|
||
for his services. Those who find betraying alike the innocent and guilty
|
||
indiscriminantly for monetary gain are as ethically bankrupt as those who
|
||
buy the service. Our abridged dictionary doesn't contain the term for those
|
||
who get paid for performing unnatural acts, but it will come to us
|
||
eventually.
|
||
|
||
The informant was on a number of boards, and because he reported *FOR
|
||
MONETARY GAIN*, we cannot be sure how many innocent people had their logs
|
||
passed on, how these logs may have been edited or interpreted by law
|
||
enforcement, or what uses were made of the information once acquired. The
|
||
strangely creative interpretations and cavalier disregard of "reality" by
|
||
federal prosecutors and some Secret Service agents are too troublesome to
|
||
allow presumption of good-faith use. We STRONGLY URGE all persons who have
|
||
been or currently are on a board with The Dictator to search their logs and
|
||
consider filing a Freedom of Information Act request (see concluding file).
|
||
|
||
********************************************************************
|
||
** THE DARK SIDE BBS: A SNAPSHOT **
|
||
********************************************************************
|
||
|
||
For those who wonder what kind of board The Dark Side was, it appears from
|
||
reports and logs and other sources that it was not well maintained, had 8
|
||
message bases with few messages, and the discussion was fairly general:
|
||
|
||
+++++++++++++++++++++++++++
|
||
|
||
From: <deleted>
|
||
Subject: The Dark Side BBS Log-In Screen
|
||
Date: Sat, 12 Jan 91 14:19:25 EST
|
||
|
||
Is this helpful? It was captured in March of '89. I think there were 8
|
||
message sections, but the only ones of any interest were 1 (general), 2
|
||
(security) and 3 (Da Elites). There were a couple of funny things about the
|
||
board. It seemed to be up and down a lot, and the sysop never seemed to
|
||
know how to run it. He was always having problems with the simplest things.
|
||
He was defensive and always seemed worried about narcs. He didn't have many
|
||
elite users and the ones listed didn't contribute. There weren't many new
|
||
messages whenever I checked, and from the logs I'm sending, I only counted
|
||
less than 10 posters over a two week period. Really lame. Guess the rest of
|
||
us just logged on and logged off. There was a rumor he was busted in
|
||
Arizona and turned informant and that he was living next to the
|
||
secret service in summercon '88. Oh. I didn't edit anything out, so please
|
||
take out the names if you use this. To make it official, I got this off The
|
||
Dark Side BBS at telephone number 602-789-9269 in March of 1989.
|
||
I swear it's all true and virgin and blah blah blah.
|
||
|
||
----begin Dark Side capture---
|
||
|
||
** 300/1200/2400 Baud **
|
||
|
||
You are now connected to
|
||
The Dark Side BBS
|
||
|
||
The Information Capital Of
|
||
The World!
|
||
|
||
|
||
SYSOP - The Dictator
|
||
|
||
Disclaimer :
|
||
Any unauthorized access attempts may constitute a
|
||
violation of 1986 federal computer crime laws,
|
||
punishable by both civil and criminal remedies.
|
||
The information made available on this BBS is
|
||
for informational and educational uses only. I
|
||
am not responsible for any misuse or criminal acts
|
||
from this information. It is the responsibility
|
||
solely by the user and we assume no liability for
|
||
any actions of the user.
|
||
With use of system password you hereby agree to
|
||
the terms of this contract and shall be held liable
|
||
for any misuse of said contained information and may
|
||
expose you to both civil and criminal penalties under
|
||
law.
|
||
Any unauthorized or misuse of valid logon and
|
||
passwords constitute both civil and criminal violations,
|
||
punishable under law.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Your name: xxxxxx
|
||
Password: #####
|
||
|
||
You are caller #xxx
|
||
Logged at xx:xx xx on xx-Mar-89
|
||
|
||
Last call : xx-xx-89
|
||
Access : xxxxxxxxxxxxx
|
||
Privilege : 10
|
||
Time limit: 60
|
||
D/U ratio : Disabled
|
||
High msg : xxx
|
||
Calls : xx
|
||
Messages : xx
|
||
Downloads : x
|
||
Uploads : xx
|
||
|
||
Checking for messages...
|
||
|
||
(identifying msgs deleted)
|
||
|
||
These message(s) have been
|
||
marked for your retrieval
|
||
|
||
System contains xxx msgs (1-2xx)
|
||
|
||
Remember:
|
||
That the SYSOP, (Thats me), has the right to review everything on
|
||
this system! I like the idea of covering my butt in all cases...
|
||
If you dont agree with the idea of my reviewing everything then
|
||
you should hang up now. If you do agree with this, then at the
|
||
next prompt, type 'Y'.
|
||
N:No; Hang up
|
||
Y:I agree with the terms
|
||
|
||
Do You Agree With The Terms Of The Disclaimer? <Y/N> y
|
||
|
||
13-Mar-89 02:01 AM
|
||
Subj: PAY ATTENTION!
|
||
From: Sysop
|
||
To: All
|
||
|
||
Ok guys and gals...listen up..
|
||
|
||
Ive been informed that there is a strong possiblility that The Sorcer (sp) who
|
||
runs the code line is a narc. This has not been confirmed, but it has not
|
||
been denied. Please beaware of it and be careful.
|
||
|
||
There have been a few busts recently, so be aware of your surroundings and be
|
||
careful of everything your doing..ok, guys? Perhaps you will respect my
|
||
security measures here on the system. Id like to think that we can all trust
|
||
each other here..if you have any questions, suggestions, comments, ect...let
|
||
me know.
|
||
|
||
Thanks guys. Take care. Let me know what you know so we can stay one step
|
||
ahead of the competition. (grin)
|
||
(REply Quit ?):
|
||
|
||
---End of intro to DARK SIDE BBS---
|
||
|
||
%moderators' comment: We agree there is a style to the sysop's
|
||
participation that seems probing. It is always possible that his
|
||
supervisors provided him with questions or other strategies to begin
|
||
various types of discussions or to lead topics in a particular direction.
|
||
As we obtain more logs, we will look for patterns.
|
||
|
||
******************************************************************
|
||
** A RE-EXAMINATION OF THE SECRET SERVICE "STING BOARD" CLAIMS **
|
||
******************************************************************
|
||
In CuD 1.18 (file 5), we reprinted the response from the Secret Service,
|
||
signed by John R. Simpson, Director, to Rep. Don Edwards (Chair of the
|
||
House Subcommitee on Civil and Constitutional Rights), dated April 30,
|
||
1990. Mr. Edwards submitted a list of questions to the SS asking about
|
||
surveillance of BBSs. Parts of it seem especially relevant to the issue of
|
||
informants.
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
DEPARTMENT OF TREASURY
|
||
UNITED STATES SECRET SERVICE
|
||
WASHINGTON, DC 20223
|
||
APR 30 1990
|
||
|
||
The Honorable Don Edwards
|
||
Chairman
|
||
Subcommittee on Civil and Constitutional Rights
|
||
Committee on the Judiciary
|
||
House of Representatives
|
||
Washington, D.C. 20515
|
||
|
||
Dear Mr. Chairman:
|
||
|
||
Thank you for your letter of April 3, 1990, concerning your
|
||
committee's interest in computer fraud. We welcome the
|
||
opportunity to discuss this issue with your committee and I
|
||
hope the following responses adequately answer your
|
||
questions.
|
||
|
||
%First question and response omitted--see CuD 1.18 File #5%
|
||
|
||
Question 2:
|
||
|
||
Has the Secret Service ever monitored any computer bulletin
|
||
boards or networks? Please describe the procedures for
|
||
initiating such monitoring, and list those computer bulletin
|
||
boards or networks monitored by the Secret Service since
|
||
January 1988.
|
||
|
||
Response:
|
||
|
||
Yes, we have occasionally monitored computer bulletin boards.
|
||
The monitoring occurred after we received complaints
|
||
concerning criminal activity on a particular computer bulletin
|
||
board. The computer bulletin boards were monitored as part of
|
||
an official investigation and in accordance with the directives
|
||
of the Electronic Communications Privacy Act of 1986 (Title
|
||
18 USC 2510)
|
||
|
||
The procedures used to monitor computer bulletin boards
|
||
during an official investigation have involved either the use of
|
||
an informant (under the direct supervision of the investigating
|
||
agent) or an agent operating in an undercover capacity. In
|
||
either case, the informant or agent had received authorization
|
||
from the computer bulletin board's owner/operator to access
|
||
the system.
|
||
|
||
We do not keep records of the bulletin boards which we have
|
||
monitored but can provide information concerning a particular
|
||
board if we are given the name of the board.
|
||
|
||
%Question 3 omitted%
|
||
Question 4:
|
||
|
||
Has the Secret Service or someone acting under its direction
|
||
ever created a computer bulletin board or network that was
|
||
offered to the public? Please describe any such bulletin board
|
||
or networks.
|
||
|
||
Response:
|
||
|
||
No, the U. S. Secret Service has not created a computer bulletin
|
||
board nor a network which was offered to members of the
|
||
public. We have created an undercover bulletin board which
|
||
was offered to a select number of individuals who had
|
||
demonstrated an interest in conducting criminal activities.
|
||
This was done with the guidance of the U.S. Attorney's office
|
||
and was consistent with the Electronic Communications
|
||
Privacy Act.
|
||
|
||
%Question 5 omitted%
|
||
|
||
(end Secret Service Response)
|
||
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
The SS response refers to only a single sting/undercover board, and because
|
||
the identify of the Dark Side was revealed as a sting board by the SS, we
|
||
conclude that the board referred to below and The Dark Side are the same.
|
||
We also suggest that this response is less than forthcoming, perhaps even
|
||
deceptive, for at least two reasons:
|
||
|
||
1. Prosecutors can nitpick over legal nuances of the meaning of the
|
||
following:
|
||
|
||
"The procedures used to monitor computer bulletin boards during
|
||
an official investigation have involved either the use of an
|
||
informant (under the direct supervision of the investigating
|
||
agent) or an agent operating in an undercover capacity. In
|
||
either case, the informant or agent had received authorization
|
||
from the computer bulletin board's owner/operator to access the
|
||
system."
|
||
|
||
To mere layfolk unlettered in law, the language implies that the sysop of a
|
||
surveilled system allowed access with knowledge that the surveillor was an
|
||
agent or informant. If a sysop does not know that he/she has given access
|
||
to a potential agitator or provocateur, then the spirit of the law seems
|
||
compromised. According to Dr Ripco, some users in the past did identify
|
||
themselves as affiliated with law enforcement. The Dictator was not one of
|
||
these.
|
||
|
||
A second claim in the SS response is less ambiguous. The Director writes:
|
||
|
||
"No, the U. S. Secret Service has not created a computer bulletin
|
||
board nor a network which was offered to members of the public.
|
||
We have created an undercover bulletin board which was offered
|
||
to a select number of individuals who had demonstrated an
|
||
interest in conducting criminal activities. This was done with
|
||
the guidance of the U.S. Attorney's office and was consistent
|
||
with the Electronic Communications Privacy Act."
|
||
|
||
Now, we could quibble about what constitutes the "general public." But this
|
||
statement by The Director of the Secret Service does not correspond to
|
||
several facts. First, and most offensive, is the claim that The Dark Side
|
||
"AS OFFERED TO A SELECT GROUP OF INDIVIDUALS WHO HAD DEMONSTRATED AN
|
||
INTEREST IN CONDUCTING CRIMINAL ACTIVITIES." This is simply not true! The
|
||
Dark Side was explicitly advertised on other quasi-public boards, including
|
||
The Central Office, and was found in the BBS lists of other boards. In
|
||
PHRACK #20 (file 12), there is a two line advertisement reading: "The
|
||
Dictator is looking for users to call his bulletin board," and it provides
|
||
the number as (602) 789-9269. The Dictator also left the following message
|
||
on The Phoenix Project (which, despite it's reputation was open and readily
|
||
accessible):
|
||
|
||
--Begin Phoenix Project Message---
|
||
>
|
||
>13/100: the dark side
|
||
>Name: The Dictator #115
|
||
>Date: 10:42 pm Fri Nov 04, 1988
|
||
>
|
||
>attention:
|
||
> the dark side bbs is up and running...any user that wishes to become
|
||
>a part of history...please call..this is yet another hard working system
|
||
>that wishes to make its mark in computer history.
|
||
>
|
||
> give us a call..
|
||
>
|
||
> the dictator
|
||
>
|
||
>dark side bbs 602-789-9864
|
||
>
|
||
>summer con '88 members given imddiate access
|
||
|
||
The number given is different from the one later identified in SS
|
||
documents as the sting board number. Perhaps it was typo, or perhaps
|
||
it was and it was presumably changed shortly after this message was
|
||
left. An anonymous sysop of a board in the Midwest told CuD that the
|
||
Dictator personally left the number of The Dark Side on the BBS, and
|
||
recalls at least one public message in which The Dictator left a
|
||
public message requesting people call it. This BBS in question was a
|
||
quasi-open board in that--as most boards, including public ones--after
|
||
a preliminary log-in, virtually everybody who seemed "non-loony" was
|
||
validated. The point is that The Dictator was ACTIVELY SOLICITING
|
||
CALLERS OPENLY, and not simply inviting a "select few" to call the
|
||
board who "demonstrated an interest in conducting criminal
|
||
activities." One user who documents participation on The Dark Side
|
||
from shortly after it's inception states that The Dictator encouraged
|
||
him to tell his friends to call The Dark Side and, at one time shortly
|
||
after it "went up after being down" actually "seemed desperate for new
|
||
users."
|
||
|
||
According to information from several DARK SIDE users and logs they have
|
||
provided from The Dictator on his own system and on others, The Dictator
|
||
took an active role in generating message topics. According to one source,
|
||
The Dictator would rarely provide information, but would attempt to generate
|
||
seemingly innocent topics that might, in retrospect, provide the kind of
|
||
"documentary evidence" (especially if take out of context) that could lead
|
||
to suspicion or to searches. The following were provided as examples of
|
||
"typical" ways that a discussion topic might be generated. We observed
|
||
from the responses to these notes (that we deleted), that the innocent
|
||
question would elicit a technical or potentially incriminating answer of
|
||
the type used prejudicially in the sentencing memorandum of the Atlanta
|
||
Three, or of the type used to justify the raid on Steve Jackson Games. The
|
||
lesson we take from the following is that the Secret Service, through the
|
||
use of an informant, seems to have *ELICITED* statements that could be used
|
||
as evidence.
|
||
|
||
++++ BEGIN SELECTED SYSOP QUOTES FROM 1989 +++++
|
||
|
||
|
||
Msg: #192 Sec: 7 - Security
|
||
24-Feb-89 10:13 PM
|
||
Subj: ATTENTION
|
||
From: Sysop
|
||
To: All
|
||
|
||
Ok guys...heres the scoop...
|
||
|
||
Since the incarsaration of one AZ KID, The Dark Side BBS has engaged PARANIOA
|
||
MODE..
|
||
|
||
If you didnt read in the previous post, the AZ KID was served with a search
|
||
warrent a few days ago for some local and otherwise federal phreaking.
|
||
|
||
This board will remain in paranioa mode until the developments of the AZ KID
|
||
come into play. Lets just say that there are a few things that the AZ KID
|
||
could suggest that would/could be hazardous to this boards health. SO, please
|
||
keep the posts to a .... ahem .... legal sence.
|
||
|
||
Thank you...
|
||
|
||
As updates to this situation come into play, you will be updated. For those
|
||
of you who may have experience in these circumstances, please leave me
|
||
mail...as much info that I can gather in this pressing situation the more I
|
||
can help my upcoming ulcer.
|
||
|
||
Thanks
|
||
|
||
<Grin>
|
||
|
||
|
||
Msg: #251 Sec: 1 - General
|
||
09-Mar-89 02:06 AM
|
||
Subj: Ok Now what
|
||
From: Sysop
|
||
To: All
|
||
|
||
Ok people...
|
||
|
||
Suggestion time. Im looking for a few trustworthy people that want to help me
|
||
out with the system to help it grow... I need as many suggestions as possible.
|
||
We have really been growing in the past couple of weeks, and I am gaing
|
||
multiple sources of info to boost the integrity of this system.
|
||
|
||
Help me out here people, I cant do it on my own...Leave me E-Mail
|
||
|
||
TD
|
||
|
||
|
||
Msg: #248 Sec: 8 - Da Elites
|
||
09-Mar-89 01:53 AM
|
||
Subj: #243 - divertors
|
||
From: Sysop
|
||
To: (Name Deleted)
|
||
|
||
Interesting concept!
|
||
However, I am not too familair with divertors...There are a lot of concepts
|
||
I understand and what not, however...lemme see if I can put this into words...
|
||
|
||
What about open divertors? It is true that divertors work like call
|
||
forwarding, however, is it theoridcally (sp) possible to find an open divertor
|
||
and have it dial your line?
|
||
|
||
In high school just for the fun of it, we bought a DTMF chip from our
|
||
local Rat Shack store and basically built a call forwarding system that we
|
||
could attach to any ones line (if need be) to then have the DTMF chip call to
|
||
any number needed.
|
||
|
||
It worked well...primitive, but well...
|
||
|
||
TD
|
||
|
||
|
||
Msg: #247 Sec: 1 - General
|
||
09-Mar-89 01:48 AM
|
||
Subj: #244 - alala
|
||
From: Sysop
|
||
To: (Name deleted)
|
||
|
||
Who makes the most popular PBX system?
|
||
|
||
The reason for asking is for curiosity sake. There are a lot of different
|
||
features within a PBX.....
|
||
, TD
|
||
|
||
|
||
Msg: #235 Sec: 8 - Da Elites
|
||
06-Mar-89 05:18 PM
|
||
Subj: Radius's (R)
|
||
From: Sysop
|
||
To: all
|
||
|
||
What can anyone tell us about radius's? This is a subject area that I admitt
|
||
I am no good at!
|
||
|
||
TD
|
||
|
||
|
||
Msg: #234 Sec: 8 - Da Elites
|
||
06-Mar-89 05:17 PM
|
||
Subj: divertors (R)
|
||
From: Sysop
|
||
To: all
|
||
|
||
What can any one tell us about diverters??
|
||
|
||
Discussion time!
|
||
|
||
Reply(s) #243
|
||
|
||
|
||
|
||
Msg: #228 Sec: 7 - Security
|
||
06-Mar-89 12:36 AM
|
||
Subj: Ummmmm
|
||
From: Sysop
|
||
To: All
|
||
|
||
Ok guys...lemme ask a general question here that seems to have me a bit
|
||
confused...
|
||
|
||
About a week or so ago, AZ KID had a search warrent served on his house, and
|
||
they took in possession several tapes, tape player, ect, ect.. However, he
|
||
has not been arrested or charged with ANY kind of a crime. He still does not
|
||
have his confiscated equipment back, so I am thinking that they think they
|
||
have something on him...
|
||
|
||
My question is, should he be charged by now?? Its got me a bit concerned. I
|
||
thought usually they would have charged him with a crime, or let it go by
|
||
now....Unless of course he "plea bargined"...
|
||
I dont know..Ive talked to him, but he "doesnt know whats going on"
|
||
|
||
So...What do you guys think,eh??
|
||
|
||
|
||
|
||
Msg: #227 Sec: 7 - Security
|
||
05-Mar-89 01:38 AM
|
||
Subj: CNA (R)
|
||
From: Sysop
|
||
To: All
|
||
|
||
We all know that CNA gives you the Customer Name and Address if you have the
|
||
number, is there a department that has the Number if you have the Name, or
|
||
address, or something of that sort???
|
||
|
||
TD
|
||
|
||
|
||
Msg: #225 Sec: 1 - General
|
||
05-Mar-89 01:34 AM
|
||
Subj: #211 - Text files
|
||
From: Sysop
|
||
To: (Name deleted)
|
||
|
||
Any kind of text file that you see fit to better this system. Its the users
|
||
that make the system. This BBS will work on a diplomatic system. (And Ill
|
||
have thelast word..har har har)
|
||
|
||
Once youve been voice validated, Im sure youll understand what text files will
|
||
be benificail to this system
|
||
|
||
TD
|
||
|
||
+++ END SYSOP QUOTES +++
|
||
|
||
The tenor and content of these and other messages by the sysop suggest that
|
||
the SS's operative was not passive or particularly selective, and may have
|
||
generated the kinds of evidence for which he was being paid by his leading
|
||
questions. If The Dictator was indeed operating under the "direct
|
||
supervision" of a field investigator, then it would seem that the SS knew
|
||
full well that the information it supplied to Rep. Edwards was, at best,
|
||
misleading: Recruiting users was for The Dark Side was hardly "selective,"
|
||
but quite open, and those who called stood a chance of being drawn into
|
||
discussion initiated by the sysop, a paid informant of the secret service,
|
||
who turned the logged files over to them.
|
||
|
||
It would seem that either the SS has little control over its operatives
|
||
(which suggests incompetency) or that it knows full well what its
|
||
operatives do and choses to redefine reality in self-serving ways. Either
|
||
way, the responses by the SS to Rep. Edwards should be re-examined and
|
||
those who were involved in the undercover investigation held accountable.
|
||
|
||
********************************************************
|
||
** WHAT'S THE POINT? **
|
||
********************************************************
|
||
|
||
When the federal government uses *paid* informants, nobody wins.
|
||
Officially sanctioned deception and betrayal, as Gary Marx argued in his
|
||
book "Undercover: Police Surveillance in America," is generally far more
|
||
detrimental to public order in the long run than whatever "crimes" the
|
||
deception targets.
|
||
|
||
When federal agencies set up sting boards and use informants to gather,
|
||
even generate, diverse information that is in turn given to agents as
|
||
potential "evidence" of wrong doing, there can be problems. In the 1960s
|
||
and 1970s, we have seen through various class action suits, congressional
|
||
hearings, FOIA requests, and other inquiries, how abuse of information by
|
||
those who collected it resulted in lost employment opportunities and other
|
||
uncool consequences. In the past year, we have also seen the misuse of
|
||
information in indictments, sentencing memorandums, and especially in
|
||
several search affidavits and seizure warrants.
|
||
|
||
Most of us are concerned if agencies collect information on us against our
|
||
knowledge, because the potential for harm can be subtle. Many readers of
|
||
CuD have called a variety of bulletin boards considerated to be
|
||
"underground." When an agency such as the Secret Service sets up a STING
|
||
board and PAYS an informant to capture logs, those of us who call these
|
||
boards have reason to be concerned with how our **LEGAL, LEGITIMATE** posts
|
||
may be interpreted and used by agents. When we recall that one sysop was
|
||
liked to a fraud conspiracy because of a two line comment that kermit is a
|
||
7-bit protocol used primarily on mainframes, our confidence in agents'
|
||
interpretive competence diminishes.
|
||
|
||
Our intent has not been to embarrass The Dictator. If it were, we would
|
||
include the name he uses when socializing with others.
|
||
|
||
IT WOULD ALSO BE TOTALLY REPREHENSIBLE IF OTHERS WERE TO ENGAGE IN
|
||
HARASSMENT OR OTHER RESPONSE AGAINST HIM! The CU has increasingly been
|
||
united by principles of justice, and to engage in unjust acts because we
|
||
feel others have done the same to us violates those principles we are
|
||
working toward.
|
||
|
||
Calls to the "voice number" The Dictator has left on at least one public
|
||
post on a public board, and given to others, have gone not received a
|
||
response. Messages left to him on BBSs have also not generated contact. We
|
||
continue to invite him to contact us and give his side of the story. There
|
||
are generally shades of grey in even the darkest images, and if he contacts
|
||
us we promise either a fair and impartial story, or, he can write his own
|
||
version and we will publish it unedited.
|
||
|
||
We also remind readers that the issue IS NOT an individual. At stake in
|
||
all this is the issue of privacy and police power as we enter the 21st
|
||
century. When laws cannot keep up with technology, the consequences may be
|
||
ill-considered strategies for monitoring and punishing alleged wrong-doers.
|
||
As Gary Marx reminds us in his book "Undercover" (p. 233):
|
||
|
||
In a democratic society, covert police tactics, along
|
||
with many of the other surveillance techniques, offer us a
|
||
queasy ethical and moral paradox. The choice between anarchy
|
||
and repression is not a happy one, wherever the balance is
|
||
struck. We are caught on the horns of a moral dilemma. In
|
||
Machiavelli's words: %Never% let any state ever believe that
|
||
it can always adopt safe policies...we never try to escape
|
||
one difficulty without running into another; but prudence
|
||
consists in knowing how to recognize the nature of the
|
||
difficulties and how to choose the least bad as good."
|
||
Sometimes undercover tactics will be the least bad. Used
|
||
with great care, they may be a necessary evil. The
|
||
challenge is to prevent them from becoming an intolerable
|
||
one.
|
||
|
||
|
||
********************************************************************
|
||
**END OF CuD #3.02**
|
||
********************************************************************
|
||
|
||
|