792 lines
40 KiB
Plaintext
792 lines
40 KiB
Plaintext
|
||
|
||
Computer Underground Digest--Thu Jul 18 17:22:30 CDT 1991 (Vol #3.26)
|
||
|
||
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
||
Contents of Issue 3.26, July 27, 1991:
|
||
|
||
File 1: Moderators' Corner
|
||
File 2: The Vajk-Spaf-Leichter dialogue continues......
|
||
File 3: The TERMINUS of Len Rose
|
||
File 4: "Computer Crime" paper by Brian Peretti available
|
||
File 5: Doc Savage Sentenced (NEWSBYTES Reprint)
|
||
File 6: CompuServe Responds to Policy and Operations Questions
|
||
|
||
Administratia:
|
||
|
||
ARCHIVISTS: ROB KRAUSE, BOB KUSUMOTO, AND BRENDAN KEHOE
|
||
|
||
CuD is available via electronic mail at no cost. Printed copies are
|
||
available by subscription. Single copies are available for the costs
|
||
of reproduction and mailing.
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, by FidoNet file request from 1:100/345,
|
||
on Genie, on the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp
|
||
from ftp.cs.widener.edu, chsun1.uchicago.edu, and
|
||
dagon.acc.stolaf.edu. To use the U. of Chicago email server, send
|
||
mail with the subject "help" (without the quotes) to
|
||
archive-server@chsun1.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to the
|
||
Computer Underground. Articles are preferred to short responses.
|
||
Please avoid quoting previous posts unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: July 18, 1991
|
||
From: "The Moderataors" <tk0jut2@MVS.CSO.NIU.EDU>
|
||
Subject: File 1-- Moderators' Corner
|
||
|
||
NEW CuD FORMAT: The responses to the new format have been
|
||
overwhelmingly favorable, so it will replace the old format. Thanks
|
||
to Gene Spafford who provided us with a digest maker that we hope to
|
||
have working soon.
|
||
|
||
READING THE NEW FORMAT: Usenet readers should soon be able to read CuD
|
||
as individual messages, making replies easier (thanks to Chip
|
||
Rosenthal). Those who get it as "mail" on Unix system can break the
|
||
single file up into individual files (depending on the system and
|
||
what's set up on it) with "burst" or, the easiest, with "inc". Those
|
||
receiving CuD on an IBM-type machine appear limited to a large file,
|
||
but if anybody has suggests on how to burst on VMS, pass them along.
|
||
|
||
MA/PHD THESES AND DISSERTATIONS: We're compiling a list of anybody
|
||
currently working on a thesis or dissertation on computer culture,
|
||
computer crime, or other related topics. If you, or somebody you know,
|
||
is doing this, please pass along the names and snail-mail and email
|
||
address. This includes international researchers as well as those in
|
||
North America.
|
||
|
||
LEN ROSE: Len Rose began his prison term in North Carolina this month.
|
||
Barring surprises, he should be out next May. He could use some
|
||
"cheery" mail. His address is:
|
||
|
||
LEN ROSE
|
||
FEDERAL PRISON CAMP
|
||
SEYMOUR JOHNSON AFB
|
||
CALLER BOX 8004
|
||
GOLDSBORO, NC 27531-5000
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 15 Jul 91 02:21:46 CDT
|
||
From: "William Vajk (igloo)" <learn@GARGOYLE.UCHICAGO.EDU>
|
||
Subject: File 2-- The Vajk-Spaf-Leichter dialogue continues......
|
||
|
||
More Questions....
|
||
====================
|
||
|
||
I have read Jerry Leichter's response in CuD 3.24, and have received
|
||
mail from Thomas Klotzbach which has also been submitted by him for
|
||
publication in CuD.
|
||
|
||
As a direct result of the issues raised by these two gentlemen, I
|
||
spent the better part of a day in one of the law libraries provided by
|
||
Cook County, Illinois, for use by the public. Instead of having
|
||
answers, the review of copyright laws in 17 USC only created more new
|
||
questions, which I'll address another time in yet another article.
|
||
|
||
Briefly stated, copyright laws do the best job of protecting tangible
|
||
goods wherein the expression constitutes the primary value. In other
|
||
cases where a visual rendition is possible but does not represent the
|
||
real value of the object, as with musical scores, the public
|
||
production rights also glean protection, but the primary purpose is to
|
||
preclude unauthorized reproduction of tangible medium versions.
|
||
|
||
It would seem that copyright protections for source code, as in UNIX
|
||
source code, is rather minimal. Indeed, rereading the Rose indictment
|
||
from Maryland and the plea bargain, copyright is never mentioned. In
|
||
detail, the Rose case becomes further complicated in that he received
|
||
the code from a bailee.
|
||
|
||
Klotzbach is correct in one comment that there are criminal aspects to
|
||
copyright violations. They fall, however, in a particularly narrow
|
||
range, requiring willful action AND profit motive on part of the
|
||
miscreant. If you don't sell it, copyright law isn't applicable to
|
||
prosecution as a criminal.
|
||
|
||
I was unable to discover the exact requirements currently mandate for
|
||
deposit of software in order to support a copyright. The Rose
|
||
indictment calls the source code "confidential and proprietary." It is
|
||
confidential in an AT&T security employee's dream, and that's about
|
||
the extent. Leichter suggests that AT&T could claim to have never
|
||
published the source code. This would be true if sale or offer to sell
|
||
were a requirement. 17 USC addresses these issues with the term "vend"
|
||
instead of "sell." The source code we're talking about has been
|
||
published all right, and is in no way entitled to a "trade secret"
|
||
status.
|
||
|
||
Leichter defends the errors made by law enforcement, stipulating that
|
||
they have to learn how to deal with computer crime. Agreed, in
|
||
principle, but not in detail. The problems I am addressing have to do
|
||
with the general approach law enforcement seems to be taking to
|
||
solving all crime these days. The Constitution hasn't changed
|
||
recently. Essentially the same rules have applied to investigations.
|
||
What does an officer have to learn about computer criminality in order
|
||
to keep him from kicking in two doors because some law abiding
|
||
individual tried to get into a bbs that was no longer a bbs ? What
|
||
does he have to be taught in order to have the patience necessary to
|
||
simply wait for the guy to get home from work, and ask a few questions
|
||
? We are seeing some of the fallout from our permissiveness regarding
|
||
RICO.
|
||
|
||
These issues have nothing to do with computer criminality as opposed
|
||
to using sensible investigative techniques. Are we in an age where
|
||
we've been subjected to so many shoot-em-up cops versus the bad guys
|
||
TV shows that people here on usenet, among the best educated, most
|
||
sensible souls in the US, can accept kicking in doors and summary
|
||
confiscation of personal property as a valid and reasonable outcome
|
||
from calling the wrong phone number a few times ?
|
||
|
||
We have a nation which based its laws on personal freedoms and rights
|
||
before any other consideration. Let's please try to remember the
|
||
importance of this simple philosophy.
|
||
|
||
CuD 3.25 arrived as I was finishing this article. A couple of points
|
||
for Gene Spafford to contemplate come to mind. He asks why it is that
|
||
I criticize him personally. The answer is simple. The way the articles
|
||
by Spafford have been written, it is impossible to separate the
|
||
concepts from the man. His style is the same in Communications of the
|
||
ACM. Interestingly, I have been criticized by him exactly in the same
|
||
way as he complained regarding my statements about him. I expected it.
|
||
I suppose Spafford didn't. These opinions are pretty personal. They
|
||
can hardly be discussed at arm's length. It is not any more remote to
|
||
ask if readers find statements hypocritical, or the individual (see
|
||
Spafford's comments in referenced CuD.) I am not insulted by
|
||
Spafford's opinion. He holds it, he's entitled to it, I won't argue
|
||
the point. (Where do you cut notches, Spaf? :-)
|
||
|
||
Spafford asks a direct question of me to which I am happy to reply:
|
||
|
||
> If Joe Random were to shoot someone in front of witnesses, he would
|
||
> be innocent under the law until a jury returned a verdict in a trial,
|
||
> but he would NOT be innocent of the act. Would any witness to the
|
||
> crime, or anyone who spoke to the witness, then be equally condemned
|
||
> by Mr. Vajk for saying "Joe was not innocent of murder" before the
|
||
> conclusion of the trial?
|
||
|
||
Yes.
|
||
|
||
A witness can justly say "I saw him shoot the guy." A person who spoke
|
||
to a witness might reasonably say "He said he saw Joe Random shoot the
|
||
guy." Anyone can say "I believe Joe is guilty" and still be fair and
|
||
reasonable. But to state someone IS guilty is the duty of the jury
|
||
(or judge.) We, all of us, have reserved that right to the judicial
|
||
process. I cannot fathom why anyone would be inclined to change that
|
||
now. When one begins to assume these responsibilities on themselves,
|
||
it becomes easy to victimize even individuals who haven't been charged
|
||
with crimes by painting them with a wide black brush of presumed
|
||
guilt. We've seen it happen, right here on this network. It has also
|
||
been called the tyranny imposed by the self-righteous.
|
||
|
||
And finally:
|
||
|
||
> ...one cannot champion free speech without also embracing the responsibility
|
||
> to to respect others who choose to exercise that right -- disagreement with
|
||
> views should not become contempt for people who (appear to) espouse them.
|
||
|
||
Of course it is possible to respect another's right to freedom of
|
||
expression while holding them in contempt. I respect the rights of
|
||
Nazis to march in Skokie. If asked to testify regarding their rights,
|
||
I would most likely state that 'I believe this swill must be permitted
|
||
to march. Please issue the necessary permits.' I certainly will never
|
||
respect them in any way.
|
||
|
||
I don't, however, see anything hypocritical about respecting some
|
||
particular individual for some aspects regarding them, and detest
|
||
other aspects concurrently. Most of us aren't particularly narrow.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 09 Jul 91 21:28:26 CDT
|
||
From: "Craig Neidorf" <C483307@UMCVMB.BITNET>
|
||
Subject: File 3-- The TERMINUS of Len Rose
|
||
|
||
The TERMINUS of LEN ROSE
|
||
|
||
by Craig Neidorf
|
||
(kl@stormking.com)
|
||
|
||
(Adapted from 2600 Magazine, Spring 1990)
|
||
|
||
As most readers of 2600 Magazine and Computer Underground Digest
|
||
should know, I am Knight Lightning, and I used to be the editor and
|
||
publisher of Phrack, a magazine similar to 2600, but not available in
|
||
a hardcopy format. In my capacity as editor and publisher I often
|
||
received text files and other articles submitted for publication.
|
||
Actually, this is how the majority of the material found in Phrack was
|
||
acquired. Outside of articles written by Taran King or myself, there
|
||
was no staff, merely a loose, unorganized group of free-lancers who
|
||
sent us material from time-to-time.
|
||
|
||
One such free-lance writer was Len Rose, known to some as
|
||
Terminus. To the best of my knowledge at the time, Len was a Unix
|
||
consultant who ran his own system on UUCP called Netsys. Netsys was a
|
||
major electronic mail station for messages passing through UUCP.
|
||
Terminus was no stranger to Phrack. Taran King had interviewed him
|
||
for Phrack Pro-Phile 10, found in Phrack's fourteenth issue.
|
||
Prior to the end of 1988, I had very little contact with Terminus
|
||
and we were reintroduced when he contacted me through the Internet.
|
||
He was very excited that Phrack still existed over the course of the
|
||
years and he wanted to send us an article. However, Len was a
|
||
professional Unix consultant, holding contracts with major
|
||
corporations and organizations across the country and quite reasonably
|
||
(given the corporate mentality) he assumed that these companies would
|
||
not understand his involvement with Phrack. Nevertheless, he did send
|
||
Phrack an article back in 1988. It was a computer program actually
|
||
that was called "Yet Another File on Hacking Unix" and the name on the
|
||
file was >Unknown User<, adopted from the anonymous posting feature of
|
||
the once famous Metal Shop Private bulletin board.
|
||
The file itself was a password cracking program. Such programs
|
||
were then and are still today publicly available intentionally so that
|
||
system managers can run them against their own password files in order
|
||
|
||
"An example is the password cracker in COPS, a package
|
||
that checks a Unix system for different types of
|
||
vulnerabilities. The complete package can be obtained
|
||
by anonymous FTP from ftp.uu.net. Like the password
|
||
cracker published in Phrack, the COPS cracker checks
|
||
whether any of the words in an on-line dictionary
|
||
correspond to a password in the password file."
|
||
(Dorothy Denning, Communications of the ACM,
|
||
March 1991, p. 28)
|
||
|
||
Perhaps if more people used them, we would not have incidents
|
||
like the Robert Morris Worm, Cliff Stoll's KGB agents, or the
|
||
recent crisis involving system intruders from the Netherlands.
|
||
|
||
Time passed and eventually we come to January 1990. At some
|
||
point during the first week or two of the new year, I briefly logged
|
||
on to my account on the VM mainframe on the University of
|
||
Missouri-Columbia and saw that I had received electronic mail from Len
|
||
Rose. There was a brief letter followed by some sort of program.
|
||
From the text I saw that the program was Unix-based, an operating
|
||
system I was virtually unfamiliar with at the time. I did not
|
||
understand the significance of the file or why Len had sent it to me,
|
||
however, since I was logged in remotely from St. Louis, I decided to
|
||
let it sit until I arrived back at school a few days later. In the
|
||
meantime I had noticed some copyright markings on the file and sent a
|
||
letter to a friend at Bellcore Security asking about the legalities in
|
||
having or publishing such material. As it turns out this file was
|
||
never published in Phrack.
|
||
|
||
Although Taran King and I had already decided not to publish this
|
||
file, other events made sure that our decision was mandatory. Upon
|
||
returning to University of Missouri-Columbia (for the new semester) on
|
||
January 12, 1990, we discovered that all access to our accounts on the
|
||
mainframe of the University of Missouri had been revoked without
|
||
explanation. On January 18, 1990 I was visited by the U.S. Secret
|
||
Service for reasons unrelated to the Unix program Len Rose had sent.
|
||
That same day under obligation from a subpoena issued by a Federal
|
||
District Court judge, the University turned over all files from my
|
||
mainframe account to the U.S. Secret Service including the Unix file.
|
||
Included below is the text portion of that file:
|
||
|
||
"Here is a specialized login for System V 3.2 sites.
|
||
I presume that any competent person can get it working
|
||
on other levels of System V. It took me about 10
|
||
minutes to make the changes and longer to write the
|
||
README file and this bit of mail."
|
||
|
||
"It comes from original AT&T SVR3.2 sources, so it's
|
||
definitely now something you wish to get caught with.
|
||
As people will probably tell you, it was originally
|
||
part of the port to an AT&T 3B2 system. Just so that
|
||
I can head off any complaints, tell them I also
|
||
compiled it with a minimal change on a 386 running AT&T
|
||
Unix System V 3.2 (they'll have to fiddle with some
|
||
defines, quite simple to do). Any changes I made are
|
||
bracketed with comments, so if they run into something
|
||
terrible tell them to blame AT&T and not me."
|
||
|
||
"I will get my hands on some Berkeley 4.3 code and do
|
||
the same thing if you like (it's easy of course)."
|
||
|
||
In the text of the program it also reads:
|
||
|
||
"WARNING: This is AT&T proprietary source code. Do
|
||
NOT get caught with it."
|
||
|
||
and;
|
||
|
||
" Copyright (c) 1984 AT&T
|
||
All Rights Reserved
|
||
|
||
* THIS IS UNPUBLISHED PROPRIETARY SOURCE CODE OF AT&T *
|
||
* The copyright notice above does not evidence any *
|
||
* actual or intended publication of such source code. *"
|
||
|
||
As it turned out the program that Len Rose had sent was
|
||
modified to be a Trojan horse program that could capture accounts
|
||
and passwords, saving them into a file that could later be
|
||
retrieved. However, knowing how to write a Trojan horse login
|
||
program is no secret. For example;
|
||
|
||
"such programs have been published in The Cuckoo's Egg
|
||
by Clifford Stoll and an article by Grampp and Morris.
|
||
Also in his ACM turing lecture, Ken Thompson, one of
|
||
the Bell Labs coauthors of Unix, explained how to
|
||
create a powerful Trojan horse that would allow its
|
||
author to log onto any account with either the password
|
||
assigned to the account or a password chosen by the
|
||
author."(Dorothy Denning, Communications of the ACM,
|
||
March 1991, p. 29-30)
|
||
|
||
Between the Unix 3.2 source code, the Unix password cracking
|
||
file, and the added fact that Terminus was a subscriber to
|
||
Phrack, Len Rose was raided by the United States Secret Service
|
||
(including SSA Tim Foley who was the case agent in U.S. v.
|
||
Neidorf) at his Middletown, Maryland home on February 1, 1990.
|
||
The actual search on his home was another atrocity in and of
|
||
itself.
|
||
|
||
"For five hours, the agents -- along with two Bellcore
|
||
employees -- confined <Len> Rose to his bedroom for
|
||
questioning and the computer consultant's wide, Sun,
|
||
in another room while they searched the house.
|
||
|
||
The agents seized enough computers, documents, and
|
||
personal effects -- including Army medals, Sun Rose's
|
||
personal phone book, and sets of keys to their house
|
||
-- to fill a 14-page list in a pending court case."
|
||
(No Kid Gloves For The Accused, Unix Today!,
|
||
June 11, 1990, page 1)
|
||
|
||
It was also reported that the agents did serious damage to
|
||
the physical house itself. Len was left without the computers
|
||
that belonged to him and that he desperately needed to support
|
||
himself and his family financially. Essentially Len went into
|
||
bankruptcy and furthermore now he was blacklisted by AT&T.
|
||
|
||
This culminated in a May 15, 1990 indictment of Len Rose at
|
||
age 31. There were five counts charging Len with violations of
|
||
the 1986 Computer Fraud and Abuse Act and Wire Fraud. The total
|
||
maximum penalty he faced was 32 years in prison and fines of
|
||
$950,000. Furthermore, the U.S. Attorney's office in Baltimore
|
||
insisted that Len was a member of the Legion of Doom, a claim
|
||
that Len and known LOD members have consistently denied. It did
|
||
finally become clear that Terminus was not a member.
|
||
|
||
This was just the beginning of another long saga of bad luck
|
||
for Len Rose. He had no real lawyer, he had no money, and he had
|
||
no job. Furthermore, Len suffered a broken leg after rescuing
|
||
his son during a camping trip.
|
||
|
||
Eventually Len found work with a company in Naperville,
|
||
Illinois (DuPage County <Chicago suburbs>) with a Unix consulting
|
||
firm called InterActive and he had a new lawyer named Jane Macht.
|
||
The future began to look a little brighter temporarily. The
|
||
problem was that within a week InterActive was making claims that Len
|
||
had copied Unix source code from them. Illinois State Police and SSA
|
||
Tim Foley (what is HE doing here!?) came to Len's new home and took
|
||
him away. In addition to the five count indictment in Baltimore, now
|
||
Len was facing criminal charges from the State of Illinois. It was at
|
||
this point, attorney Sheldon T. Zenner, who had successfully defended
|
||
me took on the responsibility of defending Len against the state
|
||
charges.
|
||
|
||
Len's spin of bad luck was not over yet. Assistant U.S. Attorney
|
||
William Cook in Chicago wanted a piece of the action, in part perhaps
|
||
to redeem himself from his highly publicized defeat in U.S. v.
|
||
Neidorf. A third possible indictment for Len seemed inevitable. In
|
||
fact, there were statements made that I personally was to have been
|
||
subpoenaed to testify before the grand jury about Len, but this never
|
||
took place.
|
||
|
||
As time passed and court dates kept being delayed, Len was barely
|
||
surviving; running out of money and options. His wife wanted to leave
|
||
him and take away his children, he could not find work, he was looking
|
||
at two serious indictments for sure, and a possible third, and he just
|
||
could not take it any longer.
|
||
|
||
Len's legal arguments were strong in many respects and it is
|
||
widely believed that if he had fought the charges that he may very
|
||
well have been able to prove his innocence. Unfortunately, the pile
|
||
up of multiple indictments, in a legal system that defines justice in
|
||
terms of how much money you can afford to spend defending yourself,
|
||
took its toll. The U.S. Attorney in Baltimore did not want to try the
|
||
case and they offered Len a deal, part of which was that Assistant
|
||
U.S. Attorney Cook got something as well. Len would agree to plead
|
||
guilty to two wire fraud charges, one in Baltimore, one in Chicago.
|
||
The U.S. Attorney's office would offer a recommendation of a prison
|
||
sentence of 10 months, the State of Illinois would drop it's charges,
|
||
and Len would eventually get his computer equipment back.
|
||
|
||
In the weeks prior to accepting this decision I often spoke with
|
||
Len, pleading with him to fight based on the principles and importance
|
||
of the issues, no matter what the costs. However, I was blinded by
|
||
idealism while Len still had to face the reality.
|
||
|
||
Len Rose was sentenced in June and began serving his time on July
|
||
10, 1990. He got his computer equipment back, but only under the
|
||
agreement that he sell all of it.
|
||
|
||
United States v. Rose was not a case about illegal intrusion into
|
||
other people's computers. Despite this the Secret Service and AT&T
|
||
called his case a prime example of a hacker conspiracy. In reality it
|
||
was only an example of blind justice and corporate power. Like many
|
||
criminal cases of this type, it is all a question of how much justice
|
||
can a defendant afford -- How much of this type of *injustice* can the
|
||
American public afford?
|
||
|
||
-- -- -- -- --
|
||
|
||
A Few Words About Law Enforcement and the Len Rose case...
|
||
|
||
As a person who has been involved with the legal process
|
||
repeatedly over the last couple of years I have learned and
|
||
discovered some of the realities behind the rumors and the myths.
|
||
In the Spring 1991 issue 2600, I authored an article titled "The
|
||
Terminus of Len Rose" and unfortunately the meaning behind the
|
||
article was lost on some of the readers whom I admire greatly.
|
||
|
||
Through my unique experiences at meetings like the 13th
|
||
Annual National Computer Security Conference in Washington D.C. and
|
||
the first conference on Computers, Freedom, & Privacy in San
|
||
Francisco, I have come into contact and had discussions with both the
|
||
people who help create the laws as well as those who actively enforce
|
||
them. I have learned a lot about what actually takes place behind the
|
||
scenes and why. More than anything else, I discovered that my views
|
||
on several issues were not so very far from theirs and they taught me
|
||
why certain realities were so. What they said made sense and I
|
||
realized that I was indeed wrong about some issues and situations. I
|
||
was even more wrong in my expectations of the individuals themselves.
|
||
These people are decent folks just like you and me. Despite the
|
||
highly publicized incidents of the past couple of years, the vast
|
||
majority of these people are not out there trying to destroy someone's
|
||
life just to make a name for themselves or to put a notch on their
|
||
desk. They believe in their work like a sacred religious mission. At
|
||
the same time they have families, hobbies, like to go to the movies,
|
||
play video games, take vacations during the holidays, and everything
|
||
else.
|
||
|
||
In the article about Len Rose, I did not intend to imply that the
|
||
prosecution or the prosecutors were malicious (although the frantic
|
||
raid on Len's house may have been a bit out of order), but rather that
|
||
the legal process itself can be a difficult road for a non-wealthy
|
||
defendant to travel, especially when faced with many indictments at
|
||
once. Len Rose was never charged with actually breaking into a
|
||
computer, but he was called a hacker (under the negative definition)
|
||
just the same. That is not fair. I believe that the prosecutors
|
||
acted in the way they thought best and were not out to deny Rose of
|
||
his constitutional rights, but the issues of law and computers that
|
||
clashed here make things confusing for everyone including myself.
|
||
|
||
The fact of the matter is that the system does have flaws in it
|
||
which arise and are corrected over time. These flaws arose in my own
|
||
case and cost me dearly until the system caught its flaw and corrected
|
||
itself. I am not here to tell you that Len Rose was a saint or that
|
||
he did not do anything wrong. Indeed in the past month I have heard
|
||
complaints from several people about bad business deals with Len and
|
||
mishaps concerning stolen computer equipment. I don't know all of the
|
||
details behind those allegations and considering where Len is today,
|
||
those questions are moot. I must admit that Len's transportation of
|
||
Unix source code strikes me as a form of copyright infringement or
|
||
perhaps software piracy, but Rose did not even make an attempt to
|
||
profit financially from this venture. The value of what he actually
|
||
transported and his guilt or innocence of these statutes was never put
|
||
to the test because the prosecution did not seek to use these more
|
||
appropriate statutes concerning piracy or copyright infringement. I
|
||
still wonder why.
|
||
|
||
While I believe that the prosecutors involved with his case are
|
||
honest, hardworking, and highly motivated people, it strikes me as
|
||
being overly harsh to see a very bright, non-violent offender who did
|
||
not even commit a crime for money go to prison when his formidable
|
||
talents could have been put to good use elsewhere.
|
||
|
||
In conclusion I think there may be a rare bad apple mucking up
|
||
the legal process from time to time, but it is my firm belief that the
|
||
prosecutors and law enforcement officials in our system overall are
|
||
dedicated to doing the right thing and going after offenders that they
|
||
truly believe to be committing real crimes. Up to this point I've
|
||
only been able to watch and learn about their work from an outsider's
|
||
viewpoint, but one day I may be interested in participating from their
|
||
perspective. As a group in general, the law enforcement community has
|
||
earned my respect and appreciation.
|
||
|
||
------------------------------
|
||
|
||
Date: July 28, 1991
|
||
From: "The Moderataors" <tk0jut2@MVS.CSO.NIU.EDU>
|
||
Subject: File 4-- "Computer Crime" paper by Brian Peretti available
|
||
|
||
Brian J. Peretti has finished the latest draft of his paper:
|
||
"Computer Crime: Current Practices, Problems and Proposed Solutions".
|
||
Here is a brief excerpt from the introduction. The complete paper is
|
||
available in the CuD ftp sites.
|
||
|
||
++++++++++++++++++
|
||
|
||
Within recent years, computer crime has become a
|
||
preoccupation with law enforcement officials. In California, a
|
||
group of West German hackers using phone lines and satellite
|
||
hookups, gained unauthorized access into civilian and military
|
||
computers and stole sensitive documents that were sold to the
|
||
Soviet Union. A young New York programmer broke into a
|
||
Washington computer to run a program that he could not run from his
|
||
personal computer. After Southeastern Bell Stated that a document
|
||
published in an electronic publication was valued at more than
|
||
$75,000 the publisher was arrested and brought to trial before the
|
||
discovery that the document could be publicly bought from the
|
||
company for $12.6 The Chaos Computer Club, a Hamburg, Germany,
|
||
club, went into government computers and access information
|
||
and gave it to reporters. In May, 1988, the United States government
|
||
launched Operation Sun Devil, which lead to the seizure of 23,000
|
||
computer disks and 40 computers. In addition, poor police
|
||
performance has also been blamed on computers.
|
||
|
||
Since its creation, the computer has become increasing important
|
||
in society. The law, as in the past, has not been able to evolve
|
||
as quickly as the rapidly expanding technology. This lack
|
||
of movement on the part of governments shows a lack of understanding
|
||
with the area. The need to create a comprehensive regulation or
|
||
code of ethics has become increasing necessary.
|
||
|
||
Due to the nature of computer systems and their
|
||
transnational connections through telephone lines, an
|
||
individual state's action will only stop the problems associated with
|
||
computer crime if many states join together. The patchwork of
|
||
legislation that exists covers only a small part of the problem.
|
||
To adequately address computer crime, greater efforts must be
|
||
made within the computer community to discourage unauthorized
|
||
computer access, countries must strengthen and
|
||
|
||
co-ordinated their computer related laws, as well as proper
|
||
enforcement mechanism created, computer program copyright laws be
|
||
enhanced and computer systems should be created to allow those who
|
||
wish to explore computer systems which will not disrupt the users of
|
||
computer systems.
|
||
|
||
This paper will first set out a definition of computer crime and why
|
||
laws or regulation by the computer community must be created.
|
||
Section II will then discuss the United States law concerning
|
||
computer crime and why it needs to be strengthened. Section III
|
||
will discuss the proposed Israeli computer crime bill, Britain's
|
||
Computer Misuse Act and Ghana's proposed law. Section IV will
|
||
discuss what can be done by both the government and computer owners
|
||
and users to make computer crime less possible.
|
||
<The rest is available from the CuD ftp archives>
|
||
|
||
------------------------------
|
||
|
||
Date: July 28, 1991
|
||
From: "The Moderataors" <tk0jut2@MVS.CSO.NIU.EDU>
|
||
Subject: File 5-- Doc Savage Sentenced (NEWSBYTES Reprint)
|
||
|
||
(Moderators' Note: Readers should note well the final paragraphs of
|
||
this article. It is the first case that we're aware of in which the
|
||
prosecutor opposed the judges intention to imprison. Gail Thackeray's
|
||
arguments against incarceration are compelling and productive. Sadly,
|
||
such logic is the exception and not the rule, but perhaps her example
|
||
will spread).
|
||
|
||
SUNDEVIL DEFENDANT "DOC SAVAGE" SENTENCED 7/17/91
|
||
|
||
PHOENIX, ARIZONA, U.S.A., 1991 JUL 17(NB) -- The Maricopa County
|
||
Arizona County Attorney's Office has announced the sentencing Baron
|
||
Majette, 20 , also known as "Doc Savage", for computer-related crimes
|
||
uncovered in the joint federal / state investigation known as
|
||
"Sundevil".
|
||
|
||
Majette was arrested on March 27th of this year and charged with a
|
||
number of felony charges relating to unauthorized use of telephone
|
||
facilities of Toys 'R Us to make calls worth approximately $8,000,
|
||
illegal access of TRW's credit data base and use of information
|
||
obtained therein to obtain in excess of $50,000 in cash, goods, and
|
||
services, and stealing of credit cards from U.S. Mail boxes and use of
|
||
the cards to obtain approximately $10,000 in cash, goods and services.
|
||
If convicted of the charges, Majette faced a possible jail sentence of
|
||
15 years and the requirement to make restitution for the full amount
|
||
of the alleged losses endured by the firms and individuals.
|
||
|
||
In late May, Majette pleaded guilty to an amended charge of a single
|
||
count of computer fraud, felony third degree. The reduced charge was a
|
||
result of an agreement between Mark Berardoni, the public defender
|
||
assigned to Majette; Janet Black, Majette's probation officer and the
|
||
Maricopa County Arizona County Attorney's Office. Under the reduced
|
||
charges, Majette's maximum term of incarceration was reduced from the
|
||
aforementioned 15 years to 5.
|
||
|
||
On July 16th, when the actual sentence was to be imposed, a further
|
||
agreement between the prosecution, defense and parole service was
|
||
presented to the presiding judge, Justice Gottsfield, and, after
|
||
discussion, became the actual sentence. The court decision imposed the
|
||
following:
|
||
|
||
-- Majette will remain in jail for up to two months while he awaits
|
||
placement in a "Shock Incarceration" program (Majette has been in jail
|
||
since his March 27th arrest because of parole violation related to an
|
||
earlier crime). Assistant County Attorney Gail Thackeray told
|
||
Newsbytes that Shock Incarceration is a 120 day program which
|
||
"provides both intensive counseling and military-like discipline and
|
||
exercise."
|
||
|
||
-- Upon his release from Shock Incarceration, Majette will enter a 5
|
||
year period of "intensive probation". Under Arizona procedures, the
|
||
subject must provide the probation officer, on a weekly basis, a
|
||
schedule for the next week's activities. In the event that the
|
||
schedule has to be modified in any way, the probation office must be
|
||
called before the new schedule is acted on.
|
||
|
||
-- During the time of intensive probation, the probation officer may
|
||
visit or call the subject at any time of day or night to insure
|
||
compliance with the schedule.
|
||
|
||
-- If, at some point after a year of intensive probation, the
|
||
probation officer feels that the subject has followed the rules and
|
||
shown that intensive procedure is no longer warranted, the subject and
|
||
probation officer may recommend to the sentencing judge that the
|
||
subject be transferred to normal probation. In normal probation, the
|
||
subject advises the officer weekly of progress and problems. There is
|
||
not the hovering presence felt in intensive probation, according to
|
||
Thackeray. Additionally, the subject may be released from any form of
|
||
probation at the petition of the probation office and subject and
|
||
approval, after hearing, of the sentencing judge.
|
||
|
||
-- If, on the other hand, Majette violates the terms of his probation,
|
||
he is liable for incarceration in prison for the remainder of his
|
||
probationary period.
|
||
|
||
-- Majette was also ordered to make restitution to the parties
|
||
victimized by his activities by paying a sum of $19,774.03 to those
|
||
involved. The sum is to be paid on a monthly basis over the course of
|
||
his sentence. Additionally, he was ordered to make payments to help
|
||
defray the cost of his probationary supervision.
|
||
|
||
Under the terms of his probation, Majette is subject to the following
|
||
conditions said by Thackeray to be unique to his type of offense:
|
||
|
||
-- He may not use any computer connected to a modem or communications
|
||
network without the prior permission of his probation officer.
|
||
|
||
In the event that he takes a job that brings him into contact with
|
||
computer activities, he must notify someone in the employer's office
|
||
of the restrictions on his computer use and must discuss the planned
|
||
activities with his probation officer.
|
||
|
||
-- He is not to communicate or associate with "members of the computer
|
||
underground" (defined as persons such as those known to have or
|
||
reasonably believed to have been involved in theft of communications
|
||
services, computer fraud or related activities). In the event that any
|
||
such individuals contact him, he must report the contact to his
|
||
probation officer (According to Thackeray, this stipulation is
|
||
intended for Majette' s protection -- "In the event that the
|
||
contacting party is investigated or arrested and phone records show a
|
||
call to Majette, his notification to his probation officer of the call
|
||
will stand as proof that he was not involved in any conspiracy with the
|
||
other individual. His notification responsibility in no way requires
|
||
him to cooperate with authorities in the location or apprehension of
|
||
another individual and such cooperation is neither expected nor
|
||
desired.").
|
||
|
||
Transcripts of the sentencing hearing reportedly show that it was the
|
||
intention of Judge Gottsfield to sentence Majette to a straight five
|
||
years in prison but was dissuaded by the combined recommendations of
|
||
the prosecution, defense and probation office. Thackeray explained to
|
||
Newsbytes the rationale of the prosecution in recommending a lighter
|
||
sentence -- "Usually computer hackers who get into trouble for
|
||
activities of this nature are kids or young adults who are not the
|
||
type to be in trouble for any other criminal activities. The point of
|
||
sentencing in these cases should be rehabilitation. If we can break
|
||
the pattern of illegal behavior, society will benefit from Majette's
|
||
participation. If we simply locked him up for 5 years, neither he nor
|
||
society would benefit."
|
||
|
||
(Barbara E. McMullen & John F. McMullen/19910717)
|
||
|
||
------------------------------
|
||
|
||
Date: 02 Jul 91 19:15:10 EDT
|
||
From: "76012,300 Brad Hicks" <76012.300@COMPUSERVE.COM>
|
||
Subject: File 6-- CompuServe Responds to Policy and Operations Questions
|
||
|
||
Attn: Computer Underground Digest
|
||
In TELECOM Digest #11.507, John Higdon writes:
|
||
|
||
> If I really am responsible for every article and pass-through
|
||
> e-mail message that writes to my disk drive, then I lack the
|
||
> facilities (mostly manpower) to remain an intermediate UUCP site.
|
||
|
||
|
||
John, in every meeting of four or more sysops I have been at in the
|
||
last three years, I have heard this one argued. I have submitted this
|
||
exact question to maybe a half-dozen lawyers. The only thing that ALL
|
||
agreed upon was that until we have three or more cases prosecuted in
|
||
the federal courts, no one knows whether you are liable or not.
|
||
|
||
Mike Godwin, the EFF's attorney, told a bunch of us that he's been
|
||
researching this exact question for most of a year, and so far it
|
||
comes down to three broad categories:
|
||
|
||
(1) ENTIRELY PRIVATE, ONE-TO-ONE MAIL
|
||
|
||
Covered by the Electronic Communications Privacy Act. Sysop/sysadmin
|
||
is not liable for content; may read for technical reasons such as to
|
||
check service; may not disclose to anyone for any reason without a
|
||
court order. (Aside: Since the search warrant at Steve Jackson Games
|
||
said nothing about third-party mail, in the seizure of Illuminati BBS
|
||
the aptly-acronymed SS almost certainly violated ECPA over this very
|
||
issue.)
|
||
|
||
(2) ENTIRELY PUBLIC MAIL ON ONLY ONE SYSTEM (local BBS messages)
|
||
|
||
Only limited case law, but it does appear that the sysop is liable in
|
||
general. More cases or new laws will be necessary to determine WHEN
|
||
the sysop becomes liable ... e.g., if somebody posts a Sprint access
|
||
number on your BBS, you are definitely liable if it is still there a
|
||
month later. But what about the next day? An hour later? Five
|
||
seconds later? Nobody knows until the lawyers fight it out. Godwin
|
||
thinks it comes down to "if the sysop could reasonably have known
|
||
about it"--and then some poor ignorant bunch of jurors will get to
|
||
decide how often a "resonable sysop" checks his mail.
|
||
|
||
(3) WIDELY-DISTRIBUTED PUBLIC MAIL (newsgroups, echomail, mail lists,
|
||
etc.)
|
||
|
||
No readily applicable law. No CLEAR precedent ... but the few
|
||
half-precedents, taken from the world of ham packet-radio repeaters,
|
||
suggests that in fact, you are liable for any public message residing
|
||
on your system, even if it originated elsewhere. If you allow your
|
||
system to forward public messages before you clear them, you may find
|
||
yourself charged with moving illegal messages across state lines.
|
||
|
||
As an ex-sysop of seven years' experience, #3 horrifies and terrifies
|
||
me. I almost got caught in this trap myself, when a Dallas TV station
|
||
tried to persuade police that as the conference moderator on
|
||
MagickNet, I personally was responsible for a message on MagickNet
|
||
offering assistance to a man seeking to smuggle his daughter out of
|
||
the country so his inlaws couldn't take her away. (Note: message from
|
||
someone else, to a third party outside the country, and the hue and
|
||
cry arose two days before I even saw the message.)
|
||
|
||
Maybe common sense will prevail in the courtroom. (And maybe chickens
|
||
have teeth.) Maybe Congress will pass clear, reasonable, technically
|
||
feasible legislation to clarify the issue and President Bush will sign
|
||
it. (And maybe we =can= balance the budget in 1993.) Or maybe the
|
||
Rehnquist court will recognize this as an important freedom-of-speech,
|
||
freedom-of-association, freedom-of-press issue and grant appropriate
|
||
protection. (And maybe we'll find a universally popular solution to
|
||
the abortion issue tomorrow after lunch, and everybody will agree to
|
||
it.)
|
||
|
||
------------------------------
|
||
|
||
************************************
|
||
End of Computer Underground Digest #3.26
|
||
|
||
|