826 lines
39 KiB
Plaintext
826 lines
39 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun, Dec 1, 1991 Volume 3 : Issue 43
|
||
|
||
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
||
CONTENTS, #3.43 ( Dec 8, 1991)
|
||
File 1--Moderators' Corner
|
||
File 2--You can help build the National Public Network. Here's how.
|
||
File 3--#3.41--Bill Cook's opening statement in the Neidorf trial
|
||
File 4-- Two Juveniles arrested in BBS Extortion case
|
||
File 5--Law Enforcement and Rights
|
||
File 6--Townson's reply to Neidorf (in Cu Digest, #3.42)
|
||
File 7--"High-Tech Watergate" (Inslaw reprint by E. Richardson)
|
||
File 8--Software Piracy
|
||
File 9--Hacker Convicted
|
||
File 10--"Teens Tapped Computers of U.S. Military"
|
||
File 11--Canada: Police Seize BBS, Software Piracy Charges Expected 11/25/91
|
||
File 12--Here's something you might find of interest
|
||
File 13--24 Year Old Cracks NASA
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
||
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.132),
|
||
chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of
|
||
Chicago email server, send mail with the subject "help" (without the
|
||
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to the
|
||
Computer Underground. Articles are preferred to short responses.
|
||
Please avoid quoting previous posts unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Thu, 30 Nov 91 9:39:58 EST
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: Moderators' Corner
|
||
|
||
In CuD 3.41 (the Bill Cook opening statement), the Moderators' Corner
|
||
file was garbled on some systems. In that file, we indicated that Bill
|
||
Cook is now in private practice in Chicago. We will reprint his new
|
||
address when we print Sheldon Zenner's opening statement in a few
|
||
weeks.
|
||
|
||
We are often asked why we re-publish occasional material from the nets
|
||
or other old news. About one-quarter of CuD readers do not have access
|
||
to usenet and obtain it from BBSs or other non-net sources. For them,
|
||
this is the only source to some of the net debates. In addition, some
|
||
readers keep files of news stories for research or reference, so if an
|
||
old story comes across that we think would be useful as a resource, we
|
||
will occasionally reproduce it to enable researchers to track down
|
||
additional information more easily. We apologize for those who find
|
||
this mundane, but our goal is to make information available to a wide
|
||
audience, so not all files will be of equal interest to all readers.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 12 Nov 1991 21:24:58 -0500
|
||
From: van@EFF.ORG(Gerard Van der Leun)
|
||
Subject: You can help build the National Public Network. Here's how.
|
||
|
||
THE NATIONAL PUBLIC NETWORK BEGINS NOW. YOU CAN HELP BUILD IT.
|
||
|
||
Telecommunications in the United States is at a crossroads. With the
|
||
Regional Bell Operating Companies now free to provide content, the
|
||
shape of the information networking is about to be irrevocably
|
||
altered. But will that network be the open, accessible, affordable
|
||
network that the American public needs? You can help decide this
|
||
question.
|
||
|
||
The Electronic Frontier Foundation recently presented a plan to
|
||
Congress calling for the immediate deployment of a national network
|
||
based on existing ISDN technology, accessible to anyone with a
|
||
telephone connection, and priced like local voice service. We believe
|
||
deployment of such a platform will spur the development of innovative
|
||
new information services, and maximize freedom, competitiveness, and
|
||
civil liberties throughout the nation.
|
||
|
||
The EFF is testifying before Congress and the FCC; making
|
||
presentations to public utility commisions from Massachusetts to
|
||
California; and meeting with representatives from telephone companies,
|
||
publishers, consumer advocates, and other stakeholders in the
|
||
telecommunications policy debate.
|
||
|
||
The EFF believes that participants on the Internet, as pioneers on the
|
||
electronic frontier, need to have their voices heard at this critical
|
||
moment.
|
||
|
||
To automatically receive a description of the platform and details,
|
||
send mail to archive-server@eff.org, with the following line:
|
||
|
||
send documents open-platform-overview
|
||
|
||
or send mail to eff@eff.org.
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 17 Nov 1991 05:22:52 +0200
|
||
From: Jyrki Kuoppala <jkp@CS.HUT.FI>
|
||
Subject: #3.41--Bill Cook's opening statement in the Neidorf trial
|
||
|
||
In article <1991Nov17.003502.16748@chinacat.unicom.com> you write:
|
||
|
||
> JURORS: Good morning.
|
||
>
|
||
> MR. COOK: My name is Bill Cook. I'm an Assistant United States
|
||
>Attorney. I am going to be substantially aided in this prosecution
|
||
>by Colleen Coughlin, who is an Assistant United States Attorney, and
|
||
>Dave Glockner, who is also an Assistant United States Attorney. We
|
||
>will be having Special Agent Tim Foley of the United States Secret
|
||
>Service working with us. He is sitting at the trial table with us.
|
||
|
||
Wow! This is really fascinating - Bill Cook appears to have a very
|
||
good imagination and talent to present things. Sad that's there
|
||
doesn't seem to be a desire to represent things objectively or
|
||
truthfully.
|
||
|
||
This concept of thinking of information as something which can be
|
||
stolen and even as something which is something not for 'all to have'
|
||
as Don Ingraham (sp?) said about Craig Neidorf is really a fascinating
|
||
idea. It's a bit like saying that he owns the sunshine and others
|
||
have no right to sunshine unless he says so.
|
||
|
||
Another thing I find fascinating is the absurdness of the accusations
|
||
- it's really weird to find out that such ridiculousness and total
|
||
contempt for the civil liberties of individuals can be presented at a
|
||
court of law. Guilt by association to a group which is painted by
|
||
stereotypes and imagination - accusing someone of printing a magazine
|
||
- accusing someone of publishing technical information - accusing
|
||
someone of sharing information with others. If these acts can be
|
||
considered to be fraud, then you in the USA are in worse than trouble.
|
||
I hope it's just argument by vigorous handwaving.
|
||
|
||
Also, the description of the E911 system shows that 1984 is here. Very
|
||
scary stuff. In Finland I heard that they use caller id at hospitals
|
||
and the police uses it - someone said that all telephone exchanges
|
||
have good hooks for telephone surveillance and detailed recording of
|
||
all calls going thru the exchanges. It's easy to imagine what can be
|
||
done with the information when combined with all the various of other
|
||
source governments have. The Helsinki area has a high-tech radio cab
|
||
system - and it keeps detailed logs of where cabs were called, at what
|
||
time, where people travelled etc. and I hear they are checked by the
|
||
police.
|
||
|
||
Thanks for the excellent work you're doing by publishing CuD. If you
|
||
need a place for archives, I think nic.funet.fi could provide space -
|
||
I think I once ftp'd a lot from some archives (including the Phrack
|
||
archives with the E911 'document') but it could perhaps be useful to
|
||
have a prime archive also routinely updated here. Makes it more
|
||
difficult for oppressive governments to come after people when the
|
||
information is published internationally.
|
||
|
||
------------------------------
|
||
|
||
Date: 24 NOV 91 23:53:02 CST
|
||
From: ROBERT ERVIN JONES <RJones@USMCP6.BITNET>
|
||
Subject: Two Juveniles arrested in BBS Extortion case
|
||
|
||
TWO JUVENILES ARRESTED IN BBS EXTORTION CASE
|
||
(April 26)
|
||
|
||
Two 15-year-olds have been arrested by California authorities on
|
||
charges they made death threats and tried to extort money from at
|
||
least three computer bulletin board operators.
|
||
|
||
As reported in Online Today yesterday, Encino, Calif., BBS sysop John
|
||
Sands went to police after receiving demands for money and threats on
|
||
his life in messages left on his board in March and the first part of
|
||
this month.
|
||
|
||
Police now say that the two suspects -- both reportedly sophomores at
|
||
Seaside High School near Monterey, Calif. -- also are accused of
|
||
making similar computerized threats on a Fort Ord-based Army staff
|
||
sergeant and his teen-age son, and on another student at a private
|
||
high school in the Pebble Beach, Calif., area.
|
||
|
||
The juveniles were arrested at their homes in Marina by investigators
|
||
who seized computer equipment allegedly used to transmit the threats,
|
||
according to United Press International reporter Michael D. Harris.
|
||
|
||
Authorities say the teen-agers, who allegedly demanded payments
|
||
ranging from $50 to $350 from at least the three BBS sysops
|
||
identified, were turned over to their parents while authorities decide
|
||
how and where they should be prosecuted.
|
||
|
||
The case came to light yesterday after reports surfaced that legal
|
||
complaints had been filed by Sands, who is the chief electronics
|
||
engineer for Capitol records. Sands, 43, said the visitors to his
|
||
private BBS demanded $350 from him and threatened violence if he
|
||
didn't pay.
|
||
|
||
The computer message instructed Sands to leave the money at a drop
|
||
site in San Jose. During the investigation, Los Angeles police
|
||
prepared a phony drop but never carried it out because they
|
||
subsequently received tips that led them to the youths, said police Lt.
|
||
Fred Reno.
|
||
|
||
Following the arrests, Sands told Harris, "It was a little scary
|
||
because even though I suspected they were juveniles, I felt they were
|
||
probably capable of carrying out their threats. I%m sorry to see any
|
||
young person get in trouble, but I'm relieved that they were
|
||
arrested."
|
||
|
||
Meanwhile, according to Judy Smagula Farah of the Associated Press,
|
||
the youths and Sands once belonged to the same computer club and used
|
||
a code that have them access to Sands' bulletin board.
|
||
|
||
Reno said that if the suspects decide to plead guilty to the likely
|
||
charges of accessing a computer system to extort money, their
|
||
sentencing will occur in Monterey County. If they decide to fight the
|
||
charges, the case -- the first of its kind in Los Angeles County --
|
||
will be prosecuted in Southern California. Supplied by Frosty ---*
|
||
GCMS - MechWarriors
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 6 Dec 91 16:07:40 EST
|
||
From: lparks@RND.STERN.NYU.EDU(Lee S. Parks)
|
||
Subject: Law Enforcement and Rights
|
||
|
||
It is important in a free society that the pursuit of legitimate law
|
||
enforcement activities does not trample the rights of individual
|
||
citizens. There is a long history of various branches of our
|
||
government overstepping the bounds of valid inquiry and turning their
|
||
investigations into witch-hunts. Several examples come quickly to
|
||
mind, including the covert surveillance by Army intelligence (among
|
||
others) of Vietnam protest groups, attempts by the FBI to gain copies
|
||
of the membership list of the NAACP and other civil rights
|
||
organizations, and McCarthy era hunt for communists in entertainment,
|
||
schools and government service. Has our society and our government
|
||
learned nothing from these regretable incidents?
|
||
|
||
Consider the Secret Service investigations of alleged illegal computer
|
||
hacking. Several of the activities which the Secret Service has been
|
||
alleged to conduct appear to fall outside the bounds of proper
|
||
investigatory procedure. I do not think that anyone contends that
|
||
reading a public digest on the internet is wrong; however, attempting
|
||
to determine who are the contributors to the digest or who subscribes
|
||
to the digest are actions which impinge upon our freedom of
|
||
association. Similarly, covert surveillance of ostensibly legal
|
||
assemblies is not permitted in the absence of specified cause.
|
||
|
||
We live today in an environment of fear of computer hackers
|
||
endangering innocent lives or harming important computational
|
||
resources through illegal "hacking" activities. Some of the present
|
||
concerns, such as the danger posed by computer viruses, may be well
|
||
grounded, but panic and over reaction arising from ignorance and
|
||
misunderstanding is harmful both to resolving the real problems and to
|
||
maintaining our civil rights. As history has repeatedly shown, it is
|
||
most important for us to guard against infringement of our rights by
|
||
government in difficult times. The actions of the CPSR and the EFF in
|
||
helping to assure that our civil rights are protected should be
|
||
applauded and supported.
|
||
|
||
In response to certain recent messages which suggest that agencies of
|
||
the government have the same rights as private groups or individuals,
|
||
let me add a final note. While an activity may be public or a
|
||
document freely circulated to any individual or group, the
|
||
participation by government in such an activity, especially on a
|
||
covert basis, is fundamentally different than participation by
|
||
individuals or private groups. Our courts have recognized such
|
||
distinctions in the past. We must not lose cite of the fact that
|
||
government has enforcement powers not available to individuals or
|
||
private groups. It is these powers which can exert a chilling effect
|
||
on the exercise of our rights in a unique fashion. It is impossible
|
||
to maintain free and open debate about government policy if that same
|
||
government by threat and innuendo frightens people from the legitimate
|
||
expression of their rights.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 3 Dec 91 15:38:55 est
|
||
From: wex@PWS.MA30.BULL.COM
|
||
Subject: Townson's reply to Neidorf (in Cu Digest, #3.42)
|
||
|
||
Patrick Townson shows his usual servile naivete when it comes to the
|
||
government. You'd think this guy had never heard of Red Squads or of
|
||
the harassment of Central-America activists, unionists, etc. He
|
||
either misses (or deliberately ignores) the implication that the
|
||
Secret Service does not read TELECOM digest because of its love for
|
||
debate about cellular phones but rather because it is monitoring the
|
||
activities and speech of individuals.
|
||
|
||
Back in the past, when we had a Bill of Rights, the courts used to
|
||
consistently rule that federal agents could not simply attend "open"
|
||
meetings in their official capacity because this created an atmosphere
|
||
of intimidation which interfered with others' First Amendment rights
|
||
of free speech and free association. Especially forbidden were
|
||
recording activities like taping and photographing license plates.
|
||
Townson is wrong when he asserts that visual observation and
|
||
photographing by government agents are equivalent -- the courts have
|
||
held otherwise. If we still had any civil rights, one might assume
|
||
that recording TELECOM or CU Digests would fall under the same
|
||
prohibition.
|
||
|
||
Townson's assertion about the government "owning" the Internet is both
|
||
specious and false. The government "owns" the interstate highway
|
||
system --it still has to respect peoples' rights on the highways.
|
||
|
||
Townson's toadying attitude only makes me happier I don't read
|
||
TELECOM.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 31 Oct 91 8:21:44 EST
|
||
From: Anonymous <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: "High-Tech Watergate" (Inslaw reprint by E. Richardson)
|
||
|
||
A High-Tech Watergate
|
||
|
||
By Elliot L. Richardson
|
||
(Source: New-York Times, Oct. 21, 1991, p. A-15)
|
||
Elliot L. Richardson, a Washington lawyer, was
|
||
Attorney General in the Nixon Administration.
|
||
|
||
Washington--As a former Federal prosecutor, Massachusetts attorney
|
||
general and U.S. Attorney General, I don't have to be told that the
|
||
appointment of a special prosecutor is justified only in exceptional
|
||
circumstances. Why, then, do I believe it should be done in the case
|
||
of Inslaw Inc., a small Washington-based software company? Let me
|
||
explain.
|
||
|
||
Inslaw's principal asset is a highly efficient computer program that
|
||
keeps track of large numbers of legal cases. In 1982, the company
|
||
contracted with the Justice Department to install this system, called
|
||
Promis, in U.S. Attorneys' offices. A year later, however, the
|
||
department began to raise sham disputes about Inslaw's costs and
|
||
performance and then started to withhold payments. The company was
|
||
forced into bankruptcy after it had installed the system in 19 U.S.
|
||
Attorneys' offices. Meanwhile, the Justice Department copied the
|
||
software and put it in other offices.
|
||
|
||
As one of Inslaw's lawyers, I advised its owners, William and Nancy
|
||
Hamilton, to sue the department in Federal bankruptcy court. In
|
||
September 1987, the judge, George Bason, found that the Justice
|
||
Department used "trickery, fraud and deceit" to take Inslaw's
|
||
property. He awarded Inslaw more than $7 million in damages for the
|
||
stolen copies of Promis. Soon thereafter, a panel headed by a former
|
||
department official recommended that Judge Bason not be reappointed.
|
||
He was replaced by a Justice Department lawyer involved in the Inslaw
|
||
case.
|
||
|
||
An intermediate court later affirmed Judge Bason's opinion. Though
|
||
the U.S. Court of Appeals set that ruling aside in May of this year on
|
||
the ground that bankruptcy courts have no power to try a case like
|
||
Inslaw's, it did not disturb the conclusion that "the Government acted
|
||
willfully and fraudulently to obtain property that it was not entitled
|
||
to under the contract." Inslaw, which reorganized under Chapter 11,
|
||
has asked the Supreme Court to review the Court of Appeals decision.
|
||
|
||
After the first court's judgment, a number of present and former
|
||
Justice Department employees gave the Hamiltons new information.
|
||
Until then, the Hamiltons thought their problems were the result of a
|
||
vendetta by a department official, C. Madison Brewer, whom Mr.
|
||
Hamilton had dismissed from Inslaw several years before. How else to
|
||
explain why a simple contract dispute turned into a vicious campaign
|
||
to ruin a small company and take its prize possession?
|
||
|
||
The new claims alleged that Earl Brian, California health secretary
|
||
under Gov. Ronald Reagan and a friend of Attorney General Edwin Meese
|
||
3d, was linked to a scheme to take Inslaw's stolen software and use it
|
||
to gain the inside track on a $250 million contract to automate
|
||
Justice Department litigation divisions.
|
||
|
||
(In Mr. Meese's confirmation fight, it was revealed that Ursula Meese,
|
||
his wife, had borrowed money to buy stock in Biotech Capital
|
||
Corporation, of which Dr. Brian was the controlling shareholder.
|
||
Biotech controlled Hadron Inc., a computer company that aggressively
|
||
tried to buy Inslaw.)
|
||
|
||
Evidence to support the more serious accusations came from 30 people,
|
||
including Justice Department sources. I long ago gave the names of
|
||
most of the 30 to Mr. Meese's successor as Attorney General, Dick
|
||
Thornburgh. But the department contacted only one of them, a New York
|
||
judge.
|
||
|
||
Meanwhile, the department has resisted Congressional investigations.
|
||
The Senate Permanent Subcommittee on Investigations staff reported
|
||
that its inquiry into Inslaw's charges had been "hampered by the
|
||
department's lack of cooperation" and that it had found employees "who
|
||
desired to speak to the subcommittee, but who chose not to out of fear
|
||
for their jobs."
|
||
|
||
The department also hindered the interrogation of employees and
|
||
resisted requests for documents by the House Judiciary Committee and
|
||
its chairman, Representative Jack Brooks. Under subpoena, Mr.
|
||
Thornburgh produced many files but the department said that a volume
|
||
containing key documents was missing.
|
||
|
||
In letters to Mr. Thornburgh in 1988 and 1989, I argued for the
|
||
appointment of an independent counsel. When it became obvious that
|
||
Mr. Thornburgh did not intend to reply or act, Inslaw went to court to
|
||
order him to act. A year ago, the U.S. District Court ruled,
|
||
incorrectly I think, that a prosecutor's decision not to investigate,
|
||
no matter how indefensible, cannot be corrected by any court.
|
||
|
||
In May 1988, Ronald LeGrand, chief investigator for the Senate
|
||
Judiciary Committee, told the Hamiltons, and confirmed to their
|
||
lawyers, that he had a trusted Justice Department source who, as Mr.
|
||
LeGrand quoted him, said that the Inslaw case was "a lot dirtier for
|
||
the Department of Justice than Watergate had been, both in its breadth
|
||
and its depth." Mr. LeGrand now says he and his friend were only
|
||
discussing rumors.
|
||
|
||
Then, in 1990, the Hamiltons received a phone call from Michael
|
||
Riconosciuto, an out-of-fiction character believed by many
|
||
knowledgeable sources to have C.I.A. connections. Mr. Riconosciuto
|
||
claimed that the Justice Department stole the Promis software as part
|
||
of a payoff to Dr. Brian for helping to get some Iranian leaders to
|
||
collude in the so-called October surprise, the alleged plot by the
|
||
Reagan campaign in 1980 to conspire with Iranian agents to hold up
|
||
release of the American Embassy hostages until after the election.
|
||
Mr. Riconosciuto is now in jail in Tacoma, Wash., awaiting trial on
|
||
drug charges, which he claims are trumped up.
|
||
|
||
Since that first Riconosciuto phone call, he and other informants from
|
||
the world of covert operations have talked to the Hamiltons, the
|
||
Judiciary Committee staff, several reporters and Inslaw's lawyers,
|
||
including me. These informants, in addition to confirming and
|
||
supplementing Mr. Riconosciuto's statements, claim that scores of
|
||
foreign governments now have Promis. Dr. Brian, these informants say,
|
||
was given the chance to sell the software as a reward for his services
|
||
in the October surprise. Dr. Brian denies all of this. The reported
|
||
sales allegedly had two aims. One was to generate
|
||
|
||
revenue for covert operations not authorized by Congress. The second
|
||
was to supply foreign intelligence agencies with a software system
|
||
that would make it easier for U.S. eavesdroppers to read intercepted
|
||
signals. These informants are not what a lawyer might consider ideal
|
||
witnesses, but the picture that emerges from the individual statements
|
||
is remarkably detailed and consistent, all the more so because these
|
||
people are not close associates of one another. It seems unlikely
|
||
that so complex a story could have been made up, memorized all at once
|
||
and closely coordinated.
|
||
|
||
It is plausible, moreover, that preventing revelations about the theft
|
||
and secret sale of Inslaw's property to foreign intelligence agencies
|
||
was the reason for Mr. Thornburgh's otherwise inexplicable reluctance
|
||
to order a thorough investigation.
|
||
|
||
Although prepared not to believe a lot they told him, Danny Casolaro,
|
||
a freelance journalist, got many leads from the same informants. The
|
||
circumstances of his death in August in a Martinsburg, W.Va., hotel
|
||
room increase the importance of finding out how much of what they have
|
||
said to him and others is true. Mr. Casolaro told friends that he had
|
||
evidence linking Inslaw, the Iran-contra affair and the October
|
||
surprise, and was going to West Virginia to meet a source to receive
|
||
the final piece of proof.
|
||
|
||
He was found dead with his wrists and arms slashed 12 times. The
|
||
Martinsburg police ruled it a suicide, and allowed his body to be
|
||
embalmed before his family was notified of his death. His briefcase
|
||
was missing. I believe he was murdered, but even if that is no more
|
||
than a possibility, it is a possibility with such sinister
|
||
implications as to demand a serious effort to discover the truth.
|
||
|
||
This is not the first occasion I have had to think about the need for
|
||
an independent investigator. I had been a member of the Nixon
|
||
Administration from the beginning when I was nominated as Attorney
|
||
General in 1973. Public confidence in the integrity of the Watergate
|
||
investigation could best be insured, I thought, by entrusting it to
|
||
someone who had no such prior connection to the White House. In the
|
||
Inslaw case the charges against the Justice Department make the same
|
||
course even more imperative.
|
||
|
||
When the Watergate special prosecutor began his inquiry, indications
|
||
of the President's involvement were not as strong as those that now
|
||
point to a widespread conspiracy implicating lesser Government
|
||
officials in the theft of Inslaw's technology.
|
||
|
||
The newly designated Attorney General, William P. Barr, has assured me
|
||
that he will address my concerns regarding the Inslaw case. That is a
|
||
welcome departure. But the question of whether the department should
|
||
appoint a special prosecutor is not one it alone should decide. Views
|
||
from others in the executive branch, as well as from Congress and the
|
||
public, should also be heard.
|
||
|
||
------------------------------
|
||
|
||
Date: 17 Nov 91 10:19:30 EST
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: Software Piracy
|
||
|
||
We recently received these brief summaries of stories that appeared in
|
||
the 11/11/91 issue of the Wall Street Journal. The contributor did
|
||
not provide additional information. It is unclear from the summary if
|
||
'software makers' (presumably the ASP) are going after CU-type
|
||
software pirates who trade software, or 'bootleggers' that sell
|
||
counterfeit or home-made copies. After reading the full text of the
|
||
article it seems that the reporter is unaware of the the distinction
|
||
as both types of activity are alluded to without explanation. It is
|
||
disappointing that errors such as this continue to be made. Nobody
|
||
benefits when issues such as there are clouded by misuse of terms and
|
||
descriptions.
|
||
|
||
As for the second article, about one year ago we ran a similar story
|
||
that the Army was developing such viruses in-house. Perhaps they have
|
||
now turned to outside sources?
|
||
|
||
+++++++++++++++++++++++
|
||
|
||
Software makers, cracking down on piracy, are secretly prowling
|
||
electronic bulletin boards in search of purloined products.
|
||
Electronic bulletin boards, which can be reached by computer over the
|
||
phone, offer a way for people with common interests to share ideas.
|
||
But, in rare cases, bulletin board operators offer illegal copies of
|
||
popular computer programs for sale. Callers can buy the programs for
|
||
a fraction of the normal price.
|
||
|
||
|
||
The Army is looking for a few good computer viruses. Computer
|
||
viruses, rogue programs that "infect" a network and render machines
|
||
inoperative, are most often dispatched by pranksters with a flair for
|
||
programming who consider it a sport to gum up a computer system. With
|
||
computers playing a growing role in battle, the Army wants to know
|
||
whether viruses can attack war-fighting hardware.
|
||
|
||
------------------------------
|
||
|
||
Date: 27 Nov 91 12:45:25 GMT
|
||
From: NIEBUHR@BNLCL6.BNL.GOV (Dave Niebuhr, BNL CCD, 516-282-3093)
|
||
Subject: Hacker Convicted
|
||
|
||
(Reprinted from X-Telecom-Digest: Volume 11, Issue 973, Message 6 of 12)
|
||
|
||
I read an article in today's %Newsday% about a person convicted of
|
||
computer crime. The entire article is:
|
||
|
||
"Hacker Pleads Guilty"
|
||
|
||
"A 24-year-old Denver hacker who admitted breaking into a sensitive
|
||
NASA computer system pleaded guilty to a felony count of altering
|
||
information.
|
||
|
||
In exchange for the plea Monday, federal prosecutors dropped six
|
||
similar counts against Richard G. Wittman Jr., who faced up to five
|
||
years in prison and a $250,000 fine. Authorities said the government
|
||
will seek a much lighter penalty when Wittman is sentenced Jan. 13.
|
||
|
||
Both sides have agreed on repayment of $1,100 in collect calls he
|
||
placed to the computer system, but they differ on whether Wittman
|
||
should be held responsible for the cost of new software.
|
||
|
||
Wittman told U.S. District Judge Sherman Finesilver that it took him
|
||
about two hours on a personal computer in his apartment to tap into
|
||
the space agency's restricted files. It took NASA investigators
|
||
nearly 300 hours to track Wittman and an additional 100 hours to
|
||
rewrite the software to prevent a recurrence, prosecutors said."
|
||
|
||
Well, I guess computer crime pays. Wittman will spend no more than
|
||
$1,100; the government paid hourly salaries of the investigators and
|
||
programmers working on the problem. A very, very conservative
|
||
estimate of the final cost would be over $20,000 when one stops to
|
||
consider that the word "investigators" was used which implies more
|
||
than one person. They gave away the store.
|
||
|
||
I could probably say more but I'm too disgusted.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 6 Dec 91 12:01:37 CST
|
||
From: Anonymous <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: "Teens Tapped Computers of U.S. Military"
|
||
|
||
"Teens Tapped Computers of U.S. Military"
|
||
From: _Chicago Tribune_, November 21, 1991: p. 3.
|
||
|
||
WASHINGTON--Four years after the federal government adopted a
|
||
computer security law, a group of Dutch teenagers was able to tap
|
||
sensitive information in Defense Department computers, a congressional
|
||
committee was told Wednesday.
|
||
|
||
Federal auditors said the interlopers entered some computer systems
|
||
without even using passwords. Among the data available at the 34
|
||
defense installations they penetrated were personnel performance
|
||
reports, weapons development information, and descriptions of the
|
||
movements of equipment and personnel.
|
||
|
||
At least one of the systems cracked by the teenagers, who operated
|
||
between April 1990 and May 1991, directly supported Operation Desert
|
||
Storm.
|
||
|
||
Jack L. Brock. director of government information for the General
|
||
Accounting Office, declined to give specifics about that system, but
|
||
said operations against Iraq were in no way compromised.
|
||
|
||
"It is not clear that these hackers had the level of sophistication
|
||
needed to use what they obtained," Brock told a subcommittee of the
|
||
Senate Governmental Affairs Committee. Nevertheless, he said, "this
|
||
type of information could be very useful to a foreign intelligence
|
||
operation."
|
||
|
||
A Defense Department spokeswoman said security procedures are being
|
||
reviewed, but noted that the hackers only gained access to unclassified
|
||
information.
|
||
|
||
The hackers' activities were first disclosed by Dutch television in
|
||
February, when camera crews filmed an unnamed individual tapping what
|
||
he said was U.S. military missile test information. But little was
|
||
known at the time about the extent of the intrusions or the methods
|
||
used. Brock's testimony provided the first details, sketchy though
|
||
they were.
|
||
|
||
Law-enforcement officials are seeking to prosecute the Dutch
|
||
teenagers, but officials declined to comment Wednesday on the progress
|
||
of their efforts.
|
||
|
||
Brock and congressional critics sought to use the case of the Dutch
|
||
hackers to illustrate their contention that federal agencies have
|
||
failed to follow the federal Computer Security Act of 1987.
|
||
|
||
A GAO review last year indicated that only one of 23 federal agencies
|
||
reviewed had instituted the security measures and training the act
|
||
requires.
|
||
|
||
The Dutch hackers used a variety of methods to crack Defense
|
||
Department computers--all of them simple.
|
||
|
||
In some cased, they copied files containing coded passwords, then
|
||
scoured those files for the names of users who had no passwords.
|
||
|
||
Brock said the Defense Department failed to detect the intruders
|
||
because it does not tightly manages its computer systems.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 28 Nov 1991 16:55:40 GMT
|
||
From: brack@uoftcse.CSe.utoledo.EDU (Steven S. Brack)
|
||
Subject: Canada: Police Seize BBS, Software Piracy Charges Expected 11/25/91
|
||
|
||
(Reposted from Article 1209 of info.academic-freedom)
|
||
|
||
[Reposted from alt.bbs]
|
||
: From: scottp@skyfox.usask.ca ()
|
||
: From: newsbytes@clarinet.com
|
||
: Date: 26-NOV-1991 02:12:56
|
||
: Canada: Police Seize BBS, Software Piracy Charges Expected 11/25/91
|
||
:
|
||
:
|
||
: MONTREAL, QUEBEC, CANADA, 1991 NOV 25 (NB) -- The Federal
|
||
: Investigations Section of the Royal Canadian Mounted Police has
|
||
: seized components of a bulletin board system (BBS), known as 90
|
||
: North, from a home in the West Island area of Montreal. Charges of
|
||
: commercial distribution of pirated software may be laid this week.
|
||
:
|
||
: The RCMP seized 10 personal computers, seven modems, and
|
||
: software, worth about C$25,000 altogether. A statement released
|
||
: through the Canadian Alliance Against Software Theft (CAAST), a
|
||
: group of major software vendors, said a four-month investigation
|
||
: had found that the BBS was charging its subscribers C$49 per year
|
||
: for access to an assortment of software that included copies of
|
||
: commercial programs and beta-test versions of unreleased
|
||
: packages.
|
||
:
|
||
: The software available on the BBS included WordPerfect 5.0, DOS
|
||
: 5.0, Windows 3.0, Lotus 1-2-3 for Windows, Borland C++ 2.0,
|
||
: Borland's Quattro Pro 3.0 spreadsheet package, dBase IV 1.1, the
|
||
: Santa Cruz Operation's SCO Xenix for DOS, Novell Netware 3.11,
|
||
: and Clipper 5.0, the CAAST statement said.
|
||
:
|
||
: Alan Reynolds, a spokesman for CAAST, said the name of the BBS
|
||
: system operator has not been released and formal charges had not
|
||
: been laid at Newsbytes' deadline. However, he said, charges are
|
||
: expected to be laid within days.
|
||
:
|
||
: Under the Canadian Copyright Act, anyone convicted of distributing
|
||
: pirated commercial software can face imprisonment for up to five
|
||
: years, a fine of as much as C$1 million, or both.
|
||
:
|
||
: The Canadian Alliance Against Software Theft is an alliance of the
|
||
: Canadian arms of major software vendors Ashton-Tate (now owned
|
||
: by Borland International), Lotus Development, Microsoft, Novell, and
|
||
: Quarterdeck Office Systems.
|
||
:
|
||
: (Grant Buckler/19911125/Press Contact: Allan Reynolds, CAAST, 416-
|
||
: 598-8988)
|
||
|
||
My question/comment about this concerns the legality of confiscating
|
||
the computer along with the software.
|
||
|
||
Namely, if the charge is distributing copyrighted materials, then why
|
||
was the entire system taken? The computer itself, once unplugged, is
|
||
not terribly capable of providing evidence.
|
||
|
||
An idea occured to me that the perpetrator of this act, the sysop, could
|
||
more easily communicate his plight to others if he had a computer, and,
|
||
by taking it away, the RCMP has made it more difficult for him to clear
|
||
himself of the charges against him.
|
||
|
||
Although I don't agree with many of the antipornography laws, I do feel
|
||
that the general principle of taking the incriminating material, rather
|
||
than taking _everything_ is the more legal way to proceed.
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 1 Dec 91 16:06:13 CST
|
||
From: wires@PRO-MOPAR.CS.WIDENER.EDU(wires wildhack)
|
||
Subject: Here's something you might find of interest
|
||
|
||
CompuServe not responsible party for allegedly offensive messages [by
|
||
Lisa Picarille, InfoWorld]
|
||
|
||
A court ruling that held CompuServe could not be held responsible for an
|
||
allegedly libelous statement posted on its bulletin board service is
|
||
being hailed as a precedent-setting case involving free speech in the
|
||
electronic information age.
|
||
|
||
In Cubby vs. CompuServe, a New York federal judge ruled that CompuServe
|
||
was not legally responsible for information disseminated over its
|
||
network.
|
||
|
||
The ruling comes at a time when other on-line service providers, such as
|
||
Prodigy, are also being accused of acting as conduits for potentially
|
||
libelous statements.
|
||
|
||
"The winners are the public and the people who use computer networks,"
|
||
said Bruce Sanford, a lawyer specializing in First Amendment issues for
|
||
the Washington firm of Baker & Hostetler. "It says that the computer
|
||
networks do not exercise editorial control over their products and,
|
||
therefore, don't have a liability for defamation."
|
||
|
||
Others agree. "I think the decision correctly reinforces the idea that
|
||
CompuServe shouldn't be obligated for everything on their systems," said
|
||
Mike Godwin, staff council for the Electronic Frontier Foundation, a
|
||
Cambridge, Massachusetts, group that is concerned with the civil
|
||
liberties of computer users over a network.
|
||
|
||
"This is a very important first in trying to understand a brand-new
|
||
medium," said Robert Charles, a New York lawyer who has been following
|
||
this issue for several years.
|
||
|
||
Cubby vs. CompuServe, being heard in the U.S. District Court in New York,
|
||
is not over, however. Although CompuServe has been eliminated as a
|
||
defendant and deemed not liable for any damages, an independently
|
||
contracted systems operator for CompuServe remains under fire.
|
||
|
||
Don Fitzpatrick, who runs CompuServe's forum for journalists -- called
|
||
Rumorville -- remains accused of allegedly posting defamatory remarks
|
||
about Skuttlebutt, a rival forum.
|
||
|
||
Judge Peter K. Leisure of the U.S. District Court compared the
|
||
responsibility of CompuServe to that of the owner of a bookstore, saying
|
||
that the owner couldn't possibly be responsible for the editorial content
|
||
of every book he sold.
|
||
|
||
CompuServe described the ruling as a major victory for freedom of speech
|
||
on a network.
|
||
|
||
"We see this case as an endorsement of our operating philosophy," said
|
||
David Kishler, a spokesman for CompuServe.
|
||
|
||
According to Kishler, the systems operators actually control the content
|
||
of the forums, not CompuServe.
|
||
|
||
"If the case had been decided differently, it might have had a chilling
|
||
effect on our relationships with information providers."
|
||
|
||
The results of the CompuServe case are expected to have little effect on
|
||
Prodigy, which has a practice of screening public messages posted by its
|
||
users. Prodigy is accused of allowing anti-Semitic messages to go out
|
||
over the network, but not allowing responses to be posted.
|
||
|
||
After a Prodigy member filed a complaint with the Anti-Defamation League,
|
||
Prodigy maintained it did not screen messages and, therefore, was not
|
||
responsible for the anti-Semitic comments. Prodigy later said it did, in
|
||
fact, screen messages and that is why no response was allowed.
|
||
|
||
"I'm disappointed in Prodigy's decision not to become a free expression
|
||
forum," Godwin said. "Prodigy should let both the original offensive
|
||
message and the response appear. The best cure for offensive speech is
|
||
more speech."
|
||
|
||
------------------------------
|
||
|
||
Date: 03 Dec 91 18:08:48 EST
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: 24 Year Old Cracks NASA
|
||
|
||
A 24 year-old Denver man, Richard G. Wittman Jr., has admitted breaking
|
||
into a NASA computer system. In a plea bargain, Wittman plead guilty to
|
||
a single count of altering information - a password - inside a federal
|
||
computer.
|
||
|
||
According to reports, it took NASA investigators nearly 300 hours to
|
||
track down Wittman and an additional 100 hours to rewrite the software
|
||
to prevent a recurrence of his feat. Wittman not only broke into 118
|
||
systems within the NASA network, he also acquired "super user" status,
|
||
allowing him to review the files and electronic mail of other users.
|
||
|
||
|
||
-- Canadian Police Seize BBS
|
||
|
||
The Royal Canadian Mounted Police (RCMP) has seized parts of a BBS known
|
||
as "90 North" from a house in Montreal. The RCMP seized 10 pc's, seven
|
||
modems and assorted copyrighted software. The BBS was charging its mem-
|
||
bers C$49 per year for access.
|
||
|
||
Under the Canadian Copyright Act, anyone convicted of distributing
|
||
pirated commercial software can face imprisonment for up to five years,
|
||
a fine of as much as C$1 million, or both.
|
||
|
||
============
|
||
Reprinted with permission from STReport No.7.4.47 November 29, 1991
|
||
|
||
------------------------------
|
||
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #3.43
|
||
************************************
|
||
|
||
|
||
|