1038 lines
53 KiB
Plaintext
1038 lines
53 KiB
Plaintext
|
||
|
||
Computer underground Digest Fri July 17, 1992 Volume 4 : Issue 31
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Copy Editor: Etaion Shrdlu, Jr.
|
||
Archivist: Brendan Kehoe
|
||
Archivist in spirit: Bob Kusumoto
|
||
Shadow-Archivist: Dan Carosone
|
||
|
||
CONTENTS, #4.31 (July 17, 1992)
|
||
File 1--MOD Indictment (July, '92)
|
||
File 2--Newsbytes Editorial on MOD Indictment
|
||
|
||
Back issues of CuD can be found in the Usenet alt.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
||
libraries; from American Online in the PC Telecom forum under
|
||
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
|
||
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
|
||
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to
|
||
computer culture and communication. Articles are preferred to short
|
||
responses. Please avoid quoting previous posts unless absolutely
|
||
necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 17 Jul 92 16:43:21 CDT
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 1--MOD Indictment (July, '92)
|
||
|
||
((Moderators' note: The following is the complete indictment of
|
||
five MOD members (see CuD 4.30 for background)).
|
||
|
||
UNITED STATES DISTRICT COURT
|
||
SOUTHERN DISTRICT OF NEW YORK
|
||
|
||
- - - - - - - - - - - - - - - - - - - -X
|
||
:
|
||
UNITED STATES OF AMERICA :
|
||
:
|
||
- v - :
|
||
:
|
||
JULIO FERNANDEZ, a/k/a "Outlaw," : _INDICTMENT_
|
||
JOHN LEE, a/k/a "John Farrington," :
|
||
a/k/a "Corrupt," :
|
||
MARK ABENE, a/k/a "Phiber Optik," :
|
||
ELIAS LADOPOULOS, : 92 Cr.
|
||
a/k/a "Acid Phreak," and :
|
||
PAUL STIRA, a/k/a "Scorpion" :
|
||
:
|
||
Defendants :
|
||
:
|
||
- - - - - - - - - - - - - - - - - - - -X
|
||
|
||
_COUNT ONE_
|
||
|
||
Conspiracy
|
||
The Grand Jury Charges:
|
||
|
||
_Introduction_
|
||
|
||
1. At all times relevant to this indictment:
|
||
(a) MOD was a closely knit group of computer
|
||
hackers located primarily in the New York City area. (The term
|
||
"computer hacker" refers to someone who uses a computer or a
|
||
telephone to obtain unauthorized access to other computers). The
|
||
letters "MOD" had various meanings, among them "Masters Of
|
||
Disaster" and "Masters of Deception."
|
||
(b) At various times, the defendants JULIO
|
||
FERNANDEZ, JOHN LEE, MARK ABENE, ELIAS LADOPOULOS and PAUL STIRA
|
||
were members of MOD. Within MOD and in the course of their
|
||
computer hacking activities, the defendants frequently identified
|
||
themselves by their nicknames or hacking "handles." In
|
||
particular, JULIO FERNANDEZ used the name "Outlaw," JOHN LEE used
|
||
|
||
- 1-
|
||
|
||
the name "Corrupt," MARK ABENE used the name "Phiber Optik,"
|
||
ELIAS LADOPOULOS used the name "Acid Phreak," and PAUL STIRA used
|
||
the name "Scorpion." JOHN LEE was also known to his associates
|
||
as "John Farrington."
|
||
(c) Southwestern Bell Telephone Company
|
||
("Southwestern Bell") was a regional telephone company that
|
||
provided local telephone service to millions of customers in
|
||
Arkansas, Kansas, Missouri, Oklahoma and Texas. Southwestern
|
||
Bell's telephone system was controlled and operated by numerous
|
||
computers located throughout the above-named states, including
|
||
telephone switching computers. The telephone switching computers
|
||
operated by Southwestern Bell and other telephone companies were
|
||
large computers that controlled call routing, calling features
|
||
(such as call forwarding, call waiting and three-way calling),
|
||
billing and other telephone services for tens of thousands of
|
||
telephone lines each. Southwestern Bell's headquarters were
|
||
located in St. Louis, Missouri.
|
||
(d) BT North America Inc. was an international
|
||
corporation that provided telecommunications services throughout
|
||
the world. Among BT North America's businesses in the United
|
||
States was the operation of a data transfer network called
|
||
Tymnet. The Tymnet network was an international network through
|
||
which customers could transmit electronic communications. The
|
||
Tymnet network was controlled and operated by numerous computers
|
||
located throughout the United States and elsewhere. BT North
|
||
America's headquarters were located in San Jose, California.
|
||
|
||
- 2 -
|
||
|
||
(e) New York Telephone Company ("New York
|
||
Telephone") was a regional telephone company that provided local
|
||
telephone service to millions of customers in New York State.
|
||
New York Telephone's telephone system was controlled and operated
|
||
by numerous computers located throughout New York State. New
|
||
York Telephone's headquarters were located in New York City.
|
||
(f) Pacific Bell and U.S. West were regional
|
||
telephone companies that provide telephone service to customers
|
||
in, among other states, California and Idaho, respectively. One
|
||
of the telephone switching computers operated by Pacific Bell was
|
||
located in Santa Rosa, California. One of the telephone
|
||
switching computers operated by U.S. West was located in Boise,
|
||
Idaho.
|
||
(g) Martin Marietta Electronics Information and
|
||
Missile Group ("Martin Marietta") was an aerospace and
|
||
engineering company located in Orlando, Florida. Martin Marietta
|
||
operated a telephone switching computer that handled the
|
||
company's telephone lines.
|
||
(h) International Telephone and Telegraph Company
|
||
("ITT"), was a telecommunications company. One of the ways that
|
||
ITT provided telephone services to customers was to provide
|
||
customers with personal identification numbers. Customers could
|
||
dial local or toll free telephone numbers assigned to ATT, enter
|
||
their personal identification numbers, and then obtain local and
|
||
long distance calling services that would be charged to their
|
||
accounts.
|
||
|
||
- 3 -
|
||
|
||
(i) Information America, Inc., was a computerized
|
||
information service that provided subscribers with accesses to
|
||
telephone numbers, addresses, business abstracts and other
|
||
information regarding individuals and businesses throughout the
|
||
United States. Information America's headquarters and its primary
|
||
computer data base were located in Atlanta, Georgia.
|
||
(j) TRW Information Services ("TRW") and Trans
|
||
Union Corporation ("Trans Union") were credit reporting services
|
||
that provided subscribers with access to credit reports and other
|
||
information. One of the ways that subscribers could obtain
|
||
credit information was to use a computer to access data bases
|
||
maintained by TRW and Trans Union. TRW's primary data base was
|
||
located in Anaheim, California. Trans Union's primary data base
|
||
was located in Chicago, Illinois.
|
||
(k) The Learning Link was a computerized
|
||
information system operated by the Educational Broadcasting
|
||
Corporation in New York City. The Learning Link computer
|
||
provided educational and instructional information to hundreds of
|
||
schools and educators in New York, New Jersey and Connecticut.
|
||
Access to the Learning Link computer was limited to persons and
|
||
institutions who subscribed to the service and paid a membership
|
||
fee.
|
||
(l) New York University ("NYU") was a large
|
||
university located in New York City. NYU operated a computer
|
||
system for faculty, students and other authorized users. One of
|
||
the services provided by the NYU computer systems was to allow
|
||
|
||
- 4 -
|
||
|
||
authorized users to make local and long distance telephone calls for
|
||
the purpose of connecting to other computers outside of NYU.
|
||
Authorized users of the NY computer could obtain outdial service by
|
||
accessing the NYU computer system and entering a billing code. The
|
||
call would then be charged to the authorized users' account.
|
||
(m) The University of Washington was a large
|
||
university located in Seattle, Washington, The University of
|
||
Washington operated numerous computers for use by faculty,
|
||
students and other authorized users.
|
||
(n) The Bank of America was a national Bank
|
||
located in California and elsewhere. The Bank of America operated
|
||
a data transfer network that was used to transmit electronic
|
||
communications of Bank of America employees and others.
|
||
|
||
_The Conspiracy_
|
||
|
||
2. From in or about 1989 through the date of the filing
|
||
of this Indictment, in the Southern District of New York and
|
||
elsewhere, JULIO FERNANDEZ, a/k/a "Outlaw," JOHN LEE, a/k/a "John
|
||
Farrington," a/k/a "Corrupt," MARK ABENE, a/k/a "Phiber Optik,"
|
||
ELIAS LADOPOULOS, a/k/a "Acid Phreak," and PAUL STIRA, a/k/a
|
||
"Scorpion," the defendants, and others known and unknown to the
|
||
Grand Jury (collectively the "co-conspirators"), unlawfully,
|
||
willfully and knowingly did combine, conspire, confederate and
|
||
agree together and with each other to commit offenses against the
|
||
United States of America, to wit, to possess unauthorized access
|
||
devices with the intent to defraud, in violation of Title 18,
|
||
United States Code, Section 1029(a)(3); to use and traffic in
|
||
|
||
- 5 -
|
||
|
||
unauthorized access devises with the intent to defraud, in
|
||
violation of Title 18, United States Code, Section 1029(a)(2); to
|
||
access federal interest computers without authorization, in
|
||
violation of Title 18, United States Code, Section 1030(a)(5)(a);
|
||
to intercept electronic communications, in violation of Title 18,
|
||
United States Code, Section 2511(1)(a); and to commit wire fraud,
|
||
in violation of Title 18, United States Code, Section 1343.
|
||
|
||
_Objects of the Conspiracy_
|
||
|
||
_Possession of Unauthorized Access Devices_
|
||
|
||
3. It was a part and object of the conspiracy that the
|
||
co-conspirators unlawfully, willfully, knowingly and with the
|
||
intent to defraud, would and did possess fifteen and more
|
||
unauthorized access devices, to wit, the co-conspirators would
|
||
and did posess fifteen and more unauthorized passwords, user
|
||
identifications, personal identification numbers and other access
|
||
devices that permitted access to computer systems, data bases and
|
||
telephone services of Southwestern Bell, BT North America, New
|
||
York Telephone, ITT, Information America, TRW, Trans Union, NYU
|
||
and others, in violation of Title 18, United States Code, Section
|
||
1029(a)(3).
|
||
|
||
_Use of Unauthorized Access Devices_
|
||
|
||
4. It was a further part and object of the conspiracy
|
||
that the co-conspirators unlawfully, willfully, knowingly and
|
||
with the intent to defraud, would and did use one or more
|
||
unauthorized access devices during a one year period, and by such
|
||
conduct obtain something of value aggregating $1,000 and more
|
||
|
||
- 6 -
|
||
|
||
during that period, to wit, the co-conspirators would and did use
|
||
unauthorized access devices of Southwestern Bell, BT North
|
||
America, New York Telephone, ITT, Information America, TRW, Trans
|
||
Union, NYU and others in order to obtain information services,
|
||
credit reporting services, telephone services and other things of
|
||
value aggregating in excess of $1,000 during a one year period,
|
||
in violation of Title 18, United States Code, Section 1029(a)(2).
|
||
|
||
_Unauthorized Access of Computers_
|
||
|
||
5. It was a further part and object of the conspiracy
|
||
that the co-conspirators unlawfully, willfully, knowingly and
|
||
intentionally would and did access federal interest computers
|
||
without authorization, and by means of such conduct alter, damage
|
||
and destroy information in such federal interest computers and
|
||
prevent authorized use of such computers and information, and
|
||
thereby cause loss to one or more others of a value aggregating
|
||
$1,000 and more during a one year period, to wit, the co-
|
||
conspirators would and did access computers belonging to
|
||
Southwestern Bell, BT North America and others without
|
||
authorization, and by means of such conduct altered telephone
|
||
services, installed their own computer programs and made other
|
||
modifications, thereby causing losses aggregating $1,000 and more
|
||
during a one year period, in violation of Title 18, United States
|
||
Code, Section 1030(a)(5)(A).
|
||
|
||
_Interception of Electronic Communications_
|
||
|
||
|
||
6. It was a further part and object of the conspiracy
|
||
that the co-conspirators unlawfully, willfully, knowingly and
|
||
|
||
- 7 -
|
||
|
||
intentionally would and did intercept, endeavor to intercept and
|
||
procure other persons to intercept electronic communications, to
|
||
wit, the co-conspirators would and did intercept, endeavor to
|
||
intercept and procure other persons to intercept passwords, user
|
||
identifications and other electronic communications as such
|
||
communications were being transmitted over Tymnet and other data
|
||
transfer networks, in violation of Title 18, United States Code,
|
||
Section 2511(1)(a).
|
||
|
||
_Wire Fraud_
|
||
|
||
7. It was a further part and object of the conspiracy
|
||
that the co-conspirators, unlawfully, willfully and knowingly,
|
||
and having devised a scheme and artifice to defraud and for
|
||
obtaining money and property by means of false and fraudulent
|
||
pretenses, representations and promises, would and did transmit
|
||
and cause to be transmitted by means of wire communications in
|
||
interstate and foreign commerce, signs, signals and sounds for
|
||
the purpose of executing the scheme to defraud, to wit, the co-
|
||
conspirators would and did transmit and cause to be transmitted
|
||
passwords, user identifications, personal identification numbers,
|
||
telephone tones and other signs, signals and sounds for the
|
||
purpose of executing a scheme to obtain telephone services,
|
||
credit reporting services, information services and other
|
||
services free of charge, in violation of Title 18, United States
|
||
Code, Section 1343.
|
||
|
||
- 8 -
|
||
|
||
_Goal of the Conspiracy_
|
||
|
||
8. It was the goal of the conspiracy that the members
|
||
of MOD would gain access to and control of computer systems in
|
||
order to enhance their image and prestige among other computer
|
||
hackers; to harass and intimidate rival hackers and other people
|
||
they did not like; to obtain telephone, credit, information and
|
||
other services without paying for them; and to obtain passwords,
|
||
account numbers and other things of value which they could sell
|
||
to others.
|
||
|
||
_Means and Methods of the Conspiracy_
|
||
|
||
9. Among the means and methods by which the co-
|
||
conspirators would and did carry out the conspiracy were the
|
||
following:
|
||
(a) The co-conspirators formed the group MOD to
|
||
further their computer hacking activities and to compete with
|
||
other computer hackers in their quest for and access to and control
|
||
of computer systems.
|
||
(b) The members of MOD exchanged computer-related
|
||
information among themselves including passwords, user
|
||
identifications and personal identification numbers. The members
|
||
of MOD also assisted each other in breaking into computer systems
|
||
by sharing technical information regarding the configuration and
|
||
security systems of target computers. The members of MOD agreed
|
||
to share important computer information only among themselves and
|
||
not with other computer hackers.
|
||
|
||
- 9 -
|
||
|
||
(c) The co-conspirators obtained passwords, user
|
||
identifications and other unauthorized access devices through a
|
||
variety of means including the following:
|
||
(i) Data interception--The co-conspirators
|
||
intercepted access codes as the codes were being transmitted over
|
||
Tymnet and other data transfer networks. The co-conspirators
|
||
were able to perform such interceptions on Tymnet by obtaining
|
||
unauthorized access to Tymnet computers which controlled the
|
||
transfer of electronic communications over the network. Using
|
||
their unauthorized access to Tymnet computers, the co-
|
||
conspirators monitored and intercepted information that Tymnet
|
||
personnel and others using the Tymnet network were sending
|
||
through the network, including user identifications and passwords
|
||
used by Tymnet personnel and others.
|
||
(ii) Social Engineering -- The co-
|
||
conspirators made telephone calls to the telephone company employees
|
||
and other persons, and pretended to be computer technicians or
|
||
others who were authorized to obtain access devices and related
|
||
information. The co-conspirators then caused the unwitting
|
||
targets of their calls to furnish access devices and other
|
||
proprietary information. The co-conspirators referred to this
|
||
technique as "social engineering."
|
||
(iii) Password Grabbing and Password Cracking
|
||
Programs -- The co-conspirators wrote and used various computer
|
||
programs that were designed to steal passwords from computers in
|
||
which the programs were inserted. The co-conspirators maintained
|
||
|
||
- 10 -
|
||
|
||
other programs that were designed to"crack" encrypted passwords,
|
||
that is, to take passwords that had been scrambled into a code
|
||
for security purposes, and to break the code so that the
|
||
passwords could be used to obtain unauthorized access to computer
|
||
systems.
|
||
(d) When the co-conspirators broke into computer
|
||
systems, they installed "back door" programs to ensure that they
|
||
would continue to have access to the computers. These back door
|
||
programs were designed to modify computers in which they were
|
||
inserted so that the computer would give the highest level of
|
||
access ("root" access) to anyone using a special password that
|
||
was known to the members of MOD. Some of these back door
|
||
programs also included additional features that were designed to
|
||
modify computers in which they were inserted so that (i) the
|
||
computer would store the passwords of legitimate users in a
|
||
secret file that was known to the members of MOD; (ii) the
|
||
computer would display a message that read, in part, "This system
|
||
is owned, controlled, and administered by MOD" to anyone who
|
||
accessed the system using the password "MOD"; and (iii) the
|
||
computer would be destroyed if anyone accessed the system using
|
||
another special password known to the members of MOD.
|
||
(e) The co-conspirators obtained free telephone
|
||
and data transfer services for themselves and for each other by:
|
||
(i) obtaining unauthorized access to telephone company computers
|
||
and adding and altering calling features; and (ii) maintaining
|
||
and exchanging personal identification numbers, passwords,
|
||
|
||
- 11 -
|
||
|
||
billing codes and other access devices that allowed them to make
|
||
free local and long distance telephone calls as well as to
|
||
transmit and receive electronic communications free of charge.
|
||
(f) One of the ways that the co-conspirators
|
||
obtained free telephone service by their access to telephone
|
||
switching computers was to call forward unassigned local
|
||
telephone numbers to long distance numbers or to pay per call
|
||
services such as conference calling services. By setting up such
|
||
call forwards the co-conspirators could make long distance and
|
||
conferences calls for the price of a call to the local unassigned
|
||
number.
|
||
(g) The co-conspirators obtained information
|
||
including credit reports, telephone numbers, addresses, neighbor
|
||
listings and social security numbers of various individuals by
|
||
obtaining unauthorized access to information and credit reporting
|
||
services.
|
||
|
||
_Overt Acts_
|
||
|
||
10. In furtherance of the conspiracy and to effect the
|
||
objects thereof, the co-conspirators committed the following acts
|
||
among others in the Southern District of New York and elsewhere:
|
||
(a) On or about November 28, 1989, members of MOD
|
||
caused virtually all of the information contained within the
|
||
Learning Link computer operated by the Educational Broadcasting
|
||
Corporation to be destroyed, and caused a message to be left on
|
||
the computer that said, in part: "Happy Thanksgiving you turkeys,
|
||
|
||
- 12 -
|
||
|
||
from all of us at MOD" and which was signed with the names "Acid
|
||
Phreak," "Phiber Optik" and "Scorpion" among others.
|
||
(b) On or about January 8, 1990, from his
|
||
residence in Queens, New York, ELIAS LADOPOULOS, a/k/a "Acid
|
||
Phreak," accessed a New York Telephone switching computer without
|
||
authorization. During the call, LADOPOULOS issued commands to
|
||
automatically call forward all calls received by one telephone
|
||
number to another telephone number.
|
||
(c) On or about January 24, 1990, at his college
|
||
dormitory room in Farmingdale, New York, PAUL STIRA, a/k/a
|
||
"Scorpion," possessed numerous password files containing hundreds
|
||
of encrypted and unencrypted user identifications and passwords
|
||
to telephone company computers and other computers.
|
||
(d) On or about January 24, 1990, at his college
|
||
dormitory room in Farmingdale, New York, PAUL STIRA, a/k/a
|
||
"Scorpion," possessed a back door computer program and a password
|
||
grabbing program. The back door program included a feature that
|
||
was designed to modify a computer in which the program was
|
||
inserted so that the computer would be destroyed if someone
|
||
accessed it using a certain password.
|
||
(e) On or about May 31, 1991, from his residence
|
||
in Brooklyn, New York, JOHN LEE, a/k/a "John Farrington," a/k/a
|
||
"Corrupt," obtained unauthorized access to a Southwestern Bell
|
||
computer in St. Louis, Missouri.
|
||
(f) On or about October 28, 1991, from his
|
||
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw,"
|
||
|
||
- 13 -
|
||
|
||
obtained unauthorized access to a Southwestern Bell telephone
|
||
switching computer in Houston, Texas and issued commands so that
|
||
calls received by one telephone number would be automatically
|
||
forwarded to another number.
|
||
(g) On or about October 31, 1991, from his
|
||
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw,"
|
||
obtained unauthorized access to a U.S. West telephone switching
|
||
computer in Boise, Idaho.
|
||
(h) On or about November 1, 1991, from his
|
||
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw,"
|
||
called a New York Telephone technician. During the call,
|
||
FERNANDEZ pretended to be another New York Telephone employee and
|
||
convinced the technician to provide information regarding access
|
||
to a New York Telephone switching computer in Mt. Vernon, New
|
||
York.
|
||
(i) On or about November 1, 1991, from his
|
||
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw,"
|
||
made multiple calls to a New York Telephone switching computer in
|
||
Mt. Vernon New York. During the calls, FERNANDEZ call forwarded
|
||
numbers and obtained detailed information regarding telephone
|
||
services provided by the switch.
|
||
(j) On or about November 5, 1991, from his
|
||
residence in Brooklyn, New York, JOHN LEE, a/k/a "John
|
||
Farrington," a/k/a "Corrupt," obtained a user identification and
|
||
password by monitoring electronic communications on the Tymnet
|
||
network. Later, on November 5, 1991, JOHN LEE called JULIO
|
||
- 14 '
|
||
|
||
FERNANDEZ, a/k/a "Outlaw," and provided FERNANDEZ with the
|
||
intercepted user identification and password.
|
||
(k) On or about November 6, 1991, JOHN LEE, a/k/a
|
||
"John Farrington," a/k/a "Corrupt," had a telephone conversation
|
||
with MARK ABENE, a/k/a "Phiber Optik." During the conversation,
|
||
LEE provided ABENE with the user identification and password that
|
||
LEE had intercepted the previous day.
|
||
(l) On or about November 6, 1991, JOHN LEE, a/k/a
|
||
"John Farrington," a/k/a "corrupt," had a telephone conversation
|
||
with another member of MOD, during which they discussed obtaining
|
||
information from another hacker about how to alter TRW credit
|
||
reports. LEE said that the information he wanted to obtain
|
||
included instructions on how to add and remove delinquency
|
||
reports, "to destroy people's lives. . .or make them look like
|
||
saints."
|
||
(m) On or about November 14, 1991, JULIO
|
||
FERNANDEZ, a/k/a "Outlaw," and JOHN LEE, a/k/a "Corrupt," had a
|
||
telephone conversation. During the conversation, FERNANDEZ and
|
||
LEE discussed a lengthy list of institutions that operated
|
||
computers, including government offices, private companies and an
|
||
Air Force base. In the course of the conversation, FERNANDEZ
|
||
said, "We've just got to start hitting these sites left and
|
||
right."
|
||
(n) On or about November 14, 1991, at his
|
||
residence in Brooklyn, New York, JOHN LEE, a/k/a "John
|
||
Farrington," a/k/a "Corrupt," obtained unauthorized access to
|
||
|
||
- 15 -
|
||
|
||
Trans Union's computerized data base and obtained credit reports
|
||
on several individuals.
|
||
(o) On or about November 22, 1991, at his
|
||
residence in Brooklyn, New York, JOHN LEE, a/k/a "John
|
||
Farrington," a/k/a "Corrupt," obtained unauthorized access to
|
||
Information American's computerized data base and obtained
|
||
personal information concerning several individuals.
|
||
(p) On or about November 23, 1991, MARK ABENE,
|
||
a/k/a "Phiber Optik," and JULIO FERNANDEZ, a/k/a "Outlaw," had a
|
||
telephone conversation. During the conversation, ABENE gave
|
||
FERNANDEZ advice concerning how to call forward telephone numbers
|
||
on a certain type of telephone switching computer.
|
||
(q) On or about November 25, 1991, JULIO
|
||
FERNANDEZ, a/k/a "outlaw," and JOHN LEE, a/k/a "John Farrington,"
|
||
a/k/a "Corrupt," obtained several hundred dollars from Morton
|
||
Rosenfeld, a co-conspirator not named herein as a defendant, in
|
||
exchange for providing Rosenfeld with information regarding how
|
||
to obtain unauthorized access to credit reporting services.
|
||
(r) On or about November 25, 1991, JOHN LEE, a/k/a
|
||
"John Farrington," a/k/a "Corrupt," JULIO FERNANDEZ, a/k/a
|
||
"Outlaw," and MARK ABENE, a/k/a "Phiber Optik," had a three way
|
||
telephone conversation. During the conversation, LEE and
|
||
FERNANDEZ provided ABENE with user identifications and passwords
|
||
of Southwestern Bell and Information America.
|
||
(s) On or about November 26, 1991, JOHN LEE, a/k/a
|
||
"John Farrington," a/k/a "Corrupt," and MARK ABENE, a/k/a "Phiber
|
||
|
||
- 16 -
|
||
|
||
Optik," had a telephone conversation. During the conversation,
|
||
LEE and ABENE discussed obtaining unauthorized access to
|
||
Southwestern Bell computes and LEE provided ABENE with a series
|
||
of Southwestern Bell user identifications and passwords. A short
|
||
while later, ABENE called LEE and reported that one of the
|
||
passwords worked and that he had obtained information from a
|
||
Southwestern Bell computer.
|
||
|
||
(t) On or about November 27, 1991, ELIAS
|
||
LADOPOULOS, a/k/a "Acid Phreak," had a telephone conversation
|
||
with JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt." During
|
||
the conversation, LADOPOULOS asked LEE to obtain personal
|
||
information on an individual.
|
||
(u) On or about November 27, 1991, from his
|
||
residence in Brooklyn, New York, JOHN LEE, a/k/a "John
|
||
Farrington," a/k/a "Corrupt" obtained unauthorized access to
|
||
Information America's computerized data base and obtained
|
||
personal information on the individual that ELIAS LADOPOULOS,
|
||
a/k/a "Acid Phreak," had requested. LEE the called LADOPOULOS
|
||
and gave him the information.
|
||
(v) On or about November 30, 1991, JULIO
|
||
FERNANDEZ, a/k/a "Outlaw," provided associates of Morton
|
||
Rosenfeld with an account number and password for TRW. Between
|
||
November 30, 1991, and December 2, 1991, Rosenfeld and his
|
||
associates used the TRW account number and password to obtain
|
||
approximately 176 credit reports on various individuals.
|
||
|
||
- 17 -
|
||
|
||
(w) On or about December 1, 1991, from his
|
||
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw,"
|
||
obtained unauthorized access to a Pacific Bell Telephone
|
||
switching computer in Santa Rosa, California.
|
||
(x) On or about December 1, 1991, from his
|
||
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "outlaw,"
|
||
obtained unauthorized access to a Southwestern ell telephone
|
||
switching computer in Saginaw, Texas.
|
||
(y) On or about December 4, 1991, from his
|
||
residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw,"
|
||
obtained unauthorized access to a Martin Marietta telephone
|
||
switching computer in Orlando, Florida. During the call,
|
||
FERNANDEZ added a feature to one of the telephone numbers
|
||
services by the switch.
|
||
(z) On or about December 6, 1991, at his
|
||
residence in Queens, New York, MARK ABENE, a/k/a "Phiber Optik,"
|
||
possessed numerous proprietary technical manuals of BT North
|
||
America, including manuals that described the operation of Tymnet
|
||
computers and computer programs.
|
||
(Title 18, United States Code, Section 371.)
|
||
|
||
- 18 -
|
||
|
||
_COUNT TWO_
|
||
|
||
_Unauthorized Access to Computers_
|
||
|
||
The Grand Jury further charges:
|
||
11. Between on or about January 1, 1991 and on or about
|
||
January 1, 1992, in the Southern District of New York and
|
||
elsewhere, JULIO FERNANDEZ, a/k/a "Outlaw," JOHN LEE, a/k/a "John
|
||
Farrington,"a/k/a "Corrupt," and MARK ABENE, a/k/a "Phiber
|
||
Optik," the defendants, and others whom they aided and abetted,
|
||
unlawfully, willfully, knowingly and intentionally did access
|
||
federal interest computers without authorization, and by means of
|
||
such conduct did alter, damage and destroy information in such
|
||
federal interest computers and prevent authorized use of such
|
||
computers and information and thereby cause loss to one or more
|
||
others of a value aggregating $1,000 and more during a one year
|
||
period, to wit, JULIO FERNANDEZ, JOHN LEE, MARK ABENE, and others
|
||
whom they aided and abetted, accessed Southwestern Bell computers
|
||
without authorization and by means of such conduct altered
|
||
calling features, installed back door programs, and made other
|
||
modifications which caused losses to Southwestern Bell of
|
||
approximately $370,000 in the form of expenses to locate and
|
||
replace computer programs and other information that hand been
|
||
modified or otherwise corrupted, expenses to determine the source
|
||
of the unauthorized intrusions, and expenses for new computers
|
||
and security devices that were necessary to prevent continued
|
||
unauthorized access by the defendants and others whom they aided
|
||
and abetted.
|
||
(Title 18, United States Code, Sections 1030(a)(5)A) and 2.)
|
||
|
||
- 19 -
|
||
|
||
_COUNT THREE_
|
||
|
||
_Possession of Unauthorized Access Devices_
|
||
|
||
The Grand Jury further charges:
|
||
12. On or about December 6, 1991, in the Southern
|
||
District of New York, JULIO FERNANDEZ, a/k/a "outlaw," the
|
||
defendant, unlawfully, willfully and knowingly, and with the
|
||
intent to defraud, did possess fifteen and more unauthorized
|
||
access devices, to wit, JULIO FERNANDEZ possessed several hundred
|
||
unauthorized user identifications and passwords of Southwestern
|
||
Bell, BT North America, TRW and others with the intent to defraud
|
||
said companies by using the access devices to obtain services and
|
||
to obtain access to computers operated by said companies under
|
||
the false pretenses that FERNANDEZ was an authorized user of the
|
||
access devices.
|
||
(Title 18, United States Code, Section 1029(a)(3).)
|
||
|
||
|
||
_COUNTS FOUR THROUGH SIX_
|
||
|
||
_Interception of Electronic Communications_
|
||
|
||
The Grand Jury further charges:
|
||
13. On or about the dates set forth below, in the
|
||
Southern District of New York and elsewhere, JOHN LEE, a/k/a
|
||
"John Farrington," a/k/a "Corrupt," the defendant, unlawfully,
|
||
willfully, knowingly and intentionally, did intercept and
|
||
endeavor to intercept electronic communications, to wit, on the
|
||
dates set forth below, JOHN LEE did intercept and endeavor to
|
||
intercept electronic communications, including user
|
||
|
||
-20 -
|
||
|
||
identifications and passwords, as the communications were being
|
||
transmitted over the Tymnet network.
|
||
_Count_ _Date of Interception_
|
||
Four November 5, 1991
|
||
Five November 12, 1991
|
||
Six November 15, 1991
|
||
(Title 18, United States Code, Section 2511(1)(a).)
|
||
|
||
|
||
_COUNT SEVEN_
|
||
|
||
_INTERCEPTION OF ELECTRONIC COMMUNICATIONS_
|
||
|
||
The Grand Jury further charges:
|
||
14. On or about December 1, 1991, in the Southern
|
||
District of New York and elsewhere, JULIO FERNANDEZ, a/k/a
|
||
"Outlaw," and JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt,"
|
||
the defendants, unlawfully, willfully, knowingly and
|
||
intentionally, did intercept, endeavor to intercept and procure
|
||
others to intercept electronic communications, to wit, JULIO
|
||
FERNANDEZ gave JOHN LEE a password that JOHN LEE used to
|
||
intercept electronic communications as the communications were
|
||
being transmitted over a data transfer network operated by the
|
||
Bank of America.
|
||
(Title 18, United States Code, Sections 2511(1)(a) and 2.)
|
||
|
||
- 21 -
|
||
|
||
_COUNTS EIGHT AND NINE_
|
||
|
||
_Wire Fraud_
|
||
|
||
The Grand Jury further charges:
|
||
15. From in or about June 1991 through the date of the
|
||
filing of this Indictment, in the Southern District of New York,
|
||
JULIO FERNANDEZ, a/k/a "Outlaw," the defendant, unlawfully,
|
||
willfully and knowingly and having devised and intending to
|
||
devise a scheme and artifice to defraud and for obtaining
|
||
property by means of false and fraudulent pretenses and
|
||
representations, to wit, a scheme to obtain unauthorized access
|
||
to NYU's computer system and to use an NYU Billing code that was
|
||
not assigned to him to obtain free telephone connections to
|
||
computers outside of NYU, did, for the purpose of executing such
|
||
scheme, transmit and cause to be transmitted by means of wire
|
||
communications in interstate commerce, writings, signs,and
|
||
signals, to wit:
|
||
|
||
Destination Called
|
||
_Count_ _Date of Call to NYU_ _From NYU Computer_
|
||
8 November 29, 1991 Southwestern ell 5ESS
|
||
telephone switching computer
|
||
El Paso, Texas
|
||
9 December 5, 1991 University of Washington
|
||
computer system
|
||
Seattle, Washington
|
||
|
||
(Title 18, United States Code, Section 1343.)
|
||
|
||
- 22 -
|
||
|
||
_COUNTS TEN AND ELEVEN_
|
||
|
||
_Wire Fraud_
|
||
|
||
The Grand Jury further charges:
|
||
15. From in or about June, 1991 through the date of the
|
||
filing of this Indictment, in the Southern District of New York,
|
||
JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," the
|
||
defendant, unlawfully, willfully and knowingly and having devised
|
||
and intending to devise a scheme and artifice to defraud and for
|
||
obtaining property by means of false and fraudulent pretenses and
|
||
representations, to wit, a scheme to obtain unauthorized access
|
||
to NYU's computer system and to use an NYU billing code that was
|
||
not assigned to him to obtain free telephone connections to
|
||
computers outside of NYU, did, for the purpose of executing such
|
||
scheme, transmit and cause to be transmitted by means of wire
|
||
communications in interstate commerce, writings, signs, and
|
||
signals, to wit:
|
||
|
||
Destination Called
|
||
_Count_ _Date of Call to NYU_ _From NYU Computer_
|
||
10 November 21,1991 University of Washington
|
||
computer system
|
||
Seattle, Washington
|
||
11 November 23, 1991 University of Washington
|
||
computer system
|
||
Seattle, Washington
|
||
|
||
(Title 18, United States Code, Section 1343.)
|
||
|
||
|
||
(signed)
|
||
_________________ ___________________________
|
||
Foreperson OTTO G. OBERMAIER
|
||
United States Attorney
|
||
|
||
- 23 -
|
||
|
||
------------------------------
|
||
|
||
Date: 14 Jul 92 22:02:12 PDT
|
||
From: mcmullen@well.sf.ca.us
|
||
Subject: File 2--Newsbytes Editorial on MOD Indictment
|
||
|
||
NEWSBYTES EDITORIAL
|
||
|
||
Second Thoughts On New York Computer Crime Indictments 7/13/92
|
||
NEW YORK, N.Y., U.S.A., 1992 JULY 13 (NB) -- On Wednesday, July 9th, I
|
||
sat at a press briefing in New York City's Federal Court Building
|
||
during which law enforcement officials presented details relating to
|
||
the indictment of 5 young computer "hackers". In describing the
|
||
alleged transgressions of the indicted, United States Assistant
|
||
Attorney Stephen Fishbein wove a tale of a conspiracy in which members
|
||
of an evil sounding group called the "Masters of Destruction" (MOD)
|
||
attempted to wreck havoc with the telecommunications system of the
|
||
country.
|
||
|
||
The accused were charged with infiltrating computer systems belonging
|
||
to telephone companies, credit bureaus, colleges and defense
|
||
contractors --Southwestern Bell, BT North America, New York Telephone,
|
||
ITT, Information America, TRW, Trans Union, Pacific Bell, the
|
||
University of Washington, New York University, U.S. West, Learning
|
||
Link, Tymnet and Martin Marietta Electronics Information, and Missile
|
||
Group. They were charged with causing injury to the telephone systems,
|
||
charging long distance calls to the universities, copying private
|
||
credit information and selling it to third parties -- a long list of
|
||
heinous activities.
|
||
|
||
The immediate reaction to the indictments were predictably knee-jerk.
|
||
Those who support any so-called "hacker"-activities mocked the
|
||
government and the charges that were presented, forgetting, it seems
|
||
to me, that these charges are serious -- one of the accused could face
|
||
up to 40 years in prison and $2 million in fines; another - 35 years
|
||
in prison and $1.5 million in fines. In view of that possibility, it
|
||
further seems to me that it is a wasteful diversion of effort to get
|
||
all excited that the government insists on misusing the word "hacker"
|
||
(The indictment defines computer hacker as "someone who uses a
|
||
computer or a telephone to obtain unauthorized access to other
|
||
computers.") or that the government used wiretapping evidence to
|
||
obtain the indictment (I think that, for at least the time being that
|
||
the wiretapping was carried out under a valid court order; if it were
|
||
not, the defendants' attorneys will have a course of action.).
|
||
|
||
On the other hand, those who traditionally take the government and
|
||
corporate line were publicly grateful that this threat to our
|
||
communications life had been removed -- they do not in my judgement
|
||
properly consider that some of these charges may have been
|
||
ill-conceived and a result of political considerations.
|
||
|
||
Both groups, I think, oversimplify and do not give proper
|
||
consideration to the wide spectrum of issues raised by the indictment
|
||
document. The issues range from a simple black-and-white case of
|
||
fraudulently obtaining free telephone time to the much broader
|
||
question of the appropriate interaction of technology and law
|
||
enforcement.
|
||
|
||
The most clear cut cases are the charges such as the ones which allege
|
||
that two of the indicted, Julio Fernandez a/k/a "Outlaw" and John Lee
|
||
a/k/a "Corrupt" fraudulently used the computers of New York University
|
||
to avoid paying long distance charges for calls to computer systems in
|
||
El Paso Texas and Seattle, Washington. The individuals named either
|
||
did or did not commit the acts alleged and, if it is proven that they
|
||
did, they should receive the appropriate penalty (it may be argued
|
||
that the 5 year, $250,000 fine maximum for each of the counts in this
|
||
area is excessive but that is a sentencing issue not an indictment
|
||
issue.).
|
||
|
||
Other charges of this black-and-white are those that allege that
|
||
Fernandez and/or Lee intercepted electronic communications over
|
||
networks belonging to Tymnet and the Bank of America. Similarly, the
|
||
charge that Fernandez, on December 4, 1991 possessed hundreds of user
|
||
id's and passwords of Southwestern Bell, BT North America and TRW fits
|
||
in the category of "either he did it or he didn't."
|
||
|
||
A more troubling count is the charge that the indicted 5 were all part
|
||
of a conspiracy to "gain access to and control of computer systems in
|
||
order to enhance their image and prestige among other computer
|
||
hackers; to harass and intimidate rival hackers and people they did
|
||
not like; to obtain telephone, credit, information, and other services
|
||
without paying for them; and to obtain. passwords, account numbers and
|
||
other things of value which they could sell to others."
|
||
|
||
To support this allegation, the indictment lists 26, lettered A
|
||
through Z, Overt Acts" to support the conspiracy. While this section
|
||
of the indictment lists numerous telephone calls between some of the
|
||
individuals, it mentions the name Paul Stira a/k/a "Scorpion" only
|
||
twice with both allegations dated "on or about" January 24, 1990, a
|
||
full 16 months before the next chronological incident. Additionally,
|
||
Stira is never mentioned as joining in any of the wiretapped
|
||
conversation -- in fact, he is never mentioned again! I find it hard
|
||
to believe that he could be considered, from these charges, to have
|
||
engaged in a criminal conspiracy with any of the other defendants.
|
||
|
||
Additionally, some of the allegations made under the conspiracy count
|
||
seem disproportionate to some of the others. Mark Abene a/k/a "Phiber
|
||
Optik" is of possessing proprietary technical manuals belonging to BT
|
||
North America while it is charged that Lee and Hernandez, in exchange
|
||
for several hundred dollars, provided both information on how to
|
||
illegally access credit reporting bureaus and an actual TRW account
|
||
and password to a person, Morton Rosenfeld, who later illegally
|
||
accessed TRW, obtained credit reports on 176 individuals and sold the
|
||
reports to private detective (Rosenfeld, indicted separately, pled
|
||
guilty to obtaining and selling the credit reports and named "Julio"
|
||
and "John" as those who provided him with the information). I did not
|
||
see anywhere in the charges any indication that Abene, Stira or Elias
|
||
Lapodoulos conspired with or likewise encouraged Lee or Fernandez to
|
||
sell information involving the credit bureaus to a third party
|
||
|
||
Another troubling point is the allegation that Fernandez, Lee, Abene
|
||
and "others whom they aided and abetted" performed various computer
|
||
activities "that caused losses to Southwestern Bell of approximately
|
||
$370,000." The $370,000 figure, according to Assistant United States
|
||
Attorney Stephen Fishbein, was developed by Southwestern Bell and is
|
||
based on "expenses to locate and replace computer programs and other
|
||
information that had been modified or otherwise corrupted, expenses to
|
||
determine the source of the unauthorized intrusions, and expenses for
|
||
new computers and security devices that were necessary to prevent
|
||
continued unauthorized access by the defendants and others whom they
|
||
aided and abetted."
|
||
|
||
While there is precedent in assigning damages for such things as
|
||
"expenses for new computers and security devices that were necessary
|
||
to prevent continued unauthorized access by the defendants and others
|
||
whom they aided and abetted." (the Riggs, Darden & Grant case in
|
||
Atlanta found that the defendants were liable for such expenses), many
|
||
feel that such action is totally wrong. If a person is found uninvited
|
||
in someone's house, they are appropriately charged with unlawful entry,
|
||
trespassing, burglary --whatever th statute is for the transgression;
|
||
he or she is, however, not charged with the cost of the installation
|
||
of an alarm system or enhanced locks to insure that no other person
|
||
unlawfully enters the house.
|
||
|
||
When I discussed this point with a New York MIS manager, prone to take
|
||
a strong anti-intruder position, he said that an outbreak of new
|
||
crimes often results in the use of new technological devices such as
|
||
the nationwide installation of metal detectors in airports in the
|
||
1970's. While he meant thi as a justification for liability, the
|
||
analogy seems rather to support the contrary position. Air line
|
||
hijackers were prosecuted for all sorts of major crimes; they were,
|
||
however, never made to pay for the installation of the metal detectors
|
||
or absorb the salary of the additional air marshalls hired to combat
|
||
hijacking.
|
||
|
||
I think the airline analogy also brings out the point that one may
|
||
both support justifiable penalties for proven crimes and oppose
|
||
unreasonable ones -- too often, when discussing these issues,
|
||
observers choose one valid position to the unnecessary exclusion of
|
||
another valid one. There is nothing contradictory, in my view, to
|
||
holding both that credit agencies must be required to provide the
|
||
highest possible level of security for data they have collected AND
|
||
that persons invading the credit data bases, no matter how secure they
|
||
are, be held liable for their intrusions. We are long past accepting
|
||
the rationale that the intruders "are showing how insecure these
|
||
repositories of our information are." We all know that the lack of
|
||
security is scandalous; this fact, however, does not excuse criminal
|
||
behavior (and it should seem evident that the selling of electronic
|
||
burglar tools so that someone may copy and sell credit reports is not
|
||
a public service).
|
||
|
||
The final point that requires serious scrutiny is the use of the
|
||
indictment a a tool in the on-going political debate over the FBI
|
||
Digital Telephony proposal. Announcing the indictments, Otto G.
|
||
Obermaier, United States Attorney for the Southern District of New
|
||
York, said that this investigation was "the first investigative use of
|
||
court-authorized wiretaps to obtain conversations and data
|
||
transmissions of computer hackers." He said that this procedure was
|
||
essential to the investigation and that "It demonstrates, think, the
|
||
federal government's ability to deal with criminal conduct as it moves
|
||
into new technological areas." He added that the interception of data
|
||
was possible only because the material was in analog form and added
|
||
"Most of the new technology is in digital form and there is a pending
|
||
statute in Congress which seeks the support of telecommunications
|
||
companies to allow the federal government, under court authorization,
|
||
to intercept digital transmission. Many of you may have read the
|
||
newspaper about the laser transmission which go through fiber optics
|
||
as a method of the coming telecommunications method. The federal
|
||
government needs the help of Congress and, indeed, the
|
||
telecommunications companies to able to intercept digital
|
||
communications."
|
||
|
||
The FBI proposal has been strongly attacked by the American Civil
|
||
Liberties Union (ACLU), the Electronic Frontier Foundation (EFF) and
|
||
Computer Professionals for Social Responsibility (CPSR) as an attempt
|
||
to institutionalize, for the first time, criminal investigations as a
|
||
responsibility of the communications companies; a responsibility that
|
||
they feel belongs solely to law-enforcement. Critics further claim
|
||
that the proposal will impede the development of technology and cause
|
||
developers to have to "dumb-down" their technologies to include the
|
||
requested interception facilities. The FBI, on the other hand,
|
||
maintains that the request is simply an attempt to maintain its
|
||
present capabilities in the face of advancing technology.
|
||
|
||
Whatever the merits of the FBI position, it seems that the indictments
|
||
either would not have been made at this time or, at a minimum, would
|
||
not have been done with such fanfare if it were not for the desire to
|
||
attempt to drum up support for the pending legislation. The press
|
||
conference was the biggest thing of this type since the May 1990
|
||
"Operation Sun Devil" press conference in Phoenix, Arizona and, while
|
||
that conference, wowed us with charges of "hackers" endangering lives
|
||
by disrupting hospital procedures and being engaged in a nationwide,
|
||
13 state conspiracy, this one told us about a bunch of New York kids
|
||
supposedly engaged in petty theft, using university computers without
|
||
authorization and performing a number of other acts referred to by
|
||
Obermaier as "anti-social behavior" -- not quite as heady stuff!
|
||
|
||
It is not to belittle these charges -- they are quite serious -- to
|
||
question the fanfare. The conference was attended by a variety of high
|
||
level Justice Department, FBI and Secret Service personnel and veteran
|
||
New York City crime reporters tell me that the amount of alleged
|
||
damages in this case would normally not call for such a production --
|
||
New York Daily News reporter Alex Michelini publicly told Obermaier
|
||
"What you've outlined, basically, except for the sales of credit
|
||
information, this sounds like a big prank, most of it" (Obermaier's
|
||
response -- "Well, I suppose, if you can characterize that as a prank
|
||
but it's really a federal crime allowing people without authorization
|
||
to rummage through the data of other people to which they do not have
|
||
access and, as I point out to you again, the burglar cannot be your
|
||
safety expert. He may be inside and laugh at you when you come home
|
||
and say that your lock is not particularly good but I think you, if
|
||
you were affected by that contact, would be somewhat miffed"). One
|
||
hopes that it is only the fanfare surrounding the indictments that is
|
||
tied in with the FBI initiative and not the indictments themselves.
|
||
|
||
As an aside, two law enforcement people that I have spoken to have
|
||
said that while the statement that the case is "the first
|
||
investigative use of court-authorized wiretaps to obtain conversations
|
||
and data transmissions of computer hackers.", while probably true,
|
||
seems to give the impression that the case is the first one in which
|
||
data transmission was intercepted. According to these sources, that
|
||
is far from the case -- there have been many instances of inception of
|
||
data and fax information by law enforcement officials in recent years.
|
||
|
||
I know each of the accused in varying degrees. The one that I know the
|
||
best, Phiber Optik, has participated in panels with myself and law
|
||
enforcement officials discussing issues relating to so-called "hacker"
|
||
crime. He has also appeared on various radio and television shows
|
||
discussing the same issues. These high profile activities have made him
|
||
an annoyance to some in law enforcement. One hopes that this annoyance
|
||
played no part in the indictment.
|
||
|
||
I have found Phiber's presence extremely valuable in these discussions
|
||
both for the content and for the fact that his very presence attracts
|
||
an audience that might never otherwise get to hear the voices of
|
||
Donald Delaney, Mike Godwin, Dorothy Denning and others addressing
|
||
these issues from quite different vantage points. While he has, in
|
||
these appearances, said that he has "taken chances to learn things",
|
||
he has always denied that he has engaged in vandalous behavior and
|
||
criticized those who do. He has also called those who engage in
|
||
"carding" and the like as criminals (These statements have been made
|
||
not only in the panel discussion but also on the occasions that he has
|
||
guest lectured to my class in "Connectivity" at the New School For
|
||
Social Research in New York City. In those classes, he has discussed
|
||
the history of telephone communications in a way that has held a class
|
||
of professionals enthralled by over two hours.
|
||
|
||
While my impressions of Phiber or any of the others are certainly not
|
||
a guarantee of innocence on these charges, they should be taken as my
|
||
personal statement that we are not dealing with a ring of hardened
|
||
criminals that one would fear on a dark knight.
|
||
|
||
In summary, knee-jerk reactions should be out and thoughtful analysis
|
||
in! We should be insisting on appropriate punishment for lawbreakers
|
||
-- this means neither winking at "exploration" nor allowing inordinate
|
||
punishment. We should be insisting that companies that have collected
|
||
data about us properly protect -- and are liable for penalties when
|
||
they do not. We should not be deflected from this analysis by support
|
||
or opposition to the FBI proposal before Congress -- that requires
|
||
separate analysis and has nothing to do with the guilt or innocence of
|
||
these young men or the appropriate punishment should any guilt be
|
||
established.
|
||
|
||
(John F. McMullen/19920713)
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.31
|
||
************************************
|
||
|
||
|
||
|