858 lines
37 KiB
Plaintext
858 lines
37 KiB
Plaintext
|
|
|
|
Computer underground Digest Wed Feb 22, 1995 Volume 7 : Issue 15
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe
|
|
Retiring Shadow Archivist: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Copy Ediotr: Ettie-Ann Shrdlu
|
|
|
|
CONTENTS, #7.15 (Wed, Feb 22, 1995)
|
|
|
|
File 1--Affidavit of FBI agent against Baker
|
|
File 2--soc.culture.usa, et al.-Re: Censorship at U of Michigan (fwd)
|
|
File 3--Baker chronology
|
|
File 4--Text of 18 USC 41 Sect. 875c (of Baker Indictment)
|
|
File 5--HACK - WELL/Mitnick FAQ (fwd)
|
|
File 6--Re: Banished CPU BBS - commentary
|
|
File 7--Cu Digest Header Info (unchanged since 18 Feb, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Tue, 14 Feb 1995 23:59:18 -0600 (CST)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 1--Affidavit of FBI agent against Baker
|
|
|
|
((MODERATORS' NOTE: The Jake Baker case raises sticky issues of
|
|
First Amendment protections, creative applications of old laws to
|
|
new scenarios, and maintaining decency in cyberspace.
|
|
The underlying issues extend beyond obscenity and free speech,
|
|
and a future issue will attempt to address the complexity of
|
|
what's at stake. The following posts provide the background for
|
|
the case)).
|
|
|
|
==============================================
|
|
|
|
United States Attorney
|
|
Easten District of Michigan
|
|
|
|
|
|
211 W. Fort Street
|
|
Suite 2300
|
|
Detroit, MI 48221-3211
|
|
|
|
|
|
February 9, l995
|
|
|
|
CONTACT: (313) 226-9509
|
|
|
|
|
|
|
|
|
|
United states Attorney Saul A. Green announced that Jake A.
|
|
Baker, Alan known aa Abraham Jacob Alkhabaz, an undergraduate
|
|
student at the University of Michigan in Ann Arbor, was charged
|
|
today in a federal criminal complaint With transmitting a threat
|
|
to injure "Jane Doe, a student at the University of Michigan.
|
|
Baker was arrested on the complaint in Ann Arbor at approximately
|
|
1:00 p.m. and subsequently transported to the federal courthouse
|
|
in Detroit for an initial appearance.
|
|
|
|
Mr. Green stated that the criminal charge is based upon a
|
|
series of transmissions Mr. Baker made on the Internet computer
|
|
network. on approximately January 19, 1995, the University of
|
|
Michigan Department of Public Sarety became aware that Baker had
|
|
transmitted communications on the Internet describing violent sex
|
|
acts against women, and that at least one transmission identified
|
|
Jane Doe as the specific victim of sexual torture and murder. A
|
|
series of subsequent transmissions between Baker and others on
|
|
the Internet system discussed plans for the abduction, torture,
|
|
and murder of women.
|
|
|
|
Mr. Green explained that Mr. Baker's transmissions on the
|
|
Internet gave rise to a charge under 18 U.S.C. s 875(c), which
|
|
criminalizes the transmission in interstate or foreign commerce
|
|
of a communication "containing any threat to kidnap any person or
|
|
any threat to injure the person of another." Mr. Green further
|
|
emphasized that the criminal complaint against Baker is merely a
|
|
charging document, and that Baker is presumed innocent of the
|
|
charge. The investigation, which is being handled by the Federal
|
|
Bureau of Investigation, is still in progress,
|
|
|
|
|
|
|
|
|
|
AFFIDAVIT
|
|
|
|
|
|
Greg Stejskal, being first duly sworn, states:
|
|
|
|
|
|
1. I am a Special Agent with the Federal Bureau of
|
|
Investigation, and have been so employed for the past 19 years.
|
|
be following is known to me to be true through personal interviews
|
|
and investigation.
|
|
|
|
|
|
2 . Abraham Jacob Alkhabaz, also known as Jake Baker , is an
|
|
undergraduate student at the University of Michigan (UM) in Ann
|
|
Arbor, Michigan. Baker has access to computers and has been
|
|
assigned a unique name (password/identifier) by the university.
|
|
Baker has, via his computer, access to a computer network commonly
|
|
referred to as "Internet." Internet is a world-wide information
|
|
network used in interstate and foreign commerce. Accordingly,
|
|
Material transmitted into Internet is communicated and distributed
|
|
in interstate and foreign commerce.
|
|
|
|
|
|
3. On or about January 19, 1995, University of Michigan
|
|
Department of Public Safety (UMDPS) becamee aware of certain
|
|
activities of Jake Baker, i.e., the transmission into Internet of
|
|
"stories" graphically depicting violent acts against women.
|
|
Further, UMDPS learned that at least one of these transmissions
|
|
named a female student at US as the specific target/victim. The
|
|
name of the female student is known to me, but will be identified
|
|
in this affidavit only as "Jane Doe."
|
|
|
|
|
|
4. On January 20, 1995, Baker was contacted by UMDPS officers
|
|
regarding the Internet transmissions. After being advised of and
|
|
waiving his Miranda rights, Baker admitted writing and "posting"
|
|
(transmitting) several depictions into the Internet computer
|
|
network. these transmissions were placed in a "compartment" of the
|
|
system labelled "alt. sex stories (a.s.s.)"
|
|
|
|
|
|
5. The transmissions distributed by Baker through Internet
|
|
described Baker's desire to commit acts of abduction, bondage,
|
|
torture, mutilation, sodomy, rape and murder of young women. The
|
|
depictions of these criminal acts are extremely graphic and
|
|
detailed.
|
|
|
|
|
|
6. In a preface to one of the transmissions, with an
|
|
unidentified victim, Baker writes, "Torture is foreplay, rape is
|
|
romance, snuff is climax."
|
|
|
|
|
|
7. one of the depictions transmitted by Baker into Internet
|
|
Involved UM Co-eds Jane Doe, who Baker identified by her true name,
|
|
Using her last name as the title of the "story." In a portion of
|
|
Baker's expressed desire to injure Jane Doe, Baker states:
|
|
|
|
|
|
Then, Jerry and I tie her by her long brown
|
|
hair to the ceiling fan, so that she's
|
|
dangling in mid-air. Her feet don't touch the
|
|
ground, She kicks trying to hit me, Jerry or
|
|
the gorund (sic). The sight of her wiggling
|
|
an mid-air, hands rudely taped behind her
|
|
back, turns me on. Jerry takes a big spiky
|
|
hair-brush and start beating her small breasts
|
|
with it, coloring them with nice red marks.
|
|
She screams and struggles harder. I've
|
|
separated her legs with a spreader-bar; now I
|
|
stretch out her pussy lips and super-glue them
|
|
wide open. Then I take a heavy clamp, and
|
|
tighten it coer her alit. once it's tight
|
|
enough, I let go.
|
|
|
|
Thus transmission and other similar transmissions may have been
|
|
posted previously, but were posted or reposted on or about January
|
|
1, 1995.
|
|
|
|
|
|
8. Baker knew Jane Doe as a class-mate from a Japanese class
|
|
at UM in the Fall of 1994. Jane Doe is aware of Baker's
|
|
transmission concerning her and ir frightened and intimidated by
|
|
it.
|
|
|
|
9. In late January l995, Baker signed various consent forms
|
|
giving permission to the UMDPS to search and/or access his room,
|
|
personal papers and computer files. This included the use of
|
|
Baker's unique password, which provided access to Baker's
|
|
electronic mail (e-mail). The hearth of the assail produced
|
|
numerous messages between Baker and an individual identifying
|
|
himself as Arthur Gronda supposedly residineding in Ontario, Canada.
|
|
In these messages sent and received via Internet, Baker and Gronda
|
|
discuss means of torture and acts of actual serial killers that had
|
|
been reported in the media. Further, Baker and Gronda discuss
|
|
actually getting together to commit the acts Baker had previously
|
|
depicted and transmitted. The following is an excerpt from a
|
|
message sent by Baker to Gonda on or about December 9, l994:
|
|
|
|
I just picked up Bllod (sic) Lust and have
|
|
started to read it. I'll look for "Final
|
|
Truth" tomorrow (payday). One of the things
|
|
I've started doing is going back and re-
|
|
reading earlier messages of yours. Each time
|
|
I do, they turn me on more and more. I can't
|
|
wait to see you in person. I've been trying
|
|
to think of secluded spots, but my area
|
|
knowledge of Ann Arbor is mostly limited to
|
|
the campus. I don't want any blood in my
|
|
room, though I have come upon an excellent
|
|
method to abduct a bitch ---
|
|
|
|
As I said before, my toom is right across from
|
|
the girl's bathroom. Wiat (sic) until late at
|
|
night, grab her when she goes to unlock the
|
|
door. Knock her unconscious and put her into
|
|
one of those portable lockers (forgot the word
|
|
for it), or even a duffle bag. Then hurry her
|
|
out to the car and take her away . . . what do
|
|
you think?
|
|
|
|
On or about December 10, 1994, the following response was sent via
|
|
lnternet to Baker by Gonda:
|
|
|
|
Hi Jake. I have been out tonight and I can
|
|
tell you that I am thinking more and more
|
|
about "doing" a girl. I can picture it so
|
|
well . . . and I can think of no better use
|
|
for their flesh. I HAVE to make a bitch
|
|
suffer!
|
|
|
|
|
|
10. Based on the aforementioned facts, there is probable
|
|
cause to believe that Abraham Jacob Alkhabaz, also known as Jake
|
|
Baker, knowingly transmitted a threat to injure the person of
|
|
another in interstate and foreign commerce in violation of Title
|
|
18, United States Code, Section 875(c).
|
|
|
|
|
|
|
|
__________________________
|
|
Greg Stetskal, Special Agent
|
|
Federal Bureau of Investigation
|
|
|
|
|
|
Subscribed and sworn to before
|
|
me this 9th day of February, l995.
|
|
|
|
_____________________________________
|
|
Hon. Thomas A. Carlson
|
|
United States Magistrate Judge
|
|
|
|
|
|
- - -
|
|
ANDREW S. BRENNER, Esq
|
|
|
|
abrenner@interaccess.com
|
|
634.8492@mcimail.com
|
|
http://www.interaccess.com/users/abrenner
|
|
finger abrenner@interaccess.com for PGP public key
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 18 Feb 1995 21:44:04 -0600 (CST)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 2--soc.culture.usa, et al.-Re: Censorship at U of Michigan (fwd)
|
|
|
|
----- Forwarded message ------
|
|
From: pjswan@engin.umich.edu (Peter Swanson)
|
|
Subject-- Re: Censorship at U of Michigan
|
|
Date: 16 Feb 1995 05:29:11 GMT
|
|
|
|
MORE INFORMATION ON THE JAKE BAKER CASE
|
|
|
|
I have several days worth of newspapers here; I will try to briefly
|
|
summarize the new information contained in the accounts
|
|
|
|
[DPS == Department of Public Safety (University Police)]
|
|
[SSRR == Statement of Student Rights and Responsibilities]
|
|
|
|
Sequence of Events (Jonathan Berndt/Michigan Daily)
|
|
December and January: Baker transmits e-mail messages to a man
|
|
in Ontario describing the kidnapping, rape, and murder of a woman.
|
|
1/9/95 The story in question posted to alt.sex.stories
|
|
1/19/95 A 16 year old girl in Moscow reads the story, then tells
|
|
her father, who tells a Michigan alumnus, who notifies the University.
|
|
1/20/95 DPS officers contact Baker. Baker waives his Miranda rights
|
|
and admits to writing and posting the stories. DPS officers search
|
|
Baker's room and account with permission, finding an unpublished story
|
|
and the e-mail conversations.
|
|
2/2/95 University President Duderstadt suspends Baker.
|
|
2/9/95 FBI arrests Baker on basis of stories and e-mail. Bail is denied.
|
|
2/10/95 After a detention hearing, Baker is again denied bail. A defense
|
|
appeal for bail bond is denied. Pre-trial motions scheduled for 2/17/95.
|
|
|
|
The Media free-for-all (Patience Atkin/Michigan Daily)
|
|
Detroit Free Press: "Debate between free speech and whether it's a
|
|
threat for the woman's safety." --Maryanne George
|
|
WDIV-4 TV Detroit: "It also goes to the issue of what constitutes
|
|
free speech and what constitutes unreasonable threats." --Paul Manzella
|
|
"People who make threats in society are always a concern to people
|
|
who don't make threats." --Manzella
|
|
Spin: "fantasy" --Detroit Free Press
|
|
"sexually violent fiction" --New York Times
|
|
"cyber-threats" --USA Today
|
|
|
|
Baker judged 'too dangerous' to be released (Josh White/Michigan Daily)
|
|
...Baker's attorney, Douglas Mullkoff, said the detention of his
|
|
client is unwarranted.
|
|
"The court is presuming that he is guilty," Mullkoff said. "I
|
|
respectfully disagree with every word the judge said. Mr. Baker
|
|
was writing fiction in a fiction area of the Internet."
|
|
During Baker's appeal hearing Friday afternoon, Mullkoff drew a
|
|
similar picture. "We have a fantasy writer's workshop going on
|
|
here," he said. "That is the Internet."
|
|
...U.S. Attorney Ken Chadwell entered six documents into evidence
|
|
as part of the case against Baker. Three of the documents were
|
|
stories that Baker had posted on the Internet, two were batches
|
|
of e-mail messages to and from Gonda, and one, a previously
|
|
unreleased document, was an incomplete story that DPS officers
|
|
discovered in Baker's East Quad dorm room.
|
|
FBI Special Agent Greg Stejskal, the only witness to testify
|
|
at the Friday hearings, said the incomplete story named the same
|
|
female University student and posed a further threat to her safety.
|
|
"The story involves Mr. Baker abducting the female student and
|
|
taking her to a secluded place off of Route 23 in Ann Arbor.,"
|
|
Stejskal said. "He tells her to disrobe, to take a toolbox
|
|
from his car and then uses the tools to torture her."
|
|
Baker, in his unfinished story, describes the abduction in detail.
|
|
"I plan it well," Baker wrote. "It will be my first kidnapping;
|
|
my first real rape of a pretty young girl. My first experimentation
|
|
with all the devices of pain I had thought up before. I obsessed
|
|
about my target more than any other girl on campus."
|
|
Baker's mother, Vilma Baker, said she was shocked after watching
|
|
her son handcuffed and taken out of the courtroom by U.S. Marshals.
|
|
"The judge must have woken up this morning and thought he
|
|
was a psychiatrist," said Mrs. Baker, a creative writing teacher
|
|
in Ohio. "While his writing is alarming and I don't particularly
|
|
like my son's genre; then again I don't like Stephen King or
|
|
sitcoms. It was just fantasy."
|
|
But Chadwell said Baker's stories went beyond being creative.
|
|
..."There is a natural progression in these cases," Chadwell
|
|
said. "He was actually talking about taking action in things he
|
|
could do to women. He writes in a message to Gonda that 'just
|
|
thinking about it anymore doesn't do the trick. I need to DO IT.'"
|
|
...The letters themselves sent mixed messages. "Sometimes, I'll
|
|
see a pretty one out in the quad and think 'Go on Jake, it'd be
|
|
easy.' But the fear of getting caught always stays my hand,"
|
|
Baker wrote to Gonda on Dec. 9.
|
|
"Sorry, can't come up with an ending to that Asian story yet.
|
|
I will soon though, hang in there."
|
|
|
|
Prosecutors push Baker indictment (Josh White/Michigan Daily) (summary)
|
|
U.S. Attorney Ken Chadwell is pushing for an early indictment
|
|
of Baker. A probable cause hearing is scheduled for Friday.
|
|
Defense attorney Douglas Mullkoff is appealing the no-bond
|
|
ruling in the 6th U.S. circuit court in Cincinatti. He expects
|
|
the appeal (for bail) to be approved, but the next step may be
|
|
the U.S. Supreme Court.
|
|
The Ontario Provincial Police deny having been notified of the
|
|
case and are not, in fact, looking for Arthur Gonda.
|
|
|
|
'U' had Baker e-mail before suspension, officials confirm
|
|
(Cathy Boguslaski, Ronnie Glassberg/Michigan Daily)(summary)
|
|
The President suspended Baker with the knowledge of Baker's
|
|
e-mail. Before suspending him, Assistant General Counsel
|
|
Daniel Sharphorn and Director of Housing Public Affairs
|
|
Alan Levy asked Baker to withdraw from the University.
|
|
Vince Keenan, chair of the Michigan Student Assembly
|
|
Students' Rights Commission, said that Baker would be
|
|
difficult to charge under the SSRR, and that he suspected
|
|
that the President summarily suspended him because he
|
|
knew that the SSRR charges wouldn't stick.
|
|
|
|
Woman named in stories declines to make comment (Josh White/Michigan Daily)
|
|
After repeated press contacts, Jane Doe has requested that the
|
|
press stop pestering her.
|
|
|
|
ACLU: Baker's free speech rights violated (Josh White/Michigan Daily)
|
|
..."This case definitely has First Amendment ramifications," said
|
|
Howard Simon, executive director of the Michigan ACLU. "His
|
|
stories may have been disgusting and vile, but I have seen nothing
|
|
that would appear to be a threat to any person.
|
|
"If Mr. Baker had sent a letter to the woman he named in his
|
|
story, or had he slipped something under her door or e-mailed
|
|
her a threatening message, the there may have been something, but
|
|
it would be a civil suit brought by the woman.
|
|
"The germane issue is: Is the FBI going to dictate what
|
|
the First Amendment is going to look like in cyberspace? Will
|
|
people be prosecuted for putting pornography and disgusting
|
|
stories on the Internet in places set aside for them? It is
|
|
not the FBI's place to be writing the First Amendment over again."...
|
|
|
|
|
|
An editorial letter in the Daily reports that Baker put a disclaimer
|
|
and warning about the content of his story at the top of his post.
|
|
|
|
Several news sources, including the Daily, Free Press, and local
|
|
TV stations, have done background checks on Baker, but nothing
|
|
ominous has surfaced and the accounts seem to be hearsay anyway.
|
|
High school friends, etc., told a great deal of personal information
|
|
about Mr. Baker, but nothing I would consider worth the trouble
|
|
of retyping.
|
|
|
|
|
|
|
|
I will be disconnected from the net for about a week, so I will be
|
|
unable to report the status of the Friday probable cause hearing,
|
|
the bail appeal to the circuit court, or the results of the grand
|
|
jury investigation. Again, others are welcome to follow up on these
|
|
stories.
|
|
|
|
If someone has the story in question, I am interested in obtaining
|
|
it and making it available on a WWW site. I would prefer that all
|
|
references to the woman's name be changed to Jane Doe, so that no one
|
|
comes asking me for her name. I would certainly do it myself before
|
|
making it publicly available.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 15 Feb 1995 00:08:08 -0600 (CST)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 3--Baker chronology
|
|
|
|
This is a document from Mike Dyer's Netzine web page --
|
|
http://www.ionet.net/~mdyer/netwatch.html. There are several other
|
|
interesting, indepth articles on the legal and ethical aspects of
|
|
cyberspace. Recommended hotlist addition.
|
|
|
|
This is the best summary I've seen to date. The web page also lists
|
|
several other supporting documents.
|
|
|
|
thanks, | "The most exciting breakthroughs of the 21st century
|
|
| will not occur because of technology but because
|
|
David Smith | of an expanding concept of what it means to be human."
|
|
bladex@bga.com | -- John Naisbitt / Patricia Aburdene
|
|
|
|
---------- Forwarded message ----------
|
|
|
|
LAST UPDATED 2/14/95
|
|
|
|
_________________________________________________________________
|
|
|
|
Only Make Believe
|
|
|
|
|
|
|
|
Jake Baker (pictured) has the attention of a great many people. The 20
|
|
year old University of Michigan student has caused an firestorm of
|
|
controversy over a fictional story he published in a Usenet newsgroup
|
|
that now has polarized two camps. On the one side are the advocates of
|
|
virtually unlimited 1st Amendment Free Speech rights, and on the
|
|
other, a host of womens groups and others concerned that the founding
|
|
fathers never intended their handiwork to go this far. Piecing
|
|
together bits and pieces from various news and information, here is
|
|
the latest I have been able to unravel:
|
|
|
|
|
|
_________________________________________________________________
|
|
|
|
BACKGROUND
|
|
|
|
|
|
|
|
Baker, 20, a Linguistics Major of Boardman, Ohio, who last year
|
|
changed his name from Abraham Jacob Alkhabaz, posted three "stories"
|
|
in the Newsgroup Alt.Sex.Stories. In one of the fictional stories,
|
|
Baker, who used his real name and that of a girl who had been a
|
|
classmate in a Japanese language class last fall, described a scenario
|
|
where he and another man broke into the girl's apartment, beat,
|
|
tortured and sodomized the girl, and then lit a match as he said
|
|
goodbye to the girl, presumably to burn the apartment where the girl
|
|
was bound and gagged.
|
|
|
|
Although such stories are not uncommon in the newsgroup, apparently
|
|
the use of real names of both the author and others involved is rare.
|
|
Baker claims that the motivation for the story was underlying stress
|
|
having to do with a student loan. He says he chose that particular
|
|
girl because "she was an attractive young woman, and I needed a name
|
|
for the story I was writing". He stated that he knew the girl, but he
|
|
never spoke to her.
|
|
|
|
It is not known if Baker used his University password to get the
|
|
access to post the story. The school requires students to sign a
|
|
statement, before using campus computers, which says, among other
|
|
things, "E-mail should not interfere unreasonably with one's
|
|
education, or work at the University, nor should they harass or
|
|
threaten an individual or group."
|
|
|
|
|
|
_________________________________________________________________
|
|
|
|
January 9
|
|
|
|
--A University of Michigan alumnus, living in Moscow, saw the post and
|
|
alerted University officials.
|
|
|
|
February 2
|
|
|
|
--Baker was escorted from the campus on February 2, and suspended.
|
|
|
|
February 3
|
|
|
|
--Baker and his attorney meet with school officials to ask that Baker
|
|
be allowed to resume classes and his duties as a projectionist on the
|
|
north campus.
|
|
|
|
February 9
|
|
|
|
--A hearing is held on the UM campus. At approximately 1:00 p.m.,
|
|
prior to the scheduled hearing, Baker is arrested by federal
|
|
authorities at the office of his attorney. Baker is taken before a
|
|
magistrate, charged with Interstate Transmission of a Threat, in
|
|
violation of 18 U.S.C. sec. 875, which carries a maximum prison term
|
|
of five years. He is also accused of sending and receiving e-mail
|
|
correspondence with an unnamed Canadian man, in which both describe
|
|
their desire to kidnap and torture women. Baker is jailed overnight
|
|
without bail, even though the prosecutor recommends bond be set.
|
|
|
|
February 9
|
|
|
|
--Baker's mother and an Ann Arbor psychiatrist appear at the hearing
|
|
on the UM campus. The psychiatrist and Baker's mother both testify
|
|
that Jake is not a threat to anyone on campus. The psychiatrist
|
|
characterizes the writings as "thoughts", with no plan of action. The
|
|
psychiatrist also states that Baker is not delusional. Baker's
|
|
attorney states that Baker has no criminal record.
|
|
|
|
February 10
|
|
|
|
--U.S. Magistrate Thomas Carolson orders Baker held without bail, in
|
|
spite of the prosecutor's request that bond be set at $100,000.
|
|
Magistrate Judge Carolson stated that the posts were "more than just a
|
|
story" and quoted the messages to the unnamed Ontario man as stating
|
|
"Just thinking about it any more doesn't do the trick. I need to do
|
|
it." The magistrate further noted that the correspondence involved
|
|
where and how to carry out such an assault. A court affidavit of an
|
|
FBI agent states that the messages between Baker and the Canadian man
|
|
"described Baker's desire to commit acts of abduction, bondage,
|
|
torture, mutilation, sodomy rape and murder of young women. Baker's
|
|
mother, a high school English teacher, said after the UM campus
|
|
hearing that her son chose the name from 200 names in a class, and
|
|
picked the one he did simply because the woman's last name "is a
|
|
sexual pun." Baker's defense attorney announces that he will appeal
|
|
the denial of bail.
|
|
|
|
February 10
|
|
|
|
--A U.S. District Judge, having read the e-mail correspondence between
|
|
Baker and the Canadian man, upheld the ruling of the Magistrate Judge
|
|
to hold Baker for trial without bail. Saying "I wouldn't want my
|
|
daughter to be on the streets of Ann Arbor or Ohio with him in the
|
|
condition I believe he is in at this time", Judge Bernard Friedman
|
|
said that he was convinced that the female subject of Baker's story,
|
|
whose identity Judge Friedman ordered kept secret, could not be
|
|
protected from Baker unless he was jailed. At the hearing, Baker's
|
|
attorney presented findings of a psychiatrist and psychologist, both
|
|
of whom had spoken with Baker, who stated that Baker is not dangerous
|
|
or mentally ill. The attorney also pointed out that Baker had
|
|
cooperated with authorities, giving them his e-mail password as they
|
|
searched for evidence.
|
|
|
|
|
|
_________________________________________________________________
|
|
|
|
*Sidenote:*
|
|
|
|
Last April, another UM student used a classmate's logon to post
|
|
statements from an Organization for the Execution of Minorities, which
|
|
threatened blacks, and criticized Latinos, Jews and gays.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 15 Feb 1995 00:09:13 -0600 (CST)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 4--Text of 18 USC 41 Sect. 875c (of Baker Indictment)
|
|
|
|
UNITED STATES CODE ANNOTATED
|
|
TITLE 18. CRIMES AND CRIMINAL PROCEDURE
|
|
PART I--CRIMES
|
|
CHAPTER 41--EXTORTION AND THREATS
|
|
|
|
s 875. Interstate communications
|
|
|
|
(a) Whoever transmits in interstate or foreign commerce any
|
|
communication containing any demand or request for a ransom or
|
|
reward for the release of an kidnapped person, shall be fined
|
|
under this title or imprisoned not more than twenty years, or
|
|
both.
|
|
|
|
(b) Whoever, with intent to extort from any person, firm,
|
|
association, or corporation, any money or other thing of value,
|
|
transmits in interstate or foreign commerce any communication
|
|
containing any threat to kidnap any person or any threat to
|
|
injure the person of another, shall be fined under this titl or
|
|
imprisoned not more than twenty years, or both.
|
|
|
|
(c) Whoever transmits in interstate or foreign commerce any
|
|
communication containing any threat to kidnap any person or any
|
|
threat to injure the person of another, shall be fined under
|
|
this title or imprisoned not more than five years, or both.
|
|
|
|
(d) Whoever, with intent to extort from any person, firm,
|
|
association, or corporation, any money or other thing of value,
|
|
transmits in interstate or foreign commerce any communication
|
|
containing any threat to injure the proper or reputation of the
|
|
addressee or of another or the reputation of a deceased person
|
|
or any threat to accuse the addressee or any other person of a
|
|
crime, shall be fined under this title or imprisoned not more
|
|
than two years, or both.
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 18 Feb 1995 21:28:20 -0600 (CST)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 5--HACK - WELL/Mitnick FAQ (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
|
|
[mod's note: Kevin Mitnick's arrest was connected with the
|
|
investigation of intrusions on the WELL, a conferencing system in
|
|
Sausalito, California. The WELL has issued a press statement in the
|
|
form of a FAQ]:
|
|
|
|
The WELL : FAQ (Frequently Asked Questions) Sheet for Press
|
|
|
|
|
|
Q. When did The WELL first become aware of the unauthorized activity
|
|
on its system?
|
|
|
|
A. Friday, January 27th.
|
|
|
|
Q. How did you discover it?
|
|
|
|
A. A routine system check.
|
|
|
|
Q. What actions did the WELL take to help track the suspect?
|
|
|
|
A. Our technical staff began monitoring and analyzing the situation
|
|
over that weekend. By Monday, we had contacted Computer Emergency
|
|
Response Team (CERT), The FBI, Sun's Security Team, Tsutomo Shimomura
|
|
of San Diego Supercomputer Center, the Board of Directors of The
|
|
WELL, representatives of The WELL community and EFF to discuss our
|
|
appropriate response. We also contacted other Internet service sites
|
|
who we believed were compromised. Our main objective was to
|
|
understand risks, options, and factors affecting our system security
|
|
and Net-wide responsibilities.
|
|
|
|
After discussing the situation with the above groups, and carefully
|
|
considering our options and responsibilities, we made the decision to
|
|
contact the U.S. Attorney's Office and to cooperate with Tsutomo
|
|
Shimomura in apprehending the intruder. We did this in an effort to
|
|
foster greater security on the global net.
|
|
|
|
We initiated round-the-clock staffing to monitor the illegal
|
|
activity. WELL technical staff were joined by Mr. Shimomura and his
|
|
associates to help trace the suspect using sophisticated monitoring
|
|
software that he supplied.
|
|
|
|
At no time was the FBI onsite at The WELL or involved in monitoring
|
|
at our site.
|
|
|
|
|
|
Q. What was the chronology of events at The WELL the day leading up
|
|
to the arrest of Kevin Mitnick?
|
|
|
|
A.
|
|
|
|
Tuesday, February 14, 2:30 pm PST
|
|
|
|
WELL technical staff, which had been monitoring the activity for
|
|
nearly 18 days, notices that the cracker has erased information on
|
|
one transaction file on The WELL. The transaction file (there are
|
|
dozens of accounting files on The WELL) contained user log-on data,
|
|
and was a file which is stored elsewhere and backed up regularly.
|
|
|
|
WELL decides to bring the system down so we can re-build the damaged
|
|
file and do further investigation. WELL staff shuts down WELL
|
|
computers.
|
|
|
|
Tuesday, February 14, 3:00 pm PST
|
|
|
|
Technical staff positively determines that it is only one accounting
|
|
file that has been affected. Approximately three hours after the
|
|
incident the damaged file is rebuilt.
|
|
|
|
Tuesday, February 14, 5:00 pm PST
|
|
|
|
Shimomura and assistants are contacted, and confirm with The WELL
|
|
technology team that the cracker appeared to have made a typing error
|
|
when he zeroed the one accounting file. Shimomura reports that they
|
|
are hours from catching the suspect.
|
|
|
|
Tuesday, February 14, 8:30 pm PST
|
|
|
|
WELL puts system back up. Monitoring continues in full gear.
|
|
|
|
Tuesday, February 14, 10:30 pm PST
|
|
|
|
Kevin Mitnick is arrested in Raleigh, North Carolina.
|
|
|
|
Q. What other sites were affected?
|
|
|
|
A. In the interest of their privacy, we will not say. We believe
|
|
that at least a dozen sites were compromised.
|
|
|
|
Q. What are The WELL's normal security procedures?
|
|
|
|
A. The WELL follows normal UNIX and Internet system security
|
|
procedures including, but not limited to, implementing changes as
|
|
recommended by CERT advisories, security patches as available from
|
|
vendors (e.g. SUN, Cisco), regular use of system security diagnostic
|
|
software, including "crack" and other appropriate security related
|
|
measures. We feel it is inappropriate to enumerate all our security
|
|
measures in a public forum.
|
|
|
|
Q. Did the cracker get WELL members' credit card information or
|
|
personal files?
|
|
|
|
A. To the extent that we are able to determine, no credit card
|
|
information was accessed by the intruder.
|
|
|
|
We monitored nearly every keystroke of the cracker. A total of 11
|
|
accounts were compromised by the intruder, and we have contacted all
|
|
of the account holders. In general, the cracker was not interested
|
|
in information on The WELL itself, but used the WELL for storing
|
|
files from other sites.
|
|
|
|
Q. Wouldn't have changing all members' passwords have secured the
|
|
system?
|
|
|
|
A. Fundamentally, it wouldn't have made any difference. The tools
|
|
used by this cracker would not have been defeated by changing
|
|
individual passwords. Additionally, we have no information that
|
|
would lead us to believe that member's passwords had been cracked or
|
|
distributed.
|
|
|
|
Q. What exactly were you monitoring and who was doing this?
|
|
|
|
A. We were tracking network transactions, e.g.. ftp, smtp, telnet
|
|
etc. to and from systems known and/or suspected by us to have been
|
|
compromised. We added additional sites as we learned about this.
|
|
|
|
Those monitoring our system included The WELL tech staff as well as
|
|
Andrew Gross, a consultant from Shimomura's office.
|
|
|
|
Q. What are you doing to strengthen the security of The WELL?
|
|
|
|
A. We've purchased a new main server, a Sparc 1000e. We're
|
|
re-installing application software from binaries, implementing
|
|
one-time (DES) password protection for critical including root
|
|
passwords, and requiring every user on the system to select a new
|
|
password (adhering to standards that make password cracking more
|
|
difficult). We are continuing close liaison with Sun specialists
|
|
and other system security specialists and advisors to examine
|
|
techniques used by the cracker to gain system access and addressing
|
|
these system weaknesses.
|
|
|
|
The WELL plans to install the new Sparc 1000e on Monday, February
|
|
20th.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 13 Feb 95 07:36:16 EST
|
|
From: Frank Tirado <SYSADMIN@ERS.BITNET>
|
|
Subject: File 6--Re: Banished CPU BBS - commentary
|
|
|
|
CuD is to be commended for presenting articles from all sources,
|
|
regardless of how much we may disagree with them. A case in point is
|
|
the article by Dan Gannon, forwarded by David Smith.
|
|
|
|
Freedom of speech is a right of all individuals, even the hate
|
|
mongers, the apologists and the revisionists. To curtail their right
|
|
to speak out is to risk having our own freedoms curtailed. Contrarian
|
|
views are necessary since they provide a yardstick against which we
|
|
measure the rightness of our own beliefs. In fact, contrarian views
|
|
have often been proved correct; for example Columbus proved the world
|
|
was not flat, the Wright brothers proved that heavier than air flight
|
|
was possible.
|
|
|
|
Having said that, however, I must add that my heart bleeds for Mr.
|
|
Gannon and the Banished CPU. I believe that he and others of his kind
|
|
should be allowed to express their opinions in an open forum if only
|
|
so that those opinions can refuted by the historical record. Frankly,
|
|
no amount of revisionism can change the facts: Nazi atrocities
|
|
happened and Jews were the main victims of Nazi pogroms.
|
|
|
|
It is no favor to allow Nazi revisionists the full benefit of freedom
|
|
of speech. If their actions are overt, they can be watched. If they
|
|
express their beliefs in an open forum, they can be refuted.
|
|
Ultimately, they will reveal their true nature: bigots and hate
|
|
mongers.
|
|
|
|
Finally, Nazi revisionists serve a very useful function: they keep
|
|
present the horrors of the Holocaust and remind us that, if we are not
|
|
vigilant, it could easily happen again. To us.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 23 Oct 1994 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 7--Cu Digest Header Info (unchanged since 18 Feb, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.15
|
|
************************************
|
|
|