**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 1, Issue #1.23 (July 18, 1990) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer ARCHIVISTS: Bob Krause / Alex Smith REPLY TO: TK0JUT2@NIU.bitnet COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS: File 1: Moderators' Comments File 2: FTPing Thru Bitnet: BITFTP Help File 3: Phrack as "Evidence?" File 4: CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #1.23, File 1 of 4: Moderators' Comments *** ******************************************************************** ++++++++++ In this file: 1) Craig Neidorf's Trial 2) Law Enforcement Contributions 3) Berserker BBS 4) The Well in Sausalito 5) LoD/H Technical Journal, #4 +++++++++++++++++++++++++++++ CRAIG NEIDORF'S TRIAL +++++++++++++++++++++++++++++ Craig Neidorf's trial begins Monday, July 23, in Chicago's Federal Court building at 220 S. Dearborn in Judge Nicholas Bua's court. For those planning to attend, the Federal Court is on the south edge of The Loop, about a 10 minute walk from commuter trains. Jury selection begins in the morning. The trial, originally expected to be fairly short, perhaps because the prosecutor expected no opposition, could run for at least two-and-a-half weeks. Judge Bua refused the prosecutor's request for a postponement apparently intended to dig up more "dirt" and witnesses. Some sources indicate that the prosecution has been attempting to amass information intended to discredit the Craig's character that has nothing to do with the charges, but might create an unfavorable imagery to persuade a jury that he must be guilty of *something*! Looks from this side like the politics of desperation. Dorothy Denning will attend the entire trial, and the CuD moderators will be on the scene as time allows. ****************** LAW ENFORCEMENT CONTRIBUTORS ****************** We have invited two high-level prosecutors to contribute their views of the problems of evidence, defining computer crime, separating "real" criminals from CU types, and other issues to CuD. One has agreed when time allows, the other is considering it. We believe it is crucial to develop dialogue between competing groups in order to address the complexity of the various issues. Unless this happens, it will be more difficult to assure Constitutional protections, to enact or change legislation, or to generally establish some sort of peaceful co-existence. So, we again encourage contributions from all sides. ****************** BERSERKER BBS ****************** We have heard that Berserker BBS, one of the elite boards in the country, went down. Does anybody have any information on this? *************** THE WELL *************** We have come across THE WELL (an acronym for Whole Earth 'Lectronic Link) in Sausalito. It's more than a BBS, and offers files, net links, and informed message sections. Anybody interested in the computer underground should participate in the "Hacker's Conference," where a variety of interesting topics are discussed by lawyers, journalists, hackers, and many, many others. The hacker's conference was the source of HARPER'S Forum on hacking this past March. It's a bit expensive (a sign-up fee, monthly fee, and user fee), but more than worth it for the price. THE WELL'S data phone: (415)-332-6106; Voice: (415)-332-4335. *************************** LOD/H TECHNICAL JOURNAL, #4 *************************** LoD/H #4 came out in May and is available from the CuD archives. The introductory statement warned of confusion and potential imposters, so we thought we'd reprint it. The issue also includes a history of the LoD from the perspective of one participant that supplements the history found in Phrack 31. Here's an excerpt from the introduction: *************************************************************************** We are still alive. This publication is not released on any schedule. Past attempts at scheduling issues have failed miserably. The editors refuse to release issues which are not up to our self-defined standards. We have in the past, and will continue in the future, to accept articles from anyone (e.g. non LOD) as long as the articles adhere to our basic format and style. The editors review all articles to verify accuracy and integrity however it may not be possible in all cases to check every fact. Plagiarized material is not acceptable and we make every attempt to verify an article's originality. When referenced material is used, the source for that material must be clearly stated. The more articles we receive the sooner each issue is released. There is a minimum 2 month review and editing period for each article. If you want to contribute articles contact any member and they will forward articles to the editors. There seems to be some confusion as to what writers are (or were) in LOD/H and what ones aren't. JUST BECAUSE SOMEONE WRITES FOR THIS PUBLICATION DOES NOT MEAN THEY ARE AN LOD/H MEMBER! Just to clear up any confusion, a current member list follows: Erik Bloodaxe Lex Luthor Prime Suspect Phase Jitter Professor Falken (End excerpt from LoD/H #4) ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ ******************************************************************** *** CuD #1.23: File 2 of 4: FTPing thru Bitnet *** ******************************************************************** ++++++++++++++++ Lang Zerner reminds us that bitnet users may be able to access FTP sites, and has sent along the following instructions. ++++++++++++++++ BITFTP -- Princeton BITNET FTP Server BITFTP provides a mail interface to the FTP portion of the IBM TCP/IP product ("FAL") running on the Princeton VM system, to allow BITNET/NetNorth/EARN users to ftp files from sites on the Internet. BITFTP currently accepts requests only via RFC822-format mail, IBM NOTE-format mail, PROFS-format messages, or files with no headers at all. BITFTP currently returns the requested files as NETDATA-format files or as mail files containing UUENCODED data. If you specify "UUENCODE" or "NETDATA" on your "FTP" command, BITFTP will attempt to use that format. If you do not specify the format, BITFTP will attempt to select the appropriate format for your node. BITFTP attempts to send NETDATA-format files through the gateway from EARN into Janet via the NIFTP facility at Rutherford Lab. If BITFTP sends you a file you cannot read, THE FIRST THING TO DO is to make sure that you specified ASCII if the file should contain textual material or that you specified BINARY if the file should contain binary data, executable programs, tar files, or the like. VMS users should specify BINARY F 512 and should use RECEIVE/BINARY to receive the NETDATA-format binary files BITFTP sends them. If BITFTP sends you a uuencoded file that you cannot uudecode, the first thing to do is to translate all occurrences of 0x7E in the file to 0x5E and then try uudecoding again. (Some gateways are changing 5Es to 7Es when the files pass through them.) To use BITFTP, send mail containing your ftp commands to "BITFTP@PUCC". The first command to BITFTP must be "FTP" or "HELP". The recommended syntax for ftp requests is: FTP hostname NETDATA --or-- FTP hostname UUENCODE USER username password QUIT After the hostname on the FTP command, you may specify "UUENCODE" or "NETDATA" to tell BITFTP the format in which you wish to receive files. (If the username is "anonymous", no password is required; BITFTP will use your userid and nodeid as the password.) Note that on many systems passwords are case-sensitive; that is, the password may be required to be in lower case or mixed case or upper case. (The same is true of directory and file names.) The following is an example of an ftp request: FTP f.ms.uky.edu NETDATA USER anonymous CD /pub/msdos/Games DIR BINARY GET robotron.arc msdos.robotron QUIT To request a list of some of the hosts that allow anonymous ftp, send BITFTP mail or a message containing only the command "FTPLIST". Note that there is no guarantee that BITFTP can access all the hosts in this list. BITFTP implements a subset of the ftp subcommands provided in the IBM TCP/IP and uses the same syntax. Therefore, you may find it useful to obtain the "IBM TCP/IP for VM Command Reference Manual", IBM order number GC09-1204. The currently supported subcommands are: ACCT -- to send host-dependent account information. format: ACCT account-information ASCII -- to change the file transfer type to ASCII. format: ASCII BINARY -- to change the file transfer type to image. format: BINARY CD -- to change the working directory. format: CD directory CLOSE -- to disconnect from the foreign host. format: CLOSE DIR -- to get a list of directory entries. format: DIR EBCDIC -- to change the file transfer type to EBCDIC format: EBCDIC GET -- to get a file from the foreign host. format: GET foreignfile If you specify "localfile", it must be in the forms "filename.filetype" or "filename", and the filename and filetype may each be no more than 8 characters long and may not contain periods. LOCSTAT -- to display local status information. format: LOCSTAT LS -- to list the files in a directory. format: LS PWD -- to print the working directory. format: PWD QUIT -- to disconnect from the foreign host. format: QUIT STATUS -- to retrieve status information from a foreign host. format: STATUS SYSTEM -- to get the name of the foreign host's operating system. format: SYSTEM TYPE -- to specify Image, ASCII, or EBCDIC file transfer. format: TYPE The files you request will be sent to you in NETDATA format or UUENCODED inside mail files. You will also receive a mail file containing a log of your ftp session. In that mail file, entries prefixed by ">" are your original commands; those prefixed by ">>" are your commands as interpreted by BITFTP and passed to TCPIP; those prefixed by ">>>" are your commands as interpreted by TCPIP and passed to the remote host; those prefixed by "<<<" are messages from the remote host; and those prefixed by ">>>>" are completion messages from BITFTP. If BITFTP is unable to connect to the host you specify, it will send you mail after the first attempt, but will keep trying at intervals over three days. The only additional mail files you will receive will be when the connection is made successfully or when BITFTP gives up after three days. The load on BITFTP is often very heavy, and network backlogs are often so great that it may take several days for a file to get to you once BITFTP sends it, so please be patient and don't send multiple requests for the same file. If your system allows you to send interactive messages, you can inquire about BITFTP's backlog by sending the query "How are you?", e.g., on a VM system: TELL BITFTP AT PUCC How are you? This service is currently under development and is far from complete. Current plans for improvements include: 1. Acknowledgments via MSG when mail is received and when processing has been completed. 2. A much more complete HELP facility. Questions about BITFTP and suggestions for improvements should be directed to Melinda Varian, MAINT@PUCC on BITNET or MAINT@pucc.princeton.edu on the Internet. The author gratefully acknowledges the use of the FTP SUBCOM interface written by David Nessl, the SENDJANI EXEC written by Alan Flavell, the uuencoding utility written by John Fisher, and the RFC822 parsing routine written by Eric Thomas. NOTE: If you have any complaints or suggestions about the way any of these routines work in BITFTP, please send them to MAINT@PUCC (Melinda Varian), not to the authors. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ ******************************************************************** *** CuD #1.23: File 3 of 4: Phrack as Evidence??? *** ******************************************************************** If a clever prosecutor wanted to introduce evidence that "proved" how dangerous a defendant was, and if that evidence included something like what follows, what would this evidence actually show? Hypothetically, if the following were evidence, would Bill Cook think it so dangerous as to have it sealed? Can't blame him, though. It's well known throughout the modem community that PHRACK took its orders directly from the Kremlin, and secret codes and meanings are incrypted in vowels. Rumor also has it that if you change the ascii to hex, stick it in the oven for 23 minutes at 420 degrees, dry it, grind it up in the food processer and smoke it, it's better than crack. Sometimes it seems like the prosecution has tried it--and found that it works! What else could explain their actions? _______________________________________________________________________________ ==Phrack Inc.== Volume Two, Issue 23, File 3 of 12 <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> <> <> <> Subdivisions <> <> ~~~~~~~~~~~~ <> <> Part Three Of The Vicious Circle Trilogy <> <> <> <> A Study On The Occurrence Of Groups Within The Community <> <> <> <> Presented by Knight Lightning <> <> August 8, 1988 <> <> <> <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> A Rose By Any Other Name... Would Smell As Sweet =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= The Administration \ Advanced Telecommunications, Inc./ATI ALIAS \ American Tone Travelers \ Anarchy Inc. \ Apple Mafia The Association \ Atlantic Pirates Guild/APG \ Bad Ass Mother Fuckers/BAMF Bellcore \ Bell Shock Force/BSF \ Black Bag \ Camorra \ C&M Productions Catholics Anonymous \ Chaos Computer Club \ Chief Executive Officers/CEO Circle Of Death \ Circle Of Deneb \ Club X \ Coalition of Hi-Tech Pirates/CHP Coast-To-Coast \ Corrupt Computing \ Cult Of The Dead Cow/-cDc- Custom Retaliations \ Damage Inc. \ D&B Communications \ The Dange Gang Dec Hunters \ Digital Gang/DG \ DPAK \ Eastern Alliance The Elite Hackers Guild \ Elite Phreakers and Hackers Club The Elite Society Of America \ EPG \ Executives Of Crime \ Extasyy (Elite) Fargo 4A \ Farmers Of Doom/FOD \ The Federation \ Feds R Us \ First Class Five O \ Five Star \ Force Hackers \ The 414s \ Hack-A-Trip Hackers Of America/HOA \ High Mountain Hackers \ High Society \ The Hitchhikers IBM Syndicate \ The Ice Pirates Imperial Warlords \ Inner Circle Inner Circle II \ Insanity Inc. International Computer Underground Bandits/ICUB \ Justice League of America/JLA Kaos Inc. \ Knights Of Shadow/KOS \ Knights Of The Round Table/KOTRT League Of Adepts/LOA \ Legion Of Doom/LOD \ Legion Of Hackers/LOH Lords Of Chaos \ Lunatic Labs, Unlimited \ Master Hackers \ MAD! The Marauders \ MD/PhD \ Metal Communications, Inc./MCI MetalliBashers, Inc./MBI \ Metro Communications \ Midwest Pirates Guild/MPG NASA Elite \ The NATO Association \ Neon Knights \ Nihilist Order Order Of The Rose \ OSS \ Pacific Pirates Guild/PPG \ Phantom Access Associates PHido PHreaks \ Phlash \ PhoneLine Phantoms/PLP Phone Phreakers Of America/PPOA \ Phortune 500/P500 Phreak Hack Delinquents \ Phreak Hack Destroyers Phreakers, Hackers, And Laundromat Employees Gang/PHALSE Gang Phreaks Against Geeks/PAG \ Phreaks Against Phreaks Against Geeks/PAP Phreaks and Hackers of America \ Phreaks Anonymous World Wide/PAWW Project Genesis \ The Punk Mafia/TPM \ The Racketeers Red Dawn Text Files/RDTF \ Roscoe Gang \ SABRE \ Secret Circle of Pirates/SCP Secret Service \ 707 Club \ Shadow Brotherhood \ Sharp Inc. \ 65C02 Elite Spectral Force \ Star League \ Stowaways \ Strata-Crackers \ The Phrim Team Hackers '86 \ Team Hackers '87 \ TeleComputist Newsletter Staff Tribunal Of Knowledge/TOK \ Triple Entente \ Turn Over And Die Syndrome/TOADS 300 Club \ 1200 Club \ 2300 Club \ 2600 Club \ 2601 Club \ 2AF \ Ware Brigade The Warelords \ WASP \ The United Soft WareZ Force/TuSwF United Technical Underground/UTU - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Its literally unbelievable just how many different groups and organizations there are or have been in the phreak/hack/pirate community. The list of 130 groups displayed above is probably still just a fraction of the actual amount of groups that there have been, but those are the only ones I am aware of at this time. In the past John Maxfield has estimated that there are about 50,000 hackers/phreaks/pirates operating in the United States today. That figure has multiplied to to a point where it probably comes close to 500,000. Believe it or not, almost everyone has been a member of one of the above groups (or perhaps a group not mentioned) at one time or another. Today's telecom security consultants and law enforcement agencies know this too and that is how group affiliations can be turned against us. What does being in a group mean? In the modem community being in a group is supposed to mean that the people in the group work on projects together and trade specific information that people outside of the group are not allowed to access and by the same token, have no way to get it. However, obviously the people in the group all feel that the other people with whom they are sharing information, can be trusted and are worthy of associating with them to begin with. So when you stop and think about it, if there was no group, the people in question would still be trading information and would still trust each other because they would not have formed the group unless this criteria was met in the first place. So in truth, being in a group really means nothing on the basis previously mentioned. You see in the modem community, being in a group really is more like a power trip or a "security blanket" for people who feel that they need to let people know that they associate with a specific clique in the hopes that the popularity of some of the other members will lend popularity to themselves. Many groups form in such a way that they try to make it look otherwise and thus begins the real problem. Some groups are formed by a person who tries to get a lot of guys together that he feels knows a lot or seems to post a lot of good information - Bad Move; If you are going to form a group at all, stick with people who you know can be trusted (can you really ever "know" who can be trusted?) and then out of those people form your group or choose who you feel should be in it. Anyway, to prove that they are elite, most groups begin to gather specific data for giving to group members, and this includes handing out their own names and phone numbers with other members of the group. They feel a false loyalty and psychologically create such utter faith in all the members that the faith is ultimately blind and based on hopes and aspirations of greatness. What is the best way for a security agent or informant to blend in with the modem community? Join as many groups as possible, start gathering data on the members, and spread your handle throughout the community to become "well known." Example: Taken From Phrack World News Issue XV; [This article has been edited for this presentation. -KL] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Mad Hatter; Informant? July 31, 1987 ~~~~~~~~~~~~~~~~~~~~~~ We at Phrack Inc. have uncovered a significant amount of information that has led us to the belief that Mad Hatter is an informant for some law enforcement organization. When Taran King, Cheap Shades, Forest Ranger, and Knight Lightning arrived at Control C's in Chicago, Illinois, Mad Hatter had already searched the place and had found some papers that could only have done ^C harm. We destroyed this information and thought everything was ok. However, as it turns out, we searched Mad Hatter's bags and found a duplicate set of this information and the general hypothesis was they he intended to leave it behind as incriminating evidence. Mad Hatter had also brought down several disks for the purpose of copying Phantasie Realm. Please note; PR was an IBM program and MH has an apple. Control C told us that when he went to pick Mad Hatter up at the bus terminal, he watched the bus pull in and saw everyone who disembarked. Suddenly Mad Hatter was there, but not from the bus he was supposed to have come in on. In addition to this, he had baking soda wrapped in a five dollar bill that he tried to pass off as cocaine. Perhaps to make us think he was cool or something. Mad Hatter constantly tried to get left behind at ^C's apartment for unknown reasons. He also was seen at a neighbor's apartment making unauthorized calls into the city of Chicago. When asked who he called, his reply was "Don't worry about it." Mad Hatter had absolutely no money with him during PartyCon (and incidentally he ate everything in ^C's refrigerator) and yet he insisted that although he had taken the bus down and had return trip tickets for the bus, that he would fly back home. How was this going to be achieved? He had no money and even if he could get a refund for the bus tickets, he would still be over $200 short. When asked how he was going to do this, his reply was "Don't worry about it." On Saturday night while on the way to the Hard Rock Cafe, Mad Hatter asked Control C for the location of his computer system and other items 4 times. This is information that Hatter did not need to know, but perhaps a SS agent or someone could use very nicely. When Phrack Inc. discovered that Dan The Operator was an FBI informant and made the news public, several people were criticizing him on Free World II Private. Mad Hatter on the other hand, stood up for Noah and said that he was still his friend despite what had happened. Then later when he realized that people were questioning his legitimacy, his original posts were deleted and he started saying how much he wanted to kill Dan The Operator and that he hated him. Mad Hatter already has admitted to knowing that Dan The Operator was an FBI informant prior to SummerCon '87. He says the reason he didn't tell anyone is because he assumed we already knew. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - When Mad Hatter first entered the phreak/hack world, he joined; Phreaks Anonymous World Wide (PAWW), MetalliBashers, Inc (MBI), Order of The Rose, and Cult of The Dead Cow (-cDc-). If you were a security agent or a loser hacker turned informant and you wanted to mix in with the phreak/hack community, wouldn't you try to join as many groups as possible to spread your name? - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Phreaks Anonymous World Wide, MetalliBashers, Inc., Order of The Rose, and Cult of The Dead Cow, not exactly the toughest groups to join and once there is one security person in the group, he is bound to vouch for others, etc. So while he spreads his name as an elite modem user throughout the community, he is busy gathering information on group members who are foolish enough to trust him. Its not bad enough that some groups are easy enough to infiltrate as it is, but does anyone remember this? Taken From Phrack World News Issue XI; - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Phortune 500: Phreakdom's Newest Organization February 16, 1987 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ For those of you who are in the least bit interested, Phortune 500 is a group of telecommunication hobbyists who's goal is to spread information as well as further their own knowledge in the world of telecommunications. This new group was formed by: Brew Associates / Handsomest One / Lord Lawless / The Renegade Chemist Quinton J. Miranda / Striker / The Mad Hacker / The Spiker These eight members are also known as Board Of Directors (BOD). They don't claim to be *Elite* in the sense that they are they world's greatest hacker, but they ARE somewhat picky about their members. They prefer someone who knows a bit about everything and has talents exclusive to him/herself. One of the projects that Phortune 500 has completed is an individual password AE type system. It's called TransPhor. It was written and created by Brew Associates. It has been Beta tested on The Undergraduate Lounge (Sysoped by Quinton J. Miranda). It is due to be released to the public throughout the next few months. Phortune 500 has been in operation for about 4 months, and has released two newsletters of their own. The Phortune 500 Newsletter is quite like the "People" of contemporary magazines. While some magazines cover the deep technical aspects of the world in which we communicate, their newsletter tries to cover the lighter side while throwing in information that they feel is "of technical nature." The third issue is due to be released by the end of this month. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - *>=-> The Phortune 500 Membership Questionnaire <-=<* Note: The following information is of a totally confidential nature. The reason you may find this so lengthy and in depth is for our knowledge of you. We, with Phortune 500, feel as though we should know prospective members well before we allow them into our organization. Pending the answers you supply us, you will be admitted to Phortune 500 as a charter member. Please answer the following completely... .............................................................................. Handle : First Name : Voice Phone Number : Data Phone Number : City & State : Age : Occupation (If Applicable) : Place of Employment (Optional) : Work Phone Number (Optional) : Computer Type : Modem Type : Interests : Areas Of Expertise : References (No More Than Three) : Major Accomplishments (If Any) : .............................................................................. Answer In 50 Words Or Less; ^*^ What Is Phortune 500 in Your Opinion? ^*^ Why Do You Want To Be Involved With Phortune 500? ^*^ How Can You Contribute to Phortune 500? .............................................................................. Please answer each question to the best of your ability and then return to any Phortune 500 Board of Directors Member Or a Phortune 500 BBS: The Private Connection (Limited Membership) 219-322-7266 The Undergraduate AE (Private Files Only) 602-990-1573 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - An actual application form for joining a group. Perhaps the concept was a good one, perhaps not, but from a standpoint of publicity and security, this was a complete and utter catastrophe. Basically we are all here to learn in one way or another. Groups and clubs in our community only seem to segregate it and at a time when everyone should be pulling together, this is not such a good idea. Privacy and security are important factors that motivate these sects within the society, but ultimately are the final consequences worth the trouble of creating a group? If groups had not been created, there would not be as much attention on the phreak/hack community as there is right now. When group names start spreading, it starts the law enforcement agencies into a panic that its big time organized crime. This allows them to justify more time and money into the apprehension of computer criminals and usually they go after the big names; the people in the most "elite" groups. Now before you, a member of a group, start criticizing this file, please understand, I am not referring to any particular groups here, just groups in general. Any and all comments made about MBI, -cDc-, PAWW, OOTR, and P500 should not be taken personally and were used only as examples of how groups can be potential security problems. There are some groups that are worthwhile organizations and its obvious because that have existed through the years and been productive. However, the only way to keep this community alive is for everyone to work together to protect and learn from each other. :Knight Lightning "The Future Is Now" =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ ******************************************************************** *** CuD #1.23: File 4 of 4: The CU in the News *** ******************************************************************** +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++- From: ekrell@ulysses.att.com Date: Mon, 9 Jul 90 16:14:38 EDT Subject: Legion of Doom Members Plead Guilty Extracts from an AP news wire: Three members of the Legion of Doom group pleaded guilty to federal conspiracy charges Monday. U.S. Attorney Joe Whitley said the group disrupted telecommunications, stole computer source codes and information, stole credit card information and fraudulently obtained money and property. In May, authorities in Indiana prosecuted a juvenile who pleaded guilty to 11 counts of fraud and agreed to testify against the three Atlanta men, in a trial scheduled to start today. Instead, the three pleaded guilty. They are E. Grant, 22 and Robert Riggs, 22 (both from Atlanta) and Franklin E. Darden Jr, 24 of Norcross. Whitley said in a statement that they illegally accessed various BellSouth computers between Sept. 10, 1987 and July 21, 1989. Grant and Darden also monitored private telephone conversations. They were carged with conspiracy to commit computer fraud, wire fraud, access code fraud and interstate transportation of stolen property. Darden and Riggs pleaded guilty to one count of conspiracy each and face a maximum of 5 years in prison and a $ 250,000 fine. Grant pleaded guilty to possessing 15 or more BellSouth access devices with intent to defraud and faces up to 10 years in prison and a $ 250,000 fine. Eduardo Krell AT&T Bell Laboratories, Murray Hill, NJ UUCP: {att,decvax,ucbvax}!ulysses!ekrell Internet: ekrell@ulysses.att.com ++++++++++++++++++++++++++++++ +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ And here's another little article from Computerworld, July 2, 1990 issue, p. 78, in the column "Inside Lines," no definite author given, only the Assistant News Editor Jim Connolly (a phone number is given for news tips, 800-343-6474): "That old hack magic The infamous Internet worm, created by ex-Cornell graduate student and hacker Robert T. Morris, still rears its head from time to time, according to one security expert. "It's taken on a life of its own," he said. Admirers of Morris' handiwork have added names to the worm's built-in password-cracking dictionary to make it more effective. One estimate puts the dictionary at 560 passwords, up from the original 430, the expert said. Morris, meanwhile, is still trying to work out a deal with his probation officer on how he will spend his 400 hours of community service -- part of his sentence for writing the untamed program, according to his lawyer. A decision will come next week, he added." +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ COMPUTER TRANSFER OF STOLEN DATA RULED A FEDERAL CRIME By Janan Hanna (From Chicago Daily Law Bulletin, June 13, 1990, pp 1, 14) The transfer of confidential information from one computer to another constitutes a violation of the federal law prohibiting the interstate transportation of stolen property, a federal judge has ruled. U.S. District Judge Nicholas Bua made this first-impression ruling in a criminal computer "hacker" case brought against two young men. Attorney Sheldon T. Zenner, representing one of the defendants, said the ruling improperly broadens the federal statue against interstate transportation of stolen property--18 U.S.C. {section} 1343. Under the ruling, Zenner argued, simple communications between persons or news organizations could be construed as illegal. Bua denied a motion to dismiss by defendant Craig Neidorf, who was indicted along with Robert J. Riggs for allegedly breaking into Bell South Telephone Co.'s computer system, copying its emergency 911 system and publishing the information on a computer bulletin board. Riggs allegedly gained acess to Bell South's computer, downloaded the system into his home computer and sent it to Neidorf who allegedly published it in a computer newsletter known as "PHRACK," according to Bua's decision. Neidorf, who was charged with violating the wire fraud and interstate transport statutes, argued that the government's allegation did not fall within the definition of those statutes because no goods, wares, or merchandise was transferred. The original indictment also charged Neidorf with violations of the Computer Fraud and Abuse Act of 1986, but government prosecutors dropped those charges in a superseding indictment and added additional wire fraud charges. 18 U.S.C. {section} 2314 provides, in part, that "whoever transports, transmits, or transfers in interstate or foreign commerce any goods, wares, merchandise, securities or money, of the value of $5,000 or more, knowing the same to have been stolen, converted or taken by fraud...shall be fined not more than $10,000 or imprisoned not more than 10 years or both." "The question is, where what takes place is merely a telephone call, where information is transported and the property never leaves Bell, because they still have it, is that interstate transportation of stolen property?" Zenner asked. "Other cases have held that property must be tangible property. If a kid...had stolen a computer disk, gotten in his car and drove it {to another person} or mailed it, that's ITSP {interstate transportation of stolen property}." But Bua disagreed. "This court is unpersuaded by Neidorf's disingenuous argument that he merely transferred electronic impulses across state lines," Bua said. "Several courts have upheld section 2314 charges based on the wire transfer of fraudulently obtained money, rejecting the arguments of the defendants in those cases that only electronic impulses, not actual money, crossed state lines. " Bua noted that no other court has ever held that the electronic transfer of confidential, proprietary business information from one computer to another across state lines constitutes a violation of section 2314, but he added that no other court has addressed the issue. "Over the course of the past decade, advances in technology and growing respect and acceptance for the powers of computers have created a true explosion in the computer industry," Bua said. "Quite naturally, the growth of computer availability and application has spawned a host of new legal issues. "This case requires the court to wrestle with some of these novel legal issues which are a product of the marriage between law and computers." Drawing a parallel between this case and cases involving the wire transfer of funds, Bua characterized Neidorf's alleged conduct not merely as the transmission of electronic impulses, but as the transfer of properitary {sic} business information. "The question this case presents, then, is not whether electronic impulses are 'goods, wares or merchandise' within the meaning of {page break} section 2314, but whether the proprietary information contained in Bell South's E911 file constitutes a 'good, ware, or merchandise' within the purview of the statute," Bua said. "This court answers that question affirmatively." The case is schedule to be tried July 23. U.S. v. ROBERT J. RIGGS AND CRAIG NEIDORF, No. 90 CR 0070. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ "U.S. Raid Stirs Drive for Computer Rights" By Linda P. Campbell, The Chicago Tribune, 7/11/90: Page 6. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Washington--Steve Jackson says he still doesn't know exactly why Secret Service agents raided his computer-game business last March in Austin, Texas, and confiscated computers, software, vital business data and a game book that was soon to be published. But at a Washington news conference Tuesday, Jackson suggested that it may be because the book described a "totally imaginary" futuristic fantasy game involving computer intrusion that government agents saw as "a handbook for computer crime." The raid, Jackson claimed, nearly ruined his business. Now a group of computer pioneers has championed Jackon's case as an example of overzealous law-enforcement officials trampling an individual's rights in the pursuit of computer criminals. Mitchell Kapor, who founded the software giant Lotus Development Corp., has teamed with Apple Computer Inc. co-founder Steven Wozniak and an anonymous Silicon Valley entrepreneur to fund the Electronic Frontier Foundation, dedicated to protecting a kind of "keyboard freedom." The group is seeking 1st Amendment protections for electronic communication such as computer bulletin boards and newsletters, and wants to halt intrusive law-enforcement techniques. "Speech is speech. It doesn't really matter whether it's formulated on paper or in bits nd bytes," said John Perry Barlow, a writer who helped put together the foundation. The group, which was formaly announced Tuesday, has focused debate on the difficult balance between securing computer systems from intruders, known as "hackers," and protecting rights to get information and communicate through electronic media. But Kapor denied that was simply a "hackers' defense fund." "We don't see our mission as defending people who illegally enter the computer systems," he said. He and others involved with the group argued that the government has gone too far, partly because ignorance about rapidly advancing computer technology has generated widespread anxiety. They cited the case of Craig Neidorf, a University of Missouri student indicted on federal charges of wire fraud and interstate transportation of stolen property. Neidorf published in his electronic magazine, Phrack, a telephone company document about 911 emergency phone services that someone else allegedly stole from the BellSouth computer system. New York Lawyer Terry Gross, who represents Neidorf, called the prosecution "an unprecedented threat to the free press." And Kapor argued that computer news networks should have the same protections as print or broadcast media. But Secret Service Special Agent Rich Adams said that legitimate computer bulletin board users were not at risk. The agency, he said, is cracking down on hackers who "are maliciously trying to get into" hospital records and 911 systems or stealing credit card information and telephone access codes "for personal gain." Earlier this year, a 2-year anti-hacker investigation dubbed Operation Sundevil led to the seizure of more than 40 computers and 23,000 disks in 13 cities. Adams said that Jackson, who was not arrested in the raid on his business, got caught in the Sundevil net because one of his employees was accused of a computer crime. On Monday three men belonging to a hackers group known as the Legion of Doom pleaded guilty to charges of conspiring to defraud BellSouth, which oversees telephone service in nine Southern States. ----END ARTICLE---- ******************************************************************** ------------------------------ **END OF CuD #1.23** ********************************************************************