home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 1, Issue #1.10 (May 17, 1990) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer
- REPLY TO: TK0JUT2@NIU.bitnet
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views.
- --------------------------------------------------------------------
- DISCLAIMER: The views represented herein do not necessarily represent the
- views of the moderators. Contributors assume all responsibility
- for assuring that articles submitted do not violate copyright
- protections.
- --------------------------------------------------------------------
-
-
- * * * SPECIAL ISSUE * * *
- 2600 MAGAZINE'S COMMENTARY ON OPERATION SUN DEVIL
- (By Emmanuel Goldstein)
- --------------------------------------------------------------------
-
- %Moderator's note: One of the best commentaries regarding Operation Sun
- Devil comes from 2600 MAGAZINE. It is factual, raises many interesting
- issues, and presents information not yet printed in conventional media
- sources. We thank the 2600 MAGAZINE crew for letting us reproduce all of
- it.
-
- 2600 MAGAZINE CAN BE REACHED AT:
-
- 2600@well.sf.ca.us OR
- 2600 EDITORIAL DEPARTMENT
- P.O. BOX 99,
- MIDDLE ISLAND, NY 11953
- ********************************************************************
-
-
- ***************************************************************************
- THE FOLLOWING TWO ARTICLES ARE FROM THE JUST-RELEASED SPRING EDITION OF
- 2600 MAGAZINE, THE HACKER QUARTERLY. WE FEEL THAT THE CURRENT HAPPENINGS
- IN THE COMPUTER WORLD ARE EXTREMELY SIGNIFICANT FOR ANYONE WHO HAS ANY
- INTEREST IN COMMUNICATIONS AND/OR TECHNOLOGY. WE'D BE MOST INTERESTED IN
- ANY FEEDBACK ON THIS TOPIC.
- ***************************************************************************
-
- ************************
- ARTICLE ONE: AN OVERVIEW
- ************************
-
- A year ago, we told the stories of Kevin Mitnick and Herbert Zinn,
- two hackers who had been sent to prison. It was then, and still is today,
- a very disturbing chain of events: mischief makers and explorers imprisoned
- for playing with the wrong toys and for asking too many questions. We said
- at the time that it was important for all hackers to stand up to such gross
- injustices. After all, they couldn't lock us all up.
-
- It now appears that such an endeavor may indeed be on the agendas of some very
- powerful U.S. governmental agencies. And even more frightening is the
- realization that these agencies don't particularly care who or what gets swept
- up along with the hackers, as long as all of the hackers get swept up.
- Apparently, we're considered even more of a threat than we had previously
- supposed.
-
- In retrospect, this doesn't come as a great deal of a surprise. In fact, it
- now
- seems to make all too much sense. You no longer have to be paranoid or of a
- %particular political mindset to point to the many parallels that we've all
- been witnesses to. Censorship, clampdowns, "voluntary" urine tests, lie
- detectors, handwriting analysis, surveillance cameras, exaggerated crises that
- invariably lead to curtailed freedoms.... All of this together with the
- overall view that if you're innocent, you've got nothing to hide. And all made
- so much more effective through the magic of high tech. Who would you target as
- the biggest potential roadblock if not the people who understand the
- technology at work? It appears the biggest threats to the system are those
- capable of manipulating it.
-
- What we're about to tell you is frightening, plain and simple. You don't have
- to be a hacker to understand this. The words and ideas are easily translatable
- to any time and any culture.
-
- Crackdown
-
- "We can now expect a crackdown...I just hope that I can pull through this one
- and that my friends can also. This is the time to watch yourself. No matter
- what you are into.... Apparently the government has seen the last straw in
- their point of view.... I think they are going after all the 'teachers'...and
- so that is where their energies will be put: to stop all hackers, and stop
- people before they can become threats."
-
- This was one of the reactions on a computer bulletin board to a series of
- raids
- on hackers, raids that had started in 1989 and spread rapidly into early 1990.
- Atlanta, St. Louis, and New York were major targets in what was then an
- undetermined investigation.
-
- This in itself wouldn't have been especially alarming, since raids on hackers
- can almost be defined as commonplace. But this one was different. For the very
- first time, a hacker newsletter had also been shut down.
-
- Phrack was an electronic newsletter published out of St. Louis and distributed
- worldwide. It dealt with hacker and phone phreak matters and could be found on
- nearly all hacker bulletin boards. While dealing with sensitive material, the
- editors were very careful not to publish anything illegal (credit card
- numbers, passwords, Sprint codes, etc.). We described "Phrack World News" (a
- regular column of Phrack) in our Summer 1989 edition as "a must-read for many
- hackers". In many ways Phrack resembled 2600, with the exception of being sent
- via electronic mail instead of U.S. Mail. That distinction would prove to be
- Phrack's undoing.
-
- It now turns out that all incoming and outgoing electronic mail used by Phrack
- was being monitored by the authorities. Every piece of mail going in and every
- piece of mail coming out. These were not pirated mailboxes that were being
- used by a couple of hackers. These had been obtained legally through the
- school the two Phrack editors were attending. Privacy on such mailboxes,
- though not guaranteed, could always be assumed. Never again.
-
- It's fairly obvious that none of this would have happened, none of this could
- have happened had Phrack been a non-electronic magazine. A printed magazine
- would not be intimidated into giving up its mailing list as Phrack was. Had a
- printed magazine been shut down in this fashion after having all of their mail
- opened and read, even the most thick-headed sensationalist media types would
- have caught on: hey, isn't that a violation of the First Amendment?
-
- Those media people who understood what was happening and saw the implications
- were very quickly drowned out in the hysteria that followed. Indictments were
- being handed out. Publisher/editor Craig Neidorf, known in the hacker world as
- Knight Lightning, was hit with a seven count indictment accusing him of
- participating in a scheme to steal information about the enhanced 911 system
- run by Bell South. Quickly, headlines screamed that hackers had broken into
- the 911 system and were interfering with emergency telephone calls to the
- police. One newspaper report said there were no indications that anyone had
- died or been injured as a result of the intrusions. What a relief. Too bad it
- wasn't true.
-
- In actuality there have been very grievous injuries suffered as a result of
- these intrusions. The intrusions we're referring to are those of the
- government and the media. The injuries have been suffered by the defendants
- who will have great difficulty resuming normal lives even if all of this is
- forgotten tomorrow.
-
- And if it's not forgotten, Craig Neidorf could go to jail for more than 30
- years and be fined $122,000. And for what? Let's look at the indictment:
-
- "It was... part of the scheme that defendant Neidorf, utilizing a computer at
- the University of Missouri in Columbia, Missouri would and did receive a copy
- of the stolen E911 text file from defendant [Robert J.] Riggs [located in
- Atlanta and known in the hacker world as Prophet] through the Lockport
- [Illinois] computer bulletin board system through the use of an interstate
- computer data network.
-
- "It was further part of the scheme that defendant Neidorf would and did edit
- and retype the E911 Practice text file at the request of the defendant Riggs
- in order to conceal the source of the E911 Practice text file and to prepare
- it for publication in a computer hacker newsletter.
-
- "It was further part of the scheme that defendant Neidorf would and did
- transfer the stolen E911 Practice text file through the use of an interstate
- computer bulletin board system used by defendant Riggs in Lockport, Illinois.
-
- "It was further part of the scheme that the defendants Riggs and Neidorf would
- publish information to other computer hackers which could be used to gain
- unauthorized access to emergency 911 computer systems in the United States and
- thereby disrupt or halt 911 service in portions of the United States."
-
- Basically, Neidorf is being charged with receiving a stolen document. There is
- nothing anywhere in the indictment that even suggests he entered any computer
- illegally. So his crimes are receiving, editing, and transmitting.
-
- Now what is contained in this document? Information about how to gain
- unauthorized access to, disrupt, or halt 911 service? Hardly. The document
- (erroneously referred to as "911 software" by the media which caused all kinds
- of misunderstandings) is quoted in Phrack Volume 2, Number 24 and makes for
- one of the dullest articles ever to appear in the newsletter. According to the
- indictment, the value of this 20k document is $79,449. [See story that follows
- this one]
-
- Shortly after the indictments were handed down, a member of the Legion of Doom
- known as Erik Bloodaxe issued a public statement. "[A group of three hackers]
- ended up pulling files off [a Southern Bell system] for them to look at. This
- is usually standard procedure: you get on a system, look around for
- interesting text, buffer it, and maybe print it out for posterity. No member
- of LOD has ever (to my knowledge) broken into another system and used any
- information gained from it for personal gain of any kind...with the exception
- of maybe a big boost in his reputation around the underground. [A hacker] took
- the documentation to the system and wrote a file about it. There are actually
- two files, one is an overview, the other is a glossary. The information is
- hardly something anyone could possibly gain anything from except knowledge
- about how a certain aspect of the telephone company works."
-
- He went on to say that Neidorf would have had no way of knowing whether or not
- the file contained proprietary information.
-
- Prosecutors refused to say how hackers could benefit from the information, nor
- would they cite a motive or reveal any actual damage. In addition, it's widely
- speculated that much of this information is readily available as reference
- material.
-
- In all of the indictments, the Legion of Doom is defined as "a closely knit
- group of computer hackers involved in: a) disrupting telecommunications by
- entering computerized telephone switches and changing the routing on the
- circuits of the computerized switches; b) stealing proprietary computer source
- code and information from companies and individuals that owned the code and
- information; c) stealing and modifying credit information on individuals
- maintained in credit bureau computers; d) fraudulently obtaining money and
- property from companies by altering the computerized information used by the
- companies; e) disseminating information with respect to their methods of
- attacking computers to other computer hackers in an effort to avoid the focus
- of law enforcement agencies and telecommunication security experts."
-
- Ironically, since the Legion of Doom isn't a closely knit group, it's unlikely
- that anyone will be able to defend the group's name against these charges --
- any defendants will naturally be preoccupied with their own defenses.
- (Incidentally, Neidorf was not a part of the Legion of Doom, nor was Phrack
- a publication of LOD, as has been reported.)
-
- The Hunt Intensifies
-
- After learning of the Phrack electronic mail surveillance, one of the system
- operators of The Phoenix Project, a computer bulletin board in Austin, Texas,
- decided to take action to protect the privacy of his users. "I will be adding
- a secure encryption routine into the e-mail in the next 2 weeks - I haven't
- decided exactly how to implement it, but it'll let two people exchange mail
- encrypted by a password only known to the two of them.... Anyway, I do not
- think I am due to be busted...I don't do anything but run a board. Still,
- there is that possibility. I assume that my lines are all tapped until proven
- otherwise. There is some question to the wisdom of leaving the board up at
- all, but I have personally phoned several government investigators and invited
- them to join us here on the board. If I begin to feel that the board is
- putting me in any kind of danger, I'll pull it down with no notice - I hope
- everyone understands. It looks like it's sweeps-time again for the feds. Let's
- hope all of us are still around in 6 months to talk about it."
-
- The new security was never implemented. The Phoenix Project was seized within
- days.
-
- And the clampdown intensified still further. On March 1, the offices of Steve
- Jackson Games, a publishing company in Austin, were raided by the Secret
- Service. According to the Associated Press, the home of the managing editor
- was also searched. The police and Secret Service seized books, manuals,
- computers, technical equipment, and other documents. Agents also seized the
- final draft of a science fiction game written by the company. According to the
- Austin American-Statesman, the authorities were trying to determine whether
- the game was being used as a handbook for computer crime.
-
- Callers to the Illuminati bulletin board (run by Steve Jackson Games),
- received
- the following message:
-
- "Before the start of work on March 1, Steve Jackson Games was visited by
- agents
- of the United States Secret Service. They searched the building thoroughly,
- tore open several boxes in the warehouse, broke a few locks, and damaged a
- couple of filing cabinets (which we would gladly have let them examine, had
- they let us into the building), answered the phone discourteously at best, and
- confiscated some computer equipment, including the computer that the BBS was
- running on at the time.
-
- "So far we have not received a clear explanation of what the Secret Service
- was
- looking for, what they expected to find, or much of anything else. We are
- fairly certain that Steve Jackson Games is not the target of whatever
- investigation is being conducted; in any case, we have done nothing illegal
- and have nothing whatsoever to hide. However, the equipment that was seized is
- apparently considered to be evidence in whatever they're investigating, so we
- aren't likely to get it back any time soon. It could be a month, it could be
- never.
-
- "To minimize the possibility that this system will be confiscated as well, we
- have set it up to display this bulletin, and that's all. There is no message
- base at present. We apologize for the inconvenience, and we wish we dared do
- more than this."
-
- Apparently, one of the system operators of The Phoenix Project was also
- affiliated with Steve Jackson Games. And that was all the authorities needed.
-
- Raids continued throughout the country with reports of more than a dozen
- bulletin boards being shut down. In Atlanta, the papers reported that three
- local LOD hackers faced 40 years in prison and a $2 million fine.
-
- Another statement from a Legion of Doom member (The Mentor, also a system
- operator of The Phoenix Project) attempted to explain the situation:
-
- "LOD was formed to bring together the best minds from the computer underground
- - not to do any damage or for personal profit, but to share experiences and
- discuss computing. The group has always maintained the highest ethical
- standards.... On many occasions, we have acted to prevent abuse of systems....
- I have known the people involved in this 911 case for many years, and there
- was absolutely no intent to interfere with or molest the 911 system in any
- manner. While we have occasionally entered a computer that we weren't supposed
- to be in, it is grounds for expulsion from the group and social ostracism to
- do any damage to a system or to attempt to commit fraud for personal profit.
-
- "The biggest crime that has been committed is that of curiosity.... We have
- been instrumental in closing many security holes in the past, and had hoped to
- continue to do so in the future. The list of computer security people who
- count us as allies is long, but must remain anonymous. If any of them choose
- to identify themselves, we would appreciate the support."
-
- And The Plot Thickens
-
- Meanwhile, in Lockport, Illinois, a strange tale was unfolding. The public
- UNIX
- system known as Jolnet that had been used to transmit the 911 files had also
- been seized. What's particularly odd here is that, according to the electronic
- newsletter Telecom Digest, the system operator, Rich Andrews, had been
- cooperating with federal authorities for over a year. Andrews found the files
- on his system nearly two years ago, forwarded them to AT&T, and was
- subsequently contacted by the authorities. He cooperated fully. Why, then, was
- his system seized as well? Andrews claimed it was all part of the
- investigation, but added, "One way to get [hackers] is by shutting down the
- sites they use to distribute stuff."
-
- The Jolnet raid caused outrage in the bulletin board world, particularly among
- administrators and users of public UNIX systems.
-
- Cliff Figallo, system administrator for The Well, a public UNIX system in
- California, voiced his concern. "The assumption that federal agents can seize
- a system owner's equipment as evidence in spite of the owner's lack of proven
- involvement in the alleged illegal activities (and regardless of the
- possibility that the system is part of the owner's livelihood) is scary to me
- and should be to anyone responsible for running a system such as this."
-
- Here is a sampling of some of the comments seen around the country after the
- Jolnet seizure:
-
- "As administrator for Zygot, should I start reading my users' mail to make
- sure they aren't saying anything naughty? Should I snoop through all the files
- to make sure everyone is being good? This whole affair is rather chilling."
-
- "From what I have noted with respect to Jolnet, there was a serious crime
- committed there -- by the [federal authorities]. If they busted a system with
- email on it, the Electronic Communication Privacy Act comes into play.
- Everyone who had email dated less than 180 days old on the system is entitled
- to sue each of the people involved in the seizure for at least $1,000 plus
- legal fees and court costs. Unless, of course, the [authorities] did it by the
- book, and got warrants to interfere with the email of all who had accounts on
- the systems. If they did, there are strict limits on how long they have to
- inform the users."
-
- "Intimidation, threats, disruption of work and school, 'hit lists', and
- serious legal charges are all part of the tactics being used in this
- 'witch-hunt'. That ought to indicate that perhaps the use of pseudonyms wasn't
- such a bad idea after all."
-
- "There are civil rights and civil liberties issues here that have yet to be
- addressed. And they probably won't even be raised so long as everyone acts on
- the assumption that all hackers are criminals and vandals and need to be
- squashed, at whatever cost...."
-
- "I am disturbed, on principle, at the conduct of at least some of the federal
- investigations now going on. I know several people who've taken their systems
- out of public access just because they can't risk the seizure of their
- equipment (as evidence or for any other reason). If you're a Usenet site, you
- may receive megabytes of new data every day, but you have no common carrier
- protection in the event that someone puts illegal information onto the Net and
- thence into your system."
-
- Increased Restrictions
-
- But despite the outpourings of concern for what had happened, many system
- administrators and bulletin board operators felt compelled to tighten the
- control of their systems and to make free speech a little more difficult, for
- their own protection.
-
- Bill Kuykendall, system administrator for The Point, a public UNIX system in
- Chicago, made the following announcement to the users of his system:
-
- "Today, there is no law or precedent which affords me... the same legal rights
- that other common carriers have against prosecution should some other party
- (you) use my property (The Point) for illegal activities. That worries me....
-
- "I fully intend to explore the legal questions raised here. In my opinion, the
- rights to free assembly and free speech would be threatened if the owners of
- public meeting places were charged with the responsibility of policing all
- conversations held in the hallways and lavatories of their facilities for
- references to illegal activities.
-
- "Under such laws, all privately owned meeting places would be forced out of
- existence, and the right to meet and speak freely would vanish with them. The
- common sense of this reasoning has not yet been applied to electronic meeting
- places by the legislature. This issue must be forced, or electronic bulletin
- boards will cease to exist.
-
- "In the meantime, I intend to continue to operate The Point with as little
- risk
- to myself as possible. Therefore, I am implementing a few new policies:
-
- "No user will be allowed to post any message, public or private, until his
- name
- and address has been adequately verified. Most users in the metropolitan
- Chicago area have already been validated through the telephone number
- directory service provided by Illinois Bell. Those of you who received
- validation notices stating that your information had not been checked due to a
- lack of time on my part will now have to wait until I get time before being
- allowed to post.
-
- "Out of state addresses cannot be validated in the manner above.... The short
- term solution for users outside the Chicago area is to find a system closer to
- home than The Point.
-
- "Some of the planned enhancements to The Point are simply not going to happen
- until the legal issues are resolved. There will be no shell access and no file
- upload/download facility for now.
-
- "My apologies to all who feel inconvenienced by these policies, but under the
- circumstances, I think your complaints would be most effective if made to your
- state and federal legislators. Please do so!"
-
- These restrictions were echoed on other large systems, while a number of
- smaller hacker bulletin boards disappeared altogether. We've been told by some
- in the hacker world that this is only a phase, that the hacker boards will be
- %back and that users will once again be able to speak without having their
- words and identities "registered". But there's also a nagging suspicion, the
- feeling that something is very different now. A publication has been shut
- down. Hundreds, if not thousands, of names have been seized from mailing lists
- and will, no doubt, be investigated. The facts in the 911 story have been
- twisted and misrepresented beyond recognition, thanks to ignorance and
- sensationalism. People and organizations that have had contact with any of the
- suspects are open to investigation themselves. And, around the country,
- computer operators and users are becoming more paranoid and less willing to
- allow free speech. In the face of all of this, the belief that democracy will
- triumph in the end seems hopelessly naive. Yet, it's something we dare not
- stop believing in. Mere faith in the system, however, is not enough.
-
- We hope that someday we'll be able to laugh at the absurdities of today. But,
- for now, let's concentrate on the facts and make sure they stay in the
- forefront.
-
- ==> Were there break-ins involving the E911 system? If so, the entire story
- must be revealed. How did the hackers get in? What did they have access to?
- What could they have done? What did they actually do? Any security holes that
- were revealed should already have been closed. If there are more, why do they
- still exist? Could the original holes have been closed earlier and, if so, why
- weren't they? Any hacker who caused damage to the system should be held
- accountable. Period. Almost every hacker around seems to agree with this. So
- what is the problem? The glaring fact that there doesn't appear to have been
- any actual damage. Just the usual assortment of gaping security holes that
- never seem to get fixed. Shoddiness in design is something that shouldn't be
- overlooked in a system as important as E911. Yet that aspect of the case is
- being side-stepped. Putting the blame on the hackers for finding the flaws is
- another way of saying the flaws should remain undetected.
-
- ==> Under no circumstance should the Phrack newsletter or any of its editors
- be
- held as criminals for printing material leaked to them. Every publication of
- any value has had documents given to them that were not originally intended
- for public consumption. That's how news stories are made. Shutting down Phrack
- sends a very ominous message to publishers and editors across the nation.
-
- ==> Finally, the privacy of computer users must be respected by the
- government.
- It's ironic that hackers are portrayed as the ones who break into systems,
- read private mail, and screw up innocent people. Yet it's the federal
- authorities who seem to have carte blanche in that department. Just what did
- the Secret Service do on these computer systems? What did they gain access to?
- Whose mail did they read? And what allowed them to do this?
-
- Take Exception
-
- It's very easy to throw up your hands and say it's all too much. But the facts
- indicate to us that we've come face to face with a very critical moment in
- history. What comes out of this could be a trend-setting precedent, not only
- for computer users, but for the free press and every citizen of the United
- States. Complacency at this stage will be most detrimental.
-
- We also realize that one of the quickest ways of losing credibility is to be
- shrill and conspiracy-minded. We hope we're not coming across in this way
- because we truly believe there is a significant threat here. If Phrack is
- successfully shut down and its editors sent to prison for writing an article,
- 2600 could easily be next. And so could scores of other publications whose
- existence ruffles some feathers. We cannot allow this to happen.
-
- In the past, we've called for people to spread the word on various issues.
- More
- times than not, the results have been felt. Never has it been more important
- than now. To be silent at this stage is to accept a very grim and dark future.
-
- *************************************************
- ARTICLE TWO: A REVIEW OF THE E911 DOCUMENT ITSELF
- %*************************************************
-
- Documentation on the E911 System
- March 1988
- $79,449, 6 pages
- Bell South Standard Practice
- 660-225-104SV
- Review by Emmanuel Goldstein
-
- It otherwise would have been a quickly forgotten text published in a hacker
- newsletter. But due to all of the commotion, the Bell South E911 document is
- now very much in the public eye. Copies are extremely easy to come by, despite
- Bell South's assertion that the whole thing is worth $79,449.
-
- While we can't publish the actual document, we can report on its contents
- since
- it's become a news story in itself. But don't get excited. There really isn't
- all that much here.
-
- Certain acronyms are introduced, among them Public Safety Answering Point
- (PSAP), also known as Emergency Service Bureau (ESB). This is what you get (in
- telco lingo) when you dial 911. The importance of close coordination between
- these agencies is stressed. Selective routing allows the 911 call to be routed
- to the proper PSAP. The 1A ESS is used as the tandem office for this routing.
- Certain services made available with E911 include Forced Disconnect,
- Alternative Routing, Selective Routing, Selective Transfer, Default Routing,
- Night Service, Automatic Number Identification, and Automatic Location
- Identification.
-
- We learn of the existence of the E911 Implementation Team, the brave men and
- women from Network Marketing who help with configuration in the difficult
- cutover period. This team is in charge of forming an ongoing maintenance
- %subcommittee. We wouldn't want that juicy tidbit to get out, now would we?
-
- We learn that the Switching Control Center (SCC) "is responsible for
- E911/1AESS
- translations in tandem central offices". We're not exactly shocked by this
- revelation.
-
- We also find out what is considered a "priority one" trouble report. Any link
- down to the PSAP fits this definition. We also learn that when ANI fails, the
- screens will display all zeroes.
-
- We could go on but we really don't want to bore you. None of this information
- would allow a hacker to gain access to such a system. All it affords is a
- chance to understand the administrative functions a little better. We'd like
- to
- assume that any outside interference to a 911 system is impossible. Does Bell
- South know otherwise? In light of their touchiness on the matter, we have to
- wonder.
-
- We'd be most interested in hearing from people with more technical knowledge
- on
- the subject. What does this whole escapade tell us? Please write or call so
- the
- facts can be brought forward.
-
-
-
- *******************************************************************************
- 2600 MAGAZINE WANTS TO HEAR YOUR THOUGHTS AS WELL AS ANY ADDITIONAL FACTS YOU
- MAY BE ABLE TO SHARE WITH US. POST PUBLIC COMMENTS HERE. YOU CAN SEND PRIVATE
- MAIL TO 2600@well.sf.ca.us OR 2600 EDITORIAL DEPARTMENT, P.O. BOX 99, MIDDLE
- ISLAND, NY 11953. IF YOU WANT TO CALL US, OUR PHONE NUMBERS ARE:
- (516) 751-2600 (VOICE/MACHINE) OR (516) 751-2608 (FAX).
- *******************************************************************************
-
- 3 responses total.
-
-
- Topic 60: 2600 Magazine Reports on Secret Service Hacker Raids of 1990
- # 1: Jef Poskanzer (jef) Tue, May 15, '90 (09:23) 3 lines
-
- Thanks for posting that. In case anyone skipped reading it because it
- was posted in response 0 and therefore has no line count, it is about
- 500 lines long.
-
- Topic 60: 2600 Magazine Reports on Secret Service Hacker Raids of 1990
- # 2: Jerry (jmcarlin) Tue, May 15, '90 (10:10) 4 lines
-
-
- One point that could be followed up on is any relationship between these
- cases and such things as the "Pentagon Papers" episode. There are certainly
- similarities.
-
- Topic 60: 2600 Magazine Reports on Secret Service Hacker Raids of 1990
- # 3: Mondo 2000 (rusirius) Tue, May 15, '90 (12:43) 3 lines
-
- I hope that some of our "mainstream" journalists will say something about
- the serious violations of any kind of rights, particularly in the confisca-
- ting of computers.
-
- =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
- + END THIS FILE +
- +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
- !