home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 2, Issue #2.03 (Sepember 14, 1990) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith
- USENET readers can currently receive CuD as alt.society.cu-digest.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. It is assumed that non-personal mail to the moderators may be
- reprinted, unless otherwise specified. Readers are encouraged to submit
- reasoned articles relating to the Computer Underground.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent the
- views of the moderators. Contributors assume all responsibility
- for assuring that articles submitted do not violate copyright
- protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Len Rose's experience with the Secret Service
- File 3: Tim Wolfson's address, cite list
- File 4: A comment on Zod's case
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ----------------------------------------------------------------------
-
- ********************************************************************
- *** CuD #2.03, File 1 of 4: Moderator's corner ***
- ********************************************************************
-
- Date: Sepember 14, 1990
- From: Moderators
- Subject: Moderators' Corner
-
- ++++++++++
- In this file:
- 1. BBS AND THE LAW PAPER ADDED TO ARCHIVES
- 2. GATEWAY TO USENET
-
- ++++++++++++++++++
- BBS and the Law Paper added to Archives
- ++++++++++++++++++
-
- We have added a paper by Mike Riddle, a law student, to the CuD archives.
- It's entitled: "The Electronic Pamphlet--Computer Bulletin Boards and the
- Law." It provides a nice overview of privacy and other issues and is worth
- reading.
-
- ++++++++++++++++
- Gateway to Usenet Newsgroup
- ++++++++++++++++
-
- A Gateway service is available for people who cannot read or post to the
- Usenet newsgroup comp.org.eff.talk.
-
- To subscribe send mail to EFF-REQUEST@NETSYS.COM.
- You will receive a copy of every article appearing in the newsgroup.
-
- To post to comp.org.eff.talk send your article to EFFTALK@NETSYS.COM. It
- will be gatewayed automatically without modification.
-
- This service has no connection with the Electronic Frontier Foundation.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Date: Tue, 11 Sep 90 01:34:49 -0400
- From: len@NETSYS.NETSYS.COM
- Subject: Len Rose's experience with the Secret Service
-
- ********************************************************************
- *** CuD #2.03: File 2 of 4: Len Rose's Experience with the S.S. ***
- ********************************************************************
-
- [Jim Thomas suggested I write something for the digest and I have been
- casting around for ideas.. All I really can think about nowadays is my
- own situation. I have become quite a bore to my friends I am sure.]
-
- Please excuse any vestiges of self-pity you may detect.
-
- The Day It Happened:
-
- I left my home around eleven am to drive down to Washington DC to meet
- with a potential client. After several hours with them , I started the
- drive back through the rush hour traffic. It was just a few minutes
- after five pm that I pulled into my driveway in Middletown Md. I remember
- getting out of the car and noticing that someone was in the back yard.
-
- He was wearing a blue wind breaker and was neatly dressed. We had been
- trying to sell a Jeep , and I assumed he was interested in buying the
- car. "What can I do for you" I asked.. I remember being slightly pissed
- that this person had just been hanging around the back of my home. He
- flipped his jacket aside and I saw a badge on his belt and a gun
- in a shoulder holster. "Please go into the house" he replied. I was
- pretty shaken and asked "What have I done wrong?" .. without answering
- the question, he took my arm and sort of marched me into the front door
- of my home. Upon entering, two agents pulled me up from the foyer, and
- put me against the wall while searching me. Then I remember being shown
- the front of a search warrant and then taken into my master bedroom.
- The door was shut and I didn't leave the room for more than five hours.
-
- They introduced themselves, and I asked them what this was about. Foley
- replied "We will ask the questions" .. "Do you know any of these hackers?"
- I was asked about 10 or 15 names, and out of them I said I recognized
- one or two from seeing articles here and there but hadn't had any contact
- with them. I remember Foley getting angry. "You had better cooperate,
- let's try again". I reiterated that I knew none of them. He said "You
- are not telling us the truth" ... I told him I had little contact with
- hackers and had been away from that scene for quite some time. He then
- scoffed and said "You have a hacker handle don't you... What is It?"
- I paused, and then replied "Terminus, but I haven't used it or gone by
- that in a very long time" He said "Right, like last month..." I thought
- about that and then I started to feel sick inside.. I knew that I had
- sent Craig Neidorf a copy of login.c which had been modified to perform
- certain functions that basically made it a trojan horse. I used that
- handle since I didn't want the world to know that Len Rose was sending
- someone proprietary source code through mail.. He shoved a photocopy of a
- printout under my nose and asked me if I recognized it.. I looked at it
- and said, "Yes.. " .. He asked me If I had made the modifications and
- placed certain comments within the source. "Yes" again. "But I never used
- it" I blurted out.
-
- "We are only interested in the 911 software and Rich Andrews" they said.
- [I never had anything to do with 911 software and after an extensive search
- of my systems that night by a certain AT&T employee they seemed to agree.]
-
- "Did Rich Andrews send you a copy of the 911 software?" Foley asked me.
- I told them no, no one had sent me anything of the sort. I told them
- that Rich had found some portion of 911 software on his system and
- sent it to Charley Boykin at killer to see if it was serious. Rich had
- told me before, and I sort of approved of the idea. I remember Rich
- saying that he'd had no response whatsoever..
-
- [I wish he had told me the truth, but that is for him to explain why]
-
- "We want dirt on Rich Andrews.." Special Agent Timothy Foley said.
- "We feel he has been less then cooperative.." and "Do you know he is
- a convicted felon" I replied "Yes" but he is a good friend and I
- know he hasn't done anything wrong. He is not involved with hackers.
- Foley asked me about any dealings I had with Rich. I realized then
- that lying wouldn't do me any good, so I told them everything I could
- remember. What I had to say must not have been good enough, as Foley
- kept saying I wasn't going to get anywhere unless I told them all the
- truth. It took me a long time to convince them that was all I knew.
-
- During the interrogation, my legal problems in Virginia were brought up,
- and I mentioned that I might be acquitted. Jack Lewis said "If you get
- off in Virginia, I'll make sure we burn you for this" .. I felt then
- that I was completely shut off from reality.
-
- Foley then asked me to tell them anything illegal I had done.
- Jack Lewis said "It would be better if you tell us now, because if we
- discover anything else later it will be very serious". By this time, I
- was scared and I remember telling them that I had copies of AT&T System V
- v3.1, System V v3.2 and various other pieces of software which had been
- given to me by certain employees of AT&T (without the benefit of a license
- agreement). "Where is it" they asked.. I told them that I had a couple
- 9 track tapes with prominent labels on a tape rack.
-
- I remember asking several times to see my wife, and to go to the bathroom.
- Each time I was told I couldn't. If I hadn't been so scared I would have
- asked for an attorney, but my mind had shutdown completely. About 6 hours
- later I was finally led out of my bedroom and told to sit at the kitchen
- table and not to move. Foley and Lewis sat with me and put a sheet of
- paper in front of me and told me to write a statement. "What do you want
- me to write about" I asked. Foley said "Everything you told us about
- Rich Andrews and also everything about the Trojan horse login program."
- "Make sure you mention the System V source code"..
-
- So, as they were finishing loading up the moving truck, I sat there and
- wrote about two pages of information.
-
- It was about midnight, when they left, but not before handing me a
- subpoena to appear before the Grand Jury.
-
- They told me to tell Rich Andrews my main Unix system had crashed, and
- not to let him know that the SS had been there. I felt pretty bad about
- this because I kept thinking they were going to get him. He must have
- called siz or seven times the day after the "raid". I couldn't tell him
- anything, since I assumed my line was tapped.
-
- I remember going outside as they were starting to leave and looking into
- the back of the moving truck. The way some of the equipment was packed, I
- knew it wouldn't survive the trip into Baltimore. I asked for permission
- to re-pack several items (CPUs,Hard Disks, and a 9 track drive) and received
- it. As I watched my belongings pull away , I remember feeling so helpless,
- and confused. It was only then did it sink in that every material possession
- that really mattered to me (other than my home), was gone. All I had to
- show for it was a sketchy 20 page inventory..
-
- Later, my wife told me what had gone on until I came home. The SS
- arrived around 3 pm, and had knocked on the door. She opened the door,
- and 5 or 6 agents pushed her back into the foyer. They took her by the
- arms and moved her over to a sofa in the living room. They had a female
- agent with them, and this person was detailed to stay with her. She was
- not allowed to make phone calls, or answer them (until much later in the
- evening.) My children were also placed there. My son, who was 4 at the
- time refused to submit to their authority (guns didn't scare him) would
- get up often and follow agents around. From what my wife recalls, they
- were amused at first , then later became less enthusiastic about that.
-
- She wasn't allowed to feed the kids until after I had been released
- from the interrogation session. She remembers getting up several times,
- to go to the bathroom or to retrieve diapers,etc. and being told to get
- back onto the sofa. The female agent even followed her into the bathroom.
- The massive search of every nook and cranny of our home encompassed much
- more than computer equipment. To this day, I feel there is a direct
- link between my previous legal problem in Virginia, and the extent of the
- search that day. In fact, the SS had obtained items seized from me by
- Virginia and had them in their posession before the raid ever took place.
-
-
- I remember going down to the SS office a couple days later to
- voluntarily answer the subpoena. I set up my equipment for them. Although
- they had labled most cables and connectors, there was some confusion.
- I remember showing them how to use my systems, and in particular how to
- do a recursive directory listing of every file contained within. After a
- while, once they made sure they had backups , I was allowed to type a few
- commands at a terminal in order to retrieve an ascii text file (a resume).
-
- Later, while being escorted back out to the front of their offices,
- I saw a large room filled with stacks of boxes and equipment cases which
- had constituted the entire sum of my office and all equipment,software,and
- documentation. I was feeling pretty numb, and remember asking the agents
- there to please take care of everything, since I hoped to get it back.
- In reflection, it seems pretty pitiful.
-
- It was this day that they told me I would be prosecuted, and I remember
- driving back from Baltimore feeling betrayed. Even though I had completely
- cooperated with them, and had been told I would not be prosecuted. When I
- got home, I was crying .. I couldn't handle this anymore. My sister was
- there and I remember she gave me three vallium.. I calmed down and in
- fact got pretty high from it.
-
- [The following is something the SS allege I did]
-
- Allegedly from a phone booth that night I called Rich Andrews and warned
- him to get rid of any source code or software he shouldn't have.. At this
- time I was also alleged to have told Rich that I was leaving the country,
- and would go to Korea with my wife and kids. [If I did do this, I never
- said anything about leaving] .. They apparently had either tapped his line,
- or he told them about my call. [I would have been stupid to say this, since
- Korea has extradition treaties with the US]
-
- My Arrest:
-
- Several days later, I received a sudden call from Special Agent John Lewis
- and he told me to come down and pick up my fax machine. (I had been
- pestering them about it so I could fax my resume out to headhunters so I
- could find a job)..
-
- [ Ironically, I had been hired a week before by Global Computer Systems,
- in New Jersey to work as a contractor at AT&T's 3B2 Hotline in South
- Plainfield New Jersey .. I knew that after this AT&T wouldn't have anything
- to do with me and in fact was informed so the night of the raid ]
-
- Upon entering the SS office (Feb. 6) around 5 pm, I waited outside in
- the waiting room.. I had been doing some house painting and wasn't dressed
- very well. Jack Lewis came out and brought me back to one of their offices
- He held out his hand (as if to shake it) and instead put hand cuffs on my
- hand. He then locked the other to an eyebolt on the desk. He sat down
- across from me and told me to empty my pockets.. I complied, and then he
- started writing an inventory of my posessions.
-
- Jack Lewis looked up from his writing and said "You fucked us,Len!"
-
- "What do you mean?" I said. "You called Rich Andrews, and warned him to
- get rid of anything he shouldn't have,you fucked us!" .. I didn't reply.
- He then told me to pull my shoestrings out of my sneakers, and I did..
- He called another agent in to witness the contents of his inventory,sealed
- the envelope and then told me I was going to jail.. About 15 minutes later
- he released the handcuffs from the desk, and put my arms behind my back and
- handcuffed them.
-
- I was led into the hallway, while he finished some last minute details..
- He was nice enough to let me make a phone call, when I asked him..I promptly
- called a friend in Philadelphia. I knew he would know what to do.. Because
- my wife didn't speak English well, and would also have been hysterical
- I couldn't count on her to be much help.
-
- They drove me over to the Baltimore City Jail,told the bored looking turnkey
- at the desk to hold me for the night.
-
- I was pretty hungry but I had missed the evening meal , and despite
- repeated pleas to make my "phone call" the jailers ignored me.
- The people in the cells next to mine were an interesting lot.
- One was in for killing someone, and the other was in for a crack bust..
- Someone in the cell block was drugged out, and kept screaming most of
- the night.. I didn't sleep much that night, and the with the cold steel
- slab they call a bed it wouldn't have been possible anyway. Sometime
- around 9 am a jailer appeared and let me out.
-
- I was then turned back over to the SS and they drove me back to the
- Federal Building... They put me in another holding cell and I was there
- for about 2 hours. A Federal Marshal came and took me to a court room,
- where I was charged with a criminal complaint of transporting stolen
- property over interstate lines with a value of $5000 or more.
-
- The conditions for my release were fairly simple..
-
- Sign a signature bond placing my home as collateral, and surrender
- my passport. Fortunately my wife had come down earlier and Agent Lewis
- had told her to get my passport or I wouldn't be released .. She drove
- the 120 mile round trip and found it.. She returned, I was brought down
- to the courtroom and the magistrate released me.
-
- We retained an attorney that day, and several weeks later they agreed to
- drop all charges. I am told this was to give both sides some time to work
- out a deal. Against the better judgement of my (then) attorney I offered to
- meet with the Assistant U.S. attorney if they would bring someone down from
- Bell Labs. My thinking was that surely a Unix hacker would understand the
- ramifications of my changes to the login.c source and corroborate my
- explanations for the public domain password scanner. They also wanted me
- to explain other "sinister" activities , such as why I had an alias for
- the Phrack editors, and I knew a Unix person from the labs would know what
- I meant when I said it made it easier for people to get to .BITNET sites.
-
-
- I was a complete fool,and the person from Bell Labs got me in even worse
- trouble when he told them I had other "trojan" software on the systems.
- He was referring to a public domain implementation of su.c which David Ihnat
- (chinet) had written to allow people to share su access without actually
- knowing the root password. "But it is public domain software," I cried.
- The Bell Labs person turned and told David King (Asst. US Attorney) that
- I was lying. He went on to say that there was a considerable amount of
- R&D source code on my machines. Things that no one should possess outside of
- AT&T, like Korn shell and AwkCC.
-
- My attorney (Mr. Carlos Recio of Deso, and Greenberg - Washington DC) was
- furious with me. All he could say was that "I told you so.." and I realized
- I had been stupid. I had hoped if I could explain the situation to the govt.
- and have someone from AT&T verify what I said was true, then they would
- realize I was just a typical Unix freak, who hadn't been involved in anything
- more sinister than possibly having things I shouldn't have.
-
- After a few months the best deal Mr. King offered was for me to plead
- guilty to 2 felony counts (Computer Fraud) and I would receive a sentence
- of 17 months in prison. I refused to take the deal, [ Perhaps I may live
- to regret that decision when my trial begins in 91.. ]
-
- In May I was formally charged with 5 felony counts.. The rest is history..
-
- Present Day:
-
- In better times I never lacked for work, and lived in a world where I
- spent more on phone bills per month (uucp traffic), than I have earned
- in the last four months.
-
- I am sitting here (rather lying, since I cannot get up) by the laptop
- computer (on loan to me from a friend) . Lately, I have grown to feel
- that without this little laptop and it's modem linking me to the network
- I would have been driven mad a long time ago.Reading Usenet news has been
- my only solace lately. During the day I spend hours calling around to all
- the head hunters asking for work.Since I still have a fax machine,
- I am able to fax my resume around. So far, I haven't had much luck in
- finding anything at all. Since all this happened , it seems that I have
- been blacklisted. A few companies expressed interest, but later called
- back and asked me if I was the "LoD hacker" and I told them yes.. They
- weren't interested anymore (I cannot blame them).
-
- I guess the Unix Today articles have cost me more than any of the others..
- I lost a great contract ($500 a day) with a major bank in Manhattan when
- they saw the first article.. In various articles from various newspapers,
- I have been called the "Mastermind of the Legion of Doom" and other bizarre
- things.
-
- The lies told by the US Attorney in Baltimore in their press release
- were printed verbatim by many papers.. The usual propaganda about the
- Legion's activities in credit card fraud, breakins and the threat to the
- 911 system were all discussed in that press release and cast a bad light
- on me.
-
- I have had the good fortune to have a friend in Philadelphia who has
- loaned me office space in his firm's building. Such an arrangement lends
- an air of credibility to Netsys Inc. Too bad I have no clients or contracts.
-
- Since I broke my leg pretty badly (The doctor says I will be in a cast for
- six months and maybe some surgery) ,I haven't been able to visit the
- "office" but I have an answering machine there and I check my calls daily.
-
- We (my wife and two children) moved to the Philadelphia suburbs in order
- to put as much distance as possible from the SS Agent John "Jack" Lewis
- who is based in Baltimore.
-
- I realize that the SS have offices in every city, and agents to spare
- but it made me feel better knowing that he is in Baltimore and I am here.
-
- Anyway, at this point I am trying to find a few system admin jobs, and
- would take any salary they offered me. I am scared about the next few
- months since I cannot even get a job as a laborer or a 7-11 clerk since
- my leg is screwed.. My wife (who has a liberal arts degree) is looking
- for a job in this area.. We hope she can get a job working minimum wage
- in some department store or as a waitress.
-
- We have enough money to last another month I guess. Then I am not sure
- what we will do, since we haven't any relatives who will take us in.
- I have never been un-employed since leaving high school, and It's a
- pretty bad feeling. One day , If I survive this, I will never forget
- what has happened. I can't help feeling that there is a thin veneer
- of freedom and democracy in this country, and agencies like the Secret
- Service are really far more powerful than anyone had realized.
-
- I know that my friends within AT&T (E. Krell for one) feel I have
- "stolen" from their company. I can only laugh at this attitude since
- I have probably done more for AT&T than he has. Those of you who knew
- me before can attest to this. While it was "wrong" to possess source code
- without a license,I never tried to make money from it. I wrote a Trojan
- Horse program, which in all honesty was done to help defend my own systems
- from attack (it is currently installed as /bin/login on my equipment).
- Any allegations that I installed it on other systems are completely false.
-
- [ in fact, most of the source code was given to me by AT&T employees ]
-
- As far as the public domain password scanner program, well.. I realize
- that most of you know this, but items far more powerful can be obtained
- from any site that archives comp.sources.unix,and comp.sources.misc ..
- I used it as a legitimate security tool when doing security audits on
- my own systems and clients. It wasn't very good really, and considering it
- was obsolete (System V 3.2 /etc/shadow) anyway, it's usefulness was limited.
-
- Since the SS will be reading this article with interest, I want to
- point out that I will fight you to the end. Someday I hope you will
- realize you made an honest mistake and will rectify it. Perhaps there
- was some justification I am not aware of, but I doubt it. If I have to
- go to prison for this, perhaps it will benefit society. Who knows what
- what Len Rose would have done if left to continue his criminal pursuits.
-
- I hope to get my equipment, and software back and then re-start my life.
- There have been repeated motions to get my equipment back , but the judge
- has summarily denied them saying I will commit crimes If I get it back.
- I have offered to assist the SS in saving evidence,and to sign any agreement
- they choose regarding validity of that evidence.
-
- I may take up begging soon , and ask for help from someone who is rich.
- It's going to be winter soon and I don't look forward to being on the
- street.
-
- Len
-
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
- Date: Mon, 10 Sep 90 22:24:24 -0400
- From: Timothy C Wolfson TTUNIX.BITNET
- Subject: Tim Wolfson's address, cite list
-
- ********************************************************************
- *** CuD #2.03: File 3 of 4: Bibliography of Law Articles ***
- ********************************************************************
-
-
- Below is a list of articles published in legal periodicals that may be of
- interest to your readers. This list is in no way meant to be all inclusive,
- I'm sure I've left out (or not yet discovered) many pertinent pieces.
-
-
-
- 24 Am. Crim. L. Rev. 623 MAIL AND WIRE FRAUD Winter, 1987
- Kimi N. NuraKami 24 AMCRLR 623
-
- PLI Order No. C4-4175 Civil RICO 1986
- PREDICATE ACTS OF MAIL FRAUD AND WIRE FRAUD June 1, 1986 Brad D. Brian
- 141 PLI/Lit 79
-
- 63 U. Det. L. Rev. 843
- COPYRIGHT--Bootleg Records--Copyright infringement in the form of unauthorized
- phonograph recordings, when such records are shipped interstate, does not fall
- within the reach of the National Stolen Property Act. Dowling v. United
- States, 105 S. Ct. 3127 (1985). Summer, 1986 Kenneth Adamczyk
-
- 13 Legal Econ. 44 ELECTRONIC BULLETIN BOARD SYSTEM PROVER BBS
- November/December, 1987 Rees W. Morrison 13 LEGEC 44
-
- 39 Fed.Com.L.J. 217
- An Electronic Soapbox: Computer Bulletin Boards and the First Amendment
- October, 1987 Eric C. Jensen 39 FCLJ 217
-
- Public Utilities Fortnightly The March of Events November 9, 1989
- NEW MEXICO ELECTRONIC BULLETIN BOARD AVAILABLE AT COMMISSION
- 124 No. 10 Fortnight 50
-
- PLI Order No. G4-3847
- How to Handle Basic Copyright and Trademark Problems A Satellite Program
- PATENT AND TRADEMARK OFFICE: PROSECUTING APPLICATIONS FOR TRADEMARK
- REGISTRATION, AND INTER PARTES PRACTICE BEFORE THE TRADEMARK TRIAL AND APPEAL
- BOARD February 13, 1990 Roberta S. Bren 288 PLI/Pat 135
-
- PLI Order No.G4-3844
- Patents, Copyrights, Trademarks, and Literary Property Course Handbook Series
- THE LICENSING OF COMPUTER SOFTWARE PROGRAMS January 1, 1990
- Gerald E. Lester 287 PLI/Pat 293
-
- PLI Order No. 64-3839 Communications Law 1989
- THE MEDIA AND THE COMMUNICATIONS REVOLUTION: AN OVERVIEW OF THE REGULATORY
- FRAMEWORK AND DEVELOPING TRENDS November 9,1989 Richard E. Wiley
- 283 PLI/Pat 327
-
- 57 Geo. Wash. L. Rev. 1459
- THE FIRST AMENDMENT AND TECHNOLOGICAL CHANGE: THE NEW MEDIA HAVE A MESSAGE
- August 1, 1989 M. Ethan Katsh 57 GWLR 1459
-
- 75 A.B.A.J. 82 THE FUTURE OF TECHNOLOGY IN LAW FIRMS July, 1989
- Jon E. Klemens 75 ABAJ 82
-
- 44 Bus. Law. 1081 ELECTRONIC FUND TRANSFERS May, 1989
- David B. Goldstein, Edward L. Rubin, Dewey B. Morris,
- Charles P. Seibold, Richard P. Kessler, Jr., Richard S. Wyde.
-
- PLI Order No. G4-3831 Protecting Trade Secrets 1989
- PROTECTING TRADE SECRETS: LEGAL THEORIES April 1, 1989 Michael J. Hutter
- 269 PLI/Pat 9
-
- PLI Order No. A4-4255
- Law Practice Management for the Solo and Small Office Practitioners
- Conquer the Computer It's your ticket to tomorrow and the key to a more
- effective and competitive practice April 1, 1989 JAMES A. EIDELMAN
- 492 PLI/Comm 353
-
- 54 W.Educ.L.Rep. 761
- COMPUTER VIRUSES: LEGAL AND POLICY ISSUES FACING COLLEGES AND UNIVERSITIES
- 1989 David R. Johnson, J.D. Thomas P. Olson, J.D.,
- David G. Post, Ph.D., J.D. 54 WELR 761
-
- PLI Order No. G4-3821/3 Communications Law 1988
- THE MEDIA AND THE COMMUNICATIONS REVOLUTION: AN OVERVIEW OF THE REGULATORY
- FRAMEWORK AND DEVELOPING TRENDS November 10, 1988 Richard E. Wiley
- 262 PLI/Pat 681
-
- XXIX B.C.L.Rev. 803
- COPYRIGHTED SOFTWARE: SEPARATING THE PROTECTED EXPRESSION FROM UNPROTECTED
- IDEAS, A STARTING POINT September, 1988 J. Dianne Brinson
- XXIX BCLR 803
-
- 21 J. Marshall L. Rev. 735
- COMMUNICATIONS TECHNOLOGY: NEW CHALLENGES TO PRIVACY Summer, 1988
- Fred W. Weingarten 21 JMARLR 735
-
- 63 N.Y.U.L.Rev. 416
- DON'T TOUCH THAT DIAL: RADIO LISTENING UNDER THE ELECTRONIC COMMUNICATIONS
- PRIVACY ACT OF 1986 May, 1988 Fred Jay Meyer 63 NYULR 416
-
- 14 Legal Econ. 30 ELECTRONIC COMMUNICATIONS A LAWYER'S PRIMER
- April, 1988 Carl G. Roberts Rees W. Morrison Greg H. Schlender
- 14 LEGEC 30
-
- PLI Order No. G4-3804
- Telecommunications 1987: Current Developments In Policy and Regulation
- AN OVERVIEW OF INTERNATIONAL ISSUES December 10, 1987 P. Michael Nugent
- 244 PLI/Pat 145
-
- PLI Order No. G4-3804
- Telecommunications 1987: Current Developments In Policy and Regulation
- REALITY RELEARNED December 10, 1987 Lawrence W. DeMuth, Jr.
- 244 PLI/Pat 133
-
- 24 Am. Crim. L. Rev. 623 MAIL AND WIRE FRAUD Winter, 1987
- Kimi N. NuraKami 24 AMCRLR 623
-
- 13 Legal Econ. 28 LEGAL TECHNOLOGY: PRESENT AND FUTURE TRENDS
- November/December, 1987 Gordon L. Jacobs 13 LEGEC 28
-
- 73 A.B.A.J. 50 HOW COMPUTERS MADE US BETTER LAWYERS May 15, 1987
- Joshua Stein 73 ABAJ 50
-
- 72 Iowa L.Rev. 1015
- The National Security Agency and Its Interference with Private Sector Computer
- Security May, 1987 Renae Angeroth Franks 72 IALR 1015
-
- 27 Va. J. Int'l. L. 575
- Statutory Improvements to the Foreign Availability Process for High Technology
- National Security Export Controls Spring, 1987 Richard T. Horan, Jr.
-
- 42 Bus.Law. 614 COMPUTER LAW February, 1987
- Bernard G. Helldorfer, Harold J. Daw, William E. Hirschberg, Darrell K.
- Fennell, and Andrew W. Hoffmann 42 BUSLAW 614
-
- 67 B.U.L.Rev. 179
- WARRANT REQUIREMENT FOR SEARCHES OF COMPUTERIZED INFORMATION January, 1987
- C. Ryan Reetz
-
- 40 Vand.L.Rev. 1 Free Speech, Copyright, and Fair Use January, 1987
- L. Ray Patterson
-
- 10 U.Ark.Little Rock L.J. 55
- WHAT IS COMPUTER CRIME, AND WHY SHOULD WE CARE? 1987-88
- Michael C. Gemignani 10 UARLRLJ 55
-
- 13 Rutgers Computer And Tech.L.J. 451
- THE ELECTRUNIC COMMUNICATIONS PRIVACY ACT OF 1986: THE CHALLENGE OF APPLYING
- AMBIGUOUS STATUTORY LANGUAGE TO INTRICATE TELECOMMUNICATION TECHNOLOGIES
- 1987 Russell S. Burnside 13 RUCTLJ 451
-
- PLI Order No. G4-3790 Protecting Trade Secrets 1986
- LEGAL THEORIES AND RECENT DEVELOPMENTS May 1, 1986 Michael J. Hutter
- 224 PLI/Pat 11
-
- 20 Colum.J.L.Soc.Prob. 89
- Teleinformatics, Transborder Data Flows and the Emerging Struggle for
- Information: An Introduction to the Arrival of the New Information Age 1986
- ANTHONY PAUL MILLER
-
- Judicature Articles August-September 1989
- TECHNOLOGY IN APPELLATE COURTS: THE NINTH CIRCUIT'S EXPERIENCE WITH ELECTRONIC
- MAIL Stephen L. Wasby 73 JUDICATURE 90
-
- Judicature Focus August-September, 1988
- TECHNOLOGY COMES TO THE COURTS Paul Nejelski 72 JUDICATURE 136
-
- 38 Cath.U.L.Rev. 401
- THE FIRST AMENDMENT INVALIDITY OF FCC OWNERSHIP REGULATIONS Winter, 1989
- Jonathan W. Emord 38 CATHULR 401
-
- 38 Cath.U.L.Rev. 299
- RED LIONS, TIGERS AND BEARS; BROADCAST CONTENT REGULATION AND THE FIRST
- AMENDMENT Winter, 1989 Charles D. Ferris Terrence J. Leahy
- 38 CATHULR 299
-
- 38 Cath.U.L.Rev. 471
- THE DIVERSITY PRINCIPLE AND THE MFJ INFORMATION SERVICES RESTRICTION: APPLYING
- TIME-WORN FIRST AMENDMENT ASSUMPTIONS TO NEW TECHNOLOGIES Winter, 1989
- Richard A. Hindman 38 CATHULR 471
-
- 57 Geo. Wash. L. Rev. 1459
- THE FIRST AMENDMENT AND TECHNOLOGICAL CHANGE: THE NEW MEDIA HAVE A MESSAGE
- August 1, 1989 M. Ethan Katsh 57 GWLR 1459
-
- 57 Geo. Wash. L. Rev. 1495
- ON UNDERSTANDING THE FIRST AMENDMENT STATUS OF CABLE: SOME OBSTACLES IN THE WAY
- August 1, 1989 Jerome A. Barron 57 GWLR 1495
-
- 38 Emory L.J. 715
- THE ILLEGITIMACY OF THE PUBLIC INTEREST STANDARD AT THE FCC July 1, 1989
- William T. Mayton 38 EMORYLJ 715
-
- PLI Order No. G4-3826/1
- Cable Television Law 1989: Dealing with the New Challenges
- TELEPHONE COMPANY ENTRY INTO VIDEO PROGRAMMING March 1, 1989 Frank W. Lloyd
- 266 PLI/Pat 9
-
- 87 Mich.L.Rev. 499
- FREE SPEECH AND THE 'ACID BATH': AN EVALUATION AND CRITIQUE OF JUDGE RICHARD
- POSNER'S ECONOMIC INTERPRETATION OF THE FIRST AMENDMENT November, 1988
- Peter J. Hammer 87 MILR 499
-
- 86 Mich.L.Rev. 1269 QUESTIONING BROADCAST REGULATION May, 1988
- Jonathan Weinberg 86 MILR 1269
-
- 1988 Duke L.J. 329 CABLE TELEVISION AND THE FREEDOM OF EXPRESSION
- April/June, 1988 Daniel Brenner 1988 DUKELJ 329
-
- VI Yale L. Pol'y Rev. 449
- Ad Hoc Access: The Regulation of Editorial Advertising on Television and Radio
- 1988 Rhonda Brown VI YLLPR 449
-
- 39 Hastings L.J. 165
- The TRAC to Fairness: Teletext and the Political Broadcasting Regulations
- November, 1987 GAIL A. FLESHER 39 HSTLJ 165
-
- 21 U.Mich.J.L.Ref. 137
- THE RIGHT TO SPEAK, THE RIGHT TO HEAR, AND THE RIGHT NOT TO HEAR: THE
- TECHNOLOGICAL RESOLUTION TO THE CABLE/PORNOGRAPHY DEBATE Fall/Winter, 1987-88
- Michael I. Meyerson 21 UMIJLR 137
-
- 8 Cardozo L.Rev. 317
- AN EXCESS OF ACCESS: THE CABLE COMMUNICATIONS POLICY ACT OF 1984 AND FIRST
- AMENDMENT PROTECTION OF EDITORIAL DISCRETION December, 1986 Adam R. Spilka
- 8 CDZLR 317
-
- 75 Geo.L.J. 361 A Press Privilege for the Worst of Times
- October, 1986 David Joseph Onorato
-
- 35 Emory L.J. 563
- CABLE LEASED ACCESS AND THE CONFLICT AMONG FIRST AMENDMENT RIGHTS AND FIRST
- AMENDMENT VALUES Summer, 1986 William E. Lee
-
- XX Suffolk U.L.Rev. 1 FREE SPEECH IN AN ECONOMIC PERSPECTIVE
- Spring, 1986 Richard A. Posner
-
- 33 U. Kan. L. Rev. 305
- INDEPENDENT BUT INADEQUATE: STATE CONSTITUTIONS AND PROTECTION OF FREEDOM OF
- EXPRESSION Winter, 1985 Todd F. Simon
-
- 58 S.Cal.L.Rev. 1351 CONTROLLING THE CONTENT OF PRINT AND BROADCAST
- September, 1985 MATTHEW L. SPITZER
-
- 22 Harv.J.Legis. 503
- TELEPHONE PORNOGRAPHY: FIRST AMENDMENT CONSTRAINTS ON SHIELDING CHILDREN FROM
- DIAL-A-PORN Summer, 1985 JOHN C. CLEARY
-
- 133 U. Pa. L. Rev. 661
- A PROPOSED MODEL OF THE SOVEREIGN/PROPRIETARY DISTINCTION March, 1985
- Teresa Gillen
-
- 98 Harv.L.Rev. 747
- INFORMATION TECHNOLOGY AND THE STRUCTURE OF SECURITIES REGULATION
- February, 1985 Donald C. Langevoort
-
- 98 Harv.L.Rev. 205
- Leading Cases of the 1983 Term--Constitutional Law: Freedom of Speech, Press,
- and Association--Restrictions on Public Broadcasters' Rights to Editorialize
- November, 1984 98 HVLR 205
-
- 38 U.Miami L.Rev. 769
- A Common Law for the Ages of Intellectual Property Septemer, 1984
- DAN ROSEN
-
- 25 Harv. Int'l L.J. 299
- The British Telecommunications Decision: Toward a New Telecommunications Policy
- in the Common Market March, 1984 Slida A. Wall
-
- 8 Nova L.J. 631
- Communications Revolutions and Legal Revolutions: The New Media and the Future
- of Law March, 1984 M. Ethan Katsh
-
- 82 Mich.L.Rev. 981 FREE SPEECH AND HIGH TECH February, 1984
- Francis Dummer Fisher 82 MILR 981
-
- XIII Fordham Urb.L.J. 801
- ELECTRONIC PUBLISHING: FIRST AMENDMENT ISSUES IN THE TWENTY-FIRST CENTURY
- 1984 Lynn Becker
-
- 97 Harv.L.Rev. 584
- SAFEGUARDING THE FIRST AMENDMENT IN THE TELECOMMUNICATIONS ERA TECHNOLOGIES OF
- FREEDOM. By Ithiel de Sola Pool. Cambridge, Massachusetts: Belknap Press
- of Harvard University Press. 1983. Pp. 299. $20. December, 1983
- Mario L. Baeza
-
- 36 Vand.L.Rev. 985
- Global Governance of Global Networks: A Survey of Transborder Data Flow in
- Transition May, 1983 Anne W. Branscomb 36 VNLR 985
-
- 38 Cath.U.L.Rev. 365
- INFORMATION AS PROPERTY: DO RUCKELSHAUS AND CARPENTER SIGNAL A CHANGING
- DIRECTION IN INTELLECTUAL PROPERTY LAW? Winter, 1989 Pamela Samuelson
- 38 CATHULR 365
-
- 47 U.Pitt.L.Rev. 1185
- ALLOCATING OWNERSHIP RIGHTS IN COMPUTER-GENERATED WORKS Summer, 1986
- Pamela Samuelson
-
- 47 U. Pitt. L. Rev. 1131
- THE UNCERTAIN CASE FOR SPECIAL LEGISLATION PROTECTING COMPUTER SOFTWARE
- Summer, 1986 Leo J. Raskind
-
- 32 Wayne L.Rev. 1191
- PROPOSED JUDICIAL GUIDELINES FOR DECIDING SOFTWARE INFRINGEMENT ACTIONS
- Spring, 1986 SUSAN L. MASHOUR
-
- 16 Rutgers Computer and Tech.L.J. 323
- DIGITAL MEDIA AND THE CHANGING FACE OF INTELLECTUAL PROPERTY LAW
- Winter, 1990 Pamela Samuelson
-
- _____________________________________________________________________
- | Tim Wolfson | Internet: tcwst@unix.cis.pitt.edu |
- | Pitt Law | CCNet : tcwst@CISUNX |
- | PGH, PA 15260 | UUCP : tcwst@cisunx.uucp |
- | (412) 486-0182 | Bitnet : TCWST@PITTVMS.BITNET |
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Date: September
- From: Entity
- Subject: A comment on Zod's case
-
- ********************************************************************
- *** CuD #2.03: File 4 of 4: A Comment on the Zod Case ***
- ********************************************************************
-
-
- I hope to present you with some of the details regarding Zod's bust so
- that your readers can be more familiar with the case. Sometime around
- late October 1989 or so, Zod set up a multi user chat system on a US Air
- Force system. The program he was using was Hans Kornedor's chat program ,
- which many of you may recognize as the chat program used on the ALTOS
- german hacker chat systems. In any case, Zod modified this program,
- making superficial changes and labelled it TDON chat.
-
- What he did was infiltrate a US Air Force UNIX system at Andrews Air Force
- Base. Because of the extremely lax security on the system, he was easily
- able to gain super user privileges and set up an SUID shell in one of the
- directories. He then changed the password on an unused account (Foster.
- Password was TDON) and set his TDON chat system up. He then went onto
- places such as TCHH (Germany), ALTGER (Germany) and QSD (France) and
- started spreading the news of this great new chat. Thankfully, not many
- people paid any attention to Zod (who is world reknown to be a class "A"
- bozo.) Very few people called and of those who did, it was mostly
- american users on telenet, although there were a few european callers as
- well. I was actually invited to the system by an up and coming VAX/VMS
- hacker who used the alias 'Corrupt' (he was part of the group HiJiNx!). I
- knew him from meetings on the various european chat systems as well as him
- being on the Corrupt Computing Canada BBS System in Toronto, Canada. Last
- I heard, he was busted as well, although I am not sure of on what charges.
-
- The chat itself was up for maybe a week -- a week and a half at best. At
- this point you are probably wondering who would be suicidal enough to set
- up a hacker chat system on a US Air Force system, right? Well, there's
- more to Zod's stupidity than just that. In addition to setting up the
- chat, Zod decided that he would be smart and in the .login script for the
- foster account he added in the TEE command to log everything to a file.
- For those unfamiliar with UNIX, the tee command basically takes the input
- coming into the user's TTY, and makes a copy of it into a specified file.
- Zod had this input go into a directory with the filename the same as the
- user's process ID. I guess Zod's intention was to at a later time peruse
- these files for useful information, but what he ended up doing was handing
- us all to the authorities on a silver platter.
-
- Now one of the modifications that Zod had made to the chat program was to
- add in a shell escape. I never did figure out what the escape sequence
- was (not that I ever looked very hard), but I noticed that if I lifted my
- phone up, (thereby sending garbage over the modem) and put it back down, I
- would automatically be plopped into the shell! It was here that I
- discovered all the craziness that Zod had set up. You can imagine my
- surprise when I looked at some of the files in my directory and discovered
- that this chat system had been set up on a military unix machine! It was
- then that I found all the TEE'd files, the source code to his TDON chat,
- and the SUID root shell. Again for those unfamiliar with unix, an SUID
- root shell basically allows a user to run this file and gain superuser
- privileges by temporarily changing their User ID to that of root
- (superuser). Those familiar with hacking unix's will agree that it is
- never a good idea to leave such a file around on a system since it can be
- easily detected if not hidden properly. Not only was this file NOT
- hidden, it was put in plain view of the system administrator! If my
- memory serves correctly, it was put into the /tmp directory under a very
- obvious filename!
-
- Of course, the biggest problem with this particular set up was the TEE'd
- log files that zod had created. Those files had some very far reaching
- consequences as I shall describe in just a minute. Because of Zod's
- generosity in logging all chat sessions, Air Force Security staff had no
- reason to do any additional logging of information. What the security
- staff did was first of all change the password on the foster/tdon account
- and then made backups of all the chat session files. These were then
- compiled into a huge document (looks to be about 800-900 pages) and was
- edited to take out overlapping chat processes. I have managed to acquire
- this document through a friend of mine who was recently charged for
- infiltrating several systems. Part of the evidence was that document
- submitted by the Andrews Air Force base.
-
- For the benefit of those people who called this chat and who gave out
- incriminating evidence, I will just briefly list their names. You guys
- should realize that your particular sessions were logged and are included
- as part of the evidence. I would not be surprised if a further
- investigation stemming from Zod's bust were to be carried out. The people
- who should be watching their tails are: Sam Brown, Hunter, Phreakenstein,
- Outlaw, Corrupt and Jetscream. These are obviously not the only people
- who were logged, but they do represent those who passed out accounts and
- passwords and other incriminating information on the chat, as well as
- having spent the most amount of time on there.
-
- So how does this lead up to Zod's arrest? Well, I'm not positive. On the
- Air Force machine, zod was dumb enough to leave his name plastered all
- over the chat including on the logon screen. Of course this cannot be
- used solely as evidence enough to convict, but it sure as hell points in
- his direction. Zod was also not a very careful person -- this is of
- course obvious from him having set up the Air Force Chat, but in addition,
- he left behind a lot of clues. He wasn't a very competent hacker and never
- cleaned up after himself. I assume it wasn't very difficult to track him
- down from his blatant misuse of the City University system in Washington.
- It is my understanding that Corrupt and others were busted indirectly
- because of him. Perhaps someone closer to the source can confirm this.
-
- In any case, what all this goes to show you is how the stupidity of one
- individual can lead to the problems of so many others. By setting up a
- hacker chat system on the Andrews Air Force base system, he committed a
- great mistake. By then inviting so many hackers from the international
- hack scene, he committed a greater sin. But for actually logging all this
- information and never deleting it, he committed the ultimate crime. This
- kid is a royal pain in the posterior and a serious threat to all hackers.
-
- - Entity/CCCAN! (Corrupt Computing Canada)
-
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #2.03**
- ********************************************************************
- !