home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 2, Issue #2.12 (November 17 1990) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith
- USENET readers can currently receive CuD as alt.society.cu-digest.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. It is assumed that non-personal mail to the moderators may be
- reprinted, unless otherwise specified. Readers are encouraged to submit
- reasoned articles relating to the Computer Underground.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent the
- views of the moderators. Contributors assume all responsibility
- for assuring that articles submitted do not violate copyright
- protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: PhD Candidate Seeks information on the CU
- File 3: Riggs, Darden, and Grant Sentenced
- File 4: Prodigy Saga Continues
- File 5: Re: Response to Mars "Censoring"
- File 6: Response to SJG Affidavit (part 1)
- File 7: Warrants schmarrants! The SS is Crazy!
- File 8: More guidelines on what to do if busted
- File 9: CU in the News--England and Emma Nicholson; VOGON News
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ----------------------------------------------------------------------
-
- ********************************************************************
- *** CuD #2.12: File 1 of 9: Moderator's corner ***
- ********************************************************************
-
- From: Moderators
- Subject: Moderators' Corner
- Date: November 17 1990
-
- ++++++++++
- In this file:
- 1. PHRACK CLASSIC #32 AND CHRISTMAS-CON
- 2. FACE-TO-FACE BBS
- ++++++++++
-
- +++++++++++++++++++++
- Phrack Classic #32 and Christmas-Con
- +++++++++++++++++++++
-
- Five years ago today (November 17, 1985), the first issue of Phrack appeared.
- Today, November 17, 1990, Phrack Classic #32 will be released. Information
- about Christmas-Con will be provided. it will be held in HOuston, December
- 28-30, and law enforcement and security personnel are encouraged to attend.
- Video cameras will not be provided.
-
- As a bit of nostalgia for the old folks, here is the original
- header from the first issue of Phrack:
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- _ _ _______
- | %/ | / _____/
- |_||_|etal/ /hop
- _________/ /
- /__________/
- (314)432-0756
- 24 Hours A Day, 300/1200 Baud
-
- Presents....
-
- ==Phrack Inc.==
- Volume One, Issue One, Phile 1 of 8
-
- Introduction...
-
- Welcome to the Phrack Inc. Philes. Basically, we are a group of phile writers
- who have combined our philes and are distributing them in a group. This
- newsletter-type project is home-based at Metal Shop. If you or your group are
- interested in writing philes for Phrack Inc. you, your group, your BBS, or any
- other credits will be included. These philes may include articles on telcom
- (phreaking/hacking), anarchy (guns and death & destruction) or kracking. Othe
- topics will be allowed also to an certain extent. If you feel you have some
- material that's original, please call and we'll include it in the next issue
- possible. Also, you are welcomed to put up these philes on your BBS/AE/Catfur
- Etc. The philes will be regularly available on Metal Shop. If you wish to sa
- in the philes that your BBS will also be sponsoring Phrack Inc., please leave
- feedback to me, Taran King stating you'd like your BBS in the credits. Later
- on.
-
- TARAN KING
- 2600 CLUB!
- METAL SHOP SYSOP
-
-
- This issue is Volume One, Issue One, released on November 17, 1985. Included
- are:
- 1 This Introduction to Phrack Inc. by Taran King
- 2 SAM Security Article by Spitfire Hacker
- 3 Boot Tracing on Apple by Cheap Shades
- 4 The Fone Phreak's Revenge by Iron Soldier
- 5 MCI International Cards by Knight Lightning
- 6 How to Pick Master Locks by Gin Fizz and Ninja NYC
- 7 How to Make an Acetylene Bomb by The Clashmaster
- 8 School/College Computer Dial-Ups by Phantom Phreaker
-
- Call Metal Shop and leave feedback saying the phile topic and where you got
- these philes to get your article in Phrack Inc.
-
- (end Phrack header)
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ++++++++++++
- FACE-TO-FACE BBS
- ++++++++++++
-
- A number of electronic digests exist, such as this one, that attempt to
- raise the issues of computer security, ethics, law, or policy. Few BBSs
- exist for the same purpose. However, a new BBS has been set up for the
- discussion of hacking, and unlike conventional "hacker" BBSs, this one is
- designed for discussions between law enforcement and security specialists
- and hackers. The goal of the board is to provide serious, intelligent
- dialogue between various groups. It's called FACE-TO-FACE, and the number is
- 713-242-6853.
-
- Here is the introductory log-in message:
-
- All Hackers, Federal Agents, and Journalists
-
- Welcome to a new concept in underground bulletin boards!
-
- IDEA: The idea first came to me when I was mourning over the fact that Phoenix
- Project went down. I thought, now gee, that was a good board. Ever since then
- I've been searching for a place to "Hang-out"; A place where users were not
- only productive but mature. Well, out of all those BBS's out there, I could
- not locate one that met my standards of "a good board". So, I came to the
- conclusion: There are no decent BBS's in the underground still running. Then
- it hit me-- Why not make one ? Sounds logical. Well, here it is.
-
- FACE to FACE: This BBS is devoted to having an intelligent, mature,
- communication link from the Computer Underground to the Press and back to the
- Security Agencies around the nation.
-
- WARNING: Although this BBS allows "hackers" access, The Management of this
- BBS demands that all users refrain from posting illegal material in nature.
- If any such material is posted, that user and the message(s) shall be deleted.
- I can't stress this enough. You have called a BBS where security agents are
- scanning the messages also-- It's for OUR and YOUR saftey. We do not advocate
- "hacking" in any way.
-
- We are the MODERATORS of this BBS, while you are the USERS. It's a pure
- communications link between the two sides. One side seeing white, the other
- black. We see grey.
-
- Access is guaranteed to any user who wishes to call.
-
- This is an open system for the "phree" world.
-
- (End Face-2-Face header)
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Subject: PhD Candidate Seeks information on the CU
- From: P.A. Taylor <EJPA09@uk.ac.edinburgh.emas-a>
- Date: 02 Nov 90 15:25:32 gmt
-
- ********************************************************************
- *** CuD #2.12: File 2 of 9: PhD Students Seeks Info on CU ***
- ********************************************************************
-
- I'm in the second year of a PhD on the subject of hacking/viruses and the
- politics behind them, and I was wondering whether any of you are prepared to
- enter into a dialogue on the subject.
- At the moment, I'm preparing the theory section and literature review. In
- January or thereabouts I want to start field-work (or modem-work, if it
- turns out that way) with both hackers and their computer security industry
- counterparts, and anyone who would consider themselves neither one nor the
- other, but nevertheless interested in the field and the issues raised by it.
- Theoretically, so far I've concentrated on the notion put forward in various
- quarters that hackers are surfers on a technological wave that is carrying
- the rest of us away, or in a similar vein, cowboys staking out new territory
- in the new frontier world of computer technology. Looking at hackers in
- this way has made me concentrate on the whole issue of technological
- determinism and the "information revolution" and also the idea of hackers
- being perhaps an extension or most recent development of an alternative
- culture, hippies with modems perhaps. It also raises the whole issue of the
- exact nature of cyberspace and the implications it holds... are we entering
- a new realm of informational colonialism? What is information? Who has rights
- over it, and are hackers/the computer underground fighting a battle of
- principle the importance of which has passed most people by?
- On a more practical level I'm interested in the following points...
- 1. To what extent has the advent of hacking/viruses fed back into
- and affected the development of computer science? (e.g. the conceptualisation
- of genetic algorithms)
-
- 2. Information and reference material relating to the formation of the
- computer security industry. Ideally I'd like to write a short history of it
- and trace the ways in which it has developed and been shaped by its
- adversarial relationship with the computer industry.
-
- 3. The subject of the changing nature of information illustrated by
- such episodes as the "look and feel lawsuits" and an increasingly
- proprietal attitude towards information that is now evident. To what
- extent are hackers/computer underground concerned with the type of
- opposition to information control that people such as Richard Stallman
- and his Gnu project represent?
-
- Thanks for taking the time to read all this,and hopefully some of you
- can give me feedback/suggestions/reference material.
-
- Cheers, P.A.T.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Moderators
- Subject: Riggs, Darden, and Grant Sentenced
- Date: 17 November, 1990
-
- ********************************************************************
- *** CuD #2.12: File 3 of 9: Riggs, Darden and Grant Sentenced ***
- ********************************************************************
-
- Robert J. Riggs (The Prophet), Franklin E. Darden, Jr. (The Leftist), and
- Adam E. Grant (The Urville) were sentenced in Atlanta Friday, November 16.
- All were given prison terms. Riggs was sentenced to 21 months. Grant and
- Darden were given 14 months each, half of which may be served in a half-way
- house. Additional provisions include supervision and prohibitions on
- computer use. In addition, each was ordered to repay $230,000 restitution.
- Darden and Grant report for sentencing on January 4, 1991, and Riggs on
- February 15. According to previous news reports, under the plea
- arrangement Riggs could have been sentences to 15 years and a fine of up to
- $500,000. Grant and Darden could have received up to 5 years in prison and
- fines of up to $250,000.
-
- Because the three pled guilty, the evidence against them is not public.
- Yet, the both the prison sentence and the restitution seem harsh. Riggs,
- presumably, received a heavier sentence because of a prior offense and
- because the charge to which he pled guilty carried a more severe sentence.
- But, according to reports, his cooperation with law enforcement and his
- testimony against Craig Neidorf would be taken into consideration during
- the testimony.
-
- Did the actions of the three cause $700,000 worth of damages, or is the
- figure intended to be a "message" to others? If the former, one wonders
- what they possible could have done to create such mischief, because the
- original indictment mentions nothing about concrete damages, and we have
- already seem how Bell is willing to inflate costs. If the amount of
- restitution was intended as a message, it is successful. But, it sends an
- inintended message: The judicial system is wacky! If each repays $4,000 a
- year, they may be paying out of their social security well into their 70s.
- If each repays it within 25 years ($9,300 a year), they are effectively
- saddled with a "second mortgage" before even launching their lives. They
- will emerge from prison faced with obstacles that even the most hardened
- criminals do not endure.
-
- Prison time also seems inappropriate. The so-called "tough on crime"
- mentality of the past decade has created an explosion in the nation's
- prison population. Since 1980, the nation's prison population has more than
- doubled, increasing from about 329,821 in 1980 to almost 800,000 in
- November of 1990. Tossing people in prison is not, for non-violent crimes,
- particularly cost-effective, and there is no agreement on the deterrent
- effect of prisons. For relatively minor white collar crimes, such as those
- commited by the "Atlanta Three," prison seems both unnecessary and unjust,
- and tax-payers foot the bill.
-
- There is apparently little the three can do about the sentence. But the
- rest of us can join in the tasks of lobbying for saner laws and sentences
- that better fit the "crime" than does incarceration, while simultaneously
- working to curtail computer abuse.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Adam Gaffin
- Subject: Prodigy Saga Continues
- Date: November 14, 1990
-
- ********************************************************************
- *** CuD #2.12: File 4 of 9: The Prodigy Saga Continues ***
- ********************************************************************
-
- (The Prodigy saga continues. Adam Gaffin, who has been following the story
- for the Middlesex News in Framingham, Mass, reports that after a couple of
- days, Prodigy restored the account of the "Prodigy Nine" and then, a few
- days after that, pulled them again! The total number is actually now up to
- about 15. Prodigy has been receiving lots of bad press in the media, and
- Henry Niman, a prodigy victim, has been interviewed about his experiences
- by several TV stations and newspapers. Adam recently wrote the following
- stories--moderators).
- +++++++++++++
-
- From: "Conversations with Fred," Middlesex News, Framingham, 11/6/90.
-
- The story is bizarre but true, swears Herb Rothman. Seems Prodigy, the
- network run as a joint venture by Sears and IBM, wouldn't let somebody post
- a message in a coin-collecting forum that he was looking for a particular
- Roosevelt dime for his collection. Upset, the man called "member services."
- The representative told him the message violated a Prodigy rule against
- mentioning another user in a public message. "What user?" the man asked.
- "Roosevelt Dime," the rep replied. "That's not a person!" the man said.
- "Yes he is, he's a halfback for the Chicago Bears," the rep shot back.
-
- Rothman is one of those alleged compu-terrorists Prodigy claims is
- harassing other users and companies that advertise on the service by
- sending out thousands upon thousands of increasingly hostile messages in
- protest of a Prodigy plan to begin charging users who send more than 30
- e-mail messages a month. Rothman and the others say they sent very polite
- messages to people (Penny Hay of Los Angeles says her messages were even
- approved by the Prodigy legal department) telling them about the new fees
- and urging them to protest.
-
- What's really happening is that Prodigy is proving its complete arrogance
- and total lack of understanding of the dynamics of on-line communication.
- They just don't get it. People are NOT going to spend nearly $130 a year
- just to see the weather in Oregon or order trips to Hawaii.
-
- Even the computerphobes Prodigy wants to attract quickly learn the real
- value of the service is in finding new friends and holding intelligent
- "discussions" with others across the country.
-
- But Prodigy blithely goes on censoring everything meant for public
- consumption, unlike other nationwide services (or even bulletin-board
- systems run out of some teenager's bedroom). Rothman's story is not the
- only one about capricious or just plain stupid censoring. Dog fanciers
- can't use the word "bitch" when talking about their pets, yet the service
- recently ran an advice column all about oral sex. One user who complained
- Law" was not allowed on was told that "queen b***h" would be acceptable,
- because adults would know what it meant but the kiddies would be saved.
-
- So when the supposed technology illiterates Prodigy thinks make up its user
- base managed to get around this through the creation of private mail
- "lists" (and, in fact, many did so at the urging of Prodigy itself!),
- Prodigy started complaining of "e-mail hogs," quietly announced plans to
- levy charges for more than a minute number of e-mail messages each month
- and finally, simply canceled the accounts of those who protested the
- loudest!
-
- And now we are watching history in the making, with the nation's first
- nationwide protest movement organized almost entirely by electronic mail
- (now don't tell Prodigy this, but all those people they kicked off quickly
- got back onto the system -- Prodogy allows up to six users per household
- account, and friends simply loaned their empty slots to the protest
- leaders).
-
- It's truly amazing how little faith Prodigy has in the ability of users to
- behave themselves. Other systems have "sysops" to keep things in line, but
- rarely do they have to pull messages. Plus, Prodigy is just being plain
- dumb. Rothman now has a mailing list of about 1,500. That means every time
- he sends out one of his newsletters on collectibles, he sends 1,500 e-mail
- messages, which, yes, costs more for Prodigy to send over long-distance
- lines and store in its central computers. But if they realized their users
- are generally mature, rather than treating them as 4-year-olds, Rothman
- could post just one message in a public area, that everybody could see.
-
- Is this any way to run an on-line system? Does Prodigy really want to drive
- away the people most inclined to use the service -- and see all those ads
- that pop up at the bottom of the screen? Prodigy may soon have to do some
- accounting to the folks at IBM and Sears, who by most accounts have already
- poured at least $750 million into "this thing."
-
- (With your computer and modem, you can reach Fred the Middlesex News
- Computer anytime, day or night, at (508) 872-8461. Set your parameters to
- 8-1-N and up to 2400 baud.)
-
- +++++++++++++
-
- "Prodigy Pulls Plug on Electronic Mail Service for Some"
- From: Middlesex News, Framingham, Mass., 11/2/90
-
- By Adam Gaffin (News staff writer)
-
- Users of a national computer network vow to continue a protest against
- censorship and a new charge for electronic mail even though the company
- kicked them off-line this week.
-
- Brian Ek, spokesman for the network, Prodigy, said the "handful" of users
- had begun harassing other users and advertisers on the service and that
- some had even created programs "to flood members' %mailboxes' with
- (thousands of) repeated and increasingly strident harangues," he said.
-
- But leaders of the protest say they sent only polite letters - approved by
- the company's legal department - using techniques taught by the company
- itself. Up to nine of them had their accounts pulled this week.
-
- Protests began in September when the company said it would cut unlimited
- electronic mail from its monthly fee -- which includes such services as
- on-line airline reservations, weather and games -- and would charge 25
- cents for every message above a monthly quota of 30. Ek says the design of
- the Prodigy network makes "e-mail" very expensive and that few users send
- more than 30 messages a month.
-
- But Penny Hay, the only organizer of the "Cooperative Defense Committee"
- whose account was not shut this week, said she and others are upset with
- Prodigy's "bait and switch" tactics: the company continues to promote
- "free" electronic mail as a major feature. She said Prodigy itself had
- spurred use of e-mail by encouraging subscribers to set up private e-mail
- "lists" rather than use public forums and that the charges will especially
- hurt families, because the quota is per household, not person.
-
- Ek said relatively few members protested the rate change. Gary Arlen, who
- publishes a newsletter about on-line services, called the controversy "a
- tempest in a teapot."
-
- Hay, however, said the group now has the backing of nearly 19,000 Prodigy
- users - the ones advertisers would want to see on-line because they are the
- most active ones on the system and so more likely to see their ads.
-
- The group is also upset with the way the company screens messages meant for
- public conferences. Other services allow users to see "postings"
- immediately.
-
- "They are infamous for this unpredictable and unfathomable censorship," Hay
- said.
-
- "We feel what we are doing is not censoring because what we are essentially
- doing is electronic publishing," Ek said, comparing the public messages to
- letters to the editor of a family newspaper.
-
- Neil Harris, marketing director at the competing GEnie service, said many
- people would feel intimidated knowing that what they write is being
- screened. He said GEnie only rarely has to deleted messages. And he said
- GEnie has picked up several thousand new customers from among disgruntled
- Prodigy users.
- del 85 86; ch eol to')' in 89; m 87
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: laird@SLUM.MV.COM(Laird Heal)
- Subject: Re: Response to Mars "Censoring"
- Date: 7 Nov 90 10:45:18 EST (Wed)
-
- ********************************************************************
- *** CuD #2.12: File 5 of 9: Mars *was* Censored ***
- ********************************************************************
-
- In article <CuD #2.09 #4>, dan-hankins@cup.portal.com (Dan Hankins) write:
-
- >In article <CuD #2.08 #3>, Karl Lehenbauer <karl@sugar.hackercorp.com> writes,
-
- >>I used Prodigy several times, and it is a heavily censored system,...
-
- >This is inaccurate. Prodigy is not censored, it is _edited_. There is a
- >significant difference. When newspaper articles are removed by government
- >order, that's censorship. When the newspaper owners decide to not run an
- >article because it is counter to their editorial policies (or personal
- >prejudices), then that's editing.
-
- >In article <CuD #2.08 #4), the moderators write,
-
- >>In the MARS incident, the NSF flexed its fiscal muscles (according to those
- >>on the receiving end).
-
- >This is again not censorship. The NSF pays for the Internet, and has the
- >right to say how those monies are spent. Since MARS resided on an Internet
- >node, the NSF had the right to refuse to pay for those files to be transmitted
- >across its network. In fact, the NSF has the right to refuse to pay for
- >network connections for any site for any reason whatsoever, unless it has made
- >a contract to the contrary. If this is "flexing its fiscal muscles", then so
- >be it.
-
- You have gotten caught up in an emotional response to the word
- "censorship". If you are going to mince words, do not use a meat
- tenderizer or your argument will be mush.
-
- The first comment is correct. Censorship is when a governmental body edits
- a writing based upon its perceived content.
-
- The fundamental point that has not been brought up by those approving of
- the action (removing access and storage of the pictures) is that a
- governmental body must grant First Amendment protection to all speech. The
- sole exception where censorship is generally allowable is when that speech
- would shock the general public, and this is normally restricted to
- materials in public view.
-
- The GIF archives are not in public view - even when sent as net-news they
- are encoded - but they were/are in a location where there is general public
- access of whatever files have been submitted to the archiver or to the
- network. Particularly with netnews, there is no specific editing done
- whatsoever after the author posts the article, and moderators serve only at
- the whim of a majority of voters. Wherever speech is allowed, even if the
- governmental body is paying for it, the content of that speech may not be
- regulated by the governmental body. These pictures might be accessed by
- immature youths who should be protected from carnal knowledge
-
- Moreover, once it is established, that arm of the government may not simply
- discontinue the service if the reason is to suppress the speech that is
- being communicated. The First Amendment is guarded zealously by the
- Federal courts and such an action should not withstand the "strict
- scrutiny" that it should be examined under. I wish the Second Amendment
- received such guardianship; I have never owned a gun, but I think everyone
- should have the right to own one while the government has lots of guns and
- seems to think nobody else should ever have any.
-
- Obscenity may be censored - when it might otherwise shock the unsuspecting
- public. A brown paper bag can never attract the prurient interest; do not
- tear the bag open unless you do want to see what is inside. I never have
- looked at any of the alt.sex hierarchy. Once a public forum exists, it may
- not be censored, although the participants may agree to self-regulation. I
- remember once wondering what was really in alt.flame, and the first article
- convinced me that I had read enough. Those guys are serious about their
- roasting there, not their vocabulary (damned if they do not just grab for
- the nearest word). The alt.flame group is there with a good reason -
- otherwise people who do not want to read that material might have to read
- the same articles, but in their news group.
-
- I personally can see no great benefit to maintaining an archive of sexually
- explicit GIF images, except that archives exist to keep network
- transmission to the most suitable paths; otherwise the private messages
- sent back and forth are unmanaged and unmanageable, and we wind up with the
- situation as described where Australians ftp'd files from Finland because
- they were not archived at a more convenient site. Archives reduce network
- load. Netnews reduces network load.
-
- I can also personally see no great benefit to every person having a gun or
- two except that we would all either be much more polite or on the way to an
- ambulance. I am not an absolutist, and everyone does not act the way I
- think everyone should. I do not act the way I think I should sometimes
- either. I am a pragmatist when it comes to dealing with other people's
- business: you send my files along, I will send yours along too.
-
- >Complete the following: Pro is to Con as Progress is to ________.
-
- That is a nice .signature.
-
- Laird Heal laird@slum.MV.COM The Usenet is dead! NA:USA:NH:Salem +1 603
- 898 1406 Long live the Usenet!
-
- ********************************************************************
-
- *******************************************************************
-
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Subject: Response to SJG Affidavit (part 1)
- From: David G. Cantor <dgc@MATH.UCLA.EDU>
- Date: Wed, 14 Nov 90 22:48:06 -0800
-
- ********************************************************************
- *** CuD #2.12: File 6 of 9: Response to SJG Affidavit (part 1) ***
- ********************************************************************
-
- I just received the special issue CUD on the search affidavit for Steve
- Jackson.
-
- Thank you for publishing it.
-
- Perhaps you could discuss how transferring a document can be a crime, other
- than possibly a (relatively minor) copyright violation? If it truly is a
- crime, as stated in the affidavit, then anyone, by calling a document
- proprietary and attaching a large value to it, can, in effect, create a
- classified document and have this classification enforced by the US
- Government.
-
- As the Pentagon Papers case (dismissed against Daniel Ellsburg) showed,
- it's extremely difficult to prosecute such cases, even when they are real!
- Note that in Ellsburg's case there was no doubt that the documents in
- question were government documents. classified SECRET (mostly). Yet the
- case against Ellsburg was dismissed. Of course, Ellsburg had powerful
- allies: The New York Times and the Washington Post, among others.
-
- You pointed out, "It should also be remembered that the "$79,449.00"
- document in question was shown to contain nothing of substance that is not
- available to the general public for under $14. Further, to our knowledge,
- there is no evidence, contrary to suggestions, that E911 software was
- obtained".
-
- I find it troubling that these considerations are even relevant. What was
- transferred were a few electrons forming information, not classified, or
- otherwise secret. Even if it were 911 software, so what? No criminal
- charges were made concerning copyright or patent violations
-
- I also wonder, considering the generally tight budgets in our government,
- why the "Feds" are so interested in this case? Why are they investing so
- much effort? In my limited experience, this occurs when some party has an
- ax to grind or something special to gain. For example, in one of the first
- such cases, against Ronald Mark Austin (who in 1983 was convicted of a
- felony, primarily for accessing the (then) Arpanet), Los Angeles District
- Attorney Phillibosian (appointed by the Governor) was running in his first
- election. Presumably for publicity to help his re-election campaign, he
- fried Austin in a MAJOR PRESS CONFERENCE (this DA also gave us the infamous
- McMartin child molestation case).
-
- Who stands to gain in the current prosecution? Is it Bell South, trying to
- protect its turf in some way, or cover up something it has done? Is it
- having problems with its 911 system it would like to blame on someone else?
- Clearly it has the clout to cause such a prosecution. But WHY?
-
- This whole case STINKS.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Anonymous
- Subject: Warrants schmarrants! The SS is Crazy!
- Date: Fri, 16 Nov 90 17:12 CST
-
- ********************************************************************
- *** CuD #2.12: File 7 of 9: Warrants Schmarrants (SJG, part 2) ***
- ********************************************************************
-
- I've read the Steve Jackson Games warrant in CuD 2.11 and it makes me want
- to move to Russia. It is crazy, just plain crazy. It reminds me of essay
- tests when I wasn't prepared for a question and tried a snow-job hoping the
- prof wouldn't notice. I usually got an F, but Foley gets rewarded and Steve
- Jackson gets raided. Foley and his crowd have taken a few logs and blown
- them out of context. They claim that Erik Bloodaxe's post on Jan 23 is some
- kind of conspiracy, and that it proves that there's an encryption service,
- and it says no such thing. The following posts don't add anything to that
- post, so it seems it's just a silly attempt to fake evidence. Bloodaxe's
- post may have been ill considered and in bad taste, but that's not a crime.
- Heck, if bad taste were a crime, federal agents would be doing 30 years for
- their wingtips.
-
- The Phoenix Project had Phrack 24 on the board with a few pages of a
- document. So what? Foley keeps talking about "my investigation." Well, if
- he'd really investigated, he'd have known that the document in Phrack #24
- was more than slightly edited and that the information in it was public.
- Everything I've read says that the information that was published costs
- about 13 dollars, not the 79,000 Foley claimed. Was he having a nap when
- he claims to be investigating? Phrack is on a lot of boards, not just the
- Phoenix Project, so what's the big deal? They make it sound like it was a
- great conspiracy. Doesn't the first amendment allow posting legal
- magazines?? Foley claims to be a lawyer; some lawyer! His lack of concern
- for constitutional rights makes me wonder if his law degree isn't mail
- order.
-
- Foley also claims that Mentor's post on Jan 26 links him to some encryption
- service. All he did was explain what Kermit is. Is that a crime?
- Explaining a protocol? Christ, would anybody else who explained Kermit have
- been busted? Beware when somebody asks about the difference between Puma
- and Lynx. They might be feds and your boss might be raided.
-
- Since when are encryption and decryption devices illegal? I can get them
- off any good PD board in the country. Did Foley rewrite the law on his own?
-
- The list of stuff to be searched boggles the mind. Books, notes, tapes, and
- everything but the computerized micro-wave oven could be snatched (oh-oh!
- Better keep quiet on that one or they'll get that next).
-
- From this they justify their raid on Steve Jackson's company and nearly
- destroy it. I guess you have to be prosecuted before you can charge
- malicious prosecution, but I hope there is some way that those involved in
- this total travesty of justice can get their due. It is frightening to
- think that this could happen in America, and if Foley and his lackey's can
- be sued, hopefully somebody will nail him. This isn't legitimate law
- enforcement, it's a witch hunt. And if Foley is sued, I hope he gets more
- justice than he is willing to give others.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: The Conflict
- Subject: More guidelines on what to do if busted
- Date: Tue, 13 Nov 90 12:26 CST
-
- ********************************************************************
- *** CuD #2.12: File 8 of 9: More tips on Reacting to a Raid ***
- ********************************************************************
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- %% %%
- %% Simple Guidelines To Follow If You Encounter %%
- %% Law Enforcement Agents In An Unfriendly Situation %%
- %% %%
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- The current state of the Computer Underground is an extreme turmoil. The
- recent threat of another series of witchhunt raids has put many people into
- a state of paranoia, and rightfully so. Noone needs to deal with all the
- bullshit associated with a bust. I am offering a few guidelines to follow
- if you are placed in a precarious situation instigated by a law enforcement
- agent; of course, it is up to you to decide what you want to do. Of the
- people who I have spoken with, these will be some of the best steps to
- follow if you receive an unexpected visit.
-
- Probably the first thing you would want to do if you receive an unfriendly
- visit from Joe Fed is to READ the fucking warrant. Find out why you have
- been chosen, and what they are looking for. Also, remember that if they
- have only a search and seizure warrant, they are warranted only to
- confiscate items on your premises; however, if they are serving a subpoena,
- they may take what they need, on or off your premises. So, in essence, the
- clean-house preventive measure may or may not be useful to you.
-
- An important thing to do when Agent Foley (or one of his lesser evil
- counterparts) comes knocking on your door is to cooperate fully. Drop a
- lot of "Yes sir"/"No sir" answers; respond politely. You're in no position
- to be a smart ass, and being friendly surely can not hurt you.
-
- Another important thing to remember, although it is almost opposite of the
- aforementioned, has to do with what to say. In essence, do not say a
- fucking thing if you are questioned! Remember, anything you say or do can
- and WILL be used AGAINST you in a court of law. Simply reply, "I can not
- answer any questions without counsel", or "I first must contact my
- attorney." You need not answer a damn thing they ask of you without an
- attorney present, and it would most probably be very detrimental to do so.
-
- This hint parallels the previous one. No matter what you do, do not reply
- to any question with "I don't know anything", or any simple derivation of
- that phrase. If you do, and you are indicted, you will be reamed in court.
- The presence of that statement could greatly damage your defense, unless
- you are conditionally mental or something.
-
- In essence, those are all you should need. What I have outlined is very
- simple, but logical. You need to keep a level head at least while they are
- on site with you; get pissed off/psycho later, after they leave. If you
- are currently an active member of the Computer Underground, you may wish to
- lose anything that is important to you, at least temporarily. Why? Well,
- the analogy I was given follows that: if you were suspected of
- racketeering, the feds could execute a search and seizure on your property.
- If they can prove by 51% that ANY of the confiscated material COULD have
- been used in your suspected racketeering, it is forfeited (i.e. you lost
- it, for good). The forfeiture stands whether or not you are indicted or
- convicted! So, you would be entirely screwed.
-
- All of the aforementioned steps are important. Those are all I really have
- to offer. I suggest that you get clean before the sweep occurs, and that
- you stay clean until after the sweep clears. Exercise extreme caution.
- Keep your head high, and keep your back to the wall (otherwise, it would be
- quite possible to find a knife lodged in it). Stay safe, and good luck!
-
- The Conflict (11-13-1990)
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: P.A. Taylor@EDINBURGH.AC.UK
- Subject: CU in the News--England and Emma Nicholson; VOGON News
- Date: 04 Nov 90 16:07:16 gmt
-
- ********************************************************************
- *** CuD #2.12: File 9 of 9: The CU in the News ***
- ********************************************************************
-
-
- "A Bug In The Machine" By Tom Dewe Matthews.
- From: Sunday Correspondent, 17th Dec, 1989.
-
- "Adrian Vole " looked on helplessly as the words on his computer terminal
- began to drift down to the bottom of the screen. Soon, all that was left
- were skeleton lines of meaningless text. "Oh God", cursed Vole, "I've
- been hit by Cascade". There was nothing he could do to stop the computer
- virus from running amok. In less than ten seconds, Adrian Vole's computer
- had been turned into a useless piece of junk. Vole the hacker had been
- hacked.
-
- Adrian Vole is typical of his breed. By day he works at a computer console
- for a financial research company and by night he hacks away in a computer-
- filled den off his bedroom. Self-sufficient, with his terminal and telephone
- modem which connects him to the rest of the computerised world, Vole is
- typical in that he himself is open to attack.
-
- Hackers see themselves as fighting for freedom of information, as trying to
- break the control which big corporations such as IBM hold over computerised
- information, in order to disseminate it freely. "Hackers", says George Stone,
- the man who gave birth to Max Headroom, " want to be able to look into a
- computer system and say %I understand you and therefore can question you.
-
- You can no longer threaten me. I've beaten you". This curiosity and
- sometimes paranoia, is provoked by the sheer power of computers. "On
- one computer disc" says Stone,"you can put every address in the UK,
- including postcodes, and on another you can put every name from every
- electoral role in the country.You correlate those two discs, whack in a
- few parameters and you can start up your own credit company, or your own
- poll tax."
-
- Hackers may say they want to demystify computers,not to rob them, but they
- are nevertheless constantly destroying each other's systems by off-
- loading sabotaged computer games on to the electronic notice-boards where
- they swap software programs with each other. "Lounge Suit Larry" is only
- one in a long line of these tainted computer games which in their pure
- commercial state are harmless, but if you run an adulterated copy of
- "Larry" through your computer, it will wipe out your hard disc, which in
- human terms is the equivalent of removing your spine.
-
- Computer companies have been known to put bugs into the programmes that
- they're trying to sell to stop the customer from copying the programme-
- which is illegal under copyright law. The computer companies also blur
- the battle lines by adopting an attitude of: "If we can't beat them,
- let's exploit them". It is now common practice among managers of computer
- networks to put the telephone access number and password of a proposed
- system on to an electronic notice-board and then sit back and watch
- hackers wander around their system. In the mock battle that follows,
- the systems designer will even put up barriers which the hackers will
- try to knock down or evade. At the end of this phoney war, the system is
- dismantled and the manager redesigns it according to what he has learnt.
-
- The real system, with a secret telephone number and password, is then
- put in place and if that is hacked into it is likely that the hacker will
- be traced and confronted- only to be employed by the company on the theory
- that it takes a thief to keep one out.
-
- For the politicians who want to introduce legislation into the computer
- industry, such double standards are largely ignored in their pursuit of the
- hacker. The Conservative M.P. Emma Nicholson tried unsuccessfully to
- introduce a bill last summer which called for a loosening of Home Office
- restrictions on phone taps and up to 10 years imprisonment for those who
- gain unauthorised access into a computer system. If the government fails to
- introduce its own hacking law in the next parliamentary session,
- Ms Nicholson promises to be back soon with a repeat of her Private Members
- Bill.
-
- Hackers according to Nicholson, "are malevolent, nasty evil doers' who
- fill the screens of amateur users with pornography". She believes that
- "hacking has now become a regular terrorist action... The European Green
- Movement hacks into large companies", she says,"and picks out sensitive
- information. It could be pharmaceutical industries; it could be the oil
- industry, and they justify it on the grounds of environmental or racial
- fairness".
-
- According to Emma Nicholson, the hacked information is then used to carry
- out bombing and fires". The Greens may storm American air bases, but do
- they really invade computers? "Yes," replies Nicholson, "The Green movement
- in Europe is the most aggressive on this. They are akin to the Animal
- Liberation movement here." So the Greens are trying to destabilize society
- through computers? "Yes, without any doubt at all," she replies, adding that
- she has " a lot of validated information" to confirm this fact.
-
- The validation turns out to be a back copy of an anarchist magazine called
- *insurrection*, in which a communique from the Dutch anti-Apartheid
- movement Ra Ra lists 40 acts of sabotage against Shell in the Netherlands.
-
- A separate article asks its readers to start fires and also lists various
- computer viruses but doesn't tell the reader how to create them. The link
- between the hackers and the European Greens still seems unclear. "That",
- Nicholson replies, "is buried deep in my files". But what's the source?
-
- She then becomes as enigmatic as she was previously emphatic. "You
- could call it unofficial secret-service trackers close to the Dutch
- government. They're very close to the hackers and if they're named they
- could be put in terrible jeopardy. These hackers are very nasty people".
-
- (That's the first approx 1/4 of the article, the rest goes on to describe
- a German hacker "Mike Blip" of the Chaos Club).
-
- *******************************************************************
-
- From: fitz@WANG.COM(Tom Fitzgerald)
- Date: Thu, 15 Nov 90 18:42:06 EST
-
-
- <><><><><><><> T h e V O G O N N e w s S e r v i c e <><><><><><><>
-
- Edition : 2193 Monday 12-Nov-1990 Circulation : 8447
-
-
- VNS COMPUTER NEWS: [Tracy Talcott, VNS Computer Desk]
- ================== [Nashua, NH, USA ]
-
- Massachusetts - Considering computer-crime bill hailed as a model for others
- %The Wall Street Journal, 9-Nov-90, p. B1%
- The legislation "is the first to properly balance property and free speech
- interests," says Mitchell Kapor, founder and chairman of Lotus Development.
- The bill, which has the support of the governor and is expected to be approved
- by the Legislature, declares that new forms of communication such as computer
- bulletin boards and paperless electronic publications "are protected by
- fundamental rights, including freedom of speech and association and freedom
- from unreasonable government intrusion." The bill orders jail terms and stiff
- fines for those who break into computers without authorization or let loose
- software viruses that disrupt systems or destroy data. Hackers caught causing
- damage of $10,000 or more are subject to as much as 2 1/2 years in prison, a
- fine of up to $25,000, or both.
-
- European Community - Protecting computer software against piracy
- %The Wall Street Journal, 9-Nov-90, p. A6%
- European Community internal-market ministers gave broad-based support to
- proposals aimed at protecting computer software against piracy. Among the
- topics touched on was "reverse engineering," which allows a manufacturer to
- write compatible software or produce compatible equipment. The EC proposals
- would allow reverse engineering if the purpose was to create compatible, or
- "inoperable" products, although strict limits on the process would be set.
-
-
- <><><><><><><> T h e V O G O N N e w s S e r v i c e <><><><><><><>
-
- Edition : 2194 Tuesday 13-Nov-1990 Circulation : 8450
-
-
- VNS COMPUTER NEWS: [Tracy Talcott, VNS Computer Desk]
- ================== [Nashua, NH, USA ]
-
- Security - Two teens charged with sabotaging voice-mail system
- %The Wall Street Journal, 12-Nov-90, p. B7C%
- Daniel Rosenbaum, 17, and a 14-year-old juvenile, both from Staten Island,
- allegedly gained unauthorized entry to a computerized voice-mail system owned
- by International Data Group, Framingham, Mass., then changed recorded
- greetings to lewd messages, made bomb threats and erased customers' messages,
- said John Keary, a New York state police investigator. The tampering occurred
- between May and September at the company's Peterborough, N.H. office, at which
- eight computer magazines published by the concern are based, said IDG
- telecommunications director Jane Creighton. She estimated the disruptions cost
- the company $2.4 million in lost revenue from advertisers and other expenses.
- Mr. Rosenbaum said the two broke into the company's system because they didn't
- get a free poster they had expected to receive with "Gamepro," one of its
- computer magazines, said Mr. Keary. Mr. Keary said the teen-agers were charged
- with computer tampering, unauthorized use of a computer and aggravated
- harassment. They gained entry to the voice-mail system by entering "certain
- codes" into it through telephones, after calling the company's toll-free
- number, he added. By experimentation or luck, outsiders can learn passwords
- needed to break into voice-mail systems, enabling them to change outgoing
- messages and otherwise disrupt operations. Voice-mail break-ins, however, are
- declining as security aspects of the systems are beefed up, asserts David
- Ladd, executive vice president of VMX Inc., a San Jose, Calif., seller of
- voice-mail systems. IDG's Ms. Creighton said that gaining access to the
- company's phone mail system required use of multiple passwords. The teen-agers
- "are subscribers and readers of ours, therefore they are very
- computer-knowledgeable," she added.
-
-
- <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
-
- Permission to copy material from this VNS is granted (per DIGITAL PP&P)
- provided that the message header for the issue and credit lines for the
- VNS correspondent and original source are retained in the copy.
-
- <><><><><><><> VNS Edition : 2194 Tuesday 13-Nov-1990 <><><><><><><>
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #2.12**
- ********************************************************************
-