home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 3, Issue #3.11 (April 4, 1991) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
- POETICA OBSCIVORUM REI: Brendan Kehoe
-
- USENET readers can currently receive CuD as alt.society.cu-digest.
- Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
- PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on
- FIDOnet. Anonymous ftp sites: (1) ftp.cs.widener.edu (or
- 192.55.239.132) (back up and running) and (2)
- cudarch@chsun1.uchicago.edu E-mail server:
- archive-server@chsun1.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. Some authors, however, do copyright their material, and those
- authors should be contacted for reprint permission. It is assumed
- that non-personal mail to the moderators may be reprinted unless
- otherwise specified. Readers are encouraged to submit reasoned
- articles relating to the Computer Underground. Articles are preferred
- to short responses. Please avoid quoting previous posts unless
- absolutely necessary.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Contributors assume all
- responsibility for assuring that articles submitted do not
- violate copyright protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- CONTENTS THIS ISSUE:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: SUNDEVIL ARREST ANNOUNCED 4/13/91
- File 4: Northern District (Ill.) Press Release on Len Rose
- File 5: Letter to AT&T Cancelling Long-Distance Carrier Service
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Moderators
- Subject: Moderators' Corner
- Date: April 4, 1991
-
- ********************************************************************
- *** CuD #3.11: File 1 of 5: Moderators' Corner ***
- ********************************************************************
-
- IN THIS FILE:
- 1. CASE UPDATES (Ripco, Len Rose, Hollywood Hacker)
- 2. SUN DEVIL PROSECUTIONS
- 3. BYTES ON SUN DEVIL AND EFF
-
- ++++++++++++
- Case Updates
- ++++++++++++
-
- >>RIPCO: The Ripco case has not been forgotten. Counsel for Dr. Ripco
- is holding strategies close to the vest, and because the seizure of
- the BBS is alleged by the Secret Service to be part of an on-going
- investigation, things move even more slowly. CuD filed an FOIA
- request to the Secret Service for information on Ripco, and the
- response was:
-
- With regard to Ripco, we regret to inform you that we cannot
- comply. according to the Freedom of Information Act, there
- are no records or documents available to you.
-
- Persuant to 5 U.S.C. 552 (b) (7) (A), this file is being
- exempted since disclosure could reasonably be expected to
- interfere with enforcement proceedings. The citation of the
- above exemption is not to be construed as the only exemption
- which may be available under the Freedom of Information Act.
-
- >>LEN ROSE: Len Rose will be sentenced in May. We are concerned about
- the posts we have seen on the nets and in news stories that continue
- to construe this as a hacking case. Mike Godwin underscored this
- point in a post in RISKS Forum (#11.40):
-
- What makes it unreasonable to claim that Rose is a hacker is
- the fact that he had authorized access to every system he
- wanted to use. There was no question of unauthorized
- intrusion in Len's case.
-
- It bears a lot of repeating that Len pled guilty to
- unauthorized possession of Unix source code, not to computer
- fraud or unauthorized access.
-
- >>THE HOLLYWOOD HACKER: Stuart Goldman, dubbed "The Hollywood Hacker" by
- Fox News, is still facing state felony charges in California for
- accessing a computer to which Fox claims he lacked proper
- authorization. On the surface, this case seems to illustrate the
- dangers of the broad language of the California computer abuse laws
- that can make what should require an apology or, at worst, be a low
- order misdemeanor, a felony charge. We have been waiting for somebody
- to give us evidence to counter the impression that this case was a set
- up and an abuse of law, but to date all that we've seen continues to
- support the preliminary judgment that this is a case of vindictive
- prosecution, *not* hacking.
-
- +++++++++++
- First Sun Devil Prosecution
- +++++++++++
-
- Barbara and John McMullen's Newsbytes reprint below (File #3)
- summarizes the first prosecutions announced from Operation Sun Devil.
- Baron M. Majette, a teenager when the alleged offenses occured, was
- charged with three counts of fraudulent schemes and artifices and
- three counts of conspiracy under Arizona law. For those wishing
- information on the case, the case number (Maricopa County) is CR
- 91-02526: State of Arizona vs. Baron M. Majette aka Doc Savage, aka
- Samuel Savage.
-
- The original search affidavit for the search on May 7, 1990, cites "CI
- 404-235," a "volunteer, paid" Secret Service informant, as the primary
- source of the goverment's information. "CI 404-235" was also the
- informant responsible for providing information that led to the raid
- on RIPCO. In CuD 3.02, we reported that the Secret Service indicated
- that this informant ran a sting board that we identified as THE DARK
- SIDE (run by a sysop known as THE DICTATOR who continues to call
- boards around the country.
-
- +++++++++++++++++++
- BYTE's Jerry Pournelle on Operation Sun Devil and the EFF
- +++++++++++++++++++
-
- Jerry Pournelle, noted science fiction author and computer columnist, hands
- out his annual "Orchid and Onion" awards in the April 1991 issue of BYTE
- magazine. (pp 91 -101) Two of this year's 'awards' are of interest to CuD
- readers:
-
- _The Big Onion_
- And the Onion of the Year, with Garlic Clusters, goes to
- Special Agent Tim Foley of the Chicago office of the U.S.
- Secret Service. While I have good reason to know that many
- Secret Service people are conscientious and highly competent,
- Mr. Foley's actions in Austin, Texas, regarding Steve Jackson
- Games no only exceeded his authority, bu weren't even half
- competently done.
- All told, a sorry chapter in the history of the Secret
- Service, and no service at all to those genuinely concerned
- with electronic fraud and computer crimes.
-
- _The Big Orchid_
- The Orchid of the Year goes to Mitch Kapor, for funding the
- Electronic Freedom Foundation and providing legal help and
- support to Steve Jackson, whose business was nearly ruined by
- the Secret Service in Austin. I hold no brief for electronic
- thieves and snoops, but many of last year's government
- actions were worse than the disease.
- Thanks, Mitch, from all of us.
-
- Source: BYTE Magazine April 1991 Vol 16, Number 4 pp 92,93
-
- +++++++++
- THE EFFECTOR
- +++++++++
-
- The first copy of the EFF's hardcopy newsletter, THE EFFECTOR, came
- out and the content and form are great! Highlights include a history
- of the EFF by John Perry Barlow and Mitch Kapor's summary of the goals
- of EFF (yes, he *explicitly* states that the EFF unequivocally opposes
- unauthorized computer trespass). To get on either the hardcopy or net
- mailing list, drop a note to eff@well.sf.ca.us
-
- ++++++++++++++
- PHRACK Index
- ++++++++++++++
-
- Timothy Newsham compiled a complete index for PHRACK. It's about 50 K
- and is available from the CuD ftp sites and Ripco BBS.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Ah, Sordid
- Subject: From the Mailbag
- Date: 4 April, 1991
-
- ********************************************************************
- *** CuD #3.11: File 2 of 5: From the Mailbag ***
- ********************************************************************
-
- From: John Mignault <AP201058@BROWNVM.BITNET>
- Subject: Eagle's Nest Bust
- Date: Fri, 29 Mar 91 15:01:10 EST
-
- >Date: Fri, 29 Mar 91 10:38:56 EST
- >Reply-To: PMC-Talk <PMC-TALK@NCSUVM.BITNET>
- >Sender: PMC-Talk <PMC-TALK@NCSUVM.BITNET>
- >From: Editors of PmC <PMC@NCSUVM.BITNET>
- >Subject: Impounding Computers
- >To: John Mignault <AP201058@BROWNVM.BITNET>
- >
- >From: Christopher Amirault <amirault@csd4.csd.uwm.edu>
- >Subject: Boston Eagle's Nest bust
- >Date: Wed, 27 Mar 91 13:55:51 CST
- >
- >I haven't seen anything about this on any lists, so if you want to post
- >it elsewhere, feel free.
- >
- >In the March 11-17, 1991 edition of _Gay Community News_, the paper
- >reported that Alden Baker was arrested March 1 on rape charges. Baker
- >was the monitor of a list called "Boston Eagle's Nest," which allowed
- >for the sharing of various s&m stories, fantasies, etc.
- >
- >The Middlesex County MA DA's office has seized the computer, and there
- >is some concern that the mailing list on it will be made public or be
- >handed over to the FBI or something. Needless to say, this could be
- >the start of something bad.
- >
- >I haven't heard any more news (I don't subscribe to GCN), but I would
- >be interested to hear any other info people can get.
- >
- >I don't know if you've heard anything about this (first I've heard of it), but
- >this seems to put a new slant on underground activity, in that it's not so much
- >hacker-oriented as it is concerned with obscenity issues...
-
- John Mignault
- ap201058@brownvm.brown.edu
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: hkhenson@CUP.PORTAL.COM
- Subject: Letter to San Jose Mercury News on Len Rose
- Date: Fri, 29 Mar 91 23:00:28 PST
-
- March 25, 1991
-
- San Jose Mercury News
-
- Dear Editor:
-
- Last Friday's Washington Post bylined story, "'Hacker' pleads guilty
- in AT&T case" presented only the prosecutor's and ATT's side of an
- issue which has serious implications for the press.
-
- The "crime" for which Leonard Rose, Jr. faces a year and a day in jail
- was that of creating a simple example of how a few-hundred-line login
- program (a program which allows access) for ATT's Unix system could be
- modified to collect passwords, and sending this example over state
- lines to the editor of Phrack, an electronic magazine.
-
- Whether Len's example was to instruct criminals on how to obtain
- continued access after an initial breakin, or if it was to warn system
- operators to look for modified login programs, his intent is not an
- issue. Either case is protected under the First Amendment, or mystery
- stories would be illegal.
-
- Pointing out security weaknesses in Unix is certainly a legitimate
- function of the press. The entire phone system and countless other
- life- or property-critical computers use this operating system,
- designed to be portable (runs on many types of computers) and not
- secure. ATT, of course, prefers that discussion of weaknesses in Unix
- be suppressed by getting the government to call them "interstate wire
- fraud." To enlist the computer-ignorant, but long, arm of the law,
- they inflated the value of a few hundred lines of trivial code to
- $77,000, just as Southern Bell inflated the value of a document
- available for $13 to over $79,000 in a related case the government
- lost against Craig Neidorf, the editor of Phrack.
-
- The big difference between the cases was that Neidorf had parents who
- were able to mortgage their house for the six-figure legal bills, and
- Rose had been reduced by ATT and the legal system to abject poverty.
- In both cases the message has been sent: "face jail time or financial
- ruin if you expose phone company documents to the press."
-
- Sincerely,
-
- H. Keith Henson
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: The Works BBS Admin <works!root@UUNET.UU.NET>
- Subject: Is hacking the same as Breaking and Entering?
- Date: Mon, 01 Apr 91 17:58:17 EDT
-
- In response to the question: "Is computer hacking the same as B&E?"
-
- Not by far. Breaking and entering has malicious intent, and usually is
- solely to steal things and/or hurt something. Hacking although
- portrayed negatively in the press is not like this at all. It is
- merely looking around at what is in various systems, and learning from
- it. Occasionally someone deletes a file by mistake. A bad apple
- meanders in from the the cold and does some harm, but the majority of
- hackers (in my opinion) are not trying to hurt anything, and only
- allow themselves a little room to look at, and possible a small chair
- to sit in from time to time... Say you find an unknown account
- mysteriously pop up? Why not find out who it is, and what they are
- looking for first, because as odds go, if they got in there once,
- they can do it again, no matter what you do.
-
- So Breaking and Entering cannot even be classified in the same manner
- at all.
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: Dave Ferret <works!LC1%das@HARVUNXW.BITNET>
- Subject: Computers and Freedom of Speech
- Date: Tue, 02 Apr 91 23:35:48 EDT
-
- In response to an article in CuD 3.09 on computer publications...
-
- What gives people the right to censor and deem something illegal in
- the electronic media when paper, TV, radio, and the spoken word is
- perfectly legal and protected by the first amendment.
-
- Q: Shouldn't electronic publications be protected under the same
- article of the constitution that allows free presses?
-
- A: Most definitly. The question now is why aren't they?
-
- I have no real clue but this is all I can fragment together... That
- people are afraid of people who are 'electronically' inclined and that
- if sensitive information reaches say 100 people on an electronic
- publication, what is to stop them from giving away all the inside
- secrets? Its the same old story. The egregious behavior of the
- authorities (Secret Service, et al) is ludicrous. Wouldn't the
- reprint in a written publication (hard copy) of PHRACK24 (The E911
- issue as it has been known so well for) be perfectly legal, except for
- possibly a small copyright infringement? (They shoved a lot more
- charges at him than copyright infringement... Mildly..)
-
- So when does it change? Are computer publications covered? Look at
- 2600, I'm sure they printed even more sensitive things in the past and
- I don't see anyone dragging them in... When will people realize we are
- entitled to freedom of speech. We have the right to say what we want,
- and disagree. That is what was guaranteed to us in the first amendment
- of the constitution. The question has been raised... Why are there
- different laws governing computers and the physical world? Is this
- double standard just? No, on both counts.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Reprint from Newsbytes (John and Barbara McMullen)
- Subject: SUNDEVIL ARREST ANNOUNCED 4/13/91
- Date: April 3, 1991
-
- ********************************************************************
- *** CuD #3.11: File 3 of 5: Sundevil Arrest Announced ***
- ********************************************************************
-
- PHOENIX, ARIZONA, U.S.A., 1991 APR 1(NB) -- The Maricopa County
- Arizona County Attorney's Office has announced the arrest of Baron
- Majette, 19, also known as "Doc Savage", for alleged crimes uncovered
- in the joint federal / state "SunDevil" investigation in progress for
- over a year.
-
- Majette is charged with a number of felony crimes including the use
- of a telephone lineman's handset in March 1990 to tap into a Toys 'R
- Us telephone line to set up two conference calls between 15
- participants. According to the charges, each call lasted
- approximately 10 hours and cost $4,000. A spokesperson for the County
- Attorney's office told Newsbytes that a Tucson resident, Anthony
- Nusall, has previously pleaded guilty to being a participant in the
- conference Majette is also accused of illegally accessing TRW's
- credit data base to obtain personal credit information and account
- numbers of persons in the TRW database. He is alleged to have then
- used the information obtained to divert existing account mailings to
- mail drops and post office boxes set up for this purpose. He is also
- alleged to have additional credit cards issued based on the
- information obtained from the database. He is further alleged to have
- obtained cash, goods and services, such as airline tickets, in excess
- of $50,000 by using cards and account information obtained through
- entry into the TRW database.
-
- It is further alleged that Majette stole credit cars from U.S. Mail
- boxes and used them to obtain approximately $10,000 worth of cash,
- goods and services.The allegations state that Majette acted either
- alone or as part of a group to perform these actions. A County
- Attorney spokesperson told Newsbytes that further arrests may be
- expected as result of the ongoing investigation.
-
- While bail was set on these charges at $4,900. Majette is being held
- on a second warrant for probation violation and cannot be released on
- bail until the probation hearing has been held.
-
- Gail H. Thackeray, former Assistant Attorney General for the State of
- Arizona, currently working with Maricopa County on the SunDevil
- cases, told Newsbytes "The SunDevil project was started in response
- to a high level of complaint of communications crimes, credit card
- fraud and other incidents relating to large financial losses. These
- were not cases of persons accessing computers 'just to look around'
- or even cases like the Atlanta 'Legion of Doom' one in which the
- individuals admitted obtaining information through illegal access.
- They are rather cases in which the accused alleged used computers to
- facilitate theft of substantial goods and services."
-
- (Barbara E. McMullen & John F. McMullen/19910401)
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Gene Spafford <spaf@CS.PURDUE.EDU>
- Subject: Northern District (Ill.) Press Release on Len Rose
- Date: Fri, 29 Mar 91 19:10:13 EST
-
- ********************************************************************
- *** CuD #3.11: File 4 of 5: Chicago Press Release on Len Rose ***
- ********************************************************************
-
- Information Release
- US Department of Justice
- United States Attorney
- Northern District of Illinois
-
- March 22, 1991
-
- FRED FOREMAN, United States Attorney for the Northern District of
- Illinois, together with TIMOTHY J. McCARTHY, Special Agent In Charge
- of the United States Secret Service in Chicago, today announced the
- guilty plea of LEONARD ROSE, 32, 7018 Willowtree Drive, Middletown,
- Maryland to felony charges brought against him in Chicago and in
- Baltimore involving Rose trafficing with others in misappropriated
- AT&T computer programs and computer access programs between May 1988
- and February 1, 1990. Under the terms of plea agreements submitted to
- the United States District Court in Maryland, Rose will serve an
- agreed, concurrent one year prison term for his role in each of the
- fraud schemes charged.
-
- In pleading guilty to the Baltimore charges, Rose admitted that on
- October 5, 1989, he knowingly received misappropriated source code(1)
- for the AT&T UNIX computer operating system from a former AT&T technical
- contractor. The UNIX operating system is a series of computer programs
- used on a computer which act as an interface or intermediary between a
- user and the computer system itself. The UNIX operating system, which is
- licensed by AT&T at $77,000 per license, provides certain services to
- the computer user, such as the login program which is designed to
- restrict access to a computer system to authorized users. The login
- program is licensed by AT&T at $27,000 per license.
-
- In pleading guilty to the Chicago charges, Rose admitted that, after
- receiving the AT&T source code, he modified the source code governing
- the computer's login program by inserting a secret set of instructions
- commonly known as a "trojan horse." This inserted program would cause
- the computer on which the source code was installed to perform
- functions the program's author did not intend, while still executing
- the original program so that the new instructions would not be detected.
- The "trojan horse" program that Rose inserted into the computer
- program enabled a person with "system administrator" privileges to
- secretly capture the passwords and login information of authorized
- computer users on AT&T computers and store them in a hidden file. These
- captured logins and passwords could later be recovered from this
- hidden file and used to access and use authorized users' accounts
- without their knowledge. The program did not record unsuccessful login
- attempts.
-
- In connection with the Chicago charge, Rose admitted that on January
- 7, 1990, he transmitted his modified AT&T UNIX login program containing
- the trojan horse from Middletown, Maryland to a computer operator in
- Lockport, Illinois, and a student account at the University of
- Missouri, Columbia Campus.
-
- In pleading guilty to the Chicago charges, Rose acknowledged that when
- he distributed his trojan horse program to others he inserted several
- warnings so that the potential users would be alerted to the fact that
- they were in posession of proprietary AT&T information. In the text of
- the program Rose advised that the source code originally came from
- AT&T "so it's definitely not something you wish to get caught with."
- and "Warning: This is AT&T proprietary source code. DO NOT get caught
- with it." The text of the trojan horse program also stated:
- Hacked by Terminus to enable stealing passwords.
- This is obviously not a tool to be used for initial
- system penetration, but instead will allow you to
- collect passwords and accounts once it's been
- installed. (I)deal for situations where you have a
- one-shot opportunity for super user privileges..
- This source code is not public domain..(so don't get
- caught with it).
- Rose admitted that "Terminus" was a name used by him in
- communications with other computer users.
-
- In addition to these warnings, the text of Rose's trojan horse program
- also retained the original warnings installed in the program by AT&T:
- Copyright (c) 1984 AT&T
- All rights reserved
- THIS IS UNPUBLISHED PROPRIETARY
- SOURCE CODE OF AT&T
-
- This copyright notice above does
- not evidence any actual or intended
- publication of the source code.
-
- Inspection of this modified AT&T UNlX login source code by AT&T's UNIX
- licensing group revealed that the modified source code was in fact a
- "derivative work" based upon the standard UNIX login source code, which
- was regarded by AT&T as proprietary information and a trade secret of
- AT&T, which was not available in public domain software.
-
- In pleading guilty to the federal charges in Chicago and Baltimore, Rose
- also acknowledged that, after being charged with computer fraud and
- theft in federal court in Baltimore, he became employed at Interactive
- Systems Inc. in Lisle, Illinois. He acknowledged that his former
- employers at Interactive would testify that he was not authorized by
- them to obtain copies of their AT&T source code which was licensed to
- them by AT&T. Rose further admitted that John Hickey, a Member of
- Technical Staff with AT&T Bell Laboratories in Lisle, Illinois,
- correctly determined that Rose had downloaded copies of AT&T source code
- programs from the computer of Interactive to Rose's home computers in
- Naperville. The computers were examined after they were seized by the
- Naperville Police Department, executing a State search warrant,
-
- As part of the plea agreement charges filed by the DuPage County State's
- Attorney's Office will be dismissed without prejudice to refiling. The
- forfeited UNIX computer seized will be retained by the Naperville Police
- Department.
-
- Commenting on the importance of the Chicago and Baltimore cases, Mr.
- Foreman noted that the UNIX computer operating system, which is involved
- in this investigation, is used to support international, national, and
- local telephone systems. Mr. Foreman stated, "The traffic which flows
- through these systems is vital to the national health and welfare.
- People who invade our telecommunications and related computer systems
- for profit or personal amusement create immediate and serious
- consequences for the public at large. The law enforcement community and
- telecommunications industry are attentive to these crimes, and those who
- choose to use their intelligence and talent in an attempt to disrupt
- these vital networks will find themselves vigorously prosecuted."
-
- Mr. Foreman also stated that the criminal information filed in Chicago
- and a companion information in Baltimore are the initial results of a
- year long investigation by agents of the United States Secret Service in
- Chicago, Maryland, and Texas. Mr. Foreman praised the cooperation of the
- DuPage County State's Attorney's Office and the Naperville Police
- Department in the investigation. He also acknowledged AT&T's technical
- assistance to the United States Secret Service in analyzing the computer
- data seized pursuant to search warrants in Chicago, Baltimore and
- Austin, Texas.
-
- TIMOTHY J. McCARTHY, Special Agent ln Charge of the United States Secret
- Service in Chicago, noted that Rose's conviction is the latest result of
- the continuing investigation of the computer hacker organization, the
- "Legion of Doom." This investigation being conducted by the United
- States Secret Service in Chicago, Atlanta, New York and Texas, and has
- resulted in convictions of six other defendants for computer related
- crimes.
-
- Assistant United States Attorney William J. Cook, who heads the Computer
- Fraud and Abuse Task Force, and Assistant United States Attorneys
- Colleen D. Coughlin and David Glockner supervised the Secret Service
- investigation in Chicago.
-
- ----------
- (1) The UNIX operating system utility programs are written initially
- in a format referred to as "source code," a high-level computer
- language which frequently uses English letters and symbols for
- constructing computer programs. The source code was translated, using
- another program known as a compiler, into another form of program
- which a computer can rapidly read and execute, referred to as the
- "object code."
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: hkhenson@CUP.PORTAL.COM
- Subject: Letter to AT&T Cancelling Long-Distance Carrier Service
- Date: Tue, 2 Apr 91 16:51:03 PST
-
- ********************************************************************
- *** CuD #3.11: File 5 of 5: Letter to AT&T Cancelling Service ***
- ********************************************************************
-
- %Moderator Comment: Individuals may or may not be able to change
- policies with their actions, but if enough people act things will
- change. Keith Hansen cancelled AT&T as his long distance carrier, and
- although it may seem a token gesture, if enough of us do it (including
- the moderators), perhaps AT&T will eventually get the message. Or,
- perhaps not, as cynics would argue. But, what can it hurt?
-
- One observer remarked that AT&T and BellSouth/BellCorp are separate
- entities, and allusion to the Craig Neidorf trial may not be
- appropriate. But, as Craig Neidorf remarked, AT&T work closely
- together and in his case AT&T was well aware of the prosecution's
- evidence and could readily have intervened because of the close
- working relationship. As we will suggest in a forthcoming CuD article,
- AT&T in the past has hardly been reticent to challenge the limits of
- law when it served their purposes. Yet, when their own ox is gored,
- they seem to demand invocation of the full measure of criminal law and
- more. Keith's letter is an excellent model for those willing to follow
- his example.%
-
- March 29, 1991
-
-
- Robert E. Allen
- Chairman of the Board
- ATT Corporate Offices
- 550 Madison Ave.
- New York, NY 10022
-
- Dear Mr. Allen:
-
- As a loyal ATT long-distance customer all my life, I feel I
- owe you an explanation for canceling my ATT long-distance
- service.
-
- I have never had a problem with ATT service, operators, or
- audio quality. I was more than willing to pay the small premium,
- and have been a heavy user of ATT long-distance services for the
- past 15 years. I am also a consultant in the computer business
- who has used Unix and its derivatives intermittently over the
- past 10 years. Outside of my technical work I have long been
- involved in legal and political issues related to high
- technology, especially space. One of my past activities involved
- the political defeat of an oppressive United Nations treaty. I
- have also taken substantial personal risks in opposing the
- organizations of Lyndon LaRouche. During the last three years I
- have been personally involved with email privacy issues.
-
- Because of my interest in email privacy, I have closely
- followed the abusive activities of Southern Bell and the Secret
- Service in the Phrack/Craig Neidorf case and the activities of
- ATT and the Secret Service with respect to the recently concluded
- case involving Len Rose. Both cases seem to me to be attempts to
- make draconian "zero tolerance" examples of people who are--at
- most--gadflies. In actuality, people who were pointing out
- deficiencies and methods of attack on Unix systems should be
- considered *resources* instead of villains.
-
- I consider this head-in-the-sand "suppress behavior" instead
- of "fix the problems" approach on the part of ATT and the
- government to be potentially disastrous to the social fabric.
- The one thing we don't need is a number of alienated programmers
- or engineers mucking up the infrastructure or teaching real
- criminals or terrorists how to do it. I find the deception
- of various aspects of ATT and the operating companies to obtain
- behavior suppression activities from the government to be
- disgusting, and certainly not in your long-term interest.
-
- A specific example of deception is ATT's pricing login.c (the
- short program in question in the Len Rose case) at over $77,000
- so the government could obtain a felony conviction for
- "interstate wire fraud." Writing a version of login.c is often
- assigned as a simple exercise in first-semester programming
- classes. It exists in thousands of versions, in hundreds of
- thousands of copies. The inflation is consistent with Southern
- Bell's behavior in claiming a $79,000 value for the E911 document
- which they admitted at trial could be obtained for $13.
-
- I know you can argue that the person involved should not
- have plead guilty if he could defend himself using these
- arguments in court. Unlike Craig Neidorf, Len Rose lacked
- parents who could put up over a hundred thousand dollars to
- defend him, and your company and the Secret Service seem to have
- been involved in destroying his potential to even feed himself,
- his wife, and two small children. At least he gets fed and
- housed while in jail, and his wife can go on welfare. All, of
- course, at the taxpayer's expense.
-
- There are few ways to curtail abuses by the law (unless you
- happen to catch them on videotape!) and I know of no effective
- methods to express my opinion of Southern Bell's activities even
- if I lived in their service area. But I can express my anger at
- ATT by not purchasing your services or products, and encouraging
- others to do the same.
-
- By the time this reaches your desk, I will have switched my
- voice and computer phones to one of the other long-distance
- carriers. My consulting practice has often involved selecting
- hardware and operating systems. In any case where there is an
- alternative, I will not recommend Unix, ATT hardware, or NCR
- hardware if you manage to buy them.
-
-
- Yours in anger,
-
-
-
- H. Keith Henson
-
- cc: Telecom Digest, comp.risk, etc.
-
-
- PS: My wife added the following:
-
- I want you to try to understand something--a lesson that can
- be learned from these cases. We are no longer living in the
- Industrial Age, when a product could be made in "one-size-fits
- all," packaged, sold and used without modification or support,
- like a television. We face massive problems in the Information
- Age in protecting intellectual property, but we cannot simply
- transfer old-world, Industrial-Age police attitudes to these
- problems. Possessing a copy of my program without paying for it
- is not the same as stealing my television. If you modify my
- program and make it more usable to the community, I can still go
- on charging for the use of my program, but I can also incorporate
- your modifications, and charge for them--especially if I pay you
- something for the help. If you provide support for my programs
- (something every major hardware and software manufacturer has had
- to either severely curtail or--like IBM--abandon altogether
- without extra charges), then you have made my product more
- usable. This is what the so-called "hacker" culture is all
- about. I'm talking about ethical "hackers" here, not the media
- image of breakin artists or virus-spreading nerds whose only
- compensation is a malignant satisfaction in destroying computer
- systems. The "hacker" culture is really a native population of
- problem solvers whose pleasure is in tailoring products to their
- own and other's use, and often pushing back the limits on a
- product. Ethical hackers are willing to pay for their use of
- products (although it's absurd to charge such a support provider
- tens of thousands of dollars for source code when he has neither
- the equipment nor the desire to use source code *as a product*).
- And they are willing to help others to use them by providing
- support which ATT could not afford to provide if it charged twice
- the price for its products! This was the sort of "theft" Len
- Rose was involved in--custom tailoring of the ATT product,
- helping customers to use the programs, manipulation of software
- which he could not use himself in any way except to help others
- use it. Prosecuting Len Rose was like prosecuting a TV repairman
- as a thief because he was removing the television from the house
- to take it to his shop--except that unlike the TV repairman, Len
- Rose didn't even need to take it into the shop, and his having a
- copy of it could do nothing except benefit ATT.
-
- In the long run, this inappropriate application of Industrial-Age
- concepts of ownership and prosecution is going to be lethal to
- you and everyone else in the same boat. While you think you are
- sending a signal that theft will not be tolerated, what you are
- actually doing is sending a signal that customer support,
- personal tailoring of programs and cooperation with ATT in
- producing a product usable by many more millions of people will
- not be tolerated. Your problem is partly that no official
- channels exist for appreciation and remuneration for the type of
- work Len Rose did as a consultant and support provider, not that
- "hackers" like him exist and flourish. (Unofficial channels
- obviously do exist for circulation of ATT materials, else where
- would he have obtained the source?--a local K-Mart?) And be
- aware that Len Rose was the least of your worries. Hackers much
- more powerful than he exist, and you have enraged them when you
- could have engaged their cooperation.
-
- Sincerely,
-
- Arel Lucas
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #3.11**
- ********************************************************************
-
-