home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 3, Issue #3.12 (April 15, 1991) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
- POETICA OBSCIVORUM REI: Brendan Kehoe
-
- +++++ +++++ +++++ +++++ +++++
-
- CONTENTS THIS ISSUE:
- File 1: Moderators' Corner
- File 2: From the Mailbag
- File 3: Business Week Article on The Dread Hacker Menace
- File 4: Using the CuD email archive server
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- USENET readers can currently receive CuD as alt.society.cu-digest.
- Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
- PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
- Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
- (2) cudarch@chsun1.uchicago.edu;
- (3) dagon.acc.stolaf.edu (130.71.192.18).
- E-mail server: archive-server@chsun1.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. Some authors, however, do copyright their material, and those
- authors should be contacted for reprint permission. It is assumed
- that non-personal mail to the moderators may be reprinted unless
- otherwise specified. Readers are encouraged to submit reasoned
- articles relating to the Computer Underground. Articles are preferred
- to short responses. Please avoid quoting previous posts unless
- absolutely necessary.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Contributors assume all
- responsibility for assuring that articles submitted do not
- violate copyright protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Moderators
- Subject: Moderators' Corner
- Date: 15 April, 1991
-
- ********************************************************************
- *** CuD #3.12: File 1 of 4: From the Moderators ***
- ********************************************************************
-
- +++++++++++++
- NEW FTP SITE
- +++++++++++++
-
- Another ftp site has been added where back issues of CuD, Phrack, and
- other documents can be obtained.
- Anonymous ftp to: dagon.acc.stolaf.edu
- (130.71.192.18 is the IP address for dagon).
- CD to the 'Next-ug/phrack' directory.
-
- NOTE: *!PLEASE!* use only between 1700-0600 (5 pm and 6 am)!
- We depend on courtesy of users to keep the sites running. Thanks.
- And thanks to the new ftpmaster for setting this up!
-
- For those wanting additional instructions on using the mail
- server, see file # 4 below.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Assorted
- Subject: From the Mailbag
- Date: April 15, 1991
-
- ********************************************************************
- *** CuD #3.12: File 2 of 4: From the Mailbag ***
- ********************************************************************
-
- Subject: Len Rose, licenses, and piracy
- From: peter@TARONGA.HACKERCORP.COM(Peter da Silva)
- Date: Sun, 7 Apr 91 13:44:05 CDT
-
- We have some odd numbers here: could someone explain them?
-
- > The UNIX operating system, which is
- > licensed by AT&T at $77,000 per license,
-
- Last time I checked the UNIX source code was considerably more than
- this. The version of UNIX that was licenced for $77,000 for source is
- no longer offered.
-
- > The login program is licensed by AT&T at $27,000 per license.
-
- Is this true, that "login" is licensed separately? If so, it's
- unlikely that it was licensed separately back in V7 days.
-
- So what's the story? Is AT&T actually lowering the estimated value of
- UNIX here, or inventing a separate license for the login program, or
- is there actually some boilerplate license for portions of the UNIX
- source?
-
- In any case, the people claiming that the 77,000 figure is "obviously"
- just another exaggerated pricing are mistaken: that figure is an
- extreme understatement of the value of teh UNIX source. The price on
- the login.c program, $27,000, does seem out of line though.
-
- Finally, I would like to note that unlike many of the posters here I'm
- not going to try to excuse Rose's adding trapdoors to login.c as
- either educational or providing support to AT&T customers. His
- posession of this code was definitely illegal. His use of it was,
- while perhaps protected under the first amendment, hardly wise.
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Subject: Len Rose
- From: jrbd@CRAYCOS.COM(James Davies)
- Date: Mon, 8 Apr 91 14:15:51 MDT
-
- Keith Hansen and Arel Lucas in CuD #3.11 shared with us their letter
- to AT&T expressing their anger at the arrest and conviction of Len
- Rose (among other things). Well, I have to disagree with their
- conclusions in this case -- Len Rose is not an innocent martyr,
- crucified by an evil corporation for benevolently giving unpaid
- support to AT&T software users, as Hansen and Lucas attempted to
- portray him. The press release published earlier in the same CuD
- issue makes it clear that Rose's intent was to steal passwords and
- invade systems. While the possession of AT&T source code was the
- charge of which Rose was convicted, his actual crime (in a moral
- sense) was the equivalent of manufacturing burglar's tools, or perhaps
- of breaking and entering (although there isn't any evidence that he
- actually did any of this, his intent was clearly to help others do
- so). Nothing makes this more obvious than Rose's own words, as quoted
- from the comments in his modified login.c by the Secret Service press
- release:
-
- Hacked by Terminus to enable stealing passwords.
- This is obviously not a tool to be used for initial
- system penetration, but instead will allow you to
- collect passwords and accounts once it's been
- installed. (I)deal for situations where you have a
- one-shot opportunity for super user privileges..
- This source code is not public domain..(so don't get
- caught with it).
-
- I'm sorry, but these aren't the words of an innocent man.
-
- Personally, I think that Rose is guilty of the exact same sort of
- behaviour that gives hackers a bad name in the press, and I think that
- you're crazy to be supporting him in this. Save your indignation for
- true misjustices, ok?
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++=
-
- Subject: Re: Computers and Freedom of Speech
- From: elroy!grian!alex@AMES.ARC.NASA.GOV(Alex Pournelle)
- Date: Tue, 9 Apr 1991 09:02:53 GMT
-
- In CuD 3.11, works!LC1%das@HARVUNXW.BITNET wrote:
-
- >In response to an article in CuD 3.09 on computer publications...
-
- >What gives people the right to censor and deem something illegal in
- >the electronic media when paper, TV, radio, and the spoken word is
- >perfectly legal and protected by the first amendment.
-
- Why am I having to answer this? Wasn't this mentioned ten times in the
- past? I'll repeat: TV and radio are federally-minded resources "of the
- people", which have guidelines set up by the FCC, nominally in the
- interest by/for/of the people. (The rationale for the government
- minding the spectrum is that it's a scarce resource and one prone to
- huge abuse if not minded. That argument cuts both ways, doesn't it?)
-
- Telephones are covered by "common-carrier" laws, which prevent
- Pac*Bell from being confiscated because someone plans a murder over the
- wires. Ditto for cellular, Tymnet, telegraph and everything like them.
- This is a two-edged sword: the telcos have to give access to anyone who
- carries money, whether they "like" them or not. And they can have
- nothing (well, little--see "The Cuckoo's Egg" for one exception) to do
- with the content of what they carry.
-
- BBSes and for-pay services are NOT covered by common-carrier: THEY ARE
- PRIVATE SERVICES. The reason that CompuServe and BIX aren't confiscated
- every month is because H&R Block and McGraw-Hill have more lawyers than
- the Dept. of Justice--and they'd sue like crazy, and the government knows
- it. But since they're private, Prodigy can take off whatever messages
- it wants to. Whether it's violating privacy laws by reading people's
- mail is a matter I am not qualified to discuss.
-
- %I have, in fits of anger, wanted to take this "too big to confiscate"
- argument another step--say, building the computer into the foundation of
- a house, or better yet, into the foundation of an apartment building
- whose owner I didn't like. Or running it on an H-P 3000, the old kind
- that takes up an entire garage. And videotaping the attempts to remove
- the thing. But I digress.%
-
- >Q: Shouldn't electronic publications be protected under the same
- >article of the constitution that allows free presses?
-
- If they can be shown to be the same thing. Can you make this stand in a
- court of law? I can't; the EFF is trying to. It's incredibly
- important, no doubt.
-
- >A: Most definitly. [sic]
-
- Why? Stand right there and tell the judge why your PC and a modem
- should be accorded the same shield laws as the L.A. Times. Then explain
- that to the same L.A. Times, in short words, and get it printed.
-
- >The question now is why aren't they?
-
- No, that's only one question. Ignorance is probably the main reason for
- this state of affairs; ignorance that spawns "YOUR KIDS COULD BE TARGETS
- OF WHITE-SUPREMACIST PEDERASTS WHO NUKE DOLPHINS WHILE EATING
- HIGH-CHOLESTERAL FATS!!!! SCENES OF THEIR ILLICIT IMMORAL COMPUTER
- NETWORK LIVE FROM THE SCENE!!! FILM AT ELEVEN, RIGHT AFTER THE MISS NUDE
- BIKINI CONTEST WINNER INTERVIEW!!!!" so-called journalism on television.
-
- But that same ignorance, I'm afraid, pervades this very conference. If
- the Sixties, that period of unbounded and unfocussed optimism, taught me
- anything by hindsight, it's this: Know Reality. Wishful thinking won't
- change a thing. If you're concerned about the issues of electronic
- freedom--and we all should--Know Reality. That means understanding
- RCCs, RFCs, PSTNs, POTS, CLASS, CLIDs and FOIAs. For that scary future
- we can't stop _will_ be based on the past. It is up to us to make sure
- it is based on the right parts.
-
- Sincerely,
- Alex Pournelle
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++=
-
- From: chron!magic322!edtjda@UUNET.UU.NET(Joe Abernathy)
- Subject: Defining Hackers for the Media
- Date: Wed, 10 Apr 91 19:31:01 CDT
-
- From the you asked for it, you got it department:
-
- We've decided to do a brief sidebar treatment of the controversy over
- the use of words such as hacker, cracker, phreaker, codez kids, etc.
-
- Your brief, to-the-point comments are hereby invited for publication.
- Please fully identify yourself and your organization (or whatever job
- description best qualifies you to have an opinion on the subject).
-
- Please respond via electronic mail to:
-
- edtjda@chron.com or %nearbybighost%!uunet!chron!edtjda
-
- If there is an overwhelming volume of responses, I will not make
- individual acknowledgements. The resulting story will in any case be
- submitted for possible distribution in cud; and will be available
- electronically to those submitting their thoughts on the subject.
-
- Thanks in advance.
-
- Joe Abernathy
- Houston Chronicle
- (800) 735-3820
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++=
-
- From: kadie@EFF.ORG(Carl Kadie)
- Subject: Computers and Academic Freedom - a new mailing list
- Date: Wed, 10 Apr 91 12:05:43 EDT
-
- Announcing a new mailing list: comp-academic-freedom-talk
-
- Purpose: To discuss questions such as: How should general principles
- of academic freedom (such as freedom of expression, freedom to read,
- due process, and privacy) be applied to university computers and
- networks? How are these principles actually being applied? How can the
- principles of academic freedom as applied to computers and networks be
- defended?
-
- To join: send email to listserv@eff.org. The body of the note should
- contain the line
- add comp-academic-freedom-talk
- To leave the list, send email with the line
- delete comp-academic-freedom-talk
- For more information about listserv, sent email with the line
- help
-
- After you join the list, to send a note to everyone on the
- list, send email to comp-academic-freedom-talk@eff.org (or caf-talk@org).
-
- The long version:
- When my grandmother attended the University of Illinois fifty-five
- years ago, academic freedom meant the right to speak up in class, to
- created student organizations, to listen to controversial speakers, to
- read "dangerous" books in the library, and to be protected from random
- searches of your dorm room.
-
- Today these rights are guaranteed by most universities. These days,
- however, my academic life very different from my grandmother's. Her
- academic life was centered on the classroom and the student union.
- Mine centers on the computer and the computer network. In the new
- academia, my academic freedom is much less secure.
-
- It is time for a discussion of computers and academic freedom. I've
- been in contact with Mitch Kapor. He has given the discussion a home on
- the eff.org machine.
-
- The suppression of academic freedom on computers is common. At least
- once a month, someone posts on plea on Usenet for help. The most
- common complaint is that a newsgroup has been banned because of its
- content (usually alt.sex). In January, a sysadmin at the University of
- Wisconsin didn't ban any newsgroups directly. Instead, he reduced the
- newsgroup expiration time so that reading groups such as alt.sex is
- almost impossible. Last month, a sysadmin at Case Western killed
- a note that a student had posted to a local newsgroup. The sysadmin
- said the information in the note could be misused. In other cases,
- university employees may be reading e-mail or looking through user
- files. This may happen with or without some prior notice that e-mail
- and files are fair game.
-
- In many of these cases the legality of the suppression is unclear. It
- may depend on user expectation, prior announcements, and whether the
- university is public or private.
-
- The legality is, however, irrelevant. The duty of the University is
- not to suppress everything it legally can; rather it is to support the
- free and open investigation and expression of ideas. This is the ideal
- of academic freedom. In this role, the University acts a model of how
- the wider world should be. (In the world of computers, universities are
- perhaps the most important model of how things should be).
-
- If you are interested in discussing this issues, or if you have
- first-hand experience with academic supression on computers or
- networks, please join the mailing list.
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++=
-
- From: Anonymous
- Subject: Fox Broadcasting, Hollywood Hacker, and Evil-doings
- Date: Sat, 7 Apr 91 19:18:15 MDT
-
- Given what Fox Television did to the Hollywood Hacker, I thought
- this might be of interest if anybody wants to read it. The following
- story appeared in the New York Times today:
-
- "Guns Found at Airport During Visit by Bush"
-
- LOS ANGELES, April 6 (AP)--Two television employees were detained
- but not arrested Friday night after two .22 caliber pistols were
- found intheir vehicles as they tried to enter an area at Los
- Angeles Airport that was secured for President Bush's departure.
-
- It was the first time that firearms had been found so close to a
- President, the White House spokesman, Marlin Fitzwater, said.
-
- --(stuff omitted)
-
- The two men were a cameraman from Fox Television and a courier for
- Cable News Network. Neither was identified.
-
- The article concludes by saying that the gun was carried in violation
- of company policy.
-
- Now, I ask this: If the HH was set up, I wonder if it's possible that
- Fox was maybe trying to do a sting of its own to see how close they
- could get The Prez without being caught?
-
- Did this story make the same splash on Fox that the HH story did? Did
- Fox come up with a cute name for these guys? Why didn't it have
- television cameras present when they got caught? Seems to me that
- getting caught with weapons so near the President is far more serious
- than logging on to a computer somewhere. I just wonder if Fox
- terminated its employee, and applied the same standards of fairness,
- lose as they may be, to these guys as they did to the HH? It's all
- gotta make ya wonder about Fox's credibility, doesn't it?
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++=
-
- FROM: cybrview@EFF.ORG
- Subject: Looking at CyberSpace from Within
- Date: Thu, 11 Apr 91 16:20 CDT
-
- Looking At CyberSpace From Within
-
-
- On January 18, 1990, Craig Neidorf was visited by the United States
- Secret Service. Shortly afterwards he became the first victim in a
- war to preserve the rights guaranteed to all by the United States
- Constitution. He would not be alone. Steve Jackson Games, though not
- a target of any criminal investigation, was treated worse than most
- criminals when his company was inexplicably raided by the Secret
- Service.
-
- A dangerous trend was in evidence throughout the nation when Secret
- Service agents -- during Operation Sun-Devil and other related cases
- -- acted as if the interests of corporations like Bellcore are more
- important than those of individual citizens.
-
- Mitch Kapor, John Barlow, and others banded together to meet the
- challenge. They became the Electronic Frontier Foundation and they
- set forth to not only defend those wrongly accused of crimes, but to
- educate the public and law enforcement in general about computers and
- today's technology.
-
- EFF participated in a large public forum in March 1991. It was the
- first conference on Computers, Freedom, & Privacy, which was in
- general an opportunity to teach and learn from law enforcement
- officials, defense attorneys, and others with a more professional
- interest in the field. Now it is time to change gears a little and
- focus on a different group of people.
-
- Announcing...
- CyberView '91
- St. Louis, Missouri
- The Weekend of June 21-23, 1991
-
- A face-to-face opportunity to learn views, perspectives, and ideas
- from the people who live in CyberSpace on a day-to-day basis.
-
- CyberView '91 is a conference to discuss civil liberties in CyberSpace
- with the group of people that have been affected the most -- Hackers.
- It is not a forum to discuss computer or telecommunications systems in
- the context of security or accessibility. Instead this is the chance
- for the people who call themselves hackers to meet the Electronic
- Frontier Foundation in person and share their feelings with the people
- who might be able to make a difference and hopefully learn a few
- things at the same time.
-
- This conference is by INVITATION ONLY. If you are interested in
- attending this noteworthy event please leave electronic mail to
- "cybrview@EFF.ORG."
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++=
-
- From: cosell@BBN.COM(Bernie Cosell)
- Subject: Re: Is hacking the same as Breaking and Entering?
- Date: 10 Apr 91 13:15:09 GMT
-
- The Works BBS Admin <works!root@UUNET.UU.NET> writes:
-
- %In response to the question: "Is computer hacking the same as B&E?"
-
- %Not by far. Breaking and entering has malicious intent, and usually is
- %solely to steal things and/or hurt something. Hacking although
- %portrayed negatively in the press is not like this at all. It is
- %merely looking around at what is in various systems, and learning from
- %it. ...
-
- While I'm sure this is sincerely felt, it so egregiously distorts the
- real issues involved it makes one wonder if Mr "root" even UNDERSTANDS
- what the dispute is all about.
-
- Consider: it is the middle of summer and you happen to be climbing in
- the mountains and see a pack of teenagers roaming around an
- abandoned-until-snow ski resort. There is no question of physical
- harm to a person, since there will be no people around for months.
- They are methodically searching EVERY truck, building, outbuilding,
- shed, etc,. Trying EVERY window, trying to pick EVERY lock. When they
- find something they can open, they wander into it, and emerge a while
- later. From your vantage point, you can see no actual evidence of any
- theft or vandalism, but then you can't actually see what they're doing
- while they're inside whatever-it-is.
-
- Should you call the cops? What should the charge be? Would the answer
- be different if you OWNED the ski resort and it was YOUR stuff they
- were sifting through? I grant you that one should temper the crime
- with the assessment of the ACTUAL intent and the ACTUAL harm done, but
- that certainly doesn't argue that the intrusion, itself, shouldn't be a
- crime.
-
- %... the majority of
- %hackers (in my opinion) are not trying to hurt anything, and only
- %allow themselves a little room to look at, and possible a small chair
-
- What a load of crap.... If you want a room and a chair, ask one of your
- friends for one, but include me out.
-
- % Say you find an unknown account
- %mysteriously pop up? Why not find out who it is, and what they are
- %looking for first, because as odds go, if they got in there once,
- %they can do it again, no matter what you do.
-
- For two reasons:
-
- 1) just because YOU have such a totally bankrupt sense of ethics and
- propriety, that shouldn't put a burden on *me* to have to waste my
- time deailing with it. Life is short enough to not have it
- gratuitously wasted on self-righteous, immature fools.
-
- 2) I'm just as happy having that kind of "finding out" done by the
- police and the courts --- that's their job and I'd just as soon not
- get involved in the messy business [even if I could spare the time].
- If you can't learn to act like a reasonable member of society for its
- own sake, perhaps somewhat more painful measures will dissuade you
- from "doing it again".
-
- If you want to 'play' on my system, you can ASK me, try to convince me
- *a*priori* of the innocence of your intent, and if I say "no" you
- should just go away. And playing without asking is, and should be,
- criminal; I have no obligation, nor any interest, in being compelled to
- provide a playpen for bozos who are so jaded that they cannot amuse
- themselves in some non-offensive way.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Moderators, J&B McMullen, and H. Silverglate and S. Beckman
- Subject: Business Week Article on The Dread Hacker Menace
- Date: April 15, 1991
-
- ********************************************************************
- *** CuD #3.12: File 3 of 4: Responses to Business Week Article ***
- ********************************************************************
-
- In the April 15, 1991, issue of BUSINESS WEEK (p. 31), Mark Lewyn and
- Evan I. Schwartz combined to write "Why 'the Legion of Doom' has
- Little Fear of the Feds." The article has been criticized by
- attorneys, journalists, and computer professionals for its flagrant
- inaccuracies, potentially libelous commentary, and distortion of facts
- and issues. A superficial reading of the article might lead others to
- agree with the criticisms we print below. We, however, rather like
- the article and find it a refreshing narrative. Clearly, as we read
- Lewyn and Schwartz, they were writing satire. The article is obviously
- an attempt at postmodernist fiction in which truth is inverted and
- juxtaposed in playful irony in an attempt to illustrate the failure of
- Operation Sun Devil. The clever use of fiction underscores the abuses
- of federal and other agents in pursuing DHs ("Dreaded Hackers") by
- reproducing the symbols of bad acts (as found in government press
- releases, indictments and search affidavits) *as if* they were real in
- a deconstructionist style in which the simulacra--the non-real--become
- the substance.
-
- Let's take a few examples:
-
- In a table listing the suspect, the alleged crime, and the outcome
- of five hackers to show the "latest in a a series of setbacks
- for the government's highly publicized drive against computer
- crime (table)," the table lists Robert Morris, Steve Jackson,
- Craig Neidorf, the Atlanta Three, and Len Rose. Steve Jackson
- was not charged with a crime, even though the table tells us the
- case was dismissed for lack of evidence. The article calls Craig
- Neidorf a hacker (he was never charged with, nor is there any
- indication whatsoever, that he ever engaged in hacking activity), and
- fails to mention that the case was dropped because there was, in fact,
- no case to prosecute. We interpret this as a subtle way of saying
- that all innocent computerists could be accused of a crime, even if
- there were no evidence to do so, and then be considered a computer
- criminal. This, and other factual errors of readily accessable and
- common public knowledge suggests to us that the table is a rhetorical
- ploy to show the dangerous procedures used by the Secret Service. Why
- else would the authors risk a libel suit?
-
- In another clever bit of satirical prose, the authors write:
-
- Jerome R. Dalton, American Telephone & Telegraph Co.'s corporate
- security manager, is convinced that the feds simply can't
- convict. He points to Leonard Rose Jr., a computer consultant
- who pleaded guilty on Mar. 22 to wire-fraud charges in Chicago and
- Baltimore. Prosecutors said he sent illegal copies of a $77,000
- AT&T computer-operating system known as Unix to hackers around
- the country after modifying it so it could be used to invade
- corporate and government systems.
-
- The article adds that Dalton
-
- contends that without AT&T's help, the government wouldn't have had a
- case. It was AT&T--not the feds--that verified that Rose wasn't a
- licensed Unix user and that the program had been modified to make
- breaking into computer systems easier."
-
- Now, this could be considered an innocuous statement, but the
- subtleness is obvious. To us, the authors are obviously saying that
- AT&T helped the feds by inflating the value of material available for
- about $13.95 to an astronomical value of $78,000 (later lowered to
- $23,000). And, why should the feds know who Unix is licensed to? Last
- we checked, AT&T, not the government, was responsible for keeping
- track of its business records, and AT&T was responsible for pursuing
- the charges. The Len Rose case was not a hacker case, the program was
- not sent to other "hackers," there was no evidence (or charges) that
- anybody had even tried to use the login.c program that allegedly was
- modified, and the case was not a hacker case at all, but rather a case
- about unlicensed software. So, it seems to us that the authors are
- trying to illustrate the arrogance of AT&T and the evidentiary
- aerobics used to try to secure indictments or convictions in cases
- that are more appropriately civil, rather than criminal matters.
-
- So, we say congrats to the authors for taking the risk to write news
- as fiction, and suggest that perhaps they should consider changing
- their career line.
-
- But, we recognize that others might interpret article as
- irresponsible, ignorant, and journalistically bankrupt. We reprint
- (with permission) two letters sent to Business Week in response to the
- article.
-
- Others wishing either to complain to BW or to commend their
- reporters on their fiction writing can fax letters to Business
- Week at (212) 512-4464.
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- MCMULLEN & MCMULLEN, INC
-
-
- April 9, 1991
-
- Readers Report
- Business Week
- 1221 Avenue of the Americas
- New York, NY 10020
-
- Dear Madam or Sir,
-
- As a long time admirer of your coverage of technological issues, I was
- dismayed to find an appalling number of inaccuracies in "Why 'The
- Legion OF Doom' Has Little Fear Of The Feds" (BW, 04/15/91). The
- article, unfortunately, shows little attention to detail in its
- presentation of "facts" and winds up being unfair to those "accused"
- and law enforcement officials alike.
-
- The article states that Steve Jackson, "President of computer-game
- maker accused of publishing a 'handbook of computer crime' had his
- "case dismissed because of lack of evidence." In fact, Steve Jackson
- was never accused of anything (there was a remark made by a Secret
- Service Agent that the game about to be published read like a
- "handbook of computer crime" -- the game is a role playing game set in
- a future totalitarian society). Steve Jackson's computers, diskettes
- and printed records were seized pursuant to an investigation of one of
- his employees who was thought to be a recipient of information related
- to the investigation of Craig Neidorf's electronic publishing
- activities. Jackson's equipment has since been returned and law
- enforcement officials attending the recent "Computers, Freedom &
- Privacy" conference in San Francisco referred to the Jackson case as
- one that should not have happened (One of the authors of your piece,
- Evan Schwartz, was listed as an attendee at the conference. Copies of
- the search warrant used in obtaining Jackson's equipment were
- available to all attendees at the conference. The warrants clearly
- indicate that Jackson was not a subject of the investigation. It is my
- information that Jackson will shortly file suit against the government
- as a result of the damage that the "search and seizure" did to his
- business.
-
- I suggest that you, by your description, have made Jackson fit the
- public image of John Gotti -- a person "everyone knows is guilty" but
- for whom insufficient evidence exists to make him pay his just
- deserts. In Jackson's case, nothing could be further from the truth.
-
- The article states that Franklin Darden, Jr, Adam Grant and Robert
- Riggs were "each sentenced to one year split between a half-way house
- and probation." In fact, Riggs received 21 months in prison while
- Grant and Darden received 14 months with the stipulation that 7 may be
- served in a half-way house. Additionally, the three were ordered to
- jointly and/or separately make restitution to BellSouth for $233,000.
- After reading the article, I spoke to Kent Alexander, US Attorney
- responsible for the prosecution of Riggs, Darden and Grant to confirm
- the sentences. Alexander not only confirmed the sentences; he objected
- to the calling of the cases as other than a victory for the government
- (There are many in the computer community who feel that the sentence
- was, in fact, too harsh. None would consider it other than a
- government "victory".). Alexander also affirmed that each of the
- defendants is actually doing prison time, rather than the type of
- split sentence mentioned in the article. Alexander also told me, by
- the way, that he believes that he sent a copy of the sentencing
- memorandum to one of your reporters.
-
- The actual sentences imposed on Riggs, Darden and Grant also, of
- course, makes the article's statement that Rose's one-year sentence is
- "by far the stiffest to date" incorrect.
-
- The treatment of the Neidorf case, while perhaps not factually
- incorrect, was superficial to the point of dereliction. Neidorf, the
- publisher of an electronic newsletter, Phrack, was accused of
- publishing, as part of his newsletter, a document which later was
- proven to be unlawfully obtained by Riggs, Darden and Grant -- an
- activity that many saw as similar to the Pentagon Papers case. The
- case was, in fact, eventually dropped when it turned out that the
- document in question was publicly available for under $20. Many
- believe that the case should never have been brought to trian in the
- first place and it is to this kind of electronic publishing activity
- that Professor Tribe's constitutional amendment attempts to protect.
-
- It is a bit of a reach to call Neidorf a "hacker". He is a college
- senior with an interest in hacking who published a newsletter about
- the activities and interest of hackers. It is totally inaccurate to
- call Jackson a hacker, no matter what definition of that oft-misused
- terms is applied.
-
- The article further states that the target of the Sundevil
- investigation was the "Legion of Doom". According to Gail Thackeray,
- ex-Assistant Attorney General of the State of Arizona and one of the
- key players in the Sundevil investigation, and the aforementioned Kent
- Alexander (both in conversations with me and, in Thackeray's case, in
- published statements), this is untrue. The Legion of Doom was a
- loosely constructed network of persons who, it has been alleged and,
- in some cases, proven, illegally accessed computers to obtain
- information considered proprietary. The subjects of the Sundevil
- investigations were those suspected of credit card fraud and other
- crime for profit activities. On April 1st, commenting on the first
- major Sundevil indictment, Thackeray was quoted by the Newsbytes News
- Service as saying "The Sundevil project was started in response to a
- high level of complaint of communications crimes, credit card fraud
- and other incidents relating to large financial losses. These were not
- cases of persons accessing computers 'just to look around' or even
- cases like the Atlanta 'Legion of Doom' one in which the individuals
- admitted obtaining information through illegal access. They are rather
- cases in which the accused allegedly used computers to facilitate
- theft of substantial goods and services."
-
- The article further, by concentrating on a small number of cases,
- gives the reader the impression that so-called "hackers' are free to
- do whatever they like in the global network that connects businesses,
- government and educational institutions. There have been many arrests
- and convictions in recent months for computer crime. In New York State
- alone, there have been arrests for unlawful entries into PBX's,
- criminal vandalism, illegal access to computers, etc. Heightened law
- enforcement activity, greater corporate and government concern with
- security and a better understanding by "hackers" of acceptable limits
- are, if anything, making a safer climate for the global net while the
- concern of civil libertarians coupled with greater understanding by
- law enforcement officials seems to be reducing the possibility of
- frivolous arrests and overreaching. This improved climate, as
- evidenced by the recent conference on "Computers, Freedom and
- Privacy", is a far cry from the negative atmosphere evidenced in the
- conclusion of your article.
-
- I have spent the last few years discussing the issues of computer
- crime, access to information and reasonable law enforcement procedures
- with a wide range of individuals --police officers, prosecutors,
- defense attorneys, "hackers", civil libertarians, lawmakers, science
- fiction writers, etc. and have found that their opinions, while often
- quite different, warrant presentation to the general public.
- Unfortunately, your article with its factual errors and misleading
- conclusions takes away from this dialog rather than providing
- enlightenment; it is a great disappointment to one who has come to
- expect accuracy and insightful analysis from Business Week. I urge you
- to publish an article explaining these issues in full and correcting
- the many errors in the April 15th piece.
-
- Yours truly,
-
-
- John F. McMullen
- Executive Vice President
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- Response #2
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
-
- April 8, 1991
-
- Readers Report
- Business Week
- 1221 Avenue of the Americas
- New York, NY 10020
-
- Dear Editor,
-
- Mark Lewyn and Evan Schwartz are correct that the Secret Service's
- "Operation Sundevil" has been a disaster ("Why %The Legion of Doom'
- has little fear of the Feds", BW April 15th), but the rest of their
- article completely misses the point. The problem with the
- government's war on computers is not that "it's much harder to nail
- hackers for electronic mayhem than prosecutors ever imagined," but
- rather, that lack of computer sophistication has caused prosecutors
- and investigators to treat law-abiding citizens like criminals. Their
- reporting on Steve Jackson Games is particularly egregious. To call
- Steve Jackson a "suspect" in the "war on hackers" is to allege
- criminal conduct that even the government never alleged.
-
- Steve Jackson Games is a nationally known and respected, award-winning
- publisher of books, magazines, and adventure company was ever accused
- of any criminal activity. The government has verified that Jackson is
- not the target of any investigation, including "Operation Sundevil."
- There was no criminal case "dismissed because of lack of evidence"
- --there simply was no criminal case at all.
-
- Lewyn and Schwartz missed the real story here. Based on allegations
- by government agents and employees of Bellcore and AT&T, the
- government obtained a warrant to seize all of the company's computer
- hardware and software, and all documentation related to its computer
- system. Many of the allegations were false, but even if they had been
- true, they did not provide any basis for believing that evidence of
- criminal activity would be found at Steve Jackson Games.
-
- The Secret Service raid caused the company considerable harm. Some of
- the equipment and data seized was "lost" or damaged. One of the
- seized computers ran an electronic conferencing system used by
- individuals across the country to discuss adventure games and related
- literary genres. The company used the system to communicate with its
- customers and writers and to get feedback on new game ideas. The
- seizure shut the conferencing system down for over a month. Also
- seized were all of the current drafts of the company's
- about-to-be-released book, GURPS Cyberpunk. The resulting delay in
- the publication of the book caused the company considerable financial
- harm, forcing it to lay off half of its employees.
-
- Jackson has resuscitated his electronic conferencing system and his
- business. GURPS Cyberpunk was partially reconstructed from old drafts
- and eventually published. It has been nominated for a prestigious
- game industry award and is assigned reading in at least one college
- literature course.
-
- But what happened at Steve Jackson Games demonstrates the
- vulnerability of computer users -- whether corporate or individual --
- to government ineptitude and overreaching. What the Secret Service
- called a "handbook for computer crime" was really a fantasy
- role playing game book, something most twelve-year-olds would have
- recognized after reading the first page.
-
- Sincerely,
-
-
- Harvey A. Silverglate
- Sharon L. Beckman
- Silverglate & Good
- Boston, Massachusetts
- Counsel for Steve Jackson Games
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: kusumoto@CHSUN1.UCHICAGO.EDU(Bob Kusumoto)
- Subject: Using the CuD email archive server
- Date: Mon, 8 Apr 91 18:23:52 CDT
-
- ********************************************************************
- *** CuD #3.12: File 4 of 4: Using the CuD mailserver ***
- ********************************************************************
-
- A note about the e-mail archive server at chsun1.uchicago.edu:
-
- please send any and all requests for files/help to:
- archive-server@chsun1.uchicago.edu
-
- this is not the address for receiving the latest issue of CuD from the
- mailing list. Either subscribe to alt.society.cu-digest on USEnet or
- send mail to TK0JUT2@NIU.BITNET (although I'm not sure, you might be able
- to do uunet!NIU.BITNET!TK0JUT2 if you do not have a definition for .BITNET
- sites).
-
- The archive server is automated and it only understands a few commands placed
- in the body of the message you send. These commands are HELP, INDEX, SEND,
- and PATH (case doesn't matter). In short:
-
- help: sends a help file describing each command in detail
- index: sends an index of available topics. If the topic is on the same
- line, it will send a detailed index of that topic. Available CuD
- topics are:
-
- ane ati bootlegger chalisti cud hnet law lod narc network
- nia papers phantasy phrack phun pirate school synd tap
- send: sends a file. Commands for send must be in the following format:
- send topic filename
- send topic filename1 filename2 filename3 ...
-
- Please note that the arguments are separated by spaces, not slashes
- or any other characters. Also, some mailers between this site and
- yours might not be able to handle mail messages larger than 50k in
- size. You will have to make special arrangements to receive these
- files (see address below).
- path: This command forces a specified return path. Normally, the server
- will guess what the return address should be (most of the time,
- successfully), but in some cases, it will cause the requested
- files to bounce, leaving you without your files. If this is the
- case, you should use the path command to set the return address.
- Please note, the mailer here cannot handle .uucp addresses, these
- addresses must be fully expanded. Here are some examples:
- path user@host.bitnet [for BITNET hosts, direct]
- path user%hosta.major.domain@hostb.major.domain
- path hosta!hostb!hostc@uunet.uu.net
-
- some useful commands to give to the server (once you know your mailing
- address is OK) are:
-
- send cud cud-arch
- which sends the master Index for the CuD archive.
- send cud chsun1.email.files
- which sends a directory of all files that are in the CuD archives by
- topic, filename, size of the file, and other less useful information.
- This file is updated whenever new files are added to the archives.
-
- If you have any problems and wish to have someone help you with the server,
- please send mail to:
- archive-management@chsun1.uchicago.edu
- (also cudarch@chsun1.uchicago.edu)
-
- Bob Kusumoto
- chsun1 archive manager
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #3.12**
- ********************************************************************
-
-