home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 3, Issue #3.21 (June 17, 1991) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / / Bob Kusumoto
- ARCHMASTER: Brendan Kehoe
-
- +++++ +++++ +++++ +++++ +++++
-
- CONTENTS THIS ISSUE:
- File 1: Moderator's Corner
- File 2: From the Mailbag
- File 3: Review of Gary Marx's UNDERCOVER
- File 4: Review of PROTECTORS OF PRIVILEGE
- File 5: Review of THE INFORMATION WEB
- File 6: Hollywood Hacker Sentenced
- File 7: Len Rose Sentenced (Reprint from Newsbytes)
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- USENET readers can currently receive CuD as alt.society.cu-digest.
- Back issues of Computer Underground Digest on CompuServe can be found
- in these forums:
- IBMBBS, DL0 (new uploads) and DL4 (BBS Management)
- LAWSIG, DL1 (Computer Law)
- TELECOM, DL0 (New Uploads) and DL12 (Electronic Frontier)
- Back issues are also available from:
- GEnie, PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
- Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
- (2) cudarch@chsun1.uchicago.edu;
- (3) dagon.acc.stolaf.edu (130.71.192.18).
- E-mail server: archive-server@chsun1.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. Some authors, however, do copyright their material, and those
- authors should be contacted for reprint permission. It is assumed
- that non-personal mail to the moderators may be reprinted unless
- otherwise specified. Readers are encouraged to submit reasoned
- articles relating to the Computer Underground. Articles are preferred
- to short responses. Please avoid quoting previous posts unless
- absolutely necessary.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Contributors assume all
- responsibility for assuring that articles submitted do not
- violate copyright protections.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Moderators
- Subject: Moderator's Corner
- Date: June 17, 1991
-
- ********************************************************************
- *** CuD #3.21: File 1 of 7: Moderators Corner ***
- ********************************************************************
-
- A few quick notes:
-
- CuDs ON COMPUSERVE: Back issues of Computer Underground Digest on
- CompuServe can be found in these forums:
-
- IBMBBS, DL0 (new uploads) and DL4 (BBS Management)
- LAWSIG, DL1 (Computer Law)
- TELECOM, DL0 (New Uploads) and DL12 (Electronic Frontier)
-
- Issues in the IBMBBS and LAWSIG libraries are binary files that can be
- extracted using recent versions of ARC or ARC-compatible programs.
- The issues uploaded to TELECOM have thus far been ASCII text that can
- be read on-line or downloaded. Thanks to Scott Loftesness for
- uploading the issues to TELECOM. Special thanks to Bob Izenberg who
- sent this information along to us and has been meticulously diligent
- in keeping Compuserve files current.
-
- PAPER ON THE CU: Back in February, The Butler passed along to us his
- paper on THE COMPUTER UNDERGROUND. We intended to publish it, but
- because of the size, we haven't yet had the chance. So, we've made it
- available in the ftp cites. If you do not have ftp access, let us know
- and we'll send a copy via bitnet.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Various
- Subject: From the Mailbag
- Date: 15 June, 1991
-
- ********************************************************************
- *** CuD #3.21: File 2 of 7: From the Mailbag ***
- ********************************************************************
-
- From: vnend@PRINCETON.EDU(D. W. James)
- Subject: Re: Cu Digest, #3.20 (file 5--response to M. Hittinger)
- Date: 13 Jun 91 16:08:27 GMT
-
- In CuD #3.20, file 5, (an288@freenet.cleveland.edu) Mark Hittinger writes:
- ) Personal computers are so darn powerful now. The centralized MIS
- )department is essentially dead. Companies are moving away from the
- )big data center and just letting the various departments role their
- )own with PCs. It is the wild west again! The new users are on their
- )own again! The guys who started the stagnation are going out of
- )business! The only thing they can cling to is the centralized data
- )base of information that a bunch of PCs might need to access. This
- )data will often be too expensive or out-of-date to justify, so even
- )that will die off. Scratch one of the vested definers! Without
- )centralized multi-million dollar computing there can't be any credible
- )claims for massive multi-million dollar damages.
-
- In some areas maybe, but not on most college campuses. And they
- are just as oppressive as the MIS's of old that Mark's article mentioned.
- And it is not just *CCs...
-
- Some time ago the NSF directed that all sites that have access to the
- Internet have some means of authenticating who is accessing it from
- those sites. It used to be that, in most any college town, you could
- call the local campus network access number, and with a few keystrokes
- be accessing your account across the country, or even out of the
- country. Now, as more and more sites come into compliance with the
- NSF, this is becoming a thing of the past. Is this a bad thing?
- Maybe not. But the network is a little less useful than it used to
- be.
-
- As computers become smaller and cheaper and more powerful, the power
- that the central Computing Center had is being weakened. But that is
- not the end of the story. Those smaller and cheaper and more powerful
- computers are (for me, and I suspect for most of us) not all that
- useful unless they can talk to other computers. So *that* is where
- the CC of the 90's is becoming powerful. Instead of controlling CPU
- cycles and diskspace, they are controlling bandwidth.
-
- An example: a talented programmer at a major state school started
- writing a suite of network communications tools. He realized that
- what he had written would make it easy to write a chat program that
- ran over the Internet (or a lan), and hacked one together. It was a
- wild success. In its first year there were two papers written about
- it's conversational dynamics and NASA requested the sources. It was
- used to get news out of the Bay area after the Oct. '89 earthquake.
- The programmer learned a lot. People who decided to write their own
- versions of the client learned a lot. Sounds like the kind of thing
- that a major university would like to hear about, right?
-
- Wrong. As soon as someone at the CC heard about it, there were
- questions about it as a "legitimate use of University resources".
- Finally, though no one at the Computing Center would claim
- responsibility, a filter was put in place that effectively killed it.
-
- Some of the people in the administration claimed that they had to do
- it because the NSF didn't feel it was an appropriate use of the
- facilities. The NSF's own documentation puts the lie to this. But
- the utility is still dead. It never reached its second birthday.
-
- The MIS departments, as Mark refers to them, are not dead. They just
- changed what they sell.
-
- )The witch hunts are over and poorly designed systems are going to become
- )extinct.
-
- I very much hope that you are correct. I don't believe it for a
- moment though...
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- From: "Genetics Lifeguard: YOU!!! Out of the pool!!!"@UNKNOWN.DOMAIN
- Subject: On Achley's making an arrest %File 2, CuD 3.20%
- Date: Thu, 13 Jun 1991 16:21 CDT
-
- Anyone can make a citizen's arrest for a crime which the person being
- arrested did in fact commit. However, the person making the arrest
- had better be sure, because if the prosecution doesn't get a
- conviction FOR ANY REASON, they become liable for civil and criminal
- charges of false arrest and kidnapping.
-
- However, this does NOT give the arresting citizen the right to lay
- hands on the arrestee UNLESS THE ARRESTEE tries to resist the arrest.
- So don't be surprised if Atchley doesn't find himself in trouble for
- assault and battery.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Sanford Sherizen <0003965782@MCIMAIL.COM>
- Subject: Review of Gary Marx's UNDERCOVER
- Date: Wed, 12 Jun 91 15:07 GMT
-
- ********************************************************************
- *** CuD #3.21: File 3 of 7: Review of Gary Marx's UNDERCOVER ***
- ********************************************************************
-
- Gary T. Marx, UNDERCOVER: POLICE SURVEILLANCE IN AMERICA
- A Twentieth Century Fund Book
- Berkeley: University of California Press, 1988
-
- Reviewed by Sanford Sherizen, President of Data Security Systems, Inc.,
- Natick, MA, MCI MAIL: SSHERIZEN (396-5782)
-
-
- On the western (non-electric) frontier of the U.S., disagreements on
- property rights led to almost continuous battles between Native
- Americans, farmers, cattle ranchers, sheep herders, and the
- propertyless. To a large degree, these battles were decided by the
- invention of barbed wire. Ownership was quite literally set by the
- wire, which defined the property lines. They who had the wire had the
- rights. Livestock or crops could be kept in and trespassers or the
- unwanted could be kept out.
-
- For some, the current battle over electronic information property
- rights is a search for the electronic equivalent of barbed wire.
- Ownership of intellectual property, only in part a battle to control
- that "stuff" called cyberspace, is becoming an almost continuous set
- of encounters. The participants differ from the western frontier days
- but the stakes are as high for the future of this nation.
-
- As LAN increasingly stands for *L*imitless *A*ccess *N*ationwide and
- the Sun Devil and Steve Jackson cases take on new twists and turns,
- there is a need for guidance on how to resolve essential questions of
- electronic property. As computer people discuss the law and BBS's are
- filled with terms like attractive nuisance, it is clear that there is
- a need to ask essential questions. Can we have appropriate controls
- over certain illegal/unethical/ inappropriate behavior and, at the
- same time, establish accountability over the behaviors of the police
- and other control agents? How can we develop the rules of behavior,
- using old laws, new technologies, and uncertain etiquette?
-
- To help me answer these questions, I decided to reread Gary Marx's
- book on undercover policing. He had written one of the few analytical
- books that cover the dilemmas of covert policing in a democratic
- society. His perspective on the issue is quite clear. In starting
- his research for this book, Marx viewed undercover police tactics as
- an *unnecessary* evil. In the course of his research, he reached the
- conclusion, however reluctantly, that in the United States these
- tactics are a *necessary* evil. As he explores the troubling issues of
- covert policing in great detail, he documents the problems and
- pitfalls rather than singing its praises. He also point out that it
- is sometimes difficult to separate the heroes from the villains. This
- is a book for the Information Age that I highly recommend.
-
- One of the strengths of the book, and of sociologist Gary Marx's more
- general work found in his many public speeches, articles, and research
- reports, is the broadness of his analysis. While focusing on
- undercover policing, he discusses a much broader set of insights on
- the delicate and often difficult decisions that have to be made to
- establish a society that is based on law as well as on order. He
- makes clear that easy answers ("unhandcuff the police", "All
- information is free") are non-answers. What is necessary is for
- public policy to reach some new understandings on appropriate conduct,
- both for computer users and for policing authorities.
-
- Marx points out that undercover policing has developed from the
- society at large rather than as a rogue activity. It is often stated
- that a society gets the crime that it deserves. Similarly, we get the
- policing that we accept. Covert policing developed as a result of
- changing crime patterns, which included acts such as white collar
- crimes and drug smuggling that were difficult to control with
- traditional policing. Specific funding supports from the federal
- government and changes in judicial and legislative priorities also
- supported more active policing activities. Finally, new surveillance
- technology allowed different types of police work. Undercover
- policing was the child of major changes in our society.
-
- The last chapter sums up his arguments about policing as well as the
- larger issues of social change by discussing the new surveillance.
- Whether humans or computers as informers, visual and audio
- surveillance, electronic leashes or person truth technologies, there
- is a steadily increasing technological way and technological will to
- gather information on individuals. The new surveillance transcends
- anything possible during earlier eras. It transcends, distance,
- darkness, physical barriers, and time. It is often involuntary. It
- is more intensive and more extensive. The result could mean a
- maximum-security society.
-
- How does this book help us to understand the cyberspace battles? In
- some ways, that book can be seen as a counter-argument, both against
- the Secret Service (and other computer crime-fighting organizations)
- as well as against the EFF (and the other information freeing
- organizations). Rather than taking a middle road that says both sides
- of this argument are equally right or wrong, Marx suggests that in
- democratic societies, we are faced with police techniques that offer
- us a queasy ethical and moral paradox. "The choice between anarchy
- and repression is not a happy one, wherever the balance is struck. We
- are caught on the horns of a moral dilemma. In Machiavelli's words:
- "...(P)rudence consists in knowing how to recognize the nature of the
- difficulties and how to choose the least bad as good.' " The barbed
- wire of the electronic age must have a different set of conditions.
-
- The book draws out relevant questions and issues, not only about the
- police but more about public policy. Marx presents what he calls a
- compass, not a map. The questions that he raises should be seen as
- navigational aids and not as a flight plan. He ventures to ask,
- "Where and how should the lines (of appropriate police activities) be
- drawn?" That is a good start for the development of electronic
- rights.
-
- For those who would like a more constitutional view of the policing
- problem, I would also recommend the report from the U.S. Congress,
- Office of Technology Assessment, CRIMINAL JUSTICE, NEW TECHNOLOGIES
- AND THE LAW. This 1988 report, available from the Government Printing
- Office (No. 052-003-01105-1, $2.75) is a useful supplement to the Marx
- book.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
- From: Jim Thomas >jthomas@well@sf.ca.us<
- Subject: Review of PROTECTORS OF PRIVILEGE
- Date: 14 June, 1991
-
- ********************************************************************
- *** CuD #3.21: File 4 of 7: Review of PROTECTORS OF PRIVILEGE ***
- ********************************************************************
-
-
- Review of: PROTECTORS OF PRIVILEGE: RED SQUADS AND POLICE REPRESSION
- IN URBAN AMERICA, by Frank Donner. Berkeley: University of California
- Press; 503 pp. $34.95 (cloth).
- Reviewed by Jim Thomas, Northern Illinois University
-
- Sandy Sherizen's review of Gary Marx's UNDERCOVER (file 3, this issue)
- demonstrates the potential dangers of covert police work to the
- cyberworld. Frank Donner's PROTECTORS OF PRIVILEGE extends Marx's work
- by illustrating the potential dangers of state intrusion into the
- lives of those who appear to challenge a preferred view of the world.
-
- Imagine the following scenario dredged from the depths of paranoid
- fantasies: Stodgy, a massive computer system into which over 750,000
- customers call for benign services such as shopping by computer or
- arranging travel plans, provides each customer with a package of
- software that connects Stodgy's computer to each user's personal home
- computer. Now, imagine that this software is highly proprietary and
- nobody is really quite sure what it does when it is in the home
- computer. It could provide many user-friendly conveniences, such as
- replacing and deleting old versions of itself; it can scan the home
- computer's operation system and files to assure smooth functioning and
- non-disruption of other existing programs, and it assure smooth
- communication between the home and master unit. However,
- communication means that the home computer is giving information,
- albeit of a benign technical nature, just as it is receiving it.
-
- Now, add a different scenario. Law enforcement agents suspect that a
- serial killer is also a computer afficianado and subscribes to Stodgy.
- Agents request that Stodgy add a component to their software that
- allows it to scan through all the files, and even deleted files, in a
- user's home computer and transfer that information back to the offices
- of Stodgy, who would in turn give it over to agents for analysis.
- With such user-interface software, it becomes quite possible to
- collect copious quantities of private, personal information from
- millions of citizens and keep computerized files on citizens for the
- professed noble goal of protecting the social order.
-
- What does this have to do with Frank Donner's "Protectors of
- Privilege?" The basis of a democratic society rests on the ability of
- citizens to openly discuss competing ideas, challenge political power
- and assemble freely with others. These fundamental First Amendment
- rights are subverted when, through neglect, the state fails to protect
- them. Worse, they are shattered when the state itself silences
- political dissent and disrupts freedom of assembly.
-
- PROTECTORS OF PRIVILEGE details silencing of the worst sort: State
- agents who systematically used their power and resources to subvert
- the democratic process by targeting generally law-abiding private
- citizens for surveillance, "dirty tricks," or violence. Given the
- revelations from the report of the Senate Select Committee on
- Intelligence (Church Report) in 1975 and from other sources, it is
- hardly a secret that local, state, and federal agencies have engaged
- in extreme covert surveillance and disruption of groups or individuals
- of whom they disapprove. However, Donner does not simply repeat what
- we already know. The contribution of PROTECTORS OF PRIVILEGE lies
- in Donner's meticulous research of the scope and depth of political
- surveillance and in pulling together the voluminous data within an
- implicit conflict paradigm (although he neither uses this term nor
- alludes to his work in this fashion) to illustrate how surveillance
- has historically been employed to protect the interests of those in
- power in the guise of safeguarding democracy. The roots of political
- surveillance, Donner argues, began with the state's intervention in
- labor unrest in the nineteenth century. In Chicago, for example, the
- police "unambiguously served as the arm of the dominant manufacturing
- and commercial interests" and dispersed strikers, raided meetings, and
- terrorized demonstrators (p. 11). By portraying labor activists as a
- threat to the commonweal, the police acquired public support--or at
- least tolerance--to subvert First Amendment rights of freedom of
- speech and association.
-
- Although Donner perhaps overstates the quiescence of labor and radical
- groups in the early twentieth century, he correctly identifies
- Depression-era activism as the source of a new phase of government
- suppression. Former FBI director J. Edgar Hoover, in MASTERS OF
- DECEIT, equated Communism with cancer, and cancer was a disease to be
- eradicated. Hoover's views and policies serve as an icon for
- understanding the fear of a nebulous social menace that justified the
- organization of special, usually secret, "red squads" within police
- agencies of large urban cities in the post-depression years, and the
- social unrest of the 1960s further stimulated data acquisition on and
- disruption of those whose politics were judged as unacceptable.
-
- Donner devotes the bulk of his study to the period between 1960-80,
- and and focuses on the major U.S. cities (Chicago, New York,
- Philadelphia, Los Angeles). Drawing from court documents, files
- obtained under the Freedom of Information Act, media accounts, and
- other sources, an image emerges of law enforcement run amok in its
- efforts to amass information, much of it useless or fabricated, to
- disrupt dissenters who appeared excessively liberal, and to attack
- those who challenged police authority. Donner's controlled
- indignation is relatively restrained, and he relies on the power of
- chilling examples of law enforcement abuses to convey the message that
- political surveillance had far less to do with maintaining social
- stability than in protecting the interests of a dominant class on one
- hand and enhancing the careers of cynical politicians or police
- officials on the other.
-
- Lest his readers be left with the impression that the subversion of
- Constitutionally protected rights of political expression by the state
- was simply an anomaly occuring only in a few large cities, Donner
- includes a chapter on "second tier" cities, including Detroit,
- Baltimore, and Washington D.C. The pattern of abusive surveillance
- duplicates the larger cities, suggesting that excesses were the norm,
- not the exception.
-
- Donner's work would be valuable if it were only a history of official
- abuse in our nation's recent past. But, his work is much more than
- simply a chronicle. Although most agencies have at least attempted to
- curtail the most serious forms of abuse--albeit only when forced to as
- the result of public outrage or legal action--there is no evidence
- that the surveillance has stopped. The FBI's monitoring of of
- political organizations such as CISPES or the Secret Service's
- creation of a "sting" computer bulletin board system in a way that
- contradicts the "official" explanation of it, are just two recent
- examples that challenge claims that surveillance is under control.
- Computer technology creates a new danger for those concerned with
- surveillance. Law enforcement now has the technological means to
- monitor activities and process data infinitely more comprehensively,
- quickly, and surreptitiously than a decade ago. Donner's work reminds
- us that an open society can in no way tolerate threats to our liberty
- from those entrusted to protect it.
-
- Just as I completed writing the above review, I noticed the following
- news article:
-
- "Killing Columnist Plotted, Liddy Says" (Chicago Tribune, (June
- 13, 1991: Sect. 1, p. 2):
-
- New York (AP)--In their first face-to-face meeting, G. Gordon
- Liddy, mastermind of the bungled Watergate burglary, told
- columnist Jack Anderson that the president's men vetoed plans to
- silence the newsman.
-
- "The rationale was to come up with a method of silencing you
- through killing you," Liddy tells Anderson on "The Real Story," a
- news show to be shown Thursday night on cable TV's CNBC.
-
- With not a hint of irony, the story continues that the White House
- thought such a sanction was too severe. Rumors of this have been
- floating around for awhile, but it's the first time, to my knowledge,
- a participant has made a public comment, but there's something so
- postmodernly absurd about talking about it F2F on national TV in the
- same way that the galloping gourmet would trade recipes with Julia.
- Marx's and Donner's cynicism in and distrust of gov't seens terribly
- understated if we can so serenely turn a potential gov't murder plot
- into TV fare.
-
- Given the government's actions in Operation Sun Devil and other abuse
- of existing law enforcement procedures, concern for protections of
- rights in cyberspace seem crucial.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Kevin Kehoe
- Subject: Review of THE INFORMATION WEB
- Date: 20 Apr 91 19:55:45
-
- ********************************************************************
- *** CuD #3.21: File 5 of 7: Review of THE INFORMATION WEB ***
- ********************************************************************
-
- Review of: THE INFORMATION WEB: ETHICAL AND SOCIAL IMPLICATIONS
- IN COMPUTER NETWORKING
- Author: Carol C. Gould
- Reviewed by: Kevin Kehoe
-
- In "The Information Web: Ethical and Social Implications of Computer
- Networking", Carol C. Gould brings together papers from a number of
- sources, ranging in concentration from philosopher to chemist to
- physicist. Each gives their own views on the shape of ethics in
- computing and technology as a whole today (and in the future).
-
- Topics range from formal and implied rights of privacy (whether a
- person is giving implied consent to have/relinquish his/her privacy by
- using the system in the first place); whether computer conferencing
- can be considered a public or private forum; the case of privacy vs. a
- person or persons' right to know; whether or not a violation of
- computer privacy (e.g. breaking into medical records) comprises a
- violation of personal privacy, or if the two are legally and morally
- separated by the same technological boundary that brought them
- together in the first place; the benefits & dangers of performing
- scientific research and the dissemination of the results of that
- research through a network; voting with computers (how it effects
- democracy, the social effects of voting in such a totally neutral
- atmosphere); the moral responsibility inherent in all forms of
- technology; our growing reliance on electronic information (will it
- ever reach a point where the computers have more control than the
- humans? or has it already?); the ethics involved in computer crimes --
- how viruses, hackers, and security methods all inter-mesh in a way
- that leaves many things open to interpretation; personal ethics vs
- professional (an excellent example of a chemist who's hired to create
- a deadly disease -- should he be allowed to restrict its use after
- realizing its incredible potential?); and how to handle the voluntary
- and involuntary disclosure of company-private information.
-
- Gould did an excellent job of putting the book together --she
- assembled a group of people in the ethics project that not only made
- valid points, but they did so in a way that was logical and clear.
- (Far too many aspects of ethics today have proven markedly vague. But
- perhaps that's just another part of the whole concept of trying to
- define an ethic or ethics to begin with.)
-
- The book was published by Westview Press (ISBN 0-8133-0699-X) 5500
- Central Avenue, Boulder, CO 80301.
-
- I highly recommend it as a read for anyone who's interested in
- computer ethics and privacy; particularly for those who have a
- definite feeling on the subject, but aren't able to adequately
- articulate their views -- these papers may well serve that purpose.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Rambo Pacifist@placid.com.uunet.uu.net
- Subject: Hollywood Hacker Sentenced
- Date: Sun, 9 Jun 91 09:29:09 PDT
-
- ********************************************************************
- *** CuD #3.21: File 6 of 7: Hollywood Hacker Sentenced ***
- ********************************************************************
-
- "Writer Gets Probation in Sting at Fox." From THE LA TIMES,
- May 29, 1991, p. B-3 (Metro Section). By John Kendall.
-
- Free-lance writer Stuart Goldman pleaded no contest Tuesday to three
- felony charges of illegally entering Fox Televisions computer system
- and stealing story ideas planted by Los Angeles police in a sting
- operation.
-
- In a plea bargain presented by prosecutors and approved by Superior
- Court Judge Richard Neidorf, the 45-year-old self-proclaimed muckraker
- was placed on five years' probation and ordered to pay $90,000 in
- restitution, reduced to $12,000 with Fox's approval.
-
- The judge ordered Goldman to serve 120 days in County Jail but stayed
- the sentence.
-
- Deputy Dist. Atty. Richard Lowenstein moved for dismissal of four
- additional counts of entry of a computer illegally. Goldman's
- no-contest pleas were tantamount to admitting guilt, the prosecutor
- said.
-
- Despite the pleas, Goldman continued to insist outside the courtroom
- Tuesday that Hollywood-based Fox had attempted to silence him.
-
- "There's been an effort by Fox Television to silence me and, as far as
- I'm concerned, that's what this case was all about," Goldman told
- reporters.
-
- Attorney James E. Hornstein, representing Fox Television, denied
- Goldman's charge. He said his client had agreed to reduce the
- court-ordered restitution from $90,000 to $12,000 on Goldman's "plea
- and statement that he is indigent."
-
- "Throughout these proceedings, Mr. Goldman has tried to argue that
- someone was out to get him," Hornstein said. "The only victims in
- these proceedings were the computers of "A Current Affair which Mr.
- Goldman has admitted by the plea he accessed illegally."
-
- Goldman was arrested at his Studio City apartment in March of last
- year by Secret Service agents and Los Angeles police who confiscated a
- personal computer, floppy disks, Rolodexes and a loaded .38 caliber
- handgun.
-
- Prosecutors accused Goldman of using a password apparently gained when
- the journalist worked briefly for "A Current Affair" to enter the Fox
- production's computer system. They charged that Goldman stole bogus
- tips, including one involving "Ronald Reagan Jr.'s Lover," and
- attempted to sell the items to a national tabloid magazine.
-
- In an interview with The Times last year Goldman explained that he was
- engaged in a free-lance undercover inquiry of gossip news-papers and
- TV shows, and he claimed that his arrest was a setup to get him.
-
- "These people will look very foolish when they get into court,"
- Goldman insisted at the time. "I'm a good guy, and I'm going to prove
- it. This is going to be the biggest soap opera you ever saw."
-
- After his arrest, Goldman said he was writing a book about his
- experience as a former gossip media insider who once attacked
- feminists, gays and other targets in vitriolic columns in the National
- Review.
-
- After Tuesday's court session, Goldman vowed to publish his completed
- book, "Snitch," as soon as possible.
-
- Neidorf ordered authorities to return Goldman's computer.
-
- "I'm sure you know now that computers will get you in trouble," the
- judge said. "If you don't, I'll see you back in her again."
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Barbara E. McMullen and John F. McMullen
- Subject: Len Rose Sentenced (Reprint from Newsbytes)
- Date: 12 June, 1991
-
- ********************************************************************
- *** CuD #3.21: File 7 of 7: Len Rose Sentenced ***
- ********************************************************************
-
- LEN ROSE SENTENCED TO 1 YEAR 06/12/91
- BALTIMORE, MARYLAND, U.S.A., 1991 JUNE 12 (NB) -- Leonard Rose, Jr., a
- computer consultant also known as "Terminus", was sentenced to a year
- and a day in prison for charges relating to unauthorized sending of
- AT&T UNIX source code via telephone to another party. Rose is
- scheduled to begin serving his sentence on July 10th.
-
- The original indictment against Rose was for interstate transportation
- of stolen property and violations of the Computer Fraud and Abuse Act
- but those charges were dropped and replaced by a single charge of wire
- fraud under a plea agreement entered into in March. The charges
- involving the violation of the Computer Fraud and Abuse Act had been
- challenged in a friend of the court brief filed in January by the
- Electronic Frontier Foundation (EFF) who challenged the statute as
- "unconstitutionally vague and overbroad and in violation of the First
- Amendment guarantees of freedom of speech and association." The issues
- raised by EFF were not resolved as the charges to which they objected
- were dropped as part of the plea agreement.
-
- In his plea, Rose admitted to receiving misappropriated UNIX source
- code and modifying it to introduce a trojan horse into the login
- procedures; the trojan horse would allow its developer to collect
- passwords from unsuspecting persons logging on to a system containing
- this code. Rose admitted that he transmitted the modified code via
- telephone lines to a computer operator in Lockport, IL and a student
- account at the University of Missouri. He also admitted putting
- warnings in the transmitted code saying "Warning: This is AT&T
- proprietary source code. DO NOT get caught with it."
-
- U.S. District Judge J. Frederick Motz, in sentencing Rose, ordered him
- to sell his computer equipment and to inform potential employers of
- his conviction. Assistant United States Attorney Geoffrey Garinther,
- who prosecuted Rose, explained these portions of the sentence to
- Newsbytes, saying "The equipment was seized as evidence during the
- investigation and was only returned to him as part of the agreement
- when it became evident that he had no means of supporting his wife and
- two children. It was returned to him for the sole purpose of selling
- the equipment for this purpose and, although he has not yet sold it,
- he has shown evidence of efforts to do so. The judge just formalized
- the earlier agreement in his sentence. The duty to inform potential
- employers puts the burden of proof on him to insure that he is not
- granted "Root" privileges on a system without the employer's
- knowledge."
-
- Garinther added "I don't have knowledge of the outcome of all the
- cases of this type in the country but I'm told that this is one of the
- stiffest sentences a computer hacker has received. I'm satisfied
- about the outcome."
-
- Jane Macht, attorney for Rose, commenting to Newsbytes on the
- sentence, said "The notification of potential employers was a
- negotiated settlement to allow Len to work during the three years of
- his supervised release while satisfying the government's concern that
- employers be protected." Macht also pointed out that many reports of
- the case had glossed over an important point,"This is not a computer
- intrusion or security case; it was rather a case involving corporate
- computer software property rights. There were no allegations that Len
- broke into anyone's system. Further, there are no reported cases of
- anyone installing his modified code on any system. It should be
- understood that it would require a system manager or someone else with
- 'superuser' status to install this routine into the UNIX login
- procedure. The publishing of the routine did not, as has been
- reported, open the door to a marked increase in unauthorized computer
- access."
-
- Macht said that she believed that Rose had reached an agreement to
- sell the computer equipment. He had been offering it through the
- Internet for $6,000, the amount required to prepay his rent for the
- length of his prison sentence. Because of his financial circumstances,
- which Macht referred to as a "negative net worth", the judge did not
- order any restitution payments from Rose to AT&T.
-
- (Barbara E. McMullen & John F. McMullen/19910612)
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #3.21**
- ********************************************************************
-
-