Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 02 Issue 12
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 2, Issue #2.12 (November 17 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / Alex Smith
USENET readers can currently receive CuD as alt.society.cu-digest.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. It is assumed that non-personal mail to the moderators may be
reprinted, unless otherwise specified. Readers are encouraged to submit
reasoned articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
CONTENTS:
File 1: Moderators' Corner
File 2: PhD Candidate Seeks information on the CU
File 3: Riggs, Darden, and Grant Sentenced
File 4: Prodigy Saga Continues
File 5: Re: Response to Mars "Censoring"
File 6: Response to SJG Affidavit (part 1)
File 7: Warrants schmarrants! The SS is Crazy!
File 8: More guidelines on what to do if busted
File 9: CU in the News--England and Emma Nicholson; VOGON News
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
----------------------------------------------------------------------
********************************************************************
*** CuD #2.12: File 1 of 9: Moderator's corner ***
********************************************************************
From: Moderators
Subject: Moderators' Corner
Date: November 17 1990
++++++++++
In this file:
1. PHRACK CLASSIC #32 AND CHRISTMAS-CON
2. FACE-TO-FACE BBS
++++++++++
+++++++++++++++++++++
Phrack Classic #32 and Christmas-Con
+++++++++++++++++++++
Five years ago today (November 17, 1985), the first issue of Phrack appeared.
Today, November 17, 1990, Phrack Classic #32 will be released. Information
about Christmas-Con will be provided. it will be held in HOuston, December
28-30, and law enforcement and security personnel are encouraged to attend.
Video cameras will not be provided.
As a bit of nostalgia for the old folks, here is the original
header from the first issue of Phrack:
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
_ _ _______
| %/ | / _____/
|_||_|etal/ /hop
_________/ /
/__________/
(314)432-0756
24 Hours A Day, 300/1200 Baud
Presents....
==Phrack Inc.==
Volume One, Issue One, Phile 1 of 8
Introduction...
Welcome to the Phrack Inc. Philes. Basically, we are a group of phile writers
who have combined our philes and are distributing them in a group. This
newsletter-type project is home-based at Metal Shop. If you or your group are
interested in writing philes for Phrack Inc. you, your group, your BBS, or any
other credits will be included. These philes may include articles on telcom
(phreaking/hacking), anarchy (guns and death & destruction) or kracking. Othe
topics will be allowed also to an certain extent. If you feel you have some
material that's original, please call and we'll include it in the next issue
possible. Also, you are welcomed to put up these philes on your BBS/AE/Catfur
Etc. The philes will be regularly available on Metal Shop. If you wish to sa
in the philes that your BBS will also be sponsoring Phrack Inc., please leave
feedback to me, Taran King stating you'd like your BBS in the credits. Later
on.
TARAN KING
2600 CLUB!
METAL SHOP SYSOP
This issue is Volume One, Issue One, released on November 17, 1985. Included
are:
1 This Introduction to Phrack Inc. by Taran King
2 SAM Security Article by Spitfire Hacker
3 Boot Tracing on Apple by Cheap Shades
4 The Fone Phreak's Revenge by Iron Soldier
5 MCI International Cards by Knight Lightning
6 How to Pick Master Locks by Gin Fizz and Ninja NYC
7 How to Make an Acetylene Bomb by The Clashmaster
8 School/College Computer Dial-Ups by Phantom Phreaker
Call Metal Shop and leave feedback saying the phile topic and where you got
these philes to get your article in Phrack Inc.
(end Phrack header)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++
FACE-TO-FACE BBS
++++++++++++
A number of electronic digests exist, such as this one, that attempt to
raise the issues of computer security, ethics, law, or policy. Few BBSs
exist for the same purpose. However, a new BBS has been set up for the
discussion of hacking, and unlike conventional "hacker" BBSs, this one is
designed for discussions between law enforcement and security specialists
and hackers. The goal of the board is to provide serious, intelligent
dialogue between various groups. It's called FACE-TO-FACE, and the number is
713-242-6853.
Here is the introductory log-in message:
All Hackers, Federal Agents, and Journalists
Welcome to a new concept in underground bulletin boards!
IDEA: The idea first came to me when I was mourning over the fact that Phoenix
Project went down. I thought, now gee, that was a good board. Ever since then
I've been searching for a place to "Hang-out"; A place where users were not
only productive but mature. Well, out of all those BBS's out there, I could
not locate one that met my standards of "a good board". So, I came to the
conclusion: There are no decent BBS's in the underground still running. Then
it hit me-- Why not make one ? Sounds logical. Well, here it is.
FACE to FACE: This BBS is devoted to having an intelligent, mature,
communication link from the Computer Underground to the Press and back to the
Security Agencies around the nation.
WARNING: Although this BBS allows "hackers" access, The Management of this
BBS demands that all users refrain from posting illegal material in nature.
If any such material is posted, that user and the message(s) shall be deleted.
I can't stress this enough. You have called a BBS where security agents are
scanning the messages also-- It's for OUR and YOUR saftey. We do not advocate
"hacking" in any way.
We are the MODERATORS of this BBS, while you are the USERS. It's a pure
communications link between the two sides. One side seeing white, the other
black. We see grey.
Access is guaranteed to any user who wishes to call.
This is an open system for the "phree" world.
(End Face-2-Face header)
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
Subject: PhD Candidate Seeks information on the CU
From: P.A. Taylor <EJPA09@uk.ac.edinburgh.emas-a>
Date: 02 Nov 90 15:25:32 gmt
********************************************************************
*** CuD #2.12: File 2 of 9: PhD Students Seeks Info on CU ***
********************************************************************
I'm in the second year of a PhD on the subject of hacking/viruses and the
politics behind them, and I was wondering whether any of you are prepared to
enter into a dialogue on the subject.
At the moment, I'm preparing the theory section and literature review. In
January or thereabouts I want to start field-work (or modem-work, if it
turns out that way) with both hackers and their computer security industry
counterparts, and anyone who would consider themselves neither one nor the
other, but nevertheless interested in the field and the issues raised by it.
Theoretically, so far I've concentrated on the notion put forward in various
quarters that hackers are surfers on a technological wave that is carrying
the rest of us away, or in a similar vein, cowboys staking out new territory
in the new frontier world of computer technology. Looking at hackers in
this way has made me concentrate on the whole issue of technological
determinism and the "information revolution" and also the idea of hackers
being perhaps an extension or most recent development of an alternative
culture, hippies with modems perhaps. It also raises the whole issue of the
exact nature of cyberspace and the implications it holds... are we entering
a new realm of informational colonialism? What is information? Who has rights
over it, and are hackers/the computer underground fighting a battle of
principle the importance of which has passed most people by?
On a more practical level I'm interested in the following points...
1. To what extent has the advent of hacking/viruses fed back into
and affected the development of computer science? (e.g. the conceptualisation
of genetic algorithms)
2. Information and reference material relating to the formation of the
computer security industry. Ideally I'd like to write a short history of it
and trace the ways in which it has developed and been shaped by its
adversarial relationship with the computer industry.
3. The subject of the changing nature of information illustrated by
such episodes as the "look and feel lawsuits" and an increasingly
proprietal attitude towards information that is now evident. To what
extent are hackers/computer underground concerned with the type of
opposition to information control that people such as Richard Stallman
and his Gnu project represent?
Thanks for taking the time to read all this,and hopefully some of you
can give me feedback/suggestions/reference material.
Cheers, P.A.T.
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
From: Moderators
Subject: Riggs, Darden, and Grant Sentenced
Date: 17 November, 1990
********************************************************************
*** CuD #2.12: File 3 of 9: Riggs, Darden and Grant Sentenced ***
********************************************************************
Robert J. Riggs (The Prophet), Franklin E. Darden, Jr. (The Leftist), and
Adam E. Grant (The Urville) were sentenced in Atlanta Friday, November 16.
All were given prison terms. Riggs was sentenced to 21 months. Grant and
Darden were given 14 months each, half of which may be served in a half-way
house. Additional provisions include supervision and prohibitions on
computer use. In addition, each was ordered to repay $230,000 restitution.
Darden and Grant report for sentencing on January 4, 1991, and Riggs on
February 15. According to previous news reports, under the plea
arrangement Riggs could have been sentences to 15 years and a fine of up to
$500,000. Grant and Darden could have received up to 5 years in prison and
fines of up to $250,000.
Because the three pled guilty, the evidence against them is not public.
Yet, the both the prison sentence and the restitution seem harsh. Riggs,
presumably, received a heavier sentence because of a prior offense and
because the charge to which he pled guilty carried a more severe sentence.
But, according to reports, his cooperation with law enforcement and his
testimony against Craig Neidorf would be taken into consideration during
the testimony.
Did the actions of the three cause $700,000 worth of damages, or is the
figure intended to be a "message" to others? If the former, one wonders
what they possible could have done to create such mischief, because the
original indictment mentions nothing about concrete damages, and we have
already seem how Bell is willing to inflate costs. If the amount of
restitution was intended as a message, it is successful. But, it sends an
inintended message: The judicial system is wacky! If each repays $4,000 a
year, they may be paying out of their social security well into their 70s.
If each repays it within 25 years ($9,300 a year), they are effectively
saddled with a "second mortgage" before even launching their lives. They
will emerge from prison faced with obstacles that even the most hardened
criminals do not endure.
Prison time also seems inappropriate. The so-called "tough on crime"
mentality of the past decade has created an explosion in the nation's
prison population. Since 1980, the nation's prison population has more than
doubled, increasing from about 329,821 in 1980 to almost 800,000 in
November of 1990. Tossing people in prison is not, for non-violent crimes,
particularly cost-effective, and there is no agreement on the deterrent
effect of prisons. For relatively minor white collar crimes, such as those
commited by the "Atlanta Three," prison seems both unnecessary and unjust,
and tax-payers foot the bill.
There is apparently little the three can do about the sentence. But the
rest of us can join in the tasks of lobbying for saner laws and sentences
that better fit the "crime" than does incarceration, while simultaneously
working to curtail computer abuse.
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
From: Adam Gaffin
Subject: Prodigy Saga Continues
Date: November 14, 1990
********************************************************************
*** CuD #2.12: File 4 of 9: The Prodigy Saga Continues ***
********************************************************************
(The Prodigy saga continues. Adam Gaffin, who has been following the story
for the Middlesex News in Framingham, Mass, reports that after a couple of
days, Prodigy restored the account of the "Prodigy Nine" and then, a few
days after that, pulled them again! The total number is actually now up to
about 15. Prodigy has been receiving lots of bad press in the media, and
Henry Niman, a prodigy victim, has been interviewed about his experiences
by several TV stations and newspapers. Adam recently wrote the following
stories--moderators).
+++++++++++++
From: "Conversations with Fred," Middlesex News, Framingham, 11/6/90.
The story is bizarre but true, swears Herb Rothman. Seems Prodigy, the
network run as a joint venture by Sears and IBM, wouldn't let somebody post
a message in a coin-collecting forum that he was looking for a particular
Roosevelt dime for his collection. Upset, the man called "member services."
The representative told him the message violated a Prodigy rule against
mentioning another user in a public message. "What user?" the man asked.
"Roosevelt Dime," the rep replied. "That's not a person!" the man said.
"Yes he is, he's a halfback for the Chicago Bears," the rep shot back.
Rothman is one of those alleged compu-terrorists Prodigy claims is
harassing other users and companies that advertise on the service by
sending out thousands upon thousands of increasingly hostile messages in
protest of a Prodigy plan to begin charging users who send more than 30
e-mail messages a month. Rothman and the others say they sent very polite
messages to people (Penny Hay of Los Angeles says her messages were even
approved by the Prodigy legal department) telling them about the new fees
and urging them to protest.
What's really happening is that Prodigy is proving its complete arrogance
and total lack of understanding of the dynamics of on-line communication.
They just don't get it. People are NOT going to spend nearly $130 a year
just to see the weather in Oregon or order trips to Hawaii.
Even the computerphobes Prodigy wants to attract quickly learn the real
value of the service is in finding new friends and holding intelligent
"discussions" with others across the country.
But Prodigy blithely goes on censoring everything meant for public
consumption, unlike other nationwide services (or even bulletin-board
systems run out of some teenager's bedroom). Rothman's story is not the
only one about capricious or just plain stupid censoring. Dog fanciers
can't use the word "bitch" when talking about their pets, yet the service
recently ran an advice column all about oral sex. One user who complained
Law" was not allowed on was told that "queen b***h" would be acceptable,
because adults would know what it meant but the kiddies would be saved.
So when the supposed technology illiterates Prodigy thinks make up its user
base managed to get around this through the creation of private mail
"lists" (and, in fact, many did so at the urging of Prodigy itself!),
Prodigy started complaining of "e-mail hogs," quietly announced plans to
levy charges for more than a minute number of e-mail messages each month
and finally, simply canceled the accounts of those who protested the
loudest!
And now we are watching history in the making, with the nation's first
nationwide protest movement organized almost entirely by electronic mail
(now don't tell Prodigy this, but all those people they kicked off quickly
got back onto the system -- Prodogy allows up to six users per household
account, and friends simply loaned their empty slots to the protest
leaders).
It's truly amazing how little faith Prodigy has in the ability of users to
behave themselves. Other systems have "sysops" to keep things in line, but
rarely do they have to pull messages. Plus, Prodigy is just being plain
dumb. Rothman now has a mailing list of about 1,500. That means every time
he sends out one of his newsletters on collectibles, he sends 1,500 e-mail
messages, which, yes, costs more for Prodigy to send over long-distance
lines and store in its central computers. But if they realized their users
are generally mature, rather than treating them as 4-year-olds, Rothman
could post just one message in a public area, that everybody could see.
Is this any way to run an on-line system? Does Prodigy really want to drive
away the people most inclined to use the service -- and see all those ads
that pop up at the bottom of the screen? Prodigy may soon have to do some
accounting to the folks at IBM and Sears, who by most accounts have already
poured at least $750 million into "this thing."
(With your computer and modem, you can reach Fred the Middlesex News
Computer anytime, day or night, at (508) 872-8461. Set your parameters to
8-1-N and up to 2400 baud.)
+++++++++++++
"Prodigy Pulls Plug on Electronic Mail Service for Some"
From: Middlesex News, Framingham, Mass., 11/2/90
By Adam Gaffin (News staff writer)
Users of a national computer network vow to continue a protest against
censorship and a new charge for electronic mail even though the company
kicked them off-line this week.
Brian Ek, spokesman for the network, Prodigy, said the "handful" of users
had begun harassing other users and advertisers on the service and that
some had even created programs "to flood members' %mailboxes' with
(thousands of) repeated and increasingly strident harangues," he said.
But leaders of the protest say they sent only polite letters - approved by
the company's legal department - using techniques taught by the company
itself. Up to nine of them had their accounts pulled this week.
Protests began in September when the company said it would cut unlimited
electronic mail from its monthly fee -- which includes such services as
on-line airline reservations, weather and games -- and would charge 25
cents for every message above a monthly quota of 30. Ek says the design of
the Prodigy network makes "e-mail" very expensive and that few users send
more than 30 messages a month.
But Penny Hay, the only organizer of the "Cooperative Defense Committee"
whose account was not shut this week, said she and others are upset with
Prodigy's "bait and switch" tactics: the company continues to promote
"free" electronic mail as a major feature. She said Prodigy itself had
spurred use of e-mail by encouraging subscribers to set up private e-mail
"lists" rather than use public forums and that the charges will especially
hurt families, because the quota is per household, not person.
Ek said relatively few members protested the rate change. Gary Arlen, who
publishes a newsletter about on-line services, called the controversy "a
tempest in a teapot."
Hay, however, said the group now has the backing of nearly 19,000 Prodigy
users - the ones advertisers would want to see on-line because they are the
most active ones on the system and so more likely to see their ads.
The group is also upset with the way the company screens messages meant for
public conferences. Other services allow users to see "postings"
immediately.
"They are infamous for this unpredictable and unfathomable censorship," Hay
said.
"We feel what we are doing is not censoring because what we are essentially
doing is electronic publishing," Ek said, comparing the public messages to
letters to the editor of a family newspaper.
Neil Harris, marketing director at the competing GEnie service, said many
people would feel intimidated knowing that what they write is being
screened. He said GEnie only rarely has to deleted messages. And he said
GEnie has picked up several thousand new customers from among disgruntled
Prodigy users.
del 85 86; ch eol to')' in 89; m 87
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
From: laird@SLUM.MV.COM(Laird Heal)
Subject: Re: Response to Mars "Censoring"
Date: 7 Nov 90 10:45:18 EST (Wed)
********************************************************************
*** CuD #2.12: File 5 of 9: Mars *was* Censored ***
********************************************************************
In article <CuD #2.09 #4>, dan-hankins@cup.portal.com (Dan Hankins) write:
>In article <CuD #2.08 #3>, Karl Lehenbauer <karl@sugar.hackercorp.com> writes,
>>I used Prodigy several times, and it is a heavily censored system,...
>This is inaccurate. Prodigy is not censored, it is _edited_. There is a
>significant difference. When newspaper articles are removed by government
>order, that's censorship. When the newspaper owners decide to not run an
>article because it is counter to their editorial policies (or personal
>prejudices), then that's editing.
>In article <CuD #2.08 #4), the moderators write,
>>In the MARS incident, the NSF flexed its fiscal muscles (according to those
>>on the receiving end).
>This is again not censorship. The NSF pays for the Internet, and has the
>right to say how those monies are spent. Since MARS resided on an Internet
>node, the NSF had the right to refuse to pay for those files to be transmitted
>across its network. In fact, the NSF has the right to refuse to pay for
>network connections for any site for any reason whatsoever, unless it has made
>a contract to the contrary. If this is "flexing its fiscal muscles", then so
>be it.
You have gotten caught up in an emotional response to the word
"censorship". If you are going to mince words, do not use a meat
tenderizer or your argument will be mush.
The first comment is correct. Censorship is when a governmental body edits
a writing based upon its perceived content.
The fundamental point that has not been brought up by those approving of
the action (removing access and storage of the pictures) is that a
governmental body must grant First Amendment protection to all speech. The
sole exception where censorship is generally allowable is when that speech
would shock the general public, and this is normally restricted to
materials in public view.
The GIF archives are not in public view - even when sent as net-news they
are encoded - but they were/are in a location where there is general public
access of whatever files have been submitted to the archiver or to the
network. Particularly with netnews, there is no specific editing done
whatsoever after the author posts the article, and moderators serve only at
the whim of a majority of voters. Wherever speech is allowed, even if the
governmental body is paying for it, the content of that speech may not be
regulated by the governmental body. These pictures might be accessed by
immature youths who should be protected from carnal knowledge
Moreover, once it is established, that arm of the government may not simply
discontinue the service if the reason is to suppress the speech that is
being communicated. The First Amendment is guarded zealously by the
Federal courts and such an action should not withstand the "strict
scrutiny" that it should be examined under. I wish the Second Amendment
received such guardianship; I have never owned a gun, but I think everyone
should have the right to own one while the government has lots of guns and
seems to think nobody else should ever have any.
Obscenity may be censored - when it might otherwise shock the unsuspecting
public. A brown paper bag can never attract the prurient interest; do not
tear the bag open unless you do want to see what is inside. I never have
looked at any of the alt.sex hierarchy. Once a public forum exists, it may
not be censored, although the participants may agree to self-regulation. I
remember once wondering what was really in alt.flame, and the first article
convinced me that I had read enough. Those guys are serious about their
roasting there, not their vocabulary (damned if they do not just grab for
the nearest word). The alt.flame group is there with a good reason -
otherwise people who do not want to read that material might have to read
the same articles, but in their news group.
I personally can see no great benefit to maintaining an archive of sexually
explicit GIF images, except that archives exist to keep network
transmission to the most suitable paths; otherwise the private messages
sent back and forth are unmanaged and unmanageable, and we wind up with the
situation as described where Australians ftp'd files from Finland because
they were not archived at a more convenient site. Archives reduce network
load. Netnews reduces network load.
I can also personally see no great benefit to every person having a gun or
two except that we would all either be much more polite or on the way to an
ambulance. I am not an absolutist, and everyone does not act the way I
think everyone should. I do not act the way I think I should sometimes
either. I am a pragmatist when it comes to dealing with other people's
business: you send my files along, I will send yours along too.
>Complete the following: Pro is to Con as Progress is to ________.
That is a nice .signature.
Laird Heal laird@slum.MV.COM The Usenet is dead! NA:USA:NH:Salem +1 603
898 1406 Long live the Usenet!
********************************************************************
*******************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
Subject: Response to SJG Affidavit (part 1)
From: David G. Cantor <dgc@MATH.UCLA.EDU>
Date: Wed, 14 Nov 90 22:48:06 -0800
********************************************************************
*** CuD #2.12: File 6 of 9: Response to SJG Affidavit (part 1) ***
********************************************************************
I just received the special issue CUD on the search affidavit for Steve
Jackson.
Thank you for publishing it.
Perhaps you could discuss how transferring a document can be a crime, other
than possibly a (relatively minor) copyright violation? If it truly is a
crime, as stated in the affidavit, then anyone, by calling a document
proprietary and attaching a large value to it, can, in effect, create a
classified document and have this classification enforced by the US
Government.
As the Pentagon Papers case (dismissed against Daniel Ellsburg) showed,
it's extremely difficult to prosecute such cases, even when they are real!
Note that in Ellsburg's case there was no doubt that the documents in
question were government documents. classified SECRET (mostly). Yet the
case against Ellsburg was dismissed. Of course, Ellsburg had powerful
allies: The New York Times and the Washington Post, among others.
You pointed out, "It should also be remembered that the "$79,449.00"
document in question was shown to contain nothing of substance that is not
available to the general public for under $14. Further, to our knowledge,
there is no evidence, contrary to suggestions, that E911 software was
obtained".
I find it troubling that these considerations are even relevant. What was
transferred were a few electrons forming information, not classified, or
otherwise secret. Even if it were 911 software, so what? No criminal
charges were made concerning copyright or patent violations
I also wonder, considering the generally tight budgets in our government,
why the "Feds" are so interested in this case? Why are they investing so
much effort? In my limited experience, this occurs when some party has an
ax to grind or something special to gain. For example, in one of the first
such cases, against Ronald Mark Austin (who in 1983 was convicted of a
felony, primarily for accessing the (then) Arpanet), Los Angeles District
Attorney Phillibosian (appointed by the Governor) was running in his first
election. Presumably for publicity to help his re-election campaign, he
fried Austin in a MAJOR PRESS CONFERENCE (this DA also gave us the infamous
McMartin child molestation case).
Who stands to gain in the current prosecution? Is it Bell South, trying to
protect its turf in some way, or cover up something it has done? Is it
having problems with its 911 system it would like to blame on someone else?
Clearly it has the clout to cause such a prosecution. But WHY?
This whole case STINKS.
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
From: Anonymous
Subject: Warrants schmarrants! The SS is Crazy!
Date: Fri, 16 Nov 90 17:12 CST
********************************************************************
*** CuD #2.12: File 7 of 9: Warrants Schmarrants (SJG, part 2) ***
********************************************************************
I've read the Steve Jackson Games warrant in CuD 2.11 and it makes me want
to move to Russia. It is crazy, just plain crazy. It reminds me of essay
tests when I wasn't prepared for a question and tried a snow-job hoping the
prof wouldn't notice. I usually got an F, but Foley gets rewarded and Steve
Jackson gets raided. Foley and his crowd have taken a few logs and blown
them out of context. They claim that Erik Bloodaxe's post on Jan 23 is some
kind of conspiracy, and that it proves that there's an encryption service,
and it says no such thing. The following posts don't add anything to that
post, so it seems it's just a silly attempt to fake evidence. Bloodaxe's
post may have been ill considered and in bad taste, but that's not a crime.
Heck, if bad taste were a crime, federal agents would be doing 30 years for
their wingtips.
The Phoenix Project had Phrack 24 on the board with a few pages of a
document. So what? Foley keeps talking about "my investigation." Well, if
he'd really investigated, he'd have known that the document in Phrack #24
was more than slightly edited and that the information in it was public.
Everything I've read says that the information that was published costs
about 13 dollars, not the 79,000 Foley claimed. Was he having a nap when
he claims to be investigating? Phrack is on a lot of boards, not just the
Phoenix Project, so what's the big deal? They make it sound like it was a
great conspiracy. Doesn't the first amendment allow posting legal
magazines?? Foley claims to be a lawyer; some lawyer! His lack of concern
for constitutional rights makes me wonder if his law degree isn't mail
order.
Foley also claims that Mentor's post on Jan 26 links him to some encryption
service. All he did was explain what Kermit is. Is that a crime?
Explaining a protocol? Christ, would anybody else who explained Kermit have
been busted? Beware when somebody asks about the difference between Puma
and Lynx. They might be feds and your boss might be raided.
Since when are encryption and decryption devices illegal? I can get them
off any good PD board in the country. Did Foley rewrite the law on his own?
The list of stuff to be searched boggles the mind. Books, notes, tapes, and
everything but the computerized micro-wave oven could be snatched (oh-oh!
Better keep quiet on that one or they'll get that next).
From this they justify their raid on Steve Jackson's company and nearly
destroy it. I guess you have to be prosecuted before you can charge
malicious prosecution, but I hope there is some way that those involved in
this total travesty of justice can get their due. It is frightening to
think that this could happen in America, and if Foley and his lackey's can
be sued, hopefully somebody will nail him. This isn't legitimate law
enforcement, it's a witch hunt. And if Foley is sued, I hope he gets more
justice than he is willing to give others.
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
From: The Conflict
Subject: More guidelines on what to do if busted
Date: Tue, 13 Nov 90 12:26 CST
********************************************************************
*** CuD #2.12: File 8 of 9: More tips on Reacting to a Raid ***
********************************************************************
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% %%
%% Simple Guidelines To Follow If You Encounter %%
%% Law Enforcement Agents In An Unfriendly Situation %%
%% %%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
The current state of the Computer Underground is an extreme turmoil. The
recent threat of another series of witchhunt raids has put many people into
a state of paranoia, and rightfully so. Noone needs to deal with all the
bullshit associated with a bust. I am offering a few guidelines to follow
if you are placed in a precarious situation instigated by a law enforcement
agent; of course, it is up to you to decide what you want to do. Of the
people who I have spoken with, these will be some of the best steps to
follow if you receive an unexpected visit.
Probably the first thing you would want to do if you receive an unfriendly
visit from Joe Fed is to READ the fucking warrant. Find out why you have
been chosen, and what they are looking for. Also, remember that if they
have only a search and seizure warrant, they are warranted only to
confiscate items on your premises; however, if they are serving a subpoena,
they may take what they need, on or off your premises. So, in essence, the
clean-house preventive measure may or may not be useful to you.
An important thing to do when Agent Foley (or one of his lesser evil
counterparts) comes knocking on your door is to cooperate fully. Drop a
lot of "Yes sir"/"No sir" answers; respond politely. You're in no position
to be a smart ass, and being friendly surely can not hurt you.
Another important thing to remember, although it is almost opposite of the
aforementioned, has to do with what to say. In essence, do not say a
fucking thing if you are questioned! Remember, anything you say or do can
and WILL be used AGAINST you in a court of law. Simply reply, "I can not
answer any questions without counsel", or "I first must contact my
attorney." You need not answer a damn thing they ask of you without an
attorney present, and it would most probably be very detrimental to do so.
This hint parallels the previous one. No matter what you do, do not reply
to any question with "I don't know anything", or any simple derivation of
that phrase. If you do, and you are indicted, you will be reamed in court.
The presence of that statement could greatly damage your defense, unless
you are conditionally mental or something.
In essence, those are all you should need. What I have outlined is very
simple, but logical. You need to keep a level head at least while they are
on site with you; get pissed off/psycho later, after they leave. If you
are currently an active member of the Computer Underground, you may wish to
lose anything that is important to you, at least temporarily. Why? Well,
the analogy I was given follows that: if you were suspected of
racketeering, the feds could execute a search and seizure on your property.
If they can prove by 51% that ANY of the confiscated material COULD have
been used in your suspected racketeering, it is forfeited (i.e. you lost
it, for good). The forfeiture stands whether or not you are indicted or
convicted! So, you would be entirely screwed.
All of the aforementioned steps are important. Those are all I really have
to offer. I suggest that you get clean before the sweep occurs, and that
you stay clean until after the sweep clears. Exercise extreme caution.
Keep your head high, and keep your back to the wall (otherwise, it would be
quite possible to find a knife lodged in it). Stay safe, and good luck!
The Conflict (11-13-1990)
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
From: P.A. Taylor@EDINBURGH.AC.UK
Subject: CU in the News--England and Emma Nicholson; VOGON News
Date: 04 Nov 90 16:07:16 gmt
********************************************************************
*** CuD #2.12: File 9 of 9: The CU in the News ***
********************************************************************
"A Bug In The Machine" By Tom Dewe Matthews.
From: Sunday Correspondent, 17th Dec, 1989.
"Adrian Vole " looked on helplessly as the words on his computer terminal
began to drift down to the bottom of the screen. Soon, all that was left
were skeleton lines of meaningless text. "Oh God", cursed Vole, "I've
been hit by Cascade". There was nothing he could do to stop the computer
virus from running amok. In less than ten seconds, Adrian Vole's computer
had been turned into a useless piece of junk. Vole the hacker had been
hacked.
Adrian Vole is typical of his breed. By day he works at a computer console
for a financial research company and by night he hacks away in a computer-
filled den off his bedroom. Self-sufficient, with his terminal and telephone
modem which connects him to the rest of the computerised world, Vole is
typical in that he himself is open to attack.
Hackers see themselves as fighting for freedom of information, as trying to
break the control which big corporations such as IBM hold over computerised
information, in order to disseminate it freely. "Hackers", says George Stone,
the man who gave birth to Max Headroom, " want to be able to look into a
computer system and say %I understand you and therefore can question you.
You can no longer threaten me. I've beaten you". This curiosity and
sometimes paranoia, is provoked by the sheer power of computers. "On
one computer disc" says Stone,"you can put every address in the UK,
including postcodes, and on another you can put every name from every
electoral role in the country.You correlate those two discs, whack in a
few parameters and you can start up your own credit company, or your own
poll tax."
Hackers may say they want to demystify computers,not to rob them, but they
are nevertheless constantly destroying each other's systems by off-
loading sabotaged computer games on to the electronic notice-boards where
they swap software programs with each other. "Lounge Suit Larry" is only
one in a long line of these tainted computer games which in their pure
commercial state are harmless, but if you run an adulterated copy of
"Larry" through your computer, it will wipe out your hard disc, which in
human terms is the equivalent of removing your spine.
Computer companies have been known to put bugs into the programmes that
they're trying to sell to stop the customer from copying the programme-
which is illegal under copyright law. The computer companies also blur
the battle lines by adopting an attitude of: "If we can't beat them,
let's exploit them". It is now common practice among managers of computer
networks to put the telephone access number and password of a proposed
system on to an electronic notice-board and then sit back and watch
hackers wander around their system. In the mock battle that follows,
the systems designer will even put up barriers which the hackers will
try to knock down or evade. At the end of this phoney war, the system is
dismantled and the manager redesigns it according to what he has learnt.
The real system, with a secret telephone number and password, is then
put in place and if that is hacked into it is likely that the hacker will
be traced and confronted- only to be employed by the company on the theory
that it takes a thief to keep one out.
For the politicians who want to introduce legislation into the computer
industry, such double standards are largely ignored in their pursuit of the
hacker. The Conservative M.P. Emma Nicholson tried unsuccessfully to
introduce a bill last summer which called for a loosening of Home Office
restrictions on phone taps and up to 10 years imprisonment for those who
gain unauthorised access into a computer system. If the government fails to
introduce its own hacking law in the next parliamentary session,
Ms Nicholson promises to be back soon with a repeat of her Private Members
Bill.
Hackers according to Nicholson, "are malevolent, nasty evil doers' who
fill the screens of amateur users with pornography". She believes that
"hacking has now become a regular terrorist action... The European Green
Movement hacks into large companies", she says,"and picks out sensitive
information. It could be pharmaceutical industries; it could be the oil
industry, and they justify it on the grounds of environmental or racial
fairness".
According to Emma Nicholson, the hacked information is then used to carry
out bombing and fires". The Greens may storm American air bases, but do
they really invade computers? "Yes," replies Nicholson, "The Green movement
in Europe is the most aggressive on this. They are akin to the Animal
Liberation movement here." So the Greens are trying to destabilize society
through computers? "Yes, without any doubt at all," she replies, adding that
she has " a lot of validated information" to confirm this fact.
The validation turns out to be a back copy of an anarchist magazine called
*insurrection*, in which a communique from the Dutch anti-Apartheid
movement Ra Ra lists 40 acts of sabotage against Shell in the Netherlands.
A separate article asks its readers to start fires and also lists various
computer viruses but doesn't tell the reader how to create them. The link
between the hackers and the European Greens still seems unclear. "That",
Nicholson replies, "is buried deep in my files". But what's the source?
She then becomes as enigmatic as she was previously emphatic. "You
could call it unofficial secret-service trackers close to the Dutch
government. They're very close to the hackers and if they're named they
could be put in terrible jeopardy. These hackers are very nasty people".
(That's the first approx 1/4 of the article, the rest goes on to describe
a German hacker "Mike Blip" of the Chaos Club).
*******************************************************************
From: fitz@WANG.COM(Tom Fitzgerald)
Date: Thu, 15 Nov 90 18:42:06 EST
<><><><><><><> T h e V O G O N N e w s S e r v i c e <><><><><><><>
Edition : 2193 Monday 12-Nov-1990 Circulation : 8447
VNS COMPUTER NEWS: [Tracy Talcott, VNS Computer Desk]
================== [Nashua, NH, USA ]
Massachusetts - Considering computer-crime bill hailed as a model for others
%The Wall Street Journal, 9-Nov-90, p. B1%
The legislation "is the first to properly balance property and free speech
interests," says Mitchell Kapor, founder and chairman of Lotus Development.
The bill, which has the support of the governor and is expected to be approved
by the Legislature, declares that new forms of communication such as computer
bulletin boards and paperless electronic publications "are protected by
fundamental rights, including freedom of speech and association and freedom
from unreasonable government intrusion." The bill orders jail terms and stiff
fines for those who break into computers without authorization or let loose
software viruses that disrupt systems or destroy data. Hackers caught causing
damage of $10,000 or more are subject to as much as 2 1/2 years in prison, a
fine of up to $25,000, or both.
European Community - Protecting computer software against piracy
%The Wall Street Journal, 9-Nov-90, p. A6%
European Community internal-market ministers gave broad-based support to
proposals aimed at protecting computer software against piracy. Among the
topics touched on was "reverse engineering," which allows a manufacturer to
write compatible software or produce compatible equipment. The EC proposals
would allow reverse engineering if the purpose was to create compatible, or
"inoperable" products, although strict limits on the process would be set.
<><><><><><><> T h e V O G O N N e w s S e r v i c e <><><><><><><>
Edition : 2194 Tuesday 13-Nov-1990 Circulation : 8450
VNS COMPUTER NEWS: [Tracy Talcott, VNS Computer Desk]
================== [Nashua, NH, USA ]
Security - Two teens charged with sabotaging voice-mail system
%The Wall Street Journal, 12-Nov-90, p. B7C%
Daniel Rosenbaum, 17, and a 14-year-old juvenile, both from Staten Island,
allegedly gained unauthorized entry to a computerized voice-mail system owned
by International Data Group, Framingham, Mass., then changed recorded
greetings to lewd messages, made bomb threats and erased customers' messages,
said John Keary, a New York state police investigator. The tampering occurred
between May and September at the company's Peterborough, N.H. office, at which
eight computer magazines published by the concern are based, said IDG
telecommunications director Jane Creighton. She estimated the disruptions cost
the company $2.4 million in lost revenue from advertisers and other expenses.
Mr. Rosenbaum said the two broke into the company's system because they didn't
get a free poster they had expected to receive with "Gamepro," one of its
computer magazines, said Mr. Keary. Mr. Keary said the teen-agers were charged
with computer tampering, unauthorized use of a computer and aggravated
harassment. They gained entry to the voice-mail system by entering "certain
codes" into it through telephones, after calling the company's toll-free
number, he added. By experimentation or luck, outsiders can learn passwords
needed to break into voice-mail systems, enabling them to change outgoing
messages and otherwise disrupt operations. Voice-mail break-ins, however, are
declining as security aspects of the systems are beefed up, asserts David
Ladd, executive vice president of VMX Inc., a San Jose, Calif., seller of
voice-mail systems. IDG's Ms. Creighton said that gaining access to the
company's phone mail system required use of multiple passwords. The teen-agers
"are subscribers and readers of ours, therefore they are very
computer-knowledgeable," she added.
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
Permission to copy material from this VNS is granted (per DIGITAL PP&P)
provided that the message header for the issue and credit lines for the
VNS correspondent and original source are retained in the copy.
<><><><><><><> VNS Edition : 2194 Tuesday 13-Nov-1990 <><><><><><><>
********************************************************************
------------------------------
**END OF CuD #2.12**
********************************************************************