Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 01 Issue 28

  



****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.28 (Aug 12, 1990) **
****************************************************************************

MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / Alex Smith
USENET readers can currently receive CuD as alt.society.cu-digest.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. It is assumed that non-personal mail to the moderators may be
reprinted, unless otherwise specified. Readers are encouraged to submit
reasoned articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


CONTENTS:
File 1: Moderators' Corner
File 2: A Conversation with Len Rose
File 3: Len Rose's Indictment
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

----------------------------------------------------------------------

********************************************************************
*** CuD #1.28, File 1 of 4: Moderators' Comments ***
********************************************************************

Date: 9 August, 1990
From: Moderators
Subject: Moderators' Corner

++++++++++
In this file:
1) CRAIG NEIDORF Update
2) PHRACK MAGAZINE CONTROVERSY

+++++++++++++++++++++++++++++
CRAIG NEIDORF DEFENSE FUND
+++++++++++++++++++++++++++++

Craig Neidorf has asked us to pass along a strong *THANK YOU* to everybody
who supported him throughout his ordeal. He will be resuming college in
the fall. Craig's diversion program does not restrict his freedom to
associate with whom he wishes or to publish as he wishes. However, he has
repeatedly and unequivocally emphasized that he has no plans to continue
PHRACK. Craig must speak with a pre-trial officer once a month for the next
year. The government cannot refile charges if craig is not arrested for a
computer-related crime in the next 12 months.

Many people have asked how they can help contribute to Craig's legal
expenses. Checks should be made out to the law firm of KATTEN, MUCHIN AND
ZAVIS, and sent directly to his defense attorney:

Sheldon Zenner
c/o Katten, Muchin and Zavis
525 W. Monroe, Suite 1600
Chicago, IL 60606

A note should be included indicating it is "for Craig Neidorf," and if the
check has a line for memos, there should be an additional notation
indicating "for Craig Neidorf."

+++++++++++++++
PHRACK MAGAZINE CONTROVERSY
+++++++++++++++

When PHRACK 31 appeared, some readers were highly critical because they
felt the re-incarnation was a "rip-off" of the original. Others, with
equal passion, defended retaining the name as a way respecting the
tradition it has developed and of keeping it alive. Now that PHRACK 32 may
be out soon, we invite readers to present, without flames, their position
and their reasoning. We especially invite the new editors of PHRACK to
present their side of the issue.

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

Date: 11 August, 1990
From: Jim Thomas
Subject: Len Rose Interview

********************************************************************
*** CuD #1.28: File 2 of 4: Len Rose Interview ***
********************************************************************

The Len Rose case seems to present problems for many people. Some, who
ordinarily support Constitutional rights, seem to have backed away from
this case, perhaps because of the seriousness of the charges, or perhaps
because his case does not seem as "pure" as those of some other defendants.
Some people are also concerned that Len's brush with the law "taints" him.

We feel that Len's case deserves attention comparable to other recent
cases. The charges in the indictment, as explained to us, are no more
serious than those in the indictment's of others, and the charges do not
seem to be as serious as the media depicts them. More importantly, the duel
model process of justice that ostensibly guides criminal proceedings must
be applied to all equally, whether the defendant is squeaky clean or a
homicidal maniac. We are troubled by those who think that, because Len has
had a previous legal problem, he is less deserving of legal help. Often, it
is precisely those whose image is the most tarnished who are most at risk
in the judicial process. If the issues are worthy and potentially affect
others, then it is in everybody's interests to assure that justice is
served.

CuD recently talked at length with Len about his current situation. We
have not talked with Len's attorney nor have we seen copies of motions or
of the evidence. Len's current attorney is a public defender who has been
busy in the multiple calls we made daily for three days. He has not
returned our calls. Those who have the time to try to obtain information
from him may contact him at:

Jim Kraft (the attorney)
Kraft, Balcerzak and Bartlett
7050 Oakland Mills Road
Columbia, MD 21046 (phone: 301-381-4646).

Len informs us that the case number is CR-90-0202, Federal Court, Baltimore.

*******************************************************************

WHO IS LEN ROSE?

Len Rose is a 31 year old computer programmer who lives in Pennsylvania.
He has been married for 10 years and has a son, five years old, and a two
year old daughter. He served six years in the army and, he informed us,
received the highest peacetime medal and "held a top secret clearance until
this happened." Len broke his leg in three places in early August during a
fishing outing with his son when he fell off a 35 foot cliff, "but at least
I kept my son from falling," he said. Prior to his arrest, Len operated
his own computer system and was a computer consultant. One specialty area
was Unix systems.

WHAT IS LEN CHARGED WITH?

Len told us that there are five counts against him under Title 18. Two are
for computer fraud and three are for transporting allegedly stolen goods in
excess of $5,000 across state lines. (See File 3, this issue, for a copy
of the indictment).

According to Len, the two fraud counts were for allegedly altering
"login.c," which is source code for unix login programs, which was modified
to perform a trojan horse function to record login names and passwords and
store them in a file system. Len said he wrote the program because
somebody was attacking his own system, and he installed the program on his
system to see what accounts were being attacked. He indicated that login.c
is being valued in the indictment at $75,000, a value reminiscent of the
inflated E911 file charges that federal prosecutors in Chicago charged was
worth over $79,000. Under cross-examination, it was determined that the
information in the E911 files could be obtained in a $13 manual. The other
fraud count was for sending out a password scanner that he wrote himself
that scans passwords and tries to decrypt them. "You can find more powerful
programs n the net," he said, "such as Crypt Breakers Workbench and COPS,
which are archived on uunet to name just two %sources%."

According to Len, "The things I wrote were so trivial, a first year
computer science student could have written them. What it did was take a
word out of a dictionary file and encrypt it, and it compared the encrypted
form to the encrypted password in the password file. It was a very mindless
program. I had written it a long time ago, and used it many times myself
and when I was doing it for security %consulting%. That's all I used it
for, on any system concerned with security. In fact, it was obsolete,
because when ATT released system V 3.2 backin 1988, they stopped using the
file /etc/password and went to the /etc/shadow which was only readable by
the root account or super user accounts. This program %in question% can't
be installed without being able to control the system. I couldn't be used
by a normal user."

The three transportation counts apparently stemmed from multiple sendings
of this file. He sent the program to an e-mail publication, but the
program did not arrive intact, so he re-sent it, which, he said, was the
basis of the second count. The final count, for the same program,
occured because he deleted his own program and received a copy of the
program he had previously sent.

Len related a story that sounded similar to SS Agent Timothy Foley's
account of the initial questioning of Craig Neidorf. Len said he was
originally asked about the E911 files, and that the agents told him that he
was not in any trouble. Len said, "I told them everything I knew. I
cooperated with them to the fullest extent possible, because I trusted
them. I didn't try to hide anything. I told them everything, and they were
after this 911 stuff. They said I wouldn't be prosecuted if I told them
everything, but they did. They told me to tell them now and it won't
matter, but if it came out later.....I told him about the source code."

Len emphasized that he did not steal the source code and that he used it
only to learn Unix.

Contrary to some reports both in the media and circulating on the nets, Len
adamantly denies ever being a member of the Legion of Doom, a denial
confirmed by LoD members and a recent LoD listing of participants. "I never
said I was a member of LoD, that was nothing out of my mouth. I never had
any association with them, and only knew some of the people. I considered
it a kids group, immature, and I never had any involvement with any group
anywhere. I was not a joiner," he said.

WHAT WAS LEN'S PREVIOUS OFFENSE?

Because of the rumors circulating about an earlier offense, we asked Len to
tell us what he could. The case has not yet been resolved, although it will
be concluded within the next few days. It occured in 1989, and was
unrelated to the current situation. It was a state offense for felony
theft, which resulted from an attempt to recover computer equipment that he
believed at the time to be rightfully his, and was the consequence of a
dispute between himself and a company he felt had "ripped him off." On the
streets, we called this "midnight repossession." "It was very stupid. I had
never been n trouble before that and I am very ashamed," he said. The
details of the case can be more fully elaborated after it is fully
resolved.

WHAT'S LEN'S STATUS NOW?

The trial was originally scheduled for August 20, but it appears now that
it may be postponed until February. Until then, Len has no computer
equipment, and he said that the judge would not consider a motion to return
it because the judge perceived that he could use it to commit further
crime. As a consequence, Len has no source of income, and said that he has
lost his home, his credit rating and credit cards, his business, and some
of his friends. "I've lost everything." He is currently immobilized because
of his leg fracture, and will be in casts of various types for at least
eight weeks and may require surgery. His situation has put severe strains
on his finances, psyche, and domestic life. He indicated that he could no
longer afford to retain his original attorney, Carlos Recio of Deso and
Greenberg in Washington, D.C., and was currently represented by a public
defender. His income was slashed by one-twentieth, and he estimated he has
barely made $5,000 this year. He lost his office and currently works from a
single room in a friend's company. He feels that his reputation has been
unjustifiably destroyed, largely by distorted media representations and
rumors and added, "The press has been as damaging as the Secret Service."

If Len's account is accurate, then it would seem to raise many of the same
questions addressed by the EFF, CuD, 2600 Magazine, and others interested
in protecting the Constitutional rights of computerists. Len is not being
charged with theft, but with violations that raise the definition of
property, the legal rights of programmers, the status of source could that
seems to be fairly accessible, and other evolving issues in the
still-tenuous relationship between technology and law. It also raises the
issue of "cruel and unusual punishment." If the summary of the indictment
is correct, it would appear that the consequences resulting from Len's
situation far exceed the crime, and any additional sanctions, especially if
they involve incarceration, will be neither in the interests of Len, or,
ultimately, of society. To deprive an individual who has been a
contributing member to society of a means of livelihood would seem to serve
little purpose in this or any other case. Some argue that the courts are
the best forum to decide both the guilt/innocence and the fate of
defendants. But, justice is not always served in the legal process,
especially in the grey area of ambiguous laws enforced by technologically
untrained investigators and prosecutors. Regardless of what one might
think of Len's judgment in some of his behaviors, we must nonetheless ask:
If Len's account is accurate, at what point does the punishment become too
great? For Len Rose, the immediate goal is modest: "I just want to get my
home back again."

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

Date: 12 August, 1990
From: Moderators
Subject: Len Rose Indictment

********************************************************************
*** CuD #1.28: File 3 of 4: Len Rose Indictment ***
********************************************************************

Len Rose provided the following copy of his indictment, which we have
edited only with a spell-checker. The five counts against Len seem quite
general, and in many ways are similar both in style and substance to those
filed against Craig Neidorf. The perhaps obligatory reference to the
Legion of Doom is made in count one without establishing the defendant's
connection to it, the value of the alleged "property" established as
over $5,000 (Len informs us that the value is established at about $75,000)
seems absurdly over-stated given the apparent nature of the "property" in
question, he is being charged with sending a program that he wrote that is
much less powerful than similar programs readily accessible to the public,
and the charges themselves seem sufficiently vague and ambiguous that they
could apply to many forms of knowledge or information.

We do not publish the indictment as a "Len Rose Issue." Instead, we suggest
that the document below reflects the continued misuse of law as a means to
control information. What is the precise nature of the information in
question? Was it used by the defendant to defraud? Is there any evidence
that he, or anybody else, intended to use it to defraud? The following
indictment, like the indictment in the Neidorf case, seems vague, and from
the trickles of information coming in, it seems that none of the evidence
strongly supports any of the counts. If true, it seems like deja vous all
over again.
********************************************************************

Subject: Len Rose Indictment
Date: Sun, 12 Aug 90 15:29:14 -0400
From: lsicom2!len@CDSCOM.CDS.COM




IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF MARYLAND

UNITED STATES OF AMERICA *
* Criminal No.
v. * - -
*
LEONARD ROSE, a/k/a/ "Terminus" * (Computer Fraud, 18 U.S.C.
* S 1030(a) (6); Interstate
* Transportation of Stolen
* Property, 18 U.S.C. S 2314;
* Aiding and Abetting, 18
* U.S.C. S 2)
Defendant. *
* * * * * * * * *


INDICTMENT

COUNT ONE

The Grand Jury for the District of Maryland charges:

FACTUAL BACKGROUND

1. At all times relevant to this Indictment, American Telephone & Telegraph
Company ("AT&T"), through it's subsidiary, Bell Laboratories ("Bell Labs"),
manufactured and sold UNIX (a trademark of AT&T Bell Laboratories)
computer systems to customers throughout the United States of America.
2. At all times relevant to this Indictment, AT&T sold computer programs
("software") designed to run on the UNIX system to those customers. This
software is designed and manufactured by AT&T;some software was available
to the public for purchase, other software was internal AT&T software
(such as accounting and password control programs) designed to operate
with the AT&T UNIX system.
3. At all times relevant to this indictment, computer hackers were individuals
involved with gaining unauthorized access to computer systems by various
means . These means included password scanning (use of a program that
employed a large dictionary of words, which the program used in an attempt
to decode the passwords of authorized computer system users), masquerading
as authorized users, and use of trojan horse programs.
4. At all times relevant to this Indictment, the Legion of Doom ("LOD") was
a loosely-associated group of computer hackers. Among other activities,
LOD members were involved in:

a. Gaining unauthorized access to computer systems for purposes of
stealing computer software programs from the companies that owned the
programs;
b. Gaining unauthorized access to computer systems for purpose of using
computer time at no charge to themselves, thereby fraudulently obtaining
money and property from the companies that owned the computer systems;
c. Gaining unauthorized access to computer systems for the purpose of
stealing proprietary source code and information from the companies
that owned the source code and information;
d. Disseminating information about their methods of gaining unauthorized
access to computer systems to other hackers;
e. Gaining unauthorized access to computer systems for the purpose of
making telephone calls at no charge to themselves, obtaining and using
credit history and data for individuals other than themselves, .and
the like.

5. At all times relevant to this Indictment, LEONARD ROSE JR. a/k/a
"Terminus", was associated with the LOD and operated his own computer
system, identified as Netsys. His electronic mailing address was
netsys!len

COMPUTER TERMINOLOGY

6. For the purpose of this Indictment, an "assembler" is a computer program
that translates computer program instructions written in assembly language
(source code) into machine language executable by a computer.

7. For the purpose of this Indictment, a "compiler" is a computer program
used to translate as computer program expressed in a problem oriented
language (source code) into machine language executable by a computer.
8. For the purpose of this Indictment, a "computer" is an internally
programmed, automatic device that performs data processing.

9. For the purpose of this Indictment, a "computer network" is a set of
related, remotely connected terminals and communications facilities,
including more than one computer system, with the capability of
transmitting data among them through communications facilities, such as
telephones.

10.For the purposes of this Indictment, a "computer program" is a set of
data representing coded instructions that, when executed by a computer
causes the computer to process data.

11.For the purposes of this Indictment, a "computer system" is a set of
related, connected, or unconnected computer equipment, devices, or software.

12.For the purposes of this Indictment, electronic mail ("e-mail") is a
computerized method for sending communications and files between
computers on computer networks. Persons who send and receive e-mail are
identified by a unique "mailing" address, similar to a postal address.

13.For the purposes of this Indictment a "file" is a collection of related
data records treated as a unit by a computer.

14.For the purposes of this Indictment, "hardware" is the computer and all
related or attached machinery, including terminals, keyboard, disk drives,
tape drives, cartridges, and other mechanical, magnetic, electrical, and
electronic devices used in data processing.

15.For the purposes of this Indictment, a "modem" is a device that modulates
and demodulates signals transmitted over data telecommunications
facilities.

16.For the purposes of this Indictment, "software" is a set of computer
programs, procedures, and associated documentation.

17.For the purposes of this Indictment, "source code" is instructions
written by a computer programmer in a computer language that are used as
input for a compiler, interpreter, or assembler. Access to source code
permits a computer user to change the way in which a given computer
system executes a program, without the knowledge of the computer system
administrator.

18.For the purposes of this Indictment, "superuser privileges" (sometimes
referred to as "root") are privileges on a computer system that grant
the "superuser" unlimited access to the system, including the ability
to change the system's programs, insert new programs, and the like.

19.For the purposes of this Indictment, a "trojan horse" is a set of
computer instructions secretly inserted into a computer program so that
when the program is executed, acts occur that were not intended to be
performed by the program before modification.

20.For the purposes of this Indictment, "UNIX" (a trademark of AT&T Bell
Laboratories) is a computer operating system designed by AT&T Bell
Laboratories for use with minicomputers and small business computers,
which has been widely adopted by businesses and government agencies
throughout the United States.

COMPUTER OPERATIONS

21.For the purposes of this Indictment, typical computer operations are as
described in the following paragraphs. A computer user initiates
communications with a computer system through his terminal and modem.The
modem dials the access number for the computer system the user wishes to
access and, after the user is connected to the system, the modem
transmits and receives data to and from the computer.

22.Once the connection is established, the computer requests the user's login
identification and password. If the user fails to provide valid login and
password information, he cannot access the computer.

23.Once the user has gained access to the computer, he is capable of
instructing the computer to execute existing programs. These programs are
composed of a collection of computer files stored in the computer's
memory. The commands that make up each file and, in turn, each program, are
source code. Users who have source code are able to see all of the
commands that make up a particular program. They can change these commands,
causing the computer to perform tasks that the author of the program did
not intend.

24.The user may also copy certain files or programs from the computer he has
accessed; if the user is unauthorized, this procedure allows the user to
obtain information that is not otherwise available to him.

25.In addition, once a user has accessed a computer, he may use it's network
connections to gain access to other computers. Gaining access from one
computer to another permits a user to conceal his location because login
information on the second computer will reflect only that the first
computer accessed the second computer.

26.If a user has superuser privileges, he may add, replace, or modify existing
programs in the computer system. The user performs these tasks by
"going root"; that is, by entering a superuser password and instructing
the computer to make systemic changes.

27. On or about January 13, 1989, in the State and District of Maryland, and
elsewhere,

LEONARD ROSE JR. a/k/a Terminus

did knowingly, willfully, intentionally, and with intent to defraud,
traffic in (that is, transfer, and otherwise dispose of to another, and
obtain control of with intent to transfer and dispose of) information
through which a computer may be accessed without authorization, to wit:
a trojan horse program designed to collect superuser passwords, and by
such conduct affected interstate commerce.


18 U.S.C. S 1030(a) (6)
18 U.S.C. S 2


COUNT TWO

And the Grand Jury for the District of Maryland further charges:

1. Paragraphs 1 through 26 of Count One are incorporated by reference,
as if fully set forth.
2. On or about January 9, 1990, in the State and District of Maryland,
and elsewhere,

LEONARD ROSE JR. a/k/a/ Terminus

did knowingly, willfully, intentionally, and with intent to defraud,
traffic in (that is, transfer, and otherwise dispose of to another, and
obtain control of with intent to transfer and dispose of) information
through which a computer may be accessed without authorization, to wit:
a trojan horse login program, and by such conduct affected interstate
commerce.


18 U.S.C. S 1030(a) (6)
18 U.S.C. S 2


COUNT THREE


And the Grand Jury for the District of Maryland further charges:

1. Paragraphs 1 through 26 of Count One are incorporated by reference,
as if fully set forth.
2. That on or about May 13, 1988 in the State and District of Maryland,
and elsewhere,

LEONARD ROSE JR. a/k/a/ Terminus

did cause to be transported, transmitted, and transformed in interstate
commerce goods, wares, and merchandise of the value of $5000 or more, to
wit: computer source code that was confidential, proprietary information
of AT&T, knowing the same to have been stolen, converted, and taken by
fraud.

18 U.S.C. S 2314
18 U.S.C. S 2




COUNT FOUR


And the Grand Jury for the District of Maryland further charges:

1. Paragraphs 1 through 26 of Count One are incorporated by reference,
as if fully set forth.
2. That on or about January 15, 1989 in the State and District of Maryland,
and elsewhere,

LEONARD ROSE JR. a/k/a/ Terminus

did cause to be transported, transmitted, and transformed in interstate
commerce goods, wares, and merchandise of the value of $5000 or more, to
wit: computer source code that was confidential, proprietary information
of AT&T, knowing the same to have been stolen, converted, and taken by
fraud.


18 U.S.C. S 2314
18 U.S.C. S 2

COUNT FIVE


And the Grand Jury for the District of Maryland further charges:

1. Paragraphs 1 through 26 of Count One are incorporated by reference,
as if fully set forth.
2. That on or about January 8, 1990 in the State and District of Maryland,
and elsewhere,

LEONARD ROSE JR. a/k/a/ Terminus

did cause to be transported, transmitted, and transformed in interstate
commerce goods, wares, and merchandise of the value of $5000 or more, to
wit: computer source code that was confidential, proprietary information
of AT&T, knowing the same to have been stolen, converted, and taken by
fraud.

18 U.S.C. S 2314
18 U.S.C. S 2

____________________

Breckinridge L. Wilcox

********************************************************************
>> END OF THIS FILE <<
***************************************************************************

------------------------------

Date: 11 August, 1990
From: Contributors
Subject: CU In the News

********************************************************************
*** CuD #1.28: File 4 of 4: The CU in the News ***
********************************************************************

Date: Sun, 29 Jul 90 17:36 CDT
From: Anonymous
Subject: Neidorf news coverage- Markoff article

"U.S. Drops Computer Case Against Student"
(By John Markoff, New York Times, June 28, 1990, p. 7)

Federal prosecutors in Chicago yesterday dropped felony charges against a
20-year-old college student in a computer crime case that has drawn national
attention because of the civil liberties issues involved.

In a trial that began Monday, the Government had accused the student, Craig M.
Neidorf of the University of Missouri, of publishing an internal telephone
company document describing the emergency 911 system for nine states in the
Southeast. The Government said he had obtained the document from another
computer user who had stolen it electronically from the company, the BellSouth
Corporation of Atlanta; Mr. Neidorf then published it in an underground
computer newsletter that was distributed electronically on computer networks
and electronic bulletin boards.

But an assistant United States Attorney, William J. Cook, said the government
decided to drop the charges after learning that much information in the
document was already publicly available.

"The value of the document was one of the factors in the prosecution," he
said. "There were aspects of this document that we did not now were in the
public domain. It was a question of the way the phone company portrayed the
document.

Succession of Arrests

Mr. Neidorf did not plead guilty but acknowledged that he had received the
BellSouth document and agreed to be placed in a program under which he could
be prosecuted if he committed similar offenses in the future.

In recent months Federal and state law-enforcement officials have conducted a
succession of raids around the nation and made six arrests in a campaign
against young computer users who break into government and business data
systems.

The crackdown drew angry opposition from civil liberties experts and some
computer industry executives, who argued that the Government was overreacting
and discouraging legitimate activities of law-abiding computer users.

A civil liberties organization, the Electronic Frontier Foundation, created by
a computer industry executive, Mitchell D. Kapor, has spoken out in support of
Mr. Neidorf.

Mr. Neidorf was accused of obtaining BellSouth's 911 document from Robert J.
Riggs, 20, of Atlanta, one of three men who pleaded builty last month to
gaining illegal entry to BellSouth computers. Mr. Riggs and Franklin Darden
Jr., 23, face a maximum penalty of five years in prison and a $200,000 fine.
The third man, Adam E. Grant, 22, faces a maximum penalty of 10 years in
prison and a $250,000 fine.

Mr Riggs, testifying in the Chicago case on Thursday, said he had not acted in
concert with Mr. Neidorf as the Government had charged.

** END **
********************************************************************
Date: Thu, 09 Aug 90 00:14:44 EDT
From: Michael Rosen <CM193C@GWUVM>
Subject: Craig Neidorf
To: Computer Underground Digest <tk0jut2>


SOURCE: Computerworld, 8/6/90, p. 8, by Michael Alexander (CW Staff):
DIAL 1-800... FOR BELLSOUTH 'SECRETS'

Chicago - The attorney for Craig Neidorf, a 20-year-old electronic
newsletter editor, said last week that he plans to file a civil lawsuit
against Bellsouth Corp. as a result of the firm's "irresponsible" handling
of a case involving the theft of a computer text file from the firm.

Federal prosecutors dismissed charges against Neidorf four days into the
trial, after prosecution witnesses conceded in cross-examination that much
of the information in the text file was widely available.

Neidorf, the co-editor of "Phrack," a newsletter for computer hackers, was
accused by federal authorities of conspiring to steal and publish a text
file that detailed the inner workings of Bellsouth's enhanced 911 emergency
telephone system across nine states in the Southeast [CW, July 30].

"What happened in this case is that the government accepted lock, stock and
barrel everything that Bellsouth told them without an independent
assessment," said Sheldon Zenner, Neidorf's attorney.

One witness, a Bellsouth service manager, acknowledged that detailed
information about the inner workings of the 911 system could be purchased
from Bellsouth for a nominal fee using a toll-free telephone number.

A Bellcore security expert who was hired by Bellsouth to investigate
intrusions into its computer systems testified that the theft of the file
went unreported for nearly a year.

Last week, a Bellsouth spokesman said the firm's security experts delayed
reporting the theft because they were more intent on monitoring and
preventing intrusions into the company's computer systems. "There are only
so much resources in the data security arena, and we felt that it was more
urgent to investigate," he said.

He also disputed assertions that the document was of little value. "It is
extremely proprietary and contained routing information on 911 calls
through our nine-state territory as well as entry points into the system,"
he said.

A QUICK ENDING

The case unraveled after Robert Riggs, a prosecution witness who had
already pleaded guilty for his role in the theft of the document, testified
that he had acted alone and that Neidorf had merely agreed to publish the
text file in "Phrack."

Neidorf and his attorney agreed to a pretrial diversion, a program under
which the government voluntarily dismisses the indictment but could
reinstate it if Neidorf commits a similar crime within a year.

The case has stirred up national debate on the rights of computer users in
the age of electronic information. The Electronic Frontier Foundation, a
civil liberties group set up by Mitch Kapor, founder of Lotus Development
Corp., may participate in the filing of a lawsuit against Bellsouth, said
Terry Gross an attorney at the New York law firm of Rabinowitz Boudin
Standard Krinsky & Lieberman.

"The Electronic Frontier Foundation is concerned by the irresponsibility of
Bellsouth of claiming from the outset that this was confidential material
when it should have known that it was not," Gross said.

**END OF ARTICLE**
********************************************************************

Date: 28 Jul 90 10:41:47 EDT
From: Moderators
Subject: British Law and Modem User's Association of America (MUAA)

- London, England UK COMPUTER CRACKING BILL BECOMES LAW
---------------

Having passed Parliament, the UK Computer Misuse Bill has now gained
Royal Assent, becoming law. This Bill defines computer hacking (or to use
a MUCH more appropriate term, computer Cracking) as the act of gaining
unauthorized access into a computer system., and makes it punishable by
fines and short prison terms. It also enables people to be prosecuted in
England if either the offender OR the affected computer system was in
England when the computer system was broken into.

Interestingly enough, a Price Waterhouse report says that theft or
fraud were responsible for only 20 percent of reported security incidents
in the UK, and that over 76 percent were due to human error, system
failure, or natural hazards. However, over 65 percent of UK companies in
their survey said that they had suffered financially from security
failures....

*******************************************************************
- Topeka, Kansas EFFORTS BEGIN TO LAUNCH LOBBYING GROUP FOR MODEM USERS

Alan Bechtold (President of the BBS Press Service) has begun efforts
start the Modem User's Association of America (MUAA). If successful, the
MUAA will be a non-profit organization that will engage in legal and
Congressional Lobbying activities for modem users and operators of online
services. It will also serve as a source of information on modem-related
legislation being considered around the US (like the FCC's attempts to
charge special fees for people to use modems)....

Most of the interest for the MUAA has come from places like Texas
and Indiana, where telephone companies and state governments are trying to
implement new rate structures that charge modem users higher rates for
service. Bechtold is now trying to test the level of support for such an
organization, via an effort to raise $10,000 in funds to begin the MUAA by
the end of September. If that amount has not been raised by then, he has
pledged to "tear up all the checks that I have received and continue on
with other activities".

Interestingly, a Group based in Washington DC has offered to
contribute legal and lobbying support for the MUAA, but only IF it gains
enough support. Bechtold is considering these annual membership fees for
the MUAA:

Individuals - $15 Commercial Bulletin Boards - $50
Hobby Bulletin Boards - $25 Commercial Online Services - $100
Makers of Telecommunications and/or Terminal Software - $200
Modem and Computer Makers - $500

If you wish to obtain more information about the proposed MUAA, Alan
Bechtold can be reached at 1-913-478-3157....



source:
ST REPORT ONLINE MAGAZINE
STR Publishing Inc.
July 27, 1990, No.6.30


********************************************************************

------------------------------

**END OF CuD #1.28**
********************************************************************



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
6 Nov 2024
Thank you! I've corrected the date in the article. However, some websites list January 1980 as the date of death.

guest's profile picture
@guest
5 Nov 2024
Crespi died i april 1982, not january 1980.

guest's profile picture
@guest
4 Nov 2024
In 1955, the explorer Thor Heyerdahl managed to erect a Moai in eighteen days, with the help of twelve natives and using only logs and stone ...

guest's profile picture
@guest
4 Nov 2024
For what unknown reason did our distant ancestors dot much of the surface of the then-known lands with those large stones? Why are such cons ...

guest's profile picture
@guest
4 Nov 2024
The real pyramid mania exploded in 1830. A certain John Taylor, who had never visited them but relied on some measurements made by Colonel H ...

guest's profile picture
@guest
4 Nov 2024
Even with all the modern technologies available to us, structures like the Great Pyramid of Cheops could only be built today with immense di ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
2 Nov 2024
In Sardinia, there is a legend known as the Legend of Tirrenide. Thousands of years ago, there was a continent called Tirrenide. It was a l ...

guest's profile picture
@guest
2 Nov 2024
What is certain is that the first Greek geographer to clearly place the Pillars of Hercules at Gibraltar was Eratosthenes (who lived between ...

guest's profile picture
@guest
1 Nov 2024
Disquieting thc drinks has been quite the journey. As someone keen on unpretentious remedies, delving into the in every respect of hemp has ...

guest's profile picture
@guest
29 Oct 2024
hi Good day I am writing to inform you of recent developments that may impact our ongoing operations. This morning, global news outlets hav ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT