Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 03 Issue 26

  



Computer Underground Digest--Thu Jul 18 17:22:30 CDT 1991 (Vol #3.26)

Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

Contents of Issue 3.26, July 27, 1991:

File 1: Moderators' Corner
File 2: The Vajk-Spaf-Leichter dialogue continues......
File 3: The TERMINUS of Len Rose
File 4: "Computer Crime" paper by Brian Peretti available
File 5: Doc Savage Sentenced (NEWSBYTES Reprint)
File 6: CompuServe Responds to Policy and Operations Questions

Administratia:

ARCHIVISTS: ROB KRAUSE, BOB KUSUMOTO, AND BRENDAN KEHOE

CuD is available via electronic mail at no cost. Printed copies are
available by subscription. Single copies are available for the costs
of reproduction and mailing.

Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, by FidoNet file request from 1:100/345,
on Genie, on the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp
from ftp.cs.widener.edu, chsun1.uchicago.edu, and
dagon.acc.stolaf.edu. To use the U. of Chicago email server, send
mail with the subject "help" (without the quotes) to
archive-server@chsun1.uchicago.edu.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to the
Computer Underground. Articles are preferred to short responses.
Please avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: July 18, 1991
From: "The Moderataors" <tk0jut2@MVS.CSO.NIU.EDU>
Subject: File 1-- Moderators' Corner

NEW CuD FORMAT: The responses to the new format have been
overwhelmingly favorable, so it will replace the old format. Thanks
to Gene Spafford who provided us with a digest maker that we hope to
have working soon.

READING THE NEW FORMAT: Usenet readers should soon be able to read CuD
as individual messages, making replies easier (thanks to Chip
Rosenthal). Those who get it as "mail" on Unix system can break the
single file up into individual files (depending on the system and
what's set up on it) with "burst" or, the easiest, with "inc". Those
receiving CuD on an IBM-type machine appear limited to a large file,
but if anybody has suggests on how to burst on VMS, pass them along.

MA/PHD THESES AND DISSERTATIONS: We're compiling a list of anybody
currently working on a thesis or dissertation on computer culture,
computer crime, or other related topics. If you, or somebody you know,
is doing this, please pass along the names and snail-mail and email
address. This includes international researchers as well as those in
North America.

LEN ROSE: Len Rose began his prison term in North Carolina this month.
Barring surprises, he should be out next May. He could use some
"cheery" mail. His address is:

LEN ROSE
FEDERAL PRISON CAMP
SEYMOUR JOHNSON AFB
CALLER BOX 8004
GOLDSBORO, NC 27531-5000

------------------------------

Date: Mon, 15 Jul 91 02:21:46 CDT
From: "William Vajk (igloo)" <learn@GARGOYLE.UCHICAGO.EDU>
Subject: File 2-- The Vajk-Spaf-Leichter dialogue continues......

More Questions....
====================

I have read Jerry Leichter's response in CuD 3.24, and have received
mail from Thomas Klotzbach which has also been submitted by him for
publication in CuD.

As a direct result of the issues raised by these two gentlemen, I
spent the better part of a day in one of the law libraries provided by
Cook County, Illinois, for use by the public. Instead of having
answers, the review of copyright laws in 17 USC only created more new
questions, which I'll address another time in yet another article.

Briefly stated, copyright laws do the best job of protecting tangible
goods wherein the expression constitutes the primary value. In other
cases where a visual rendition is possible but does not represent the
real value of the object, as with musical scores, the public
production rights also glean protection, but the primary purpose is to
preclude unauthorized reproduction of tangible medium versions.

It would seem that copyright protections for source code, as in UNIX
source code, is rather minimal. Indeed, rereading the Rose indictment
from Maryland and the plea bargain, copyright is never mentioned. In
detail, the Rose case becomes further complicated in that he received
the code from a bailee.

Klotzbach is correct in one comment that there are criminal aspects to
copyright violations. They fall, however, in a particularly narrow
range, requiring willful action AND profit motive on part of the
miscreant. If you don't sell it, copyright law isn't applicable to
prosecution as a criminal.

I was unable to discover the exact requirements currently mandate for
deposit of software in order to support a copyright. The Rose
indictment calls the source code "confidential and proprietary." It is
confidential in an AT&T security employee's dream, and that's about
the extent. Leichter suggests that AT&T could claim to have never
published the source code. This would be true if sale or offer to sell
were a requirement. 17 USC addresses these issues with the term "vend"
instead of "sell." The source code we're talking about has been
published all right, and is in no way entitled to a "trade secret"
status.

Leichter defends the errors made by law enforcement, stipulating that
they have to learn how to deal with computer crime. Agreed, in
principle, but not in detail. The problems I am addressing have to do
with the general approach law enforcement seems to be taking to
solving all crime these days. The Constitution hasn't changed
recently. Essentially the same rules have applied to investigations.
What does an officer have to learn about computer criminality in order
to keep him from kicking in two doors because some law abiding
individual tried to get into a bbs that was no longer a bbs ? What
does he have to be taught in order to have the patience necessary to
simply wait for the guy to get home from work, and ask a few questions
? We are seeing some of the fallout from our permissiveness regarding
RICO.

These issues have nothing to do with computer criminality as opposed
to using sensible investigative techniques. Are we in an age where
we've been subjected to so many shoot-em-up cops versus the bad guys
TV shows that people here on usenet, among the best educated, most
sensible souls in the US, can accept kicking in doors and summary
confiscation of personal property as a valid and reasonable outcome
from calling the wrong phone number a few times ?

We have a nation which based its laws on personal freedoms and rights
before any other consideration. Let's please try to remember the
importance of this simple philosophy.

CuD 3.25 arrived as I was finishing this article. A couple of points
for Gene Spafford to contemplate come to mind. He asks why it is that
I criticize him personally. The answer is simple. The way the articles
by Spafford have been written, it is impossible to separate the
concepts from the man. His style is the same in Communications of the
ACM. Interestingly, I have been criticized by him exactly in the same
way as he complained regarding my statements about him. I expected it.
I suppose Spafford didn't. These opinions are pretty personal. They
can hardly be discussed at arm's length. It is not any more remote to
ask if readers find statements hypocritical, or the individual (see
Spafford's comments in referenced CuD.) I am not insulted by
Spafford's opinion. He holds it, he's entitled to it, I won't argue
the point. (Where do you cut notches, Spaf? :-)

Spafford asks a direct question of me to which I am happy to reply:

> If Joe Random were to shoot someone in front of witnesses, he would
> be innocent under the law until a jury returned a verdict in a trial,
> but he would NOT be innocent of the act. Would any witness to the
> crime, or anyone who spoke to the witness, then be equally condemned
> by Mr. Vajk for saying "Joe was not innocent of murder" before the
> conclusion of the trial?

Yes.

A witness can justly say "I saw him shoot the guy." A person who spoke
to a witness might reasonably say "He said he saw Joe Random shoot the
guy." Anyone can say "I believe Joe is guilty" and still be fair and
reasonable. But to state someone IS guilty is the duty of the jury
(or judge.) We, all of us, have reserved that right to the judicial
process. I cannot fathom why anyone would be inclined to change that
now. When one begins to assume these responsibilities on themselves,
it becomes easy to victimize even individuals who haven't been charged
with crimes by painting them with a wide black brush of presumed
guilt. We've seen it happen, right here on this network. It has also
been called the tyranny imposed by the self-righteous.

And finally:

> ...one cannot champion free speech without also embracing the responsibility
> to to respect others who choose to exercise that right -- disagreement with
> views should not become contempt for people who (appear to) espouse them.

Of course it is possible to respect another's right to freedom of
expression while holding them in contempt. I respect the rights of
Nazis to march in Skokie. If asked to testify regarding their rights,
I would most likely state that 'I believe this swill must be permitted
to march. Please issue the necessary permits.' I certainly will never
respect them in any way.

I don't, however, see anything hypocritical about respecting some
particular individual for some aspects regarding them, and detest
other aspects concurrently. Most of us aren't particularly narrow.

------------------------------

Date: Tue, 09 Jul 91 21:28:26 CDT
From: "Craig Neidorf" <C483307@UMCVMB.BITNET>
Subject: File 3-- The TERMINUS of Len Rose

The TERMINUS of LEN ROSE

by Craig Neidorf
(kl@stormking.com)

(Adapted from 2600 Magazine, Spring 1990)

As most readers of 2600 Magazine and Computer Underground Digest
should know, I am Knight Lightning, and I used to be the editor and
publisher of Phrack, a magazine similar to 2600, but not available in
a hardcopy format. In my capacity as editor and publisher I often
received text files and other articles submitted for publication.
Actually, this is how the majority of the material found in Phrack was
acquired. Outside of articles written by Taran King or myself, there
was no staff, merely a loose, unorganized group of free-lancers who
sent us material from time-to-time.

One such free-lance writer was Len Rose, known to some as
Terminus. To the best of my knowledge at the time, Len was a Unix
consultant who ran his own system on UUCP called Netsys. Netsys was a
major electronic mail station for messages passing through UUCP.
Terminus was no stranger to Phrack. Taran King had interviewed him
for Phrack Pro-Phile 10, found in Phrack's fourteenth issue.
Prior to the end of 1988, I had very little contact with Terminus
and we were reintroduced when he contacted me through the Internet.
He was very excited that Phrack still existed over the course of the
years and he wanted to send us an article. However, Len was a
professional Unix consultant, holding contracts with major
corporations and organizations across the country and quite reasonably
(given the corporate mentality) he assumed that these companies would
not understand his involvement with Phrack. Nevertheless, he did send
Phrack an article back in 1988. It was a computer program actually
that was called "Yet Another File on Hacking Unix" and the name on the
file was >Unknown User<, adopted from the anonymous posting feature of
the once famous Metal Shop Private bulletin board.
The file itself was a password cracking program. Such programs
were then and are still today publicly available intentionally so that
system managers can run them against their own password files in order

"An example is the password cracker in COPS, a package
that checks a Unix system for different types of
vulnerabilities. The complete package can be obtained
by anonymous FTP from ftp.uu.net. Like the password
cracker published in Phrack, the COPS cracker checks
whether any of the words in an on-line dictionary
correspond to a password in the password file."
(Dorothy Denning, Communications of the ACM,
March 1991, p. 28)

Perhaps if more people used them, we would not have incidents
like the Robert Morris Worm, Cliff Stoll's KGB agents, or the
recent crisis involving system intruders from the Netherlands.

Time passed and eventually we come to January 1990. At some
point during the first week or two of the new year, I briefly logged
on to my account on the VM mainframe on the University of
Missouri-Columbia and saw that I had received electronic mail from Len
Rose. There was a brief letter followed by some sort of program.
From the text I saw that the program was Unix-based, an operating
system I was virtually unfamiliar with at the time. I did not
understand the significance of the file or why Len had sent it to me,
however, since I was logged in remotely from St. Louis, I decided to
let it sit until I arrived back at school a few days later. In the
meantime I had noticed some copyright markings on the file and sent a
letter to a friend at Bellcore Security asking about the legalities in
having or publishing such material. As it turns out this file was
never published in Phrack.

Although Taran King and I had already decided not to publish this
file, other events made sure that our decision was mandatory. Upon
returning to University of Missouri-Columbia (for the new semester) on
January 12, 1990, we discovered that all access to our accounts on the
mainframe of the University of Missouri had been revoked without
explanation. On January 18, 1990 I was visited by the U.S. Secret
Service for reasons unrelated to the Unix program Len Rose had sent.
That same day under obligation from a subpoena issued by a Federal
District Court judge, the University turned over all files from my
mainframe account to the U.S. Secret Service including the Unix file.
Included below is the text portion of that file:

"Here is a specialized login for System V 3.2 sites.
I presume that any competent person can get it working
on other levels of System V. It took me about 10
minutes to make the changes and longer to write the
README file and this bit of mail."

"It comes from original AT&T SVR3.2 sources, so it's
definitely now something you wish to get caught with.
As people will probably tell you, it was originally
part of the port to an AT&T 3B2 system. Just so that
I can head off any complaints, tell them I also
compiled it with a minimal change on a 386 running AT&T
Unix System V 3.2 (they'll have to fiddle with some
defines, quite simple to do). Any changes I made are
bracketed with comments, so if they run into something
terrible tell them to blame AT&T and not me."

"I will get my hands on some Berkeley 4.3 code and do
the same thing if you like (it's easy of course)."

In the text of the program it also reads:

"WARNING: This is AT&T proprietary source code. Do
NOT get caught with it."

and;

" Copyright (c) 1984 AT&T
All Rights Reserved

* THIS IS UNPUBLISHED PROPRIETARY SOURCE CODE OF AT&T *
* The copyright notice above does not evidence any *
* actual or intended publication of such source code. *"

As it turned out the program that Len Rose had sent was
modified to be a Trojan horse program that could capture accounts
and passwords, saving them into a file that could later be
retrieved. However, knowing how to write a Trojan horse login
program is no secret. For example;

"such programs have been published in The Cuckoo's Egg
by Clifford Stoll and an article by Grampp and Morris.
Also in his ACM turing lecture, Ken Thompson, one of
the Bell Labs coauthors of Unix, explained how to
create a powerful Trojan horse that would allow its
author to log onto any account with either the password
assigned to the account or a password chosen by the
author."(Dorothy Denning, Communications of the ACM,
March 1991, p. 29-30)

Between the Unix 3.2 source code, the Unix password cracking
file, and the added fact that Terminus was a subscriber to
Phrack, Len Rose was raided by the United States Secret Service
(including SSA Tim Foley who was the case agent in U.S. v.
Neidorf) at his Middletown, Maryland home on February 1, 1990.
The actual search on his home was another atrocity in and of
itself.

"For five hours, the agents -- along with two Bellcore
employees -- confined <Len> Rose to his bedroom for
questioning and the computer consultant's wide, Sun,
in another room while they searched the house.

The agents seized enough computers, documents, and
personal effects -- including Army medals, Sun Rose's
personal phone book, and sets of keys to their house
-- to fill a 14-page list in a pending court case."
(No Kid Gloves For The Accused, Unix Today!,
June 11, 1990, page 1)

It was also reported that the agents did serious damage to
the physical house itself. Len was left without the computers
that belonged to him and that he desperately needed to support
himself and his family financially. Essentially Len went into
bankruptcy and furthermore now he was blacklisted by AT&T.

This culminated in a May 15, 1990 indictment of Len Rose at
age 31. There were five counts charging Len with violations of
the 1986 Computer Fraud and Abuse Act and Wire Fraud. The total
maximum penalty he faced was 32 years in prison and fines of
$950,000. Furthermore, the U.S. Attorney's office in Baltimore
insisted that Len was a member of the Legion of Doom, a claim
that Len and known LOD members have consistently denied. It did
finally become clear that Terminus was not a member.

This was just the beginning of another long saga of bad luck
for Len Rose. He had no real lawyer, he had no money, and he had
no job. Furthermore, Len suffered a broken leg after rescuing
his son during a camping trip.

Eventually Len found work with a company in Naperville,
Illinois (DuPage County <Chicago suburbs>) with a Unix consulting
firm called InterActive and he had a new lawyer named Jane Macht.
The future began to look a little brighter temporarily. The
problem was that within a week InterActive was making claims that Len
had copied Unix source code from them. Illinois State Police and SSA
Tim Foley (what is HE doing here!?) came to Len's new home and took
him away. In addition to the five count indictment in Baltimore, now
Len was facing criminal charges from the State of Illinois. It was at
this point, attorney Sheldon T. Zenner, who had successfully defended
me took on the responsibility of defending Len against the state
charges.

Len's spin of bad luck was not over yet. Assistant U.S. Attorney
William Cook in Chicago wanted a piece of the action, in part perhaps
to redeem himself from his highly publicized defeat in U.S. v.
Neidorf. A third possible indictment for Len seemed inevitable. In
fact, there were statements made that I personally was to have been
subpoenaed to testify before the grand jury about Len, but this never
took place.

As time passed and court dates kept being delayed, Len was barely
surviving; running out of money and options. His wife wanted to leave
him and take away his children, he could not find work, he was looking
at two serious indictments for sure, and a possible third, and he just
could not take it any longer.

Len's legal arguments were strong in many respects and it is
widely believed that if he had fought the charges that he may very
well have been able to prove his innocence. Unfortunately, the pile
up of multiple indictments, in a legal system that defines justice in
terms of how much money you can afford to spend defending yourself,
took its toll. The U.S. Attorney in Baltimore did not want to try the
case and they offered Len a deal, part of which was that Assistant
U.S. Attorney Cook got something as well. Len would agree to plead
guilty to two wire fraud charges, one in Baltimore, one in Chicago.
The U.S. Attorney's office would offer a recommendation of a prison
sentence of 10 months, the State of Illinois would drop it's charges,
and Len would eventually get his computer equipment back.

In the weeks prior to accepting this decision I often spoke with
Len, pleading with him to fight based on the principles and importance
of the issues, no matter what the costs. However, I was blinded by
idealism while Len still had to face the reality.

Len Rose was sentenced in June and began serving his time on July
10, 1990. He got his computer equipment back, but only under the
agreement that he sell all of it.

United States v. Rose was not a case about illegal intrusion into
other people's computers. Despite this the Secret Service and AT&T
called his case a prime example of a hacker conspiracy. In reality it
was only an example of blind justice and corporate power. Like many
criminal cases of this type, it is all a question of how much justice
can a defendant afford -- How much of this type of *injustice* can the
American public afford?

-- -- -- -- --

A Few Words About Law Enforcement and the Len Rose case...

As a person who has been involved with the legal process
repeatedly over the last couple of years I have learned and
discovered some of the realities behind the rumors and the myths.
In the Spring 1991 issue 2600, I authored an article titled "The
Terminus of Len Rose" and unfortunately the meaning behind the
article was lost on some of the readers whom I admire greatly.

Through my unique experiences at meetings like the 13th
Annual National Computer Security Conference in Washington D.C. and
the first conference on Computers, Freedom, & Privacy in San
Francisco, I have come into contact and had discussions with both the
people who help create the laws as well as those who actively enforce
them. I have learned a lot about what actually takes place behind the
scenes and why. More than anything else, I discovered that my views
on several issues were not so very far from theirs and they taught me
why certain realities were so. What they said made sense and I
realized that I was indeed wrong about some issues and situations. I
was even more wrong in my expectations of the individuals themselves.
These people are decent folks just like you and me. Despite the
highly publicized incidents of the past couple of years, the vast
majority of these people are not out there trying to destroy someone's
life just to make a name for themselves or to put a notch on their
desk. They believe in their work like a sacred religious mission. At
the same time they have families, hobbies, like to go to the movies,
play video games, take vacations during the holidays, and everything
else.

In the article about Len Rose, I did not intend to imply that the
prosecution or the prosecutors were malicious (although the frantic
raid on Len's house may have been a bit out of order), but rather that
the legal process itself can be a difficult road for a non-wealthy
defendant to travel, especially when faced with many indictments at
once. Len Rose was never charged with actually breaking into a
computer, but he was called a hacker (under the negative definition)
just the same. That is not fair. I believe that the prosecutors
acted in the way they thought best and were not out to deny Rose of
his constitutional rights, but the issues of law and computers that
clashed here make things confusing for everyone including myself.

The fact of the matter is that the system does have flaws in it
which arise and are corrected over time. These flaws arose in my own
case and cost me dearly until the system caught its flaw and corrected
itself. I am not here to tell you that Len Rose was a saint or that
he did not do anything wrong. Indeed in the past month I have heard
complaints from several people about bad business deals with Len and
mishaps concerning stolen computer equipment. I don't know all of the
details behind those allegations and considering where Len is today,
those questions are moot. I must admit that Len's transportation of
Unix source code strikes me as a form of copyright infringement or
perhaps software piracy, but Rose did not even make an attempt to
profit financially from this venture. The value of what he actually
transported and his guilt or innocence of these statutes was never put
to the test because the prosecution did not seek to use these more
appropriate statutes concerning piracy or copyright infringement. I
still wonder why.

While I believe that the prosecutors involved with his case are
honest, hardworking, and highly motivated people, it strikes me as
being overly harsh to see a very bright, non-violent offender who did
not even commit a crime for money go to prison when his formidable
talents could have been put to good use elsewhere.

In conclusion I think there may be a rare bad apple mucking up
the legal process from time to time, but it is my firm belief that the
prosecutors and law enforcement officials in our system overall are
dedicated to doing the right thing and going after offenders that they
truly believe to be committing real crimes. Up to this point I've
only been able to watch and learn about their work from an outsider's
viewpoint, but one day I may be interested in participating from their
perspective. As a group in general, the law enforcement community has
earned my respect and appreciation.

------------------------------

Date: July 28, 1991
From: "The Moderataors" <tk0jut2@MVS.CSO.NIU.EDU>
Subject: File 4-- "Computer Crime" paper by Brian Peretti available

Brian J. Peretti has finished the latest draft of his paper:
"Computer Crime: Current Practices, Problems and Proposed Solutions".
Here is a brief excerpt from the introduction. The complete paper is
available in the CuD ftp sites.

++++++++++++++++++

Within recent years, computer crime has become a
preoccupation with law enforcement officials. In California, a
group of West German hackers using phone lines and satellite
hookups, gained unauthorized access into civilian and military
computers and stole sensitive documents that were sold to the
Soviet Union. A young New York programmer broke into a
Washington computer to run a program that he could not run from his
personal computer. After Southeastern Bell Stated that a document
published in an electronic publication was valued at more than
$75,000 the publisher was arrested and brought to trial before the
discovery that the document could be publicly bought from the
company for $12.6 The Chaos Computer Club, a Hamburg, Germany,
club, went into government computers and access information
and gave it to reporters. In May, 1988, the United States government
launched Operation Sun Devil, which lead to the seizure of 23,000
computer disks and 40 computers. In addition, poor police
performance has also been blamed on computers.

Since its creation, the computer has become increasing important
in society. The law, as in the past, has not been able to evolve
as quickly as the rapidly expanding technology. This lack
of movement on the part of governments shows a lack of understanding
with the area. The need to create a comprehensive regulation or
code of ethics has become increasing necessary.

Due to the nature of computer systems and their
transnational connections through telephone lines, an
individual state's action will only stop the problems associated with
computer crime if many states join together. The patchwork of
legislation that exists covers only a small part of the problem.
To adequately address computer crime, greater efforts must be
made within the computer community to discourage unauthorized
computer access, countries must strengthen and

co-ordinated their computer related laws, as well as proper
enforcement mechanism created, computer program copyright laws be
enhanced and computer systems should be created to allow those who
wish to explore computer systems which will not disrupt the users of
computer systems.

This paper will first set out a definition of computer crime and why
laws or regulation by the computer community must be created.
Section II will then discuss the United States law concerning
computer crime and why it needs to be strengthened. Section III
will discuss the proposed Israeli computer crime bill, Britain's
Computer Misuse Act and Ghana's proposed law. Section IV will
discuss what can be done by both the government and computer owners
and users to make computer crime less possible.
<The rest is available from the CuD ftp archives>

------------------------------

Date: July 28, 1991
From: "The Moderataors" <tk0jut2@MVS.CSO.NIU.EDU>
Subject: File 5-- Doc Savage Sentenced (NEWSBYTES Reprint)

(Moderators' Note: Readers should note well the final paragraphs of
this article. It is the first case that we're aware of in which the
prosecutor opposed the judges intention to imprison. Gail Thackeray's
arguments against incarceration are compelling and productive. Sadly,
such logic is the exception and not the rule, but perhaps her example
will spread).

SUNDEVIL DEFENDANT "DOC SAVAGE" SENTENCED 7/17/91

PHOENIX, ARIZONA, U.S.A., 1991 JUL 17(NB) -- The Maricopa County
Arizona County Attorney's Office has announced the sentencing Baron
Majette, 20 , also known as "Doc Savage", for computer-related crimes
uncovered in the joint federal / state investigation known as
"Sundevil".

Majette was arrested on March 27th of this year and charged with a
number of felony charges relating to unauthorized use of telephone
facilities of Toys 'R Us to make calls worth approximately $8,000,
illegal access of TRW's credit data base and use of information
obtained therein to obtain in excess of $50,000 in cash, goods, and
services, and stealing of credit cards from U.S. Mail boxes and use of
the cards to obtain approximately $10,000 in cash, goods and services.
If convicted of the charges, Majette faced a possible jail sentence of
15 years and the requirement to make restitution for the full amount
of the alleged losses endured by the firms and individuals.

In late May, Majette pleaded guilty to an amended charge of a single
count of computer fraud, felony third degree. The reduced charge was a
result of an agreement between Mark Berardoni, the public defender
assigned to Majette; Janet Black, Majette's probation officer and the
Maricopa County Arizona County Attorney's Office. Under the reduced
charges, Majette's maximum term of incarceration was reduced from the
aforementioned 15 years to 5.

On July 16th, when the actual sentence was to be imposed, a further
agreement between the prosecution, defense and parole service was
presented to the presiding judge, Justice Gottsfield, and, after
discussion, became the actual sentence. The court decision imposed the
following:

-- Majette will remain in jail for up to two months while he awaits
placement in a "Shock Incarceration" program (Majette has been in jail
since his March 27th arrest because of parole violation related to an
earlier crime). Assistant County Attorney Gail Thackeray told
Newsbytes that Shock Incarceration is a 120 day program which
"provides both intensive counseling and military-like discipline and
exercise."

-- Upon his release from Shock Incarceration, Majette will enter a 5
year period of "intensive probation". Under Arizona procedures, the
subject must provide the probation officer, on a weekly basis, a
schedule for the next week's activities. In the event that the
schedule has to be modified in any way, the probation office must be
called before the new schedule is acted on.

-- During the time of intensive probation, the probation officer may
visit or call the subject at any time of day or night to insure
compliance with the schedule.

-- If, at some point after a year of intensive probation, the
probation officer feels that the subject has followed the rules and
shown that intensive procedure is no longer warranted, the subject and
probation officer may recommend to the sentencing judge that the
subject be transferred to normal probation. In normal probation, the
subject advises the officer weekly of progress and problems. There is
not the hovering presence felt in intensive probation, according to
Thackeray. Additionally, the subject may be released from any form of
probation at the petition of the probation office and subject and
approval, after hearing, of the sentencing judge.

-- If, on the other hand, Majette violates the terms of his probation,
he is liable for incarceration in prison for the remainder of his
probationary period.

-- Majette was also ordered to make restitution to the parties
victimized by his activities by paying a sum of $19,774.03 to those
involved. The sum is to be paid on a monthly basis over the course of
his sentence. Additionally, he was ordered to make payments to help
defray the cost of his probationary supervision.

Under the terms of his probation, Majette is subject to the following
conditions said by Thackeray to be unique to his type of offense:

-- He may not use any computer connected to a modem or communications
network without the prior permission of his probation officer.

In the event that he takes a job that brings him into contact with
computer activities, he must notify someone in the employer's office
of the restrictions on his computer use and must discuss the planned
activities with his probation officer.

-- He is not to communicate or associate with "members of the computer
underground" (defined as persons such as those known to have or
reasonably believed to have been involved in theft of communications
services, computer fraud or related activities). In the event that any
such individuals contact him, he must report the contact to his
probation officer (According to Thackeray, this stipulation is
intended for Majette' s protection -- "In the event that the
contacting party is investigated or arrested and phone records show a
call to Majette, his notification to his probation officer of the call
will stand as proof that he was not involved in any conspiracy with the
other individual. His notification responsibility in no way requires
him to cooperate with authorities in the location or apprehension of
another individual and such cooperation is neither expected nor
desired.").

Transcripts of the sentencing hearing reportedly show that it was the
intention of Judge Gottsfield to sentence Majette to a straight five
years in prison but was dissuaded by the combined recommendations of
the prosecution, defense and probation office. Thackeray explained to
Newsbytes the rationale of the prosecution in recommending a lighter
sentence -- "Usually computer hackers who get into trouble for
activities of this nature are kids or young adults who are not the
type to be in trouble for any other criminal activities. The point of
sentencing in these cases should be rehabilitation. If we can break
the pattern of illegal behavior, society will benefit from Majette's
participation. If we simply locked him up for 5 years, neither he nor
society would benefit."

(Barbara E. McMullen & John F. McMullen/19910717)

------------------------------

Date: 02 Jul 91 19:15:10 EDT
From: "76012,300 Brad Hicks" <76012.300@COMPUSERVE.COM>
Subject: File 6-- CompuServe Responds to Policy and Operations Questions

Attn: Computer Underground Digest
In TELECOM Digest #11.507, John Higdon writes:

> If I really am responsible for every article and pass-through
> e-mail message that writes to my disk drive, then I lack the
> facilities (mostly manpower) to remain an intermediate UUCP site.


John, in every meeting of four or more sysops I have been at in the
last three years, I have heard this one argued. I have submitted this
exact question to maybe a half-dozen lawyers. The only thing that ALL
agreed upon was that until we have three or more cases prosecuted in
the federal courts, no one knows whether you are liable or not.

Mike Godwin, the EFF's attorney, told a bunch of us that he's been
researching this exact question for most of a year, and so far it
comes down to three broad categories:

(1) ENTIRELY PRIVATE, ONE-TO-ONE MAIL

Covered by the Electronic Communications Privacy Act. Sysop/sysadmin
is not liable for content; may read for technical reasons such as to
check service; may not disclose to anyone for any reason without a
court order. (Aside: Since the search warrant at Steve Jackson Games
said nothing about third-party mail, in the seizure of Illuminati BBS
the aptly-acronymed SS almost certainly violated ECPA over this very
issue.)

(2) ENTIRELY PUBLIC MAIL ON ONLY ONE SYSTEM (local BBS messages)

Only limited case law, but it does appear that the sysop is liable in
general. More cases or new laws will be necessary to determine WHEN
the sysop becomes liable ... e.g., if somebody posts a Sprint access
number on your BBS, you are definitely liable if it is still there a
month later. But what about the next day? An hour later? Five
seconds later? Nobody knows until the lawyers fight it out. Godwin
thinks it comes down to "if the sysop could reasonably have known
about it"--and then some poor ignorant bunch of jurors will get to
decide how often a "resonable sysop" checks his mail.

(3) WIDELY-DISTRIBUTED PUBLIC MAIL (newsgroups, echomail, mail lists,
etc.)

No readily applicable law. No CLEAR precedent ... but the few
half-precedents, taken from the world of ham packet-radio repeaters,
suggests that in fact, you are liable for any public message residing
on your system, even if it originated elsewhere. If you allow your
system to forward public messages before you clear them, you may find
yourself charged with moving illegal messages across state lines.

As an ex-sysop of seven years' experience, #3 horrifies and terrifies
me. I almost got caught in this trap myself, when a Dallas TV station
tried to persuade police that as the conference moderator on
MagickNet, I personally was responsible for a message on MagickNet
offering assistance to a man seeking to smuggle his daughter out of
the country so his inlaws couldn't take her away. (Note: message from
someone else, to a third party outside the country, and the hue and
cry arose two days before I even saw the message.)

Maybe common sense will prevail in the courtroom. (And maybe chickens
have teeth.) Maybe Congress will pass clear, reasonable, technically
feasible legislation to clarify the issue and President Bush will sign
it. (And maybe we =can= balance the budget in 1993.) Or maybe the
Rehnquist court will recognize this as an important freedom-of-speech,
freedom-of-association, freedom-of-press issue and grant appropriate
protection. (And maybe we'll find a universally popular solution to
the abortion issue tomorrow after lunch, and everybody will agree to
it.)

------------------------------

************************************
End of Computer Underground Digest #3.26



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT