Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 01 Issue 29
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.29 (Aug 19, 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / Alex Smith
USENET readers can currently receive CuD as alt.society.cu-digest.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. It is assumed that non-personal mail to the moderators may be
reprinted, unless otherwise specified. Readers are encouraged to submit
reasoned articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
CONTENTS:
File 1:: Moderators' Corner
File 2:: From the Mailbag
File 3:: Direction of CuD
File 4:: Password checking programs and trojan horses
File 5:: What is "CYBERSPACE?"
File 6:: The CU in the News
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
----------------------------------------------------------------------
********************************************************************
*** CuD #1.29, File 1 of 6: Moderators' Comments ***
********************************************************************
Date: August 19, 1990
From: Moderators
Subject: Moderators' Corner
++++++++++
In this file:
1) CRAIG NEIDORF DEFENSE FUND
2) COMPUSERVE AND CuD BACK ISSUES
3) BLOCKING OF LONG DISTANCE NUMBERS
4) PAT TOWNSON AND TELECOM DIGEST
+++++++++++++++++++++++++++++
CRAIG NEIDORF DEFENSE FUND
+++++++++++++++++++++++++++++
Those interested in contributing the Craig Neidorf's defense fund to help
reduce his legal costs, which exceeded $100,000, should do so soon. Checks
should be made out to the law firm of KATTEN, MUCHIN AND ZAVIS, and sent
directly to his defense attorney:
Sheldon Zenner
c/o Katten, Muchin and Zavis
525 W. Monroe, Suite 1600
Chicago, IL 60606
++++++++++++++++++++++++++++
COMPUSERVE AND CuD BACK ISSUES
++++++++++++++++++++++++++++
A limited number of CuD back issues are available for downloading in the Legal
Forum of CompuServe. (GO LAWSIG) The files, called CUD1NN.ARC, are found in
Library 1 (computers and law). Also available is Gordon Meyer's thesis, "The
Social Organization of the Computer Underground" as CUTHESIS.ARC.
Eventually we hope to have all CuD back issues available in this Forum, but
the limited number of daily uploads the Forum will accept is an obstacle to
accomplishing this goal in a timely fashion.
We are also in the process of uploading CuD material to GEnie (General
Electric Network for Information Exchange). The files will be available in
the Legal SIG of that network as well.
CIS and GEnie specific questions, concerning CuD availability, can be directed
to Gordon at 72307,1502 (Compuserve) and GRMEYER (GEnie). Volunteers to help
upload files are most welcome.
+++++++++++++++++++++
LONG DISTANCE BLOCKING
+++++++++++++++++++++
Last year, both PHRACK and PIRATE printed stories about the blocking of
long distance numbers by Teleconnect, and included information about at
least one law suit in Iowa. Since then, we have heard little about blocking
long distance numbers by carriers. If anybody has information on current
blocking practices or can provide evidence of continued blocking, please
pass it along. Does the current dearth of information on blocking reflect
a reduction of the practice?
+++++++++++++++++++++++
PAT TOWNSON AND TELECOM DIGEST
+++++++++++++++++++++++
Pat Townson, moderator of TELECOM Digest, has been largely responsible for
the initial e-mail discussions of the CU. CuD began by publishing articles
Pat was unable to include in TCD, and he was always willing to answer
technical and other questions and offer advice. Whatever his own views on
the the CU, Pat has been willing to air articles from all perspectives.
Some of us have disagreed with his views and responded to his comments with
vigor. He occasionally devoted special issues to attacks on his comments,
and has never hesitated to provide others a forum for their views.
Pat, we just want to say "Thanks!"
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
Date: August 19, 1990
From: Various
Subject: From the Mailbag
********************************************************************
*** CuD #1.29: File 2 of 6: From the Mailbag ***
********************************************************************
Date: Wed, 15 Aug 90 07:13 EDT
From: lsicom2!len@cdscom.cds.com(Len Rose)
Subject: Request for INTERNET site by Len Rose
I would like to request an internet account on any system (east coast
preferable) since it seems ames can no longer provide such a favor. Most
important is ftp access without quotas. Peter Yee can be contacted at
(yee@ames.arc.nasa.gov) to vouch whether or not I was a considerate guest.
I haven't asked him to vouch for me beforehand,and won't so as to make
sure whoever contacts him gets his real opinion.
Having an Internet account is crucial to my defense at this time.
Voice phone information will be provided upon request.
Thanks.
Len Rose
------------------------------
Date: Thu, 16 Aug 90 17:50:00 -0500
From: Anonymous
Subject: BBS virus alert (PC)
This message was found on a WWIV bulletin board in Lawrence, KS alerting
BBS users to avoid a file WWIVGA.ZIP which contains the Vienna Virus and
was aimed at discrediting a local programmer.
The "General" WWIV-Sub <WWIVnet>
100/100: ************** WARNING ******************
Name: Gary Martin #1 @9354
Date: Wed Aug 15 20:32:40 1990
***************** WARNING ***************************
Someone has created a .ZIP called WWIVGA.ZIP It claims to be a useful
utility to put your computer in 43 or 50 line mode for running the BBS.
THIS .ZIP CONTAINS THE VIENNA VIRUS!!!!!!!!!!!!!!!!!!
The .DOC file that goes with it says that it was written by Carceris
Dominus #1@9354 Castle RavenLoft. That is total bullshit. Carceris
Dominus was my old handle. I've changed it since all this ^%$$@^%
happened.
BEWARE OF THIS FILE! DO NOT RUN IT!!!
A user on my board uploaded this file and asked my why it doesn't work right.
That user turned out to be a fake account. However I also got a call from a
Sysop back east who found the virus using SCAN 66.
After I read the docs I knew that some jerk had doctored up this thing to try
and discredit me. (I am the author of Trade Wars 2002) I have since been
working hard to tell everyone to avoid this file.
++++++++ Please pass this message along to others in the WWIV community
The "General" WWIV-Sub <WWIVnet>
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
Date: August 19, 1990
From: Moderators
Subject: Direction of CuD
********************************************************************
*** CuD #1.29: File 3 of 6: The Direction of CuD ***
********************************************************************
"Never trust anyone over thirty" leapt to my mind as soon as Jim pointed
out that this would be our 30th issue of C-u-D. I brought this up to a
friend (and C-u-D reader) on the way to work one morning. "Hey, great", he
replied. "You know Jesus Christ didn't begin his evangelism until he was
thirty, think of all the great things that could lie ahead for you!"
Hmmm...I was just starting to agree with him when he added that three years
later He was crucified.
The digest was begun as an experiment, the long and heated discussion about
CU issues had worn out its welcome on Telecom Digest so Pat Townsen
suggested we form our own discussion forum. Jim took up the challenge and
drafted (literally) me to help. Neither of us actually believed that it
would last longer than three or four issues but we hoped it would. Now the
digest has grown into a huge job and has a direct mailing list of over 400
readers (which doesn't begin to count those who get it from secondary
sources and news echos).
Our intent was to provide a free exchange of ideas and research into the
Computer Underground. At the time the view (which has since been
categorized as "hack symp") that the illegalization of "hacking" should be
approached with caution was, well, not very well represented in the press,
courts, law enforcement, and elsewhere. But with the efforts of the
readers of C-u-D and 2600, the mainstream press and computer industry has
picked up the cause and there is some hope that the "problem" of the
Computer Underground will be addressed with accuracy and fairness.
There are many issues and angles to be discussed and debated. The "Phrack
Inc" case, which was our initial rallying point, has been settled. The
other "LoD" busts are either in stasis or are being addressed by the
professionals. It's time for the town criers, C-u-D, to take a breather
and return to our academic research into the CU and other areas of personal
interest. The C-u-D experience has given us much to work on.
Many thanks to our readers, our friends, and even our critics. This, our
30th issue, will close volume one. The first issue of volume two will
appear sometime in the future.
Illegitimis Non Carborundum! GRM
********************************************************************
We are not sure if CuD has outlived its purpose. If so, it will be
appearing less frequently, serving primarily update functions. If not, we
must now reflect on goals and future direction. As Gordon observed, we
began as an "overflow conduit" for TELECOM Digest for articles relating to
the Phrack situation, and the goal was to stimulate discussion of issues
and provide an alternative view to the one presented by the media and law
enforcement.
We believe we have had several major successes, especially in making
visible the questionable tactics of law enforcement in some of the alleged
computer abuse cases. We focused only on those in which the targets of
federal agents seemed to exceed the alleged "crime" and in which, from the
knowledge we obtained, the charges (or lack of them) seemed far beyond what
evidence would show. We did not claim any to be innocent. Rather, we
suggested that the "official picture" was out of focus, and something was
not quite right. We have not, nor will we, condone predatory behavior, and
our concern has been for the broader issue of civil liberties rather than
for a "right to hack."
We have been accused of being "mean-spirited," "non-objective," and poor
journalists. Perhaps all are true. But, we never pretended to be
journalists: We are gadflies attempting to raise issues, and we feel our
facts were generally accurate. We have learned from both critics and
advocates, and we have come to appreciate the grey area in high tech crimes
between legitimate enforcement and over-zealousness. We have apologized for
some excesses, modified our views on others. That seems to be the primary
difference between CU types and the "other side." We have no wish to
polarize, but "sides" were thrust upon us. That "other side" does not have
"apology" in its vocabulary, nor, judging by continued public statements,
has it benefited from the dialogues occuring in and among CuD, the EFF, The
Well, 2600 Magazine, TELECOM Digest, or the many other forums. Their
hyperbole remains strident, and then others are faulted for responding.
It is not CU supporters who have confiscated some equipment without strong
justification, hidden behind "privacy protections," misled the public,
foamed to the media, engaged in initial ad hominem attacks, engaged in
disinformation, or nearly ruined a young man's life.
As long as "I'm sorry," or "we were wrong" isn't in the vocabulary of some,
as long as there seems to be no reflection on legitimate Constitutional
issues, and as long as the view that "professional image" supercedes "doing
the right thing," there is probably a role for CuD.
We will be rethinking our direction, and we hope to continue combining
general-interest information with more structured analyses of the
relationship between computer technology and the social, legal, and ethical
issues that arise. We hope readers will provide us with some feedback to
guide us. We begin a new series of CuD with Volume II beginning next issue
to symbolize the closing of one set of issues and the beginning a new set.
Jim Thomas
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
Date: Tue, 14 Aug 90 00:11:38 EDT
From: tmsoft!moore!gompa!rca@gpu.utcs.toronto.edu(Robert Ames)
Subject: Password checking programs and trojan horses
********************************************************************
*** CuD #1.29: File 4 of 6: Password Checkers and Public Domain ***
********************************************************************
To the CUD people:
Again, I find I must write as a result of an article in CUD. Last time,
I had read the indictment of C. Neidorf, alleging, for example, that the
software documentation in question was worth thousands of dollars, and
that it was closely held and proprietary. My research, which is done
for technical reasons only, indicated the truth to be entirely different -
thus I had to speak up.
So it is in the Len Rose indictment. There are two points I'd like to
address: firstly, Ken Thomson, Bell Labs employee and author of UNIX,
publicly admitted that he had installed a trojan horse in both the LOGIN.C
program and in the C compiler. His paper to the ACM, presented while
accepting a programming award, describes this trojan horse. The paper
is, "Reflections on Trusting Trust", published in Communications of the
ACM.
Secondly, there are several password checking programs in circulation of
the type described in CUD #128. The one I have here was obtained from
ROGUE.LLNL.GOV by ftp. This is a U.S. government VAX computer. Here
is an excerpt:
===================================================================
From CHECKPASS documentation:
===================================================================
This program checks users passwords against some common words and names that
are often used as passwords and against an on-line dictionary.
The "idea" for this is based on the Arpa Internet Worm that made the news this
past year. A report on the INFO-VAX Mailing list (see WORM.MES) talked about
how the worm broke into accounts. The idea of checking passwords, for
security reasons, came from that report.
To run the programs you need to have enough privilige to read the information
on the users to be checked from the UAF file using SYS$GETUAF functions. Both
primary and secondary passwords are checked if they exist.
The users to be checked are listed in the file USERS.DAT. The first line in
USERS.DAT is the minimum password length for a password (read from the various
source files) to be tested. The program allows up to 500 users to be listed.
All the usernames are read in at th start of the program and the appropriate
data read from the UAF. If a password is found it is stored in a data array
and written out in a report after all the words in the dictionary and
passwords files have been tested for all users.
PLEASE NOTE that the LEXIC files are not supplied here. These files are part
of the VASSAR Spelling checker program and make up the dictionary for that
program. Those files need to obtained or that part of the program commented
out before using this program.
===============================================================
I encourage you to retrieve the entire package, to see for yourselves
how similar this program is to Rose's.
Robert Ames rca@gompa.UUCP P.O. Box 724, Station 'A', Toronto, CANADA
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
Date: August 19, 1990
From: Reprint
Subject: What is "CYBERSPACE?"
********************************************************************
*** CuD #1.29: File 5 of 6: What is CYBERSPACE? ***
********************************************************************
++++++++++++++++++++++++++
Three "cyber-articles" appeared in the last few issues of CuD, prompting
some to ask what it all means. The following article is old, but remains a
nice overview, so we reprint it here.
+++++++++++++++++++++++++++
"Viewpoint", by Paul Saffo
_Communications of the ACM_, June 1989, volume 32 number 6, page 664-665
Copyright 1989 by the Association for Computing Machinery. Posted with
permission.
"Consensual Realities in Cyberspace"
More often than we realize, reality conspires to imitate art. In the case
of the computer virus reality, the art is "cyberpunk," a strangely
compelling genre of science fiction that has gained a cult following among
hackers operating on both sides of the law. Books with titles like _True
Names_, _Shockwave Rider_, _Neuromancer_, _Hard-wired_, _Wetware_, and
_Mona Lisa Overdrive_ are shaping the realities of many would-be viral
adepts. Anyone trying to make sense of the social culture surrounding
viruses should add the books to their reading list as well.
Cyberpunk got its name only a few years ago, but the genre can be traced
back to publication of John Brunner's _Shockwave Rider_ in 1975. Inspired
by Alvin Toffler's 1970 best-seller _Future Shock_, Brunner paints a
dystopian world of the early 21st Century in which Toffler's most
pessimistic visions have come to pass. Crime, pollution and poverty are
rampant in overpopulated urban arcologies. An inconclusive nuclear
exchange at the turn of the century has turned the arms race into a brain
race. The novel's hero, Nickie Haflinger, is rescued from a poor and
parentless childhood and enrolled in a top secret government think tank
charged with training geniuses to work for a military-industrial Big
Brother locked in a struggle for global political dominance.
It is also a world certain to fulfill the wildest fantasies of a 1970s
phone "phreak." A massive computerized data-net blankets North America, an
electronic super highway leading to every computer and every last bit of
data on every citizen and corporation in the country. Privacy is a thing
of the past, and one's power and status is determined by his or her level
of identity code. Haflinger turns out to be the ultimate phone phreak: he
discovers the immorality of his governmental employers and escapes into
society, relying on virtuoso computer skills (and a stolen transcendental
access code) to rewrite his identity at will. After six years on the run
and on the verge of a breakdown from input overload, he discovers a lost
band of academic techno-libertarians who shelter him in their ecologically
sound California commune and... well, you can guess the rest.
Brunner's book became a best-seller and remains in print. It inspired a
whole generation of hackers including, apparently, Robert Morris, Jr. of
Cornell virus fame. The _Los Angeles Times_ reported that Morris' mother
identified _Shockwave Rider_ as "her teen-age son's primer on computer
viruses and one of the most tattered books in young Morris' room." Though
_Shockwave Rider_ does not use the term "virus," Haflinger's key skill was
the ability to write "tapeworms" - autonomous programs capable of
infiltrating systems and surviving eradication attempts by reassembling
themselves from viral bits of code hidden about in larger programs.
Parallels between Morris' reality and Brunner's art is not lost on fans of
cyberpunk: one junior high student I spoke with has both a dog-eared copy
of the book, and a picture of Morris taped next to his computer. For him,
Morris is at once something of a folk hero and a role model.
In _Shockwave Rider_, computer/human interactions occurred much as they do
today: one logged in and relied on some combination of keyboard and screen
to interact with the machines. In contrast, second generation cyberpunk
offers more exotic and direct forms of interaction. Vernor Vinge's _True
Names_ was the first novel to hint at something deeper. In his story, and
small band of hackers manage to transcend the limitations of keyboard and
screen, and actually meet as presences in the network system. Vinge's work
found an enthusiastic audience (including Marvin Minsky who wrote the
afterword), but never achieved the sort of circulation enjoyed by Brunner.
It would be another author, a virtual computer illiterate, who would put
cyberpunk on the map.
The author was William Gibson, who wrote _Neuromancer_ in 1984 on a 1937
Hermes portable typewriter. Gone are keyboards; Gibson's characters jack
directly into Cyberspace, "a consensual hallucination experienced daily by
billions of legitimate operators ... a graphic representation of data
abstracted from the banks of every computer in the human system.
Unthinkable complexity. Lines of light ranged in the nonspace of the mind,
clusters and constellations of data..."
Just as Brunner offered us a future of the 1970s run riot, Gibson's
_Neuromancer_ serves up the 1980s taken to their cultural and technological
extreme. World power is in the hands of multinational "zaibatsu", battling
for power much as mafia and yakuza gangs struggle for turf today. It is a
world of organ transplants, biological computers and artificial
intelligences. Like Brunner, it is a dystopian vision of the future, but
while Brunner evoked the hardness of technology, Gibson calls up the gritty
decadence evoked in the movie _Bladerunner_, or of the William Burroughs
novel, _Naked Lunch_ (alleged similarities between that novel and
_Neuromancer_ have triggered rumors that Gibson plagiarized Burroughs).
Gibson's hero, Case, is a "deck cowboy," a freelance corporate
thief-for-hire who projects his disembodied consciousness into the
cyberspace matrix, penetrating corporate systems to steal data for his
employers. It is a world that Ivan Boesky would understand: corporate
espionage and double-dealing has become so much the norm that Cases's acts
seem less illegal than profoundly ambiguous.
This ambiguity offers an interesting counterpoint to current events. Much
of the controversy over the Cornell virus swirls around the legal and
ethical ambiguity of Morris' act. For every computer professional calling
for Morris' head, another can be found praising him. It is an ambiguity
that makes the very meaning of the word "hacker" a subject of frequent
debate.
Morris' apparently innocent error in no way matches the actions of Gibson's
characters, but a whole new generation of aspiring hackers may be learning
their code of ethics from Gibson's novels. _Neuromancer_ won three of
science fiction's most prestigious awards - the Hugo, the Nebula and the
Philip K. Dick Memorial Award - and continues to be a best-seller today.
Unambiguously illegal and harmful acts of computer piracy such as those
alleged against David Mitnick (arrested after a long and aggressive
penetration of DEC's computers) would fit right into the _Neuromancer_
story line.
_Neuromancer_ is the first book in a trilogy. In the second volume, _Count
Zero_ - so-called after the code name of a character - the cyberspace
matrix becomes sentient. Typical of Gibson's literary elegance, this
becomes apparent through an artist's version of the Turing test. Instead
of holding an intelligent conversation with a human, a node of the matrix
on an abandoned orbital factory begins making achingly beautiful and
mysterious boxes - a 21st Century version of the work of the late artist,
Joseph Cornell. These works of art begin appearing in the terrestrial
marketplace, and a young woman art dealer is hired by an unknown patron to
track down the source. Her search intertwines with the fates of other
characters, building to a conclusion equal to the vividness and suspense of
_Neuromancer_. The third book, _Mona Lisa Overdrive_ answers many of the
questions left hanging in the first book and further completes the details
of the world created by Gibson including an adoption by the network of the
personae of the pantheon of voodoo gods and goddesses, worshipped by 21st
Century Rastafarian hackers.
Hard core science fiction fans are notorious for identifying with the
worlds portrayed in their favorite books. Visit any science fiction
convention and you can encounter amidst the majority of quite normal
participants, small minority of individuals who seem just a bit, well,
strange. The stereotypes of individuals living out science fiction
fantasies in introverted solitude has more than a slight basis in fact.
Closet Dr. Whos or Warrior Monks from _Star Wars_ are not uncommon in
Silicon Valley; I was once startled to discover over lunch that a
programmer holding a significant position in a prominent company considered
herself to be a Wizardess in the literal sense of the term.
Identification with cyberpunk at this sort of level seems to be becoming
more and more common. Warrior Monks may have trouble conjuring up Imperial
Stormtroopers to do battle with, but aspiring deck jockeys can log into a
variety of computer systems as invited or (if they are good enough)
uninvited guests. One individual I spoke with explained that viruses held
a special appeal to him because it offered a means of "leaving an active
alter ego presence on the system even when I wasn't logged in." In short,
it was the first step toward experiencing cyberspace.
Gibson apparently is leaving cyberpunk behind, but the number of books in
the genre continues to grow. Not mentioned here are a number of other
authors such as Rudy Rucker (considered by many to be the father of
cyberpunk) and Walter John Williams who offer similar visions of a future
networked world inhabited by human/computer symbionts. In addition, at
least one magazine, "Reality Hackers" (formerly "High Frontiers Magazine"
of drug fame) is exploring the same general territory with a Chinese menu
offering of tongue-in-cheek paranoia, ambient music reviews, cyberdelia
(contributor Timothy Leary's term) and new age philosophy.
The growing body of material is by no means inspiration for every aspiring
digital alchemist. I am particularly struck by the "generation gap" in the
computer community when it comes to _Neuromancer_: virtually every teenage
hacker I spoke with has the book, but almost none of my friends over 30
have picked it up.
Similarly, not every cyberpunk fan is a potential network criminal; plenty
of people read detective thrillers without indulging in the desire to rob
banks. But there is little doubt that a small minority of computer artists
are finding cyberpunk an important inspiration in their efforts to create
an exceedingly strange computer reality. Anyone seeking to understand how
that reality is likely to come to pass would do well to pick up a cyberpunk
novel or two.
Paul Saffo is a research fellow at Institute for the Future in Menlo Park,
California, and a columnist for Personal Computing magazine.
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
Date: August 19, 1990
From: Various
Subject: The CU in the News
********************************************************************
*** CuD #1.29: File 6 of 6: The CU in the News ***
********************************************************************
------------------------------
Date: Fri, 17 Aug 90 18:05:08 EDT
From: Michael Rosen <CM193C@GWUVM>
Subject: Airforce airman pleads guilty to computer fraud
Computerworld, August 6, 1990, pg. 8:
TOO MUCH ACCESS
Pensacola, Fla. - A former U.S. Air Force airman, alleged to be a member of
the Legion of Doom, pleaded guilty last week in U.S. District Court to
possession of at least 15 access codes with intent to defraud.
Peter J. Salzman, 19, an airman at Elgin Air Force Base, used an Apple
Computer, Inc. IIE to enter telephone systems operated by Bellsouth Corp.,
Bell Atlantic Corp. and other carriers, said Stephen Preisser, assistant
U.S. attorney for the Northern District of Florida.
A device that logs outgoing calls indicated that Salzman was "burning the
wires" without paying for the telephone calls, Preisser said.
The airman is alleged to be a member of the Legion of Doom, a group of
hackers under investigation by federal and state authorities. Authorities
searching Salzman's home uncovered correspondence that indicated Salzman
was a member of the group, Preisser said.
Salzman will be sentenced on Oct. 5 and could receive a maximum of 10 years
imprisonment and a $250,000 fine.
MICHAEL ALEXANDER
------------------------------
Date: Fri, 17 Aug 90 17:04:44 MDT
From: siegel@spot.Colorado.EDU
Subject: New York youths charged with "hacking"
BOY, 14, ONE OF 13 HELD IN HACKER BUST
From: The New York Times
NEW YORK - Thirteen people, including a 14-year-old boy who is a suspect in
a computer break-in at the office of the Air Force secretary, were arrested
Thursday and charged with breaking into and stealing information from a
variety of computers.
Eight are juveniles, New York State Police said. Police spokesmen said
warrants had been issued for two other people and as many as 40 people may
have been involved in the computer hacker ring.
The name of the 14-year-old who was arrested - he went by the computer
handle of "Zod" - was not released because of his age.
The boy was specifically charged with breaking into and stealing software
from the mainframe computer at City University in Bellevue, Wash.
School officials said Zod had either stolen or used about $15,000 worth of
computer time and software.
State police Maj. Peter J. Brennan said Zod is also a suspect in the
November break-in of the secretary of the Air Force computer in the
Pentagon.
At the houses of those arrested, police seized computers and other
electronic equipment reportedly used in the break-ins.
The police identified the adults arrested as Bruce Monroe, 32, of Astoria,
N.Y.; Jeff Miller, 21, of Franklin Square, N.Y.; Chai Hung Ling, 17, of
Bayside, N.Y.; Anhtu Nguyen, 21, of Brooklyn, N.Y.; and Teerawee
Unchalipongse, 19, of Staten Island, N.Y.
They were charged with computer tampering, computer trespassing and theft
of services.
------------------------------
Date: Fri, 17 Aug 90 18:05:08 EDT
From: Michael Rosen <CM193C@GWUVM>
Subject: Robert Morris and Craig Neidorf blurbs (Computerworld)
Computerworld, August 6, 1990, pg. 114, Inside Lines:
Convalescent time
Robert T. Morris, convicted earlier this year for creating a worm program
that shut down thousands of computers on the Internet network in November
1988, is "at a local hospital pushing a broom" to fulfill his court-ordered
400 hours of community services, according to his lawyer, Thomas Guidoboni.
Morris also has a programming job at an unnamed Cambridge, Mass.-based
software company. Guidoboni said he plans to file a brief in the court of
appeals but has been waiting for the court reporter in Syracuse federal
district court to turn over court transcripts of the trial.
...Craig Neidorf - the electronic newsletter editor whose publication of a
"secret" Bellsouth file wasn't such a federal case after all (see page 8) -
apparently had at least a partial electronic alibi. U.S. Secret Service
agents attended Summercon, a hacker convention held in July 1988, to
surreptitiously videotape Neidorf drinking beer and eating a pizza with his
alleged co-schemers on the same date that the government alleged he was
carrying out the scheme. Before the trial abruptly concluded, prosecutors
succeeded in preventing use of the tape as evidence. If you've got facts
that shouldn't be quashed, contact News Editor Pete Bartolik at
800-343-6474, fax the incriminating lingo to 508-875-8931, or address
concerns to COMPUTERWORLD on MCIMail.
------------------------------
Date: Sat, 18 Aug 90 19:32:08 CDT
From: TELECOM Moderator <telecom@eecs.nwu.edu>
Subject: Phreak Pleads Guilty, Gets Two Years in Prison
An interesting case in federal court here in Chicago Friday involved the
sentencing of a woman who Judge Milton Shadur referred to as 'the
mastermind behind 152 hackers and phreaks nationally ...' Judge Shadur
sentenced her on Friday to two years in the custody of the Attorney
General, based on her plea of guilty to one count of a seventeen count
indictment.
Leslie Lynn Douchette, 36, and mother of two small children was referred to
by Secret Service investigators as 'the head of the largest ring of hackers
and phreaks ever uncovered in the United States'.
In TELECOM Digest, notice was made of Ms. Douchette at the time of her
indictment and arrest, but unlike other high-profile cases, little more was
noted about her in the media over the past few months.
Ms. Douchette, of 6748 North Ashland Avenue in Chicago, along with her ring
of phreaks and crackers (the term I prefer) allegedly cost various
telephone companies in excess of one million dollars. In addition, Ms.
Douchette and associates are alleged to have obtained over $600,000 from
illicitly obtained Western Union money orders and merchandise acquired with
fraudulent credit cards using the computer.
Many members of her ring were juveniles, and many were associated with or
considered themselves active in the Legion of Doom, although there is no
evidence Ms. Douchette was a member of, or associated with the Legion. Six
juveniles in four other states have been convicted as part of the ring
operated by Ms. Douchette, and investigations of other ring members is
continuing. Some of the pending investigations center around phreaks and
crackers already under investigation for Legion of Doom activities,
according to US Attorney William J. Cook, who prosecuted the case with
attorney Colleen Coughlin. As part of her plea-bargained sentence, Ms.
Douchette is cooperating fully with the government on pending
investigations. She has given *additional names* and details to Secret
Service investigators.
Although Ms. Douchette said she once worked as a day care employee in
Canada, Mr. Cook said she had been unemployed for some time, and appeared
to be 'completely unskilled, unable to obtain any gainful and legitimate
employment.' He continued, "her only skill seems to be her ability to use
the telephone to manipulate people and computers."
The sentence (actually two years and three months) is believed to be the
stiffest ever given out to a phreak, and Mr. Cook noted this was given to
her *despite* her plea of guilty. At the time of her sentencing, Judge
Shadur remarked that he thought Ms. Douchette also needed psychiatric help,
and his order calls for her to receive therapy while in prison.
Ms. Douchette was represented by attorney Robert Seeder of the Federal
Defender's Office here. At the time of sentencing, Mr. Seeder noted that
Ms. Douchette's activities have now cost her the custody of her two
children (both were taken from her and are now cared for elsewhere), and
that by her plea, she had recognized and acknowledged responsibility for
her actions. He asked Judge Shadur to show mercy upon the defendant and
impose probation, with therapy as a condition. Judge Shadur refused,
calling her 'the control center for phreaks and hackers everywhere.' Her
motive, according to Mr. Cook, was the 'ego boost' she received as leader
of the ring.
Judge Shadur said 'phreaks and hackers need an example of what to expect
when they are caught', and that Ms. Douchette's punishment and loss of
custody of her children would serve that purpose.
Patrick Townson
------------------------------
Date: 29 Jul 90 19:29:22 EDT
From: Anonymous
Subject: US Army virus research
From: TIME, June 25, 1990, p. 5 "Grapevine" by Paul Gray,
reported by David Ellis
QUICK, THE RAID. Everyone knows that the computer industry is fighting
against viruses, malicious programs that can infect whole networks and
crash them. So it stands to perverse reason that hush-hush agencies like
the CIA and NSA are trying to create such bugs as offensive weapons. The
latest entrant in this quest is the U.S. Army, which is soliciting bids on
a half-million dollar contract to develop tactical virus weapons capable of
disabling enemy computers on the battlefield. The proposal has raised
eyebrows among the military's hackers. Says one Army computer-security
officer: "Many of my colleagues are quite surprised that something of this
nature would be put o the streets for research rather than using the
expertise internally available."
------------------------------
********************************************************************
**END OF CuD #1.29**
********************************************************************
!