Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 03 Issue 39
Computer underground Digest Sun, Nov 3, 1991 Volume 3 : Issue 39
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
CONTENTS, #3.39 ( November 3, 1991)
File 1: Moderator's Corner--Brendan Kehoe's FTP information
File 2: The Secret Service and Protection of Privacy
File 3: Re: Response to Bill Vajk's FOIA Piece
File 4: Letters from Prison: Installment #1
File 5: Diehard 2 And Hacking
File 6: Re: CuD - Now It Can Be Told
File 7: Is the Government creating malign hackers?
Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
Chicago email server, send mail with the subject "help" (without the
quotes) to archive-server@chsun1.spc.uchicago.edu.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source
is cited. Some authors do copyright their material, and they should
be contacted for reprint permission. It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to the
Computer Underground. Articles are preferred to short responses.
Please avoid quoting previous posts unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
----------------------------------------------------------------------
Date: 3 Nov 91 11:32:33 CDT
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 1--Moderator's Corner--Brendan Kehoe's FTP information
>I would like to announce the release of the first issue
>of 'Informatik'. Informatik #1 is available by
>anonymous ftp at uunet.uu.net under:
>tmp/inform1.Z
>tmp/inform1.txt
Brendan Kehoe reminds everybody that this is in the CuD archives as
misc/inform-1.1.Z. (For future reference, anybody saying something
'released on uunet in /tmp/blah' is most likely not condoned by UUnet,
and isn't guaranteed to be there.)
Brendan also worked to establish an Australian shadow of the CuD
archives at the University of Melbourne. It's on ftp.ee.mu.oz.au
[128.250.1.80] in pub/text/CuD. Everything on ftp.cs.widener.edu and
chsun1.sps.uchicago.edu will be there. We *STRONGLY* encourage all
Australian readers to FTP to this machine, to save the international
link.
Thanks to Daniel Carosone for all of his help. And to Libby on
general principle.
------------------------------
Date: Thu Oct 24 16:38:35 1991
From: igloo!learn@DELTA.EECS.NWU.EDU
Subject: File 2--The Secret Service and Protection of Privacy
((Moderators' note: Bill Vajk and Glenn Roberts have recently obtained
several reams of Secret Service files under the Freedom of Information
Act related to Len Rose's case. Some of this information appears to
include the names of net people, and as the file by Gordon Meyer
indicates, having your name on a list could be sufficient to earn the
"victim" a file of their own)).
The following is an accurate representation of some of the techniques
the United States Secret Service uses to protect the privacy of
citizens from the prying eyes of those who make Freedom of Information
requests regarding investigations. The following excerpt will be
familiar to many who have been paying attention to US Secret Service
activities for the past year.
NOTE: X, Y, and Z are blankouts by your public servants.
======================================================================
TELECOM Digest Sat, 27 Oct 90 16:54:32 CDT Volume 10 : Issue 766
[......]
On his final day of employment, Mr. Rose was visited by federal agent
XXXXXXXXX, the fellow who has been involved with much of the Operation
Sun Devil investigation since the beginning. On the advice of his
attorney, Mr. Rose declined to speak with YYYYYYYYY at the time.
[......]
As ZZZZZZZZZZ points out in the current issue of %Computer Underground
Digest% something very strange is going on ... I refer you to the
current issue of CuD for more specifics on this case. If you are a
subscriber to CuD, you should have received an issue on Saturday
morning with this story. If not, and you'd like to subscribe, then
write the Moderators with your request: tk0jut2@niu.bitnet.
[......]
Was this latest turn of events a 'set up' of some kind, or a
conspiracy against Len Rose? It seems doubtful, yet if the new charges
against him are true, then he must be a very self-destructive
individual. Quite honestly, I was shocked to receive this report a few
days ago from Jim Thomas (I promised not to publish it until he did),
and I really don't know what to think. I do feel terribly sorry for
his wife and children at this point, alone in a strange place without
the resources they need for survival.
==========================================================================
Need any hints ?
X is "Tim Foley". Y is "Mr. Foley". Z is "Jim Thomas", although they missed
him with their whiteout brush in the second instance in the subsequent
paragraph. They also obviously did not recognize tk0jut2@niu.bitnet
as much an identifier as any name.
>From reading the text above, for which we have available the original
as a publicly posted article in comp.dcom.telecom, and our understanding
of the context of the information, it is obvious that the individuals
reviewing the documents with a commendable intention to preserve the
privacy of innocent individuals are oblivious to realities of any sort
regarding the cases they are reviewing.
This, I suggest, makes them a danger to the privacy we demand regarding
innocent individuals happening into investigative webs. The other side
of the double edged sword is equally as bad. Such practices on a
continuing basis create an effective shield concealing the very
misbehaviors which the Freedom Of Information Act intended to expose
to public scrutiny. Federal agents acted on our behalf. The government
wishes to keep their agent names a secret, out of the public eye. Does
this not resemble, in highly disturbing ways, the SECRET POLICE of
other nations in other times ? This trend is not limited to the
Secret Service. The FBI also routinely deletes agent names from
reports released under FOIA. The government, as an entity, demands
more privacy for themselves than they wish to permit to society as
a whole.
And the now famous article posted by Len Rose to the network
deteriorates another nonsensical tidbit under the government
censor's hand. It appears as follows in the documents released
by the Secret Service:
"Hi. I got fired Friday. They had %%%%%%%%%%%% article in
their hands when they told me the pleasant news."
Hey there, John. Aren't you proud of how the government is
safeguarding your privacy and your name ? There was a toasty
flamewar on usenet about this article. But of course, the folks
reviewing the documents hadn't a clue. They don't really know
what they are doing, and it isn't their fault. The system, which
has succumbed to entropy, is at fault.
Full Disclosure recently received a mountain of documents from the
Government. What I've described here is just the smallest bit
of the tip of an iceberg. Glen Roberts and I have a lot of analysis
to do. In some respects, the government has made the analysis a bit
more difficult, a bit more time consuming. In spite of their generally
contrary nature in such regards, they have nonetheless given us a
better insight into some of the issues and detail perplexing us.
It is to be noted that the documents we have received contain
the first formal evidence that law enforcement agencies are not
only interested in the doings and discussions on Usenet, but also
they have sought out and incorporated such discussions into the
official records of their investigations. Up to this point, such
thoughts have been hearsay and guessing by those of us not directly
involved with law enforcement agencies in these regards.
------------------------------
Date: Fri, 25 Oct 91 8:57:22 CDT
From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
Subject: File 3--Re: Response to Bill Vajk's FOIA Piece
I've just read Bill Vajk's excerpts (a digest of digests of Digests,
if you will) from the Secret Service's reply to his FOIA request. A
movie-going fool like me sees it as America's Finest nervously
regarding the Usenet Tall Black Monolith that now graces their veldt.
In time, they'll understand it and possibly even be positively changed
by it, but for now the SS lurkers are as primates checking out the
first subliminal motivation tape...
> From reading the text above, for which we have available the original
> as a publicly posted article in comp.dcom.telecom, and our understanding
> of the context of the information,
Is it common practice to blank out the names of individuals from
published newspaper or broadcast coverage? The material in question,
as Bill notes, isn't the recorded conversation of an investigation
subject and a confidential informant. It's the subject of an
investigation being discussed in a public forum.
> This, I suggest, makes them a danger to the privacy we demand regarding
> innocent individuals happening into investigative webs. The other side
> of the double edged sword is equally as bad.
A more mundane explanation suggests itself for the snipping of the
names of agents and technical sources from the documents provided.
Some of those folks whose names are Not To Be Read Aloud have had
their names read aloud in civil court, as defendants. When people may
have been wobbling over the thin blue line like a dented gyroscope,
the desire for anonymity is understandable.
> Such practices on a
> continuing basis create an effective shield concealing the very
> misbehaviors which the Freedom Of Information Act intended to expose
> to public scrutiny.
As Bill and others who've received the information can attest, the
volume of information provided to their FOIA request is substantial.
In this case, the Secret Service's compliance with Bill and Glen's
request would do a lawyer litigating a defective product claim for GE
proud. One of the documents provided, a list of the name of every
file on one individual's computer, is the size of a major city's
phonebook. Filing an FOIA request is like asking a genie for "a
little head": You may not be happy with the results.
> The government, as an entity, demands
> more privacy for themselves than they wish to permit to society as
> a whole.
What else can a collective consciousness like a government
organization say on the subject of personal privacy but "Privacy is
irrelevant. Society is irrelevant. We do what we have to do to
enforce whatever rules that we set." (I'd have thrown in "Resistance
is futile" but everybody gets the Secret Service - The Next Generation
metaphor by now, right?)
> But of course, the folks
> reviewing the documents hadn't a clue. They don't really know
> what they are doing, and it isn't their fault. The system, which
> has succumbed to entropy, is at fault.
Of course it's their fault. Computers have been with us in one form
or another for almost half of this century, and personal computers
have been around for over a decade. What keeps the ignorance level
high as a whole is the "us and them" principle. Paranoia and
laziness, nothing more.
> Glen Roberts and I have a lot of analysis
> to do. In some respects, the government has made the analysis a bit
> more difficult, a bit more time consuming. In spite of their generally
> contrary nature in such regards, they have nonetheless given us a
> better insight into some of the issues and detail perplexing us.
Well, then it was accidental. Governmental replies to FOIA requests
are grudging at best, and can take the form of the legal threat "I'm
going to paper you to death." Bill and Glen should be commended, or
at least bought a beer, for slogging through the pounds of old laundry
lists, public messages scissored up like WWII V-mail and whatever else
these rabid pitbulls salvage from their cockeyed monitoring of our
publicly expressed thoughts and deeds. Side note: It would have been
interesting to read the response to a request for these documents *in
electronic form*. We are talking about email, online newsletters and
digests, after all. A case could be made that the original
information that was requested was on a disk, not on paper.
Considering all the names whited out of the documents, a form
outlining chain of ownership of the documents from disk to paper would
have so many omissions as to be meaningless. The assertion that the
documents, which were evidence in a criminal investigation, were not
altered before printing is one that I'd like to see someone's name
associated with without concealment.
------------------------------
TRANSCRIPTION NOTES:
The following is a transcription of documents received from the US
Secret Service in response to a Freedom Of Information Act (FOIA)
request I filed in April of 1991. In that request I asked for all
records pertaining to myself, and those of SummerCon '88 which I
attended.
I received three, heavily censored, photocopies in response. The
complete contents of those pages are reproduced here. Because the SS
uses a "white out" technique to censor information, it is difficult
to determine exactly how many lines or words have been deleted. The
places marked [censored] below are my estimates of the number of
missing lines of text. GRM 10/30/91
+++++++++++++++++++++++++++++++++++
DEPARTMENT OF THE TREASURY
UNITED STATES SECRET SERVICE
X-REF: 404-704-13800
X-REF: J-201-775-115386-S
ORIGIN: Field OFFICE: Chicago, Illinois CASE NO: 201-775-115729-S
TYPE OF CASE STATUS TITLE OR CAPTION
Computer Fraud Closed Gordon R. Meyer
10/12/90
[written in]
INVESTIGATION MADE AT PERIOD COVERED
Chicago & DeKalb,
Illinois 01/19/90 - 08/01/90
INVESTIGATION MADE BY
SA [censored]
_SYNOPSIS_
Investigation has not disclosed any
illegal activity by Meyer, only [censored]
[censored]
[censored]
[censored] This case is being
closed.
_INTRODUCTION_
This case developed as an extension of the Chicago cross-referenced
case. [censored]
[censored] A high interest of
"hacking" and the "Phrack" magazine on the part of Gordon Meyer, a
student at Northern Illinois University. Meyer, aka: "Hatchet Molly",
DISTRIBUTION COPIES REPORT MADE BY DATE DICTATED
Chicago Orig. [censored] 08/23/90
Special Agent DATE TYPED
Fraud Division 1cc 08/24/90
APPROVED DATE SIGNED
[signature] 8/27/90
Patrick T McDonnel DATE APPROVED
SPECIAL AGENT IN 9/20/90
CHARGE
++++[end of page one] ++++
201-775-115729-S
08/23/90
Page 2
also appears on the "Internet Directory of hackers, January 5, 1989",
a list of hackers released in a "Phrack" issue by
[censored]
Reference is made to all M/R's in the Chicago cross-referenced case,
J-201-775-115386-S, the latest being that of SA [censored] dated
5/190, [sic] wherein that case was continued pending judicial action.
_DETAILS OF INVESTIGATION_
[censored]
[censored]
[censored] an attempted was made to determine the extent, if any, of
Gordon Meyer's, aka: Hatchet Molly, involvement with [censored] and
the Legion of Doom.
On 2/23/90, a Grand Jury subpoena was served on [censored]
[censored]
[rest of page has been censored]
+++++++++++[end of page two]++++++++++++++
201-775-115729-S
08/23/90
Page 3
[censored]
[censored]
[censored]
[censored]
[censored]
[censored]
[censored]
[censored]
[censored]
[censored]
[censored]
[censored]
[censored]
[censored]
[censored]
[censored]
Investigation to date has not revealed any "hacking" activities by
Gordon Meyer. As discussed with AUSA [censored] and SA [censored]
Meyer's possession of the E911 text as published in the Phrack
newsletter, did not warrant a personal interview.
NCIC checks were conducted with negative results.
_DEFENDANTS/SUSPECTS_
Gordon R. Meyer - Suspect
_JUDICIAL ACTION_
On 3/22/90, AUSA [censored] issued a Grand Jury subpoena
[censored]
[censored]
[censored]
[censored]
[censored]
After review of the above material, I discussed this case with AUSA
[censored]. Based on this review and the lack of significant
findings, a personal interview of Meyer was deemed no appropriate.
_DISPOSITION_
No substantive leads were developed in this case. This case is being
closed.
++++++++[end of page three]+++++++++++++++++++
++++++++[end of FOIA-obtained documents]++++++++++++
------------------------------
Date: Thu, 24 Oct 91 4:21:33 EDT
From: "Len.Rose@federal.prison.on.our.tax.dollars.edu"
Subject: File 4--Letters from Prison: Installment #1
((Moderators' Note: Len Rose pled guilty to possession of unlicensed
source AT&T Unix source code and was sentenced to a year in prison.
Many of us feel that Len's sentence was unjustly harsh. We've
received several long letters from Len, and he has given us permission
to reprint them in installments. The single dominant theme is that
prisons are lonely, desolate places, and that even a minimum security
(Level-I) institution can by psychologically devastating)).
"Letters from Prison: Part of the Story."
By Len Rose (October, 1991)
Greetings from prison!
I have been here almost four months, and have six and a half left
before I can return to my family. Time passes very slowly here. I am
not sure if I will have a family to return to, but there is nothing I
can do to save them. I'll discuss all of that in a few moments.
First, a general scenario. Prison life has been what I expected, with
a few excruciating exceptions. I'll elaborate on these, but let me say
that my life here has been easy. I live in a dormitory, along with 80
other convicts. We have small, open cubicles, each containing a bunk
bed, two small lockers, a small desk, and one waste basket. For
someone with military experience, (I had six years of it), having to
perform tasks such as making beds (military style), stripping and
waxing floors, and generally maintaining the room in spotless
conditions is easy.
My work is easy. I pick up cigarette butts all day. We work seven hours
a day, five days a week. I get paid 12 cents an hour. It sounds like a
bad deal, unless you consider I get other benefits such as a place to
sleep, clothing, and of course food. Ah. The food. Well, I don't eat
breakfast often. It's not bad as far as breakfasts go. I won't say
anything more about that meal, except to mention the coffee. If you
can call it that. I don't. It's brown colored water. We have developed
theories as to where the coffee goes, but no one is certain. We
just know that we don't get it. Lunch isn't bad either. There are days
when it's actually edible. Ditto for supper. From looking at the weekly
menu, one could say that we are fed well. However, the food is not
prepared correctly, and is often ruined. There are several factors
involved, none of which reflect anything wrong with the Bureau of
Prisons. The food is prepared by convicts, some of whom actually care
about their fellow convicts and take pride in their work. The
majority of kitchen workers here, however, are bitter, unhappy people
who do the least they can get by with, and not face disciplinary
actions. The dishes and utensils are dirty. I have learned how to
sort through stacks of plates, rummage through utensil dispensers,
and choose clean cups. Again, I don't blame the BoP for this, since
they have to use the employees--whoops, convicts--they have available.
We compete weekly for the privilege of being called first to lunch and
supper. It's based on the scores we receive from an inspection of our
dorms. Once a week, we're inspected, and the dormitory that looks the
best wins the chance to eat first. There is a paradox here. One could
wonder why people are motivated to strive for this honor, but after
adapting to the food, learning that hunger is worse, you would be
surprised. Also, when you are the fifth or sixth dorm, you discover
that a lot of the "good" food is gone, and you have to eat what's
left. The dining hall is organized like a large cafeteria, with
two lines for food. There is also a salad bar. (Thank God for the
salad bar). Well, enough said about the food.
Mail. When I first got here, we were called by dormitory each evening
to receive mail. An officer (or "hack") in convict language) would
pass out the mail in a circle of approximately 80 convicts. (If the word
"convict" assaults your sensibilities, feel free to substitute the word
inmate, guest, members, etc). It reminds me of army boot camp. I
cannot ever impress upon anyone the enormous importance of mail to
someone who has not been in jail or prison for any length of time. I am
not being dramatic. It is a lifeline to a life that used to be. A link
with people you love and miss so badly it hurts. An affirmation that
you are still a person and somewhere out there is someone who
still cares. One letter can make the difference between sinking in utter
despair or gaining enough strength to last one more day. I will
never, never forget those kind people who've had the patience and
compassion to carry on a correspondence with me here. It has not been
easy for them, I am sure. God bless them all.
We can only receive mail Monday thru Friday, thus the weekends are
bleak for me. Many other convicts feel differently since they can
receive visits on the weekends. Since my wife and children are so far
away and can't afford to come see me, I'll never get a visit. To
combat my growing depression that seemed to materialize every Friday
evening, I volunteered to work on the weekends. It has helped a lot.
For those who are fortunate enough to receive visits, it's very nice.
There is a large visitor area with both indoor and outdoor areas.
They can spend an entire day with their visitors (usually wives and
children), often being able to hug and kiss a lot. I have been told
there is a lot of opportunity for mutual masturbation. Pitiful when
viewed by someone outside the system, but it's amazing what lovers
will do when they are forced into this situation. I have also heard of
the occasional brave souls who have actually consummated the act of
making love. I am told it's difficult, but not impossible. The visitor
area is under the constant scrutiny of at least two oficers. I would
not demean myself or my wife in such circumstances, but then again--I
have not been imprisoned very long.
I would give a year of my life to just be able to see my wife and
children. I can't express myself any other way, since it really is
the truth. I don't intend to be histrionic. "Just the facts, Man!" I
think that's enough on that subject too. (Sigh!).
------------------------------
Date: Thu, 31 Oct 91 16:42:31 AST
From: iq/sju@OAMICUS.FIDONET.ORG(Timothy Buchanan)
Subject: File 5--Diehard 2 And Hacking
KB>terrorists. The second piece related to computer terrorism. In it we
KB>showed footage of Die Hard 2, which was viewed at a congressional
KB>hearing as an example of how vulnerable we are, and how what happened
KB>in that movie could happen in real life.
No, Krista, it could NOT.
In this movie, terrorists cut a cable near a major airport and "hack"
into "the air traffic control system". They seize communications,
control radar and flight data, and cause an airliner to crash by
resetting an instrument landing system.
Each tower has several means of talking to airplanes, including a
portable radio. It would be impossible to block all radio channels. Do
you think that the pilot would circle helplessly until out of fuel, as
shown in the film? He would contact another FAA facility and his
company, and if necessary exercise his pilot in command authority and
take his aircraft elsewhere.
Radar and Flight Data processing are two different functions. It is
not possible to connect into a computer and steal these functions,
although they could be disrupted. Again, the pilot and the FAA have
other means to deal with loss of data.
The landing system depicted does not exist, but appears to be a
combination of an ILS (instrument landing system) and GCA (ground
controlled approach). This last is only used at a few military fields.
It would be possible to interfere with an ILS, but not to reset it as
shown so as to lead a pilot into the ground. Also, the pilot has
several systems in his aircraft to provide altitude information,
including a radar altimeter and ground proximity warning system which
are independent of the ground. When these warned him of low altitude,
he would go-around.
In short, the movie is entertaining but has little basis in fact. Air
traffic functions, like any aspect of society, are vulnerable to
terrorists but this would involve hacking with an axe, not computer
hacking.
What is your reason for stating so baldly that such a film could
happen in real life? It is entertainment, like Geraldo's TV show.
Don't confuse it with information.
I have worked for the FAA for eleven years as a controller and
trainer, and have some knowledge of the automation systems. I am also
an IFR rated pilot.
------------------------------
From: chris@ZETACO.COM(Chris Johnson)
Subject: File 6--Re: CuD - Now It Can Be Told
Date: Wed, 30 Oct 91 13:22:34 CST
I have a strong disagreement with Krista's position as stated above
(CuD 3.38). Yes, the "media" is made up of individual "reporters", just
as the software industry is made up of individual "programmers" in
part. It is also true that we, as parties interested in fair
representation of, and public education about cyberspace, have an
obligation (to ourselves) to make sure the media individuals get the
information and education they need to deliver the messages we want to
see delivered.
However, this does not excuse those individuals in "media" in any way.
They have chosen to work in the field, and thus can be assumed to have
chosen "journalism" as a profession. A professional journalist makes
it her or his duty to become educated about the topics she or he will
be reporting and presenting to the public. A professional journalist
has a set of ethics and standards to adhere to, and ignorance and
misrepresentation are _not_ among them.
Krista's statements sound much like those of other media apologists.
I argue it is her and other "media" reporters' obligation to find out
the facts, to educate themselves about their chosen topics, and to
contact individuals who have expertise in those areas to get the
correct message.
We will do our part, I hope. Will the "media" do theirs?
------------------------------
Date: 03 Nov 91 20:57:47 EST
From: Adam Rice <76177.42@COMPUSERVE.COM>
Subject: File 7--Is the Government creating malign hackers?
Permit me to tell you all a story from my college days.
I had a friend, John, who was a resident advisor at a big dorm on
campus. His residents were all freshmen, and it adjoined the section
where most of the football players lived. As you can probably imagine,
these football players could get pretty rowdy, and especially liked to
give freshmen a hard time. Now one of John's residents was a
politically-conscious hacker, who had a lot of politcal cartoons on
his door. One of the football players ripped these down one day. The
next day, this freshmen posted a sign on his door that read something
like this: "To the guy who ripped down all my cartoons: I know who you
are. Your credit rating and your GPA are history."
John walked into his room with a grin, ripped the sign down, and said
"Hey, why advertise?"
It occurs to me that up to now, most of the hacking that this country
has seen has been relatively benign: more on the level of pranks than
sabotage, although it easily could become the latter. I have to wonder
if any of these gung-ho law enforcement officials have considered that
they could, possibly, take a "benign" hacker and piss him off
sufficiently to turn him "cancerous," probably striking back
specifically at those who had given him grief. What to do about this?
I don't know, really. As long as cyberspace remains in the legal
twilight zone it's in, we can probably expect more unprovoked arrests
and unconstitutional infringements of liberties, though. Sooner or
later, the authorities will tangle with the wrong guy, I have a
feeling.
------------------------------
End of Computer Underground Digest #3.39
************************************