Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 07 Issue 15
Computer underground Digest Wed Feb 22, 1995 Volume 7 : Issue 15
ISSN 1004-042X
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Ediotr: Ettie-Ann Shrdlu
CONTENTS, #7.15 (Wed, Feb 22, 1995)
File 1--Affidavit of FBI agent against Baker
File 2--soc.culture.usa, et al.-Re: Censorship at U of Michigan (fwd)
File 3--Baker chronology
File 4--Text of 18 USC 41 Sect. 875c (of Baker Indictment)
File 5--HACK - WELL/Mitnick FAQ (fwd)
File 6--Re: Banished CPU BBS - commentary
File 7--Cu Digest Header Info (unchanged since 18 Feb, 1995)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
----------------------------------------------------------------------
Date: Tue, 14 Feb 1995 23:59:18 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 1--Affidavit of FBI agent against Baker
((MODERATORS' NOTE: The Jake Baker case raises sticky issues of
First Amendment protections, creative applications of old laws to
new scenarios, and maintaining decency in cyberspace.
The underlying issues extend beyond obscenity and free speech,
and a future issue will attempt to address the complexity of
what's at stake. The following posts provide the background for
the case)).
==============================================
United States Attorney
Easten District of Michigan
211 W. Fort Street
Suite 2300
Detroit, MI 48221-3211
February 9, l995
CONTACT: (313) 226-9509
United states Attorney Saul A. Green announced that Jake A.
Baker, Alan known aa Abraham Jacob Alkhabaz, an undergraduate
student at the University of Michigan in Ann Arbor, was charged
today in a federal criminal complaint With transmitting a threat
to injure "Jane Doe, a student at the University of Michigan.
Baker was arrested on the complaint in Ann Arbor at approximately
1:00 p.m. and subsequently transported to the federal courthouse
in Detroit for an initial appearance.
Mr. Green stated that the criminal charge is based upon a
series of transmissions Mr. Baker made on the Internet computer
network. on approximately January 19, 1995, the University of
Michigan Department of Public Sarety became aware that Baker had
transmitted communications on the Internet describing violent sex
acts against women, and that at least one transmission identified
Jane Doe as the specific victim of sexual torture and murder. A
series of subsequent transmissions between Baker and others on
the Internet system discussed plans for the abduction, torture,
and murder of women.
Mr. Green explained that Mr. Baker's transmissions on the
Internet gave rise to a charge under 18 U.S.C. s 875(c), which
criminalizes the transmission in interstate or foreign commerce
of a communication "containing any threat to kidnap any person or
any threat to injure the person of another." Mr. Green further
emphasized that the criminal complaint against Baker is merely a
charging document, and that Baker is presumed innocent of the
charge. The investigation, which is being handled by the Federal
Bureau of Investigation, is still in progress,
AFFIDAVIT
Greg Stejskal, being first duly sworn, states:
1. I am a Special Agent with the Federal Bureau of
Investigation, and have been so employed for the past 19 years.
be following is known to me to be true through personal interviews
and investigation.
2 . Abraham Jacob Alkhabaz, also known as Jake Baker , is an
undergraduate student at the University of Michigan (UM) in Ann
Arbor, Michigan. Baker has access to computers and has been
assigned a unique name (password/identifier) by the university.
Baker has, via his computer, access to a computer network commonly
referred to as "Internet." Internet is a world-wide information
network used in interstate and foreign commerce. Accordingly,
Material transmitted into Internet is communicated and distributed
in interstate and foreign commerce.
3. On or about January 19, 1995, University of Michigan
Department of Public Safety (UMDPS) becamee aware of certain
activities of Jake Baker, i.e., the transmission into Internet of
"stories" graphically depicting violent acts against women.
Further, UMDPS learned that at least one of these transmissions
named a female student at US as the specific target/victim. The
name of the female student is known to me, but will be identified
in this affidavit only as "Jane Doe."
4. On January 20, 1995, Baker was contacted by UMDPS officers
regarding the Internet transmissions. After being advised of and
waiving his Miranda rights, Baker admitted writing and "posting"
(transmitting) several depictions into the Internet computer
network. these transmissions were placed in a "compartment" of the
system labelled "alt. sex stories (a.s.s.)"
5. The transmissions distributed by Baker through Internet
described Baker's desire to commit acts of abduction, bondage,
torture, mutilation, sodomy, rape and murder of young women. The
depictions of these criminal acts are extremely graphic and
detailed.
6. In a preface to one of the transmissions, with an
unidentified victim, Baker writes, "Torture is foreplay, rape is
romance, snuff is climax."
7. one of the depictions transmitted by Baker into Internet
Involved UM Co-eds Jane Doe, who Baker identified by her true name,
Using her last name as the title of the "story." In a portion of
Baker's expressed desire to injure Jane Doe, Baker states:
Then, Jerry and I tie her by her long brown
hair to the ceiling fan, so that she's
dangling in mid-air. Her feet don't touch the
ground, She kicks trying to hit me, Jerry or
the gorund (sic). The sight of her wiggling
an mid-air, hands rudely taped behind her
back, turns me on. Jerry takes a big spiky
hair-brush and start beating her small breasts
with it, coloring them with nice red marks.
She screams and struggles harder. I've
separated her legs with a spreader-bar; now I
stretch out her pussy lips and super-glue them
wide open. Then I take a heavy clamp, and
tighten it coer her alit. once it's tight
enough, I let go.
Thus transmission and other similar transmissions may have been
posted previously, but were posted or reposted on or about January
1, 1995.
8. Baker knew Jane Doe as a class-mate from a Japanese class
at UM in the Fall of 1994. Jane Doe is aware of Baker's
transmission concerning her and ir frightened and intimidated by
it.
9. In late January l995, Baker signed various consent forms
giving permission to the UMDPS to search and/or access his room,
personal papers and computer files. This included the use of
Baker's unique password, which provided access to Baker's
electronic mail (e-mail). The hearth of the assail produced
numerous messages between Baker and an individual identifying
himself as Arthur Gronda supposedly residineding in Ontario, Canada.
In these messages sent and received via Internet, Baker and Gronda
discuss means of torture and acts of actual serial killers that had
been reported in the media. Further, Baker and Gronda discuss
actually getting together to commit the acts Baker had previously
depicted and transmitted. The following is an excerpt from a
message sent by Baker to Gonda on or about December 9, l994:
I just picked up Bllod (sic) Lust and have
started to read it. I'll look for "Final
Truth" tomorrow (payday). One of the things
I've started doing is going back and re-
reading earlier messages of yours. Each time
I do, they turn me on more and more. I can't
wait to see you in person. I've been trying
to think of secluded spots, but my area
knowledge of Ann Arbor is mostly limited to
the campus. I don't want any blood in my
room, though I have come upon an excellent
method to abduct a bitch ---
As I said before, my toom is right across from
the girl's bathroom. Wiat (sic) until late at
night, grab her when she goes to unlock the
door. Knock her unconscious and put her into
one of those portable lockers (forgot the word
for it), or even a duffle bag. Then hurry her
out to the car and take her away . . . what do
you think?
On or about December 10, 1994, the following response was sent via
lnternet to Baker by Gonda:
Hi Jake. I have been out tonight and I can
tell you that I am thinking more and more
about "doing" a girl. I can picture it so
well . . . and I can think of no better use
for their flesh. I HAVE to make a bitch
suffer!
10. Based on the aforementioned facts, there is probable
cause to believe that Abraham Jacob Alkhabaz, also known as Jake
Baker, knowingly transmitted a threat to injure the person of
another in interstate and foreign commerce in violation of Title
18, United States Code, Section 875(c).
__________________________
Greg Stetskal, Special Agent
Federal Bureau of Investigation
Subscribed and sworn to before
me this 9th day of February, l995.
_____________________________________
Hon. Thomas A. Carlson
United States Magistrate Judge
- - -
ANDREW S. BRENNER, Esq
abrenner@interaccess.com
634.8492@mcimail.com
http://www.interaccess.com/users/abrenner
finger abrenner@interaccess.com for PGP public key
------------------------------
Date: Sat, 18 Feb 1995 21:44:04 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 2--soc.culture.usa, et al.-Re: Censorship at U of Michigan (fwd)
----- Forwarded message ------
From: pjswan@engin.umich.edu (Peter Swanson)
Subject-- Re: Censorship at U of Michigan
Date: 16 Feb 1995 05:29:11 GMT
MORE INFORMATION ON THE JAKE BAKER CASE
I have several days worth of newspapers here; I will try to briefly
summarize the new information contained in the accounts
[DPS == Department of Public Safety (University Police)]
[SSRR == Statement of Student Rights and Responsibilities]
Sequence of Events (Jonathan Berndt/Michigan Daily)
December and January: Baker transmits e-mail messages to a man
in Ontario describing the kidnapping, rape, and murder of a woman.
1/9/95 The story in question posted to alt.sex.stories
1/19/95 A 16 year old girl in Moscow reads the story, then tells
her father, who tells a Michigan alumnus, who notifies the University.
1/20/95 DPS officers contact Baker. Baker waives his Miranda rights
and admits to writing and posting the stories. DPS officers search
Baker's room and account with permission, finding an unpublished story
and the e-mail conversations.
2/2/95 University President Duderstadt suspends Baker.
2/9/95 FBI arrests Baker on basis of stories and e-mail. Bail is denied.
2/10/95 After a detention hearing, Baker is again denied bail. A defense
appeal for bail bond is denied. Pre-trial motions scheduled for 2/17/95.
The Media free-for-all (Patience Atkin/Michigan Daily)
Detroit Free Press: "Debate between free speech and whether it's a
threat for the woman's safety." --Maryanne George
WDIV-4 TV Detroit: "It also goes to the issue of what constitutes
free speech and what constitutes unreasonable threats." --Paul Manzella
"People who make threats in society are always a concern to people
who don't make threats." --Manzella
Spin: "fantasy" --Detroit Free Press
"sexually violent fiction" --New York Times
"cyber-threats" --USA Today
Baker judged 'too dangerous' to be released (Josh White/Michigan Daily)
...Baker's attorney, Douglas Mullkoff, said the detention of his
client is unwarranted.
"The court is presuming that he is guilty," Mullkoff said. "I
respectfully disagree with every word the judge said. Mr. Baker
was writing fiction in a fiction area of the Internet."
During Baker's appeal hearing Friday afternoon, Mullkoff drew a
similar picture. "We have a fantasy writer's workshop going on
here," he said. "That is the Internet."
...U.S. Attorney Ken Chadwell entered six documents into evidence
as part of the case against Baker. Three of the documents were
stories that Baker had posted on the Internet, two were batches
of e-mail messages to and from Gonda, and one, a previously
unreleased document, was an incomplete story that DPS officers
discovered in Baker's East Quad dorm room.
FBI Special Agent Greg Stejskal, the only witness to testify
at the Friday hearings, said the incomplete story named the same
female University student and posed a further threat to her safety.
"The story involves Mr. Baker abducting the female student and
taking her to a secluded place off of Route 23 in Ann Arbor.,"
Stejskal said. "He tells her to disrobe, to take a toolbox
from his car and then uses the tools to torture her."
Baker, in his unfinished story, describes the abduction in detail.
"I plan it well," Baker wrote. "It will be my first kidnapping;
my first real rape of a pretty young girl. My first experimentation
with all the devices of pain I had thought up before. I obsessed
about my target more than any other girl on campus."
Baker's mother, Vilma Baker, said she was shocked after watching
her son handcuffed and taken out of the courtroom by U.S. Marshals.
"The judge must have woken up this morning and thought he
was a psychiatrist," said Mrs. Baker, a creative writing teacher
in Ohio. "While his writing is alarming and I don't particularly
like my son's genre; then again I don't like Stephen King or
sitcoms. It was just fantasy."
But Chadwell said Baker's stories went beyond being creative.
..."There is a natural progression in these cases," Chadwell
said. "He was actually talking about taking action in things he
could do to women. He writes in a message to Gonda that 'just
thinking about it anymore doesn't do the trick. I need to DO IT.'"
...The letters themselves sent mixed messages. "Sometimes, I'll
see a pretty one out in the quad and think 'Go on Jake, it'd be
easy.' But the fear of getting caught always stays my hand,"
Baker wrote to Gonda on Dec. 9.
"Sorry, can't come up with an ending to that Asian story yet.
I will soon though, hang in there."
Prosecutors push Baker indictment (Josh White/Michigan Daily) (summary)
U.S. Attorney Ken Chadwell is pushing for an early indictment
of Baker. A probable cause hearing is scheduled for Friday.
Defense attorney Douglas Mullkoff is appealing the no-bond
ruling in the 6th U.S. circuit court in Cincinatti. He expects
the appeal (for bail) to be approved, but the next step may be
the U.S. Supreme Court.
The Ontario Provincial Police deny having been notified of the
case and are not, in fact, looking for Arthur Gonda.
'U' had Baker e-mail before suspension, officials confirm
(Cathy Boguslaski, Ronnie Glassberg/Michigan Daily)(summary)
The President suspended Baker with the knowledge of Baker's
e-mail. Before suspending him, Assistant General Counsel
Daniel Sharphorn and Director of Housing Public Affairs
Alan Levy asked Baker to withdraw from the University.
Vince Keenan, chair of the Michigan Student Assembly
Students' Rights Commission, said that Baker would be
difficult to charge under the SSRR, and that he suspected
that the President summarily suspended him because he
knew that the SSRR charges wouldn't stick.
Woman named in stories declines to make comment (Josh White/Michigan Daily)
After repeated press contacts, Jane Doe has requested that the
press stop pestering her.
ACLU: Baker's free speech rights violated (Josh White/Michigan Daily)
..."This case definitely has First Amendment ramifications," said
Howard Simon, executive director of the Michigan ACLU. "His
stories may have been disgusting and vile, but I have seen nothing
that would appear to be a threat to any person.
"If Mr. Baker had sent a letter to the woman he named in his
story, or had he slipped something under her door or e-mailed
her a threatening message, the there may have been something, but
it would be a civil suit brought by the woman.
"The germane issue is: Is the FBI going to dictate what
the First Amendment is going to look like in cyberspace? Will
people be prosecuted for putting pornography and disgusting
stories on the Internet in places set aside for them? It is
not the FBI's place to be writing the First Amendment over again."...
An editorial letter in the Daily reports that Baker put a disclaimer
and warning about the content of his story at the top of his post.
Several news sources, including the Daily, Free Press, and local
TV stations, have done background checks on Baker, but nothing
ominous has surfaced and the accounts seem to be hearsay anyway.
High school friends, etc., told a great deal of personal information
about Mr. Baker, but nothing I would consider worth the trouble
of retyping.
I will be disconnected from the net for about a week, so I will be
unable to report the status of the Friday probable cause hearing,
the bail appeal to the circuit court, or the results of the grand
jury investigation. Again, others are welcome to follow up on these
stories.
If someone has the story in question, I am interested in obtaining
it and making it available on a WWW site. I would prefer that all
references to the woman's name be changed to Jane Doe, so that no one
comes asking me for her name. I would certainly do it myself before
making it publicly available.
------------------------------
Date: Wed, 15 Feb 1995 00:08:08 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 3--Baker chronology
This is a document from Mike Dyer's Netzine web page --
http://www.ionet.net/~mdyer/netwatch.html. There are several other
interesting, indepth articles on the legal and ethical aspects of
cyberspace. Recommended hotlist addition.
This is the best summary I've seen to date. The web page also lists
several other supporting documents.
thanks, | "The most exciting breakthroughs of the 21st century
| will not occur because of technology but because
David Smith | of an expanding concept of what it means to be human."
bladex@bga.com | -- John Naisbitt / Patricia Aburdene
---------- Forwarded message ----------
LAST UPDATED 2/14/95
_________________________________________________________________
Only Make Believe
Jake Baker (pictured) has the attention of a great many people. The 20
year old University of Michigan student has caused an firestorm of
controversy over a fictional story he published in a Usenet newsgroup
that now has polarized two camps. On the one side are the advocates of
virtually unlimited 1st Amendment Free Speech rights, and on the
other, a host of womens groups and others concerned that the founding
fathers never intended their handiwork to go this far. Piecing
together bits and pieces from various news and information, here is
the latest I have been able to unravel:
_________________________________________________________________
BACKGROUND
Baker, 20, a Linguistics Major of Boardman, Ohio, who last year
changed his name from Abraham Jacob Alkhabaz, posted three "stories"
in the Newsgroup Alt.Sex.Stories. In one of the fictional stories,
Baker, who used his real name and that of a girl who had been a
classmate in a Japanese language class last fall, described a scenario
where he and another man broke into the girl's apartment, beat,
tortured and sodomized the girl, and then lit a match as he said
goodbye to the girl, presumably to burn the apartment where the girl
was bound and gagged.
Although such stories are not uncommon in the newsgroup, apparently
the use of real names of both the author and others involved is rare.
Baker claims that the motivation for the story was underlying stress
having to do with a student loan. He says he chose that particular
girl because "she was an attractive young woman, and I needed a name
for the story I was writing". He stated that he knew the girl, but he
never spoke to her.
It is not known if Baker used his University password to get the
access to post the story. The school requires students to sign a
statement, before using campus computers, which says, among other
things, "E-mail should not interfere unreasonably with one's
education, or work at the University, nor should they harass or
threaten an individual or group."
_________________________________________________________________
January 9
--A University of Michigan alumnus, living in Moscow, saw the post and
alerted University officials.
February 2
--Baker was escorted from the campus on February 2, and suspended.
February 3
--Baker and his attorney meet with school officials to ask that Baker
be allowed to resume classes and his duties as a projectionist on the
north campus.
February 9
--A hearing is held on the UM campus. At approximately 1:00 p.m.,
prior to the scheduled hearing, Baker is arrested by federal
authorities at the office of his attorney. Baker is taken before a
magistrate, charged with Interstate Transmission of a Threat, in
violation of 18 U.S.C. sec. 875, which carries a maximum prison term
of five years. He is also accused of sending and receiving e-mail
correspondence with an unnamed Canadian man, in which both describe
their desire to kidnap and torture women. Baker is jailed overnight
without bail, even though the prosecutor recommends bond be set.
February 9
--Baker's mother and an Ann Arbor psychiatrist appear at the hearing
on the UM campus. The psychiatrist and Baker's mother both testify
that Jake is not a threat to anyone on campus. The psychiatrist
characterizes the writings as "thoughts", with no plan of action. The
psychiatrist also states that Baker is not delusional. Baker's
attorney states that Baker has no criminal record.
February 10
--U.S. Magistrate Thomas Carolson orders Baker held without bail, in
spite of the prosecutor's request that bond be set at $100,000.
Magistrate Judge Carolson stated that the posts were "more than just a
story" and quoted the messages to the unnamed Ontario man as stating
"Just thinking about it any more doesn't do the trick. I need to do
it." The magistrate further noted that the correspondence involved
where and how to carry out such an assault. A court affidavit of an
FBI agent states that the messages between Baker and the Canadian man
"described Baker's desire to commit acts of abduction, bondage,
torture, mutilation, sodomy rape and murder of young women. Baker's
mother, a high school English teacher, said after the UM campus
hearing that her son chose the name from 200 names in a class, and
picked the one he did simply because the woman's last name "is a
sexual pun." Baker's defense attorney announces that he will appeal
the denial of bail.
February 10
--A U.S. District Judge, having read the e-mail correspondence between
Baker and the Canadian man, upheld the ruling of the Magistrate Judge
to hold Baker for trial without bail. Saying "I wouldn't want my
daughter to be on the streets of Ann Arbor or Ohio with him in the
condition I believe he is in at this time", Judge Bernard Friedman
said that he was convinced that the female subject of Baker's story,
whose identity Judge Friedman ordered kept secret, could not be
protected from Baker unless he was jailed. At the hearing, Baker's
attorney presented findings of a psychiatrist and psychologist, both
of whom had spoken with Baker, who stated that Baker is not dangerous
or mentally ill. The attorney also pointed out that Baker had
cooperated with authorities, giving them his e-mail password as they
searched for evidence.
_________________________________________________________________
*Sidenote:*
Last April, another UM student used a classmate's logon to post
statements from an Organization for the Execution of Minorities, which
threatened blacks, and criticized Latinos, Jews and gays.
------------------------------
Date: Wed, 15 Feb 1995 00:09:13 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 4--Text of 18 USC 41 Sect. 875c (of Baker Indictment)
UNITED STATES CODE ANNOTATED
TITLE 18. CRIMES AND CRIMINAL PROCEDURE
PART I--CRIMES
CHAPTER 41--EXTORTION AND THREATS
s 875. Interstate communications
(a) Whoever transmits in interstate or foreign commerce any
communication containing any demand or request for a ransom or
reward for the release of an kidnapped person, shall be fined
under this title or imprisoned not more than twenty years, or
both.
(b) Whoever, with intent to extort from any person, firm,
association, or corporation, any money or other thing of value,
transmits in interstate or foreign commerce any communication
containing any threat to kidnap any person or any threat to
injure the person of another, shall be fined under this titl or
imprisoned not more than twenty years, or both.
(c) Whoever transmits in interstate or foreign commerce any
communication containing any threat to kidnap any person or any
threat to injure the person of another, shall be fined under
this title or imprisoned not more than five years, or both.
(d) Whoever, with intent to extort from any person, firm,
association, or corporation, any money or other thing of value,
transmits in interstate or foreign commerce any communication
containing any threat to injure the proper or reputation of the
addressee or of another or the reputation of a deceased person
or any threat to accuse the addressee or any other person of a
crime, shall be fined under this title or imprisoned not more
than two years, or both.
------------------------------
Date: Sat, 18 Feb 1995 21:28:20 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 5--HACK - WELL/Mitnick FAQ (fwd)
---------- Forwarded message ----------
[mod's note: Kevin Mitnick's arrest was connected with the
investigation of intrusions on the WELL, a conferencing system in
Sausalito, California. The WELL has issued a press statement in the
form of a FAQ]:
The WELL : FAQ (Frequently Asked Questions) Sheet for Press
Q. When did The WELL first become aware of the unauthorized activity
on its system?
A. Friday, January 27th.
Q. How did you discover it?
A. A routine system check.
Q. What actions did the WELL take to help track the suspect?
A. Our technical staff began monitoring and analyzing the situation
over that weekend. By Monday, we had contacted Computer Emergency
Response Team (CERT), The FBI, Sun's Security Team, Tsutomo Shimomura
of San Diego Supercomputer Center, the Board of Directors of The
WELL, representatives of The WELL community and EFF to discuss our
appropriate response. We also contacted other Internet service sites
who we believed were compromised. Our main objective was to
understand risks, options, and factors affecting our system security
and Net-wide responsibilities.
After discussing the situation with the above groups, and carefully
considering our options and responsibilities, we made the decision to
contact the U.S. Attorney's Office and to cooperate with Tsutomo
Shimomura in apprehending the intruder. We did this in an effort to
foster greater security on the global net.
We initiated round-the-clock staffing to monitor the illegal
activity. WELL technical staff were joined by Mr. Shimomura and his
associates to help trace the suspect using sophisticated monitoring
software that he supplied.
At no time was the FBI onsite at The WELL or involved in monitoring
at our site.
Q. What was the chronology of events at The WELL the day leading up
to the arrest of Kevin Mitnick?
A.
Tuesday, February 14, 2:30 pm PST
WELL technical staff, which had been monitoring the activity for
nearly 18 days, notices that the cracker has erased information on
one transaction file on The WELL. The transaction file (there are
dozens of accounting files on The WELL) contained user log-on data,
and was a file which is stored elsewhere and backed up regularly.
WELL decides to bring the system down so we can re-build the damaged
file and do further investigation. WELL staff shuts down WELL
computers.
Tuesday, February 14, 3:00 pm PST
Technical staff positively determines that it is only one accounting
file that has been affected. Approximately three hours after the
incident the damaged file is rebuilt.
Tuesday, February 14, 5:00 pm PST
Shimomura and assistants are contacted, and confirm with The WELL
technology team that the cracker appeared to have made a typing error
when he zeroed the one accounting file. Shimomura reports that they
are hours from catching the suspect.
Tuesday, February 14, 8:30 pm PST
WELL puts system back up. Monitoring continues in full gear.
Tuesday, February 14, 10:30 pm PST
Kevin Mitnick is arrested in Raleigh, North Carolina.
Q. What other sites were affected?
A. In the interest of their privacy, we will not say. We believe
that at least a dozen sites were compromised.
Q. What are The WELL's normal security procedures?
A. The WELL follows normal UNIX and Internet system security
procedures including, but not limited to, implementing changes as
recommended by CERT advisories, security patches as available from
vendors (e.g. SUN, Cisco), regular use of system security diagnostic
software, including "crack" and other appropriate security related
measures. We feel it is inappropriate to enumerate all our security
measures in a public forum.
Q. Did the cracker get WELL members' credit card information or
personal files?
A. To the extent that we are able to determine, no credit card
information was accessed by the intruder.
We monitored nearly every keystroke of the cracker. A total of 11
accounts were compromised by the intruder, and we have contacted all
of the account holders. In general, the cracker was not interested
in information on The WELL itself, but used the WELL for storing
files from other sites.
Q. Wouldn't have changing all members' passwords have secured the
system?
A. Fundamentally, it wouldn't have made any difference. The tools
used by this cracker would not have been defeated by changing
individual passwords. Additionally, we have no information that
would lead us to believe that member's passwords had been cracked or
distributed.
Q. What exactly were you monitoring and who was doing this?
A. We were tracking network transactions, e.g.. ftp, smtp, telnet
etc. to and from systems known and/or suspected by us to have been
compromised. We added additional sites as we learned about this.
Those monitoring our system included The WELL tech staff as well as
Andrew Gross, a consultant from Shimomura's office.
Q. What are you doing to strengthen the security of The WELL?
A. We've purchased a new main server, a Sparc 1000e. We're
re-installing application software from binaries, implementing
one-time (DES) password protection for critical including root
passwords, and requiring every user on the system to select a new
password (adhering to standards that make password cracking more
difficult). We are continuing close liaison with Sun specialists
and other system security specialists and advisors to examine
techniques used by the cracker to gain system access and addressing
these system weaknesses.
The WELL plans to install the new Sparc 1000e on Monday, February
20th.
------------------------------
Date: Mon, 13 Feb 95 07:36:16 EST
From: Frank Tirado <SYSADMIN@ERS.BITNET>
Subject: File 6--Re: Banished CPU BBS - commentary
CuD is to be commended for presenting articles from all sources,
regardless of how much we may disagree with them. A case in point is
the article by Dan Gannon, forwarded by David Smith.
Freedom of speech is a right of all individuals, even the hate
mongers, the apologists and the revisionists. To curtail their right
to speak out is to risk having our own freedoms curtailed. Contrarian
views are necessary since they provide a yardstick against which we
measure the rightness of our own beliefs. In fact, contrarian views
have often been proved correct; for example Columbus proved the world
was not flat, the Wright brothers proved that heavier than air flight
was possible.
Having said that, however, I must add that my heart bleeds for Mr.
Gannon and the Banished CPU. I believe that he and others of his kind
should be allowed to express their opinions in an open forum if only
so that those opinions can refuted by the historical record. Frankly,
no amount of revisionism can change the facts: Nazi atrocities
happened and Jews were the main victims of Nazi pogroms.
It is no favor to allow Nazi revisionists the full benefit of freedom
of speech. If their actions are overt, they can be watched. If they
express their beliefs in an open forum, they can be refuted.
Ultimately, they will reveal their true nature: bigots and hate
mongers.
Finally, Nazi revisionists serve a very useful function: they keep
present the horrors of the Holocaust and remind us that, if we are not
vigilant, it could easily happen again. To us.
------------------------------
Date: Thu, 23 Oct 1994 22:51:01 CDT
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 7--Cu Digest Header Info (unchanged since 18 Feb, 1995)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: Bits against the Empire BBS: +39-461-980493
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu:80/~cudigest
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #7.15
************************************