Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 08 Issue 93
Computer underground Digest Tue Dec 31, 1996 Volume 8 : Issue 93
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Shadow Master: Stanton McCandlish
Field Agent Extraordinaire: David Smith
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
CONTENTS, #8.93 (Tue, Dec 31, 1996)
File 1--Unamailer Attacks on Christmas Day
File 2--Gray Areas hit by Mailbomb at Compuserve
File 3--The xchaotic story (Re Xmas Mailbombings) (fwd)
File 4--Kevin Mitnick placed in solitary
File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996)
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
---------------------------------------------------------------------
Date: Fri, 27 Dec 1996 23:04:35 -0500 (EST)
From: ptownson@MASSIS.LCS.MIT.EDU(TELECOM Digest Editor)
Subject: File 1--Unamailer Attacks on Christmas Day
Date--Fri, 27 Dec 1996 05:59:05 PST
From--Eric_Florack@xn.xerox.com (Florack,Eric)
Subject---Unamailer Strikes on Christmas
Some interesting notes about mail-site security in this news dispatch.
An interesting read, but perhaps a warning, as well. Passed onto all
of you without further comment:
/E
-=-=-=-=-=-=-=-=-=-=-==-=
CyberWire Dispatch / Copyright (c)1996/ December 26, 1996 /
Jacking in from the "Spam in the Stocking" Port:
Unamailer Delivers Christmas Grief
by Lewis Z. Koch
Special to CyberWire Dispatch
"johnny xchaotic," also known as the "Unamailer," is back, and
twenty-one individuals -- many of whom are deeply involved in the
Internet ---journalists, the heads of computer companies such as
Mircrosoft, politicians, and religious figures -- received a "denial
of service" Christmas present they wished they didn't have.
johnny, and possible friends of johnny, effectively halted these
individuals' ability to send and receive E-mail, a denial of service
attack which may take days to restore.
Among those hit were prominent journalists including magazine
columnist Joel Snyder, because, in xchaotic's words,"your last article
in 'Internet World' places all the blame of my actions on an innocent
person." Also hit was the magazine's editor Michael Neubarth because
of his failure to "apologize" for what were termed journalistic
errors.''
Political figures, such as former Presidential candidate Pat Buchanan
and U.S. Senate wannabe David Duke, also were targets. Religious
figures such as Pat Robertson and Billy Graham were subject to e-mail
bombings, as were members of the Church of Scientology and members of
the KKK.
Microsoft's Bill Gates, several people from the cable channel MTV also
were among those apparently attacked. Others hit include Carolyn
Meinel who operates a "Happy Hacker" mailing list, the Klu Klux Klan,
MTV and the Nazi party.
All told, 21 individuals were hit, some, like Gates for the second
time. This is the second time in six months that the work of one or
more individuals has exploited relatively simple vulnerabilities in
Internet e-mail lists.
The first attack, in August, targeted more than 40 individuals,
including Bill Clinton and Newt Gingrich and brought a torrent of
complaints from the people who found their names sent as subscribers
to some 3,000 E- mail lists. By comparison to the Christmas attack,
even that relatively modest attack sent enough e-mail to the targeted
recipients that it effectively halted their computers' ability to
process the messages.
This attack is estimated to involve 10,139 listservs groups, 3 times
greater than the one that took place in the summer, also at xchaotic's
instigation. If each mailing list in this attack sent the targeted
individuals just a modest 10 letters to the subscribers' computer
those individuals would receive more than 100,000 messages. If each
listing system sent 100 messages -- and many do -- then the total
messages could tally 1,000,000.
Once again, johnny xchaotic has offered an "open letter," given to
this reporter before it was scheduled to be posted throughout the
Internet, as a way to explain the reasons behind the attack. He also
taunted the FBI, telling the agency not to "waste tax dollars trying
to track me" because "there are a lot more dangerous people out there
you should be concentrating on." (The complete letter will be
released shortly to the Net by johnny.)
The open letter, and the information outlining the e-mail blast, were
give to this reporter as the "attack" was concluding. The attack began
the evening of December 24 just before midnight and took four hours,
eight minutes and twenty-nine seconds.
"They [listserv-based mailing lists] could stop this kind of attack
tomorrow," one source close to johnny said, "if they only took the
simplest of precautions --like authentication." Authentication is a
means by which the listing system, instead of agreeing to the
''subscription'' and then automatically forwarding tens or hundreds of
letters to the subscriber, would first ask if the person really wanted
to subscribe. This ''verification'' could come as an electronic mail
message to the subscriber asking for confirmation.
If this process had been in place, someone subject to an E-mail denial
of service attack would only receive one letter from each list-- that
one being the authentication confirmation query -- do you really want
this E-mail -- before sending on 10 or 100 messages.
"They're either too lazy or too dumb to do that -- so they have to pay
a price," this source said, indicating that the attacks would continue
until the administrators "get it right," indicating that johnny and
his friends want to pressure administrators into authentication.
In these kinds of instances, individuals who have been hit wind up
quickly canceling their e-mail accounts, thus passing the
responsibility for canceling the "subscription" back to the list
administrator. Many suspect the authentication-confirmation process is
viewed by listserv systems administrators as an inconvenience and
confusing to the subscriber and so, they just avoid it.
The attack, however, may be a violation of federal law, punishable by
up to five years in prison, or $250,000.00 in fines or both. While
there are techniques for tracing this kind of attack when there is
advance warning, knowledgeable sources say that this kind of attack is
very difficult to trace once the attack has occurred.
johnny xchaotic has been labeled a 'Net terrorist,' which, according
to some, debases the meaning of the word "terrorism." No one knows
who johnny is. He was misidentified earlier by Internet Underground
magazine as a well known hacker who calls himself "se7en." This
identification proved false.
One person close to "johnny xchaotic" said the FBI and Secret Service
had been contacted about the illegality of this kind of hack but said
they had no interest in this kind of "Net" attack. "We have bigger fish
to fry," was the response from law enforcement officials, according to
this person. This attitude was confirmed by a former federal prosecutor
who said the few federal investigators who understood computers and the
Internet were stretched thin in their attempts to apprehend serious
cyber-criminals, or to pursue high profile but relatively unimportant
cases against hackers such as Kevin Mitnick. There has been a tendency
on the part of law enforcement and the media to grossly overestimate the
monetary damage caused by hackers.
"johnny" and those close to him made it clear that there would be a
continuation of these kinds of email "denial of service" attacks.
These same sources say those few Federal investigators with the Secret
Service and the FBI who are computer literate and savvy about hacking
are stretched thin in attempts to solve serious multimillion dollar
computer crimes, the vast majority of which are committed by insiders
against the companies they work for.
It is far easier, these sources say, to track down, arrest and jail
16-year-old hackers who brag about their exploits to friends and fellow
hackers than to track down a true professional computer cracker on
assignment from one company to search and steal the files of a
competitor company. While it may take up to three years to investigate
and prosecute one important computer thievery case, teenage hackers can
be arrested every few months, thus improving the "stats" by which the
FBI and other agencies make their mark and their budgets.
This repeated E-mail denial of service attack will be sure to reignite
the debate about the "moral" issues surrounding hackers and hacking.
What may be ignored -- again --is the failure to rectify the problem
after the first attack back in August. Immediately following the first
E-mail bombing attack, the Computer Emergency Response Team (CERT) was
quick to tell the media that while they had no "solution," they had
"hopes" they would be able to "limit the impact" of these kinds of
attacks. Today's three-fold attack showed that a six month period of
study "hoping to limit the impact" has been futile.
Vital communications do not appear to have been slowed down. The attack
is a major "inconvenience" to be sure. Others argue that "complacency"
is the only true victim of this attack.
The temporary inconvenience caused by a few days loss of E-mail
privileges might seem to pale in significance with those who were killed
and maimed by the terrorists' bombing of the Federal Building, in
Oklahoma City, or at the World Trade Center in New York, or in Atlanta
at the 96 Olympics, or those who opened packages from the Unibomber and
were killed.
Prominent government officials like U.S. Deputy Attorney General Jamie
Gorelick have called for the development of the equivalent of a
"Manhattan project" to stop hackers, though the specifics of what kind
of "bomb" Gorelick would develop and on whom she would drop "the bomb"
are vague.
Unsafe at Any Modem Speed
On December 16, a computer attack against WebCom knocked out more than
3,000 Web sites for 40 hours, curtailing Website shopping. The attack
--a "SYN-flood" -- sent as many as 200 messages a second against the
WebCom host computer. This was the same kind of attack that brought down
the popular New York Internet provider Panix for more than a week in
September.
While Seattle computer security consultant Joel McNamara is sympathetic
toward WebCom's users problems, he allows less leeway to the company.
"The SYN-flood denial of service attack has been known for months, and
there are a variety of solutions for addressing it," McNamara said, "I'd
be curious as to what, if any, security measures WebCom, a large
provider, had in place to deal with a well-known SYN-flood attack. If I
couldn't conduct business for 40 hours, I'd have some serious questions
to ask."
McNamara believes a great deal of the responsibility for the success of
these kinds of known attacks rests on the shoulders of managers and
systems administrators who do not fully "understand the implications of
poor security practices. While the industry hasn't seen this happen
yet, it's just a matter of time before a customer files a lawsuit
against a service provider because of damages caused by ineffective
security," he predicts.
FBI agents have been undergoing some education in computer related
crimes, but sources say the educated ones are few in number and burdened
by too many cases. On the other hand, the FBI has singled out small but
prominent hackers for arrest and prosecution, hoping the jailing of
these individuals who are well-known to the Net would be a deterrent to
other younger people considering hacking. The recent adolescent-like
hacking of the Department of Justice Web site seems to indicate that
hackers aren't all that deterred.
There are other indications that Web page hacks are going to become more
political, and perhaps even more dangerous than in the past. The recent
hack of the Kriegsman Furs company Web page by animal rights activists
indicates one new, sophisticated path. In this attack, the hackers left
a manifesto, as well as links to animals rights sites throughout the
Web. How easy was it to do? "Security for the site was extremely weak,"
says McNamara, "The commonly known PHF exploit was likely used to
retrieve a system file, which contained a series of easy to crack
passwords." Presto, chango. Pro-fur into anti-fur.
"It's too easy to pass the blame off on hackers," McNamara says. Like
the keys in the car or in the front door, "maintaining an insecure site
is just an invitation to problems." Those who were responsible for
today's denial of service attack were careful to repeatedly point out to
this reporter how "unsophisticated" their attack was and how easily it
could have been avoided if the list managers had only taken minimal
precautions. "It's kind of like buying new locks and getting an alarm
system after everything in the house is stolen. Sure it will probably
prevent it from happening again, but if you took the precautions in the
first place, the damn thing wouldn't have occurred," he concludes.
--------------------
Lew Koch can be reached at: lzkoch@mcs.net
------------------------------
Date: Tue, 31 Dec 1996 10:27:11 -0600 (CST)
From: Gray Areas <greyarea@gti.gti.net>
Subject: File 2--Gray Areas hit by Mailbomb at Compuserve
((MODERATORS' NOTE: Netta Gilboa, publisher of Gray Areas
Magazine, reports Compuserve's response to her queries about the
Christmas mailbombing))
gray areas got hit at out cserve acct over xmas.
cserve has chosen to deny this has ever happened there before
even though i know of at least 4 users there (including ross perot
and rush limbaugh who were definitely hit in the past).
cserve has refused to check the sendmail headers, to fix the
problem, to credit us for the time spent unsubscribing (cserve
charges by the minute to be online writing or reading mail), etc.
we don't even know the full extent of the newsgroups we got subscribed
to because cserve only stores 102 pieces of mail at a time :)
we feel cserve was grossly negligent by not having anyone with access to
the mail servers available on xmas (traditionally one of the biggest
hacking days of the year) and by having the entire corporate billing
dept. and corporate headquarters closed on xmas. by contrast, smaller
isp's like mindspring notified all of their users that their full
staff would be working on xmas because of possible problems like this
one.
we wish to publicize compuserve's abysmal response, the fact that
they lied knowing i was tape recording the calls regarding previous
incidents, and we are curious as to whether anyone else got hit at
the same time as generally that is the case with reporters... we may
be contacted at grayarea@gti.gti.net or grayarea@well.com for
however long those addresses hold out ;)
------------------------------
Date: Sun, 29 Dec 1996 14:10:14 -0800 (PST)
From: Declan McCullagh <declan@eff.org>
Subject: File 3--The xchaotic story (Re Xmas Mailbombings) (fwd)
((MODERATORS' NOTE: From the fight-censorship discussion group,
one of the best on the net, comes the following forwarded
commentary, allegedly written by the Xmas mailbomber))
=================
[A followup to the Christmas Day email bombings. --Declan]
---------- Forwarded message ----------
today's act of "cyber-terrorism" is brought to you by the
letters 'A', 'D', and the number '1'. and the person who
brought it to you? you know who you are. <p>
before i continue, lets have a quick look at a few interesting
comments from past articles as well as some notable quotes
from various fans. <p>
"What's striking to me is how cowardly they are; anonymous,
I mean, if you have something to say, say it." <p>
- John Markoff <p>
[signing a letter isn't quite anonymous John.] <p>
"We're on Defcon 4 alert here, We expect an attack, possibly
over the weekend. We said a lot of things in our special report
the unamailer will not like. We called him names." <p>
- Stephen Baldwin <p>
[if i don't stop, will you call me more names?
trying to insult me through name calling is quite
childish of you. amusing, but childish.] <p>
"Clearly the guy's a nutcase, This guy should get a life instead
of running around annoying people.",p>
- Helena Kobrin <p>
[well, it looks like you and I have something in
common. difference? you run around harassing people for
a living.] <p>
"I hope they hang this guy by some vital personal part, I don't
know what he's trying to prove. He seems to be a smart guy with
too much time on his hands." <p>
- John Markoff <p>
[thanks for the compliment, i think.] <p>
"I hope they fry the little fuck. Can I say 'fuck?'" <p>
- Michelle Slatalla <p>
[cry for me you insipid bitch.] <p>
from the Netly News: He also calls himself, "Final Result." Desperate <p>
for publicity from the same people he ridicules,
FR posted a manifesto of sorts to.... <p>
[can we not read the last paragraph of the first letter i
posted? that was a random hacked account. we had nothing to
do with the name on it.] <p>
from every source: "johnny xchaotic" <p>
[brackets indicate a group affiliation, not a last name.] <p>
from josh at Netly: We wrestled long and hard over the journalistic
ethics of printing your "Manifesto." In the end,
we decided we had to do it, if only to get more
hits. Surely a man with your keen instincts for
the media spotlight can understand that, eh,
SpamBoy? <p>
Give it up, Unamailer. Come in from the cold. We're
waiting for your call. <p>
[i would guess this qualifies as the "names" Stephen talked
about. if so, that was really pathetic.] <p>
and finally, after soliciting my article for Netly, Noah
decides to let Philip Elmer-Dewitt take a few cheap shots at
my article, without giving me a chance to reply. if memory
serves, he apologized on the phone for that, but either way
it was a cheap move. so, my reply to PED: <p>
>going to need quite a bit of work. I find the "writing
>style," as the author calls it, generally flabby and <p>
come on PED, you should at least be able to admit that it is a little
different than the lock and stock method you and the others use. let me
tell you what kind of excitement YOUR writing brings out. <cough> <p>
>undisciplined. Why "certain well known public figures"?
>If they're public figures, they're well known by <p>
duh. how much do you know about the head of the NSA? he is a textbook
definition of 'public figure', yet you probably don't even know his name.
<p>
>definition, no? If he mailbombed the President, why not
>say so? Also, note the overuse of the first person
if you stole a car, would you tell the whole world? no. <p>
>singular. Why all these "i"s? We are not e.e. cummings. <p>
i speak for more than myself. <p>
>me. More important: I remain unconvinced by his central
>argument. How can this possibly be the "first time in
>history" that the average joe has the technical means to
>take revenge? Has the author never heard of
>saboteurs? The Luddites? Political assassins? Peasants
?have legitimate grievances; how far can a people's <p>
gee. are you trying to provoke me with this unfounded stupidity?
remember, we talked on the phone. i know you are not as inept as you
sound right now. since when have the luddites been grouped as a
'technical revenge'? yes, that does sound stupid now that you think about
it, huh? how many assassins have hit their mark AND gotten away to tell
about it? a very low percentage. saboteurs is your best argument, but
coupled with the rest is pathetic. look at the above again and think
about it. the 'average joe' has the means to enact revenge, without
getting caught, and doing equal or greater damaage. it just hasn't been
that way until now.<p>
>revolt against a bad ISP? Finally, can we do something <p>
incomplete sentence PED. and you insult MY writing? <p>
>about the byline? Johnny [xchaotic] seems so early
>eighties. Hasn't this guy read anything since Neuromancer? <p>
if you recall, i was correcting your outdated terms in your magazine.
once again, another cheezy attempt to provoke me or something. i can say
one thing about the early eighties comment though.. at least i was on the
net then. how about you? <p>
>On second thought, maybe we should just tell him his
>story was spaced out by breaking news and thank him for
>thinking of us. <p>
how unappreciative. i called you on my dime, and called back when you
asked. i did the same for Steve at IU, Noah at the Netly News, as well as
other journalists. i even wrote the article requested of me regarding all
this. instead of insulting your computer literacy, i chose to shed some
light on a popular subject and show another viewpoint. i'm afraid that is
something that has long since escaped you and other journalists. <p>
so, that leaves me with today's letter (not manifesto). i
would like to first give thanks to a few journalist types
(believe it or not). <p>
Steve Knopper. Steve has shown more than his share of
proffesional courtesy in the past. he also has shown
that he is more than fair when writing articles by
getting both sides of the story as well as remaining
objective. <p>
Noah Robischon. despite a few minor annoyances, you too
have extended some professional courtesy after a few
poorly worded articles at the beginning. if you could
put a leash on josh, i think you would be more
successful. <p>
Lewis Koch. thank you for going out of your way to get
both sides of the story. <p>
the state of the net hasn't improved of course. however, i can
say the quality of journalism has gone up one small step since
my last letter to the internet community. i have noticed more
articles being written that are technically accurate, quote better
sources, or withold the typical bias found in most articles. <p>
that alone tells me something is going right. wether or not i
had something to do with it doesn't really matter. as long as
better journalism continues, the more i lay off. of course,
there are plenty of other people who deserve some special
attention so my jihad continues. <p>
in the mean time, let me give thanks and/or greets to the
following people. <p>
P0E: hey babe! this act of terrorism is for you!
keep up the great music, and feel free to
write a song about me. :) <p>
FBI: don't waste my tax dollars trying to track me.
there are a lot more dangerous people out
there you should be concentrating on. <p>
on a separate tangent..<p>
seems that since the late 50s, the government has been doing
its best to keep young citizens from exploring their full
potential. rather than look at what they do and use it as
a template for fixing problems, they would rather put all of
their energy into jailing those that explore. it started
with "beatniks", moved to "radicals", and has landed on
"hackers" <p>.
people like me point out problems in the system. wether it is
the social system or computer system, it ends up with the same
result. instead of responsible parties fixing the problem,
they are much too intent upon trying to place blame on the
people that found the problem. don't make excuses, fix
the problem. <p>
one last thing before we move on. so many articles today say
something along the lines of "the average person is vulnerable
to these evil terrorists". wrong isn't quite the word for
it. yes, everyone can be a victim, but why? don't even
presume you are important enough to occupy my time or anyone
elses for that matter. as usual, there are always bigger and
better fish to fry out there, why stop on the first step of the
ladder? <p>
on to the bombs... <p>
76042.3624@compuserve.com Netta Gilboa
what does it take to make you realize you are not part
of the scene, and that we don't want you in it? all you
do is cry about the injustices committed against you,
but you won't take the hint and go away. <p>
askbill@microsoft.com bill gates <p>
you still suck.<p>
bb748@FreeNet.Carleton.CA neo-nazi recruiter <p>
misfitx@gnn.com <p>
micetrap@cyberenet.net <p>
the net is not a place to recruit more neo-nazi chimps. <p>
cmeinel@swcp.com carolyn meinel <p>
your happy hacker mail list is demented. you are trying
to get those people busted, aren't you? you give them
enough rope for them to hang themselves with, and then
try to preach about not using the information. give up. <p>
crunch@well.com john draper <p>
shouldn't have tried to narc me to the feds. and you
definitely shouldn't have bragged about doing so. <p>
feedback@mtv.com mtv <p>
loveline3@aol.com <p>
minutes120@aol.com <p>
mtvnews@aol.com <p>
yomail96@aol.com <p>
you still censor your videos. when will you realize the
hypocrisy of your actions? you talk about freedom of
speech, but don't practice it. <p>
grossa@sdsc.edu helped track mitnick <p>
mis@seiden.com <p>
each of you helped track down kevin mitnick. in the
process, you helped another felon gain public acceptance
creating a double standard. you should have been going
after the real crook: tsutomu <p>
hud@netcom.com Co$ Supporter or Member <p>
jaarobin@aol.com <p>
koreenb@jovanet.com <p>
vjohnson@psyber.com <p>
the cult of scientology needs to be shut down. it is a
criminal organization and should be treated as such. <p>
jms@opus1.com joel snyder <p>
your last article in 'internet world' places all the
blame of my actions on an innocent person. needless
to say, you were wrong. quality journalism is what
you should strive for. <p>
neubart@iw.com editor of joel's article <p>
unremorseful bastard. you put someone else through a
lot of shit over my actions, and didn't have the balls
to apologize for it? <p>
kkk@members.iglou.com kkk <p>
have a warm feeling knowing a nice white boy did this
to you. <p>
root@duke.org david duke <p>
politics are fucked up already. no need to drag even
more fucked up individuals into the fray. <p>
toddpeak@usa.net todd stauffer <p>
don't write about the internet until you actually know
what it is. you are way too sheltered to make such
naive statements about the net. <p>
root@cbn.org pat robertson <p>
abradshaw@graham-assn.org billy graham <p>
"doing my part to piss off the religious right" <p>
root@buchanan.org pat buchanan <p>
what part of "seperation between church and state" is
so hard to understand? changing the names of the days
is just about the most fanatical thing i have heard in
my life. <p>
once again, the internet can not be controlled by a single
body. the religious fanatics fall into that category. as
long as you try to control the net, people will slip
through your fingers. the tighter your control, the more that
slip through. i am one of many.. <p>
angry johnny<p>
------------------------------
Date: Sat, 28 Dec 1996 18:14:57 -0800
From: Rich Burroughs <richieb@teleport.com>
Subject: File 4--Kevin Mitnick placed in solitary
Source - fight-censorship@vorlon.mit.edu
More on Kevin Mitnick.
http://cause-for-alarm.com/flash/mitnick.html
>>>>>>>>>
[updated Saturday, 28-Dec-96 17:48:32 PST]
Kevin Mitnick was placed in solitary confinement
yesterday for possessing reading materials related to
hacking. Mitnick, whose hacking exploits and capture
generated a media frenzy, is currently being held in the
Metropolitan Detention Center in Los Angeles. This is
not the first time he has been placed in solitary there.
I first learned of Mitnick's move to solitary through
the following email, sent by Fernanda Serpa:
"URGENT!!!
KEVIN MITNICK WAS PLACED UNDER SOLITARY CONFINEMENT
TODAY, DECEMBER 27 TH, AT 1.00 PM, ON THE GROUNDS OF
BEING A SECURITY RISK, DUE TO HIS READING LEGAL BOOKED
IN THE LIBRARY. IT IS OBVIOUS THAT HE WAS EXERCISING HIS
RIGHTS. WE ARE AFRAID THAT THE SANE THING THAT HAPPENED
IN NORTH CAROLINA IS HAPPENING AGAIN WHEN KEVIN WAS
PLACED IN SOLITARY CONFINEMENT FOR 7 DAYS AND HAD TO
WAYVE HIS LEGAL RIGHTS IN ORDER TO BE RELEASED. WE KNOW
THAT THE ONLY WAY FBI IS ABLE TO PRESSURE KEVIN IS
TROUGH SOLITARY CONFINEMENT. PLEASE, DO SOMETHING AND
INFORM THE PRESS URGENTLY ABOUT THIS SITUATION. WE ARE
DOING OUR BEST HERE.
FERNANDA SERPA
SUPPORT KEVIN CAMPAIGN"
Serpa, who maintains a web site supporting Mitnick,
further wrote me that "We do not have details about
yesterday's events concerning Kevin Mitnick..... His
cell was searched, and his personal belongings were
seized. MDC does not release any information
whatsoever.... Due to the case backgrounds, we are
concerned about Kevin's life and physical integrity."
Since receiving Serpa's email, I have confirmed the
story with a source who is knowledgeable about the
details of Mitnick's incarceration.
According to my source, Mitnick's additional punishment
came after a search of his cell revealed written
materials related to hacking, including back issues of
2600 magazine. The magazines were allegedly sent to
Mitnick by Emmanuel Goldstein, editor of 2600. Prisoners
are able to receive written materials if they are sent
directly from the publisher, and those materials are
routinely searched.
The reason the authorities gave for Mitnick's isolation?
He's a "security risk."
This latest twist in Mitnick's case begs several
questions: Why is Mitnick being punished for possessing
materials that he received through legitimate prison
channels? How can he possibly be a "security risk" when
he has no access to computers, and can't even use a
phone for anything but collect, operator-assisted calls?
Why place a prisoner in solitary confinement for their
choice of reading materials? And how much did Markoff
and Shimomura really make off of Mitnick's bust?
Ironically, several recent issues of 2600 covered the
imprisonment of Ed Cummings (aka Bernie S), a 2600
writer who was convicted of possessing a red box and
software capable of cloning cell phones. Cummings, who
was subjected to inhumane prison conditions, was
attacked by another inmate after being transferred to a
maximum security facility for "protective custody." He
received a fractured jaw and arm in the incident, and
was released soon after due to a grassroots protest
campaign. Cummings served about a year and a half in
jail.
Maybe Mitnick was reading 2600 to catch up on Cummings'
case, or maybe he was reading about how to do a SYN
flood, who knows? Either way, he wasn't going to be able
to do much with the information while behind bars.
I'll try to pass on more news about Mitnick's situation,
as it becomes available. Check back here for updates.
>>>>>>>>
Serpa's site is at: http://www.netmarket.com.br/mitnick
Kevin's defense fund is at: http://www.kevinmitnick.com/
Rich
--
Rich Burroughs, rich@cause-for-alarm.com
Editor and Publisher, cause for alarm
A web zine about electronic freedoms
http://cause-for-alarm.com/
------------------------------
Date: Thu, 15 Dec 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996)
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.
CuD is available as a Usenet newsgroup: comp.society.cu-digest
Or, to subscribe, send post with this in the "Subject:: line:
SUBSCRIBE CU-DIGEST
Send the message to: cu-digest-request@weber.ucsd.edu
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.
To UNSUB, send a one-line message: UNSUB CU-DIGEST
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)
Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
In ITALY: ZERO! BBS: +39-11-6507540
In LUXEMBOURG: ComNet BBS: +352-466893
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
URL: http://www.soci.niu.edu/~cudigest/
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.
DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.
------------------------------
End of Computer Underground Digest #8.93
************************************