Computer Underground Digest Volume 1, Issue #1.29 (Aug 19, 1990)

Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 1, Issue #1.29 (Aug 19, 1990) ** **************************************************************************** MODERATORS: Jim Thomas & Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith USENET readers can currently receive CuD as COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. It is assumed that non-personal mail to the moderators may be reprinted, unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS: File 1:: Moderators' Corner File 2:: From the Mailbag File 3:: Direction of CuD File 4:: Password checking programs and trojan horses File 5:: What is "CYBERSPACE?" File 6:: The CU in the News ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #1.29, File 1 of 6: Moderators' Comments *** ******************************************************************** Date: August 19, 1990 From: Moderators Subject: Moderators' Corner ++++++++++ In this file: 1) CRAIG NEIDORF DEFENSE FUND 2) COMPUSERVE AND CuD BACK ISSUES 3) BLOCKING OF LONG DISTANCE NUMBERS 4) PAT TOWNSON AND TELECOM DIGEST +++++++++++++++++++++++++++++ CRAIG NEIDORF DEFENSE FUND +++++++++++++++++++++++++++++ Those interested in contributing the Craig Neidorf's defense fund to help reduce his legal costs, which exceeded $100,000, should do so soon. Checks should be made out to the law firm of KATTEN, MUCHIN AND ZAVIS, and sent directly to his defense attorney: Sheldon Zenner c/o Katten, Muchin and Zavis 525 W. Monroe, Suite 1600 Chicago, IL 60606 ++++++++++++++++++++++++++++ COMPUSERVE AND CuD BACK ISSUES ++++++++++++++++++++++++++++ A limited number of CuD back issues are available for downloading in the Legal Forum of CompuServe. (GO LAWSIG) The files, called CUD1NN.ARC, are found in Library 1 (computers and law). Also available is Gordon Meyer's thesis, "The Social Organization of the Computer Underground" as CUTHESIS.ARC. Eventually we hope to have all CuD back issues available in this Forum, but the limited number of daily uploads the Forum will accept is an obstacle to accomplishing this goal in a timely fashion. We are also in the process of uploading CuD material to GEnie (General Electric Network for Information Exchange). The files will be available in the Legal SIG of that network as well. CIS and GEnie specific questions, concerning CuD availability, can be directed to Gordon at 72307,1502 (Compuserve) and GRMEYER (GEnie). Volunteers to help upload files are most welcome. +++++++++++++++++++++ LONG DISTANCE BLOCKING +++++++++++++++++++++ Last year, both PHRACK and PIRATE printed stories about the blocking of long distance numbers by Teleconnect, and included information about at least one law suit in Iowa. Since then, we have heard little about blocking long distance numbers by carriers. If anybody has information on current blocking practices or can provide evidence of continued blocking, please pass it along. Does the current dearth of information on blocking reflect a reduction of the practice? +++++++++++++++++++++++ PAT TOWNSON AND TELECOM DIGEST +++++++++++++++++++++++ Pat Townson, moderator of TELECOM Digest, has been largely responsible for the initial e-mail discussions of the CU. CuD began by publishing articles Pat was unable to include in TCD, and he was always willing to answer technical and other questions and offer advice. Whatever his own views on the the CU, Pat has been willing to air articles from all perspectives. Some of us have disagreed with his views and responded to his comments with vigor. He occasionally devoted special issues to attacks on his comments, and has never hesitated to provide others a forum for their views. Pat, we just want to say "Thanks!" ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: August 19, 1990 From: Various Subject: From the Mailbag ******************************************************************** *** CuD #1.29: File 2 of 6: From the Mailbag *** ******************************************************************** Date: Wed, 15 Aug 90 07:13 EDT From: lsicom2! Rose) Subject: Request for INTERNET site by Len Rose I would like to request an internet account on any system (east coast preferable) since it seems ames can no longer provide such a favor. Most important is ftp access without quotas. Peter Yee can be contacted at ( to vouch whether or not I was a considerate guest. I haven't asked him to vouch for me beforehand,and won't so as to make sure whoever contacts him gets his real opinion. Having an Internet account is crucial to my defense at this time. Voice phone information will be provided upon request. Thanks. Len Rose ------------------------------ Date: Thu, 16 Aug 90 17:50:00 -0500 From: Anonymous Subject: BBS virus alert (PC) This message was found on a WWIV bulletin board in Lawrence, KS alerting BBS users to avoid a file WWIVGA.ZIP which contains the Vienna Virus and was aimed at discrediting a local programmer. The "General" WWIV-Sub 100/100: ************** WARNING ****************** Name: Gary Martin #1 @9354 Date: Wed Aug 15 20:32:40 1990 ***************** WARNING *************************** Someone has created a .ZIP called WWIVGA.ZIP It claims to be a useful utility to put your computer in 43 or 50 line mode for running the BBS. THIS .ZIP CONTAINS THE VIENNA VIRUS!!!!!!!!!!!!!!!!!! The .DOC file that goes with it says that it was written by Carceris Dominus #1@9354 Castle RavenLoft. That is total bullshit. Carceris Dominus was my old handle. I've changed it since all this ^%$$@^% happened. BEWARE OF THIS FILE! DO NOT RUN IT!!! A user on my board uploaded this file and asked my why it doesn't work right. That user turned out to be a fake account. However I also got a call from a Sysop back east who found the virus using SCAN 66. After I read the docs I knew that some jerk had doctored up this thing to try and discredit me. (I am the author of Trade Wars 2002) I have since been working hard to tell everyone to avoid this file. ++++++++ Please pass this message along to others in the WWIV community The "General" WWIV-Sub ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: August 19, 1990 From: Moderators Subject: Direction of CuD ******************************************************************** *** CuD #1.29: File 3 of 6: The Direction of CuD *** ******************************************************************** "Never trust anyone over thirty" leapt to my mind as soon as Jim pointed out that this would be our 30th issue of C-u-D. I brought this up to a friend (and C-u-D reader) on the way to work one morning. "Hey, great", he replied. "You know Jesus Christ didn't begin his evangelism until he was thirty, think of all the great things that could lie ahead for you!" Hmmm...I was just starting to agree with him when he added that three years later He was crucified. The digest was begun as an experiment, the long and heated discussion about CU issues had worn out its welcome on Telecom Digest so Pat Townsen suggested we form our own discussion forum. Jim took up the challenge and drafted (literally) me to help. Neither of us actually believed that it would last longer than three or four issues but we hoped it would. Now the digest has grown into a huge job and has a direct mailing list of over 400 readers (which doesn't begin to count those who get it from secondary sources and news echos). Our intent was to provide a free exchange of ideas and research into the Computer Underground. At the time the view (which has since been categorized as "hack symp") that the illegalization of "hacking" should be approached with caution was, well, not very well represented in the press, courts, law enforcement, and elsewhere. But with the efforts of the readers of C-u-D and 2600, the mainstream press and computer industry has picked up the cause and there is some hope that the "problem" of the Computer Underground will be addressed with accuracy and fairness. There are many issues and angles to be discussed and debated. The "Phrack Inc" case, which was our initial rallying point, has been settled. The other "LoD" busts are either in stasis or are being addressed by the professionals. It's time for the town criers, C-u-D, to take a breather and return to our academic research into the CU and other areas of personal interest. The C-u-D experience has given us much to work on. Many thanks to our readers, our friends, and even our critics. This, our 30th issue, will close volume one. The first issue of volume two will appear sometime in the future. Illegitimis Non Carborundum! GRM ******************************************************************** We are not sure if CuD has outlived its purpose. If so, it will be appearing less frequently, serving primarily update functions. If not, we must now reflect on goals and future direction. As Gordon observed, we began as an "overflow conduit" for TELECOM Digest for articles relating to the Phrack situation, and the goal was to stimulate discussion of issues and provide an alternative view to the one presented by the media and law enforcement. We believe we have had several major successes, especially in making visible the questionable tactics of law enforcement in some of the alleged computer abuse cases. We focused only on those in which the targets of federal agents seemed to exceed the alleged "crime" and in which, from the knowledge we obtained, the charges (or lack of them) seemed far beyond what evidence would show. We did not claim any to be innocent. Rather, we suggested that the "official picture" was out of focus, and something was not quite right. We have not, nor will we, condone predatory behavior, and our concern has been for the broader issue of civil liberties rather than for a "right to hack." We have been accused of being "mean-spirited," "non-objective," and poor journalists. Perhaps all are true. But, we never pretended to be journalists: We are gadflies attempting to raise issues, and we feel our facts were generally accurate. We have learned from both critics and advocates, and we have come to appreciate the grey area in high tech crimes between legitimate enforcement and over-zealousness. We have apologized for some excesses, modified our views on others. That seems to be the primary difference between CU types and the "other side." We have no wish to polarize, but "sides" were thrust upon us. That "other side" does not have "apology" in its vocabulary, nor, judging by continued public statements, has it benefited from the dialogues occuring in and among CuD, the EFF, The Well, 2600 Magazine, TELECOM Digest, or the many other forums. Their hyperbole remains strident, and then others are faulted for responding. It is not CU supporters who have confiscated some equipment without strong justification, hidden behind "privacy protections," misled the public, foamed to the media, engaged in initial ad hominem attacks, engaged in disinformation, or nearly ruined a young man's life. As long as "I'm sorry," or "we were wrong" isn't in the vocabulary of some, as long as there seems to be no reflection on legitimate Constitutional issues, and as long as the view that "professional image" supercedes "doing the right thing," there is probably a role for CuD. We will be rethinking our direction, and we hope to continue combining general-interest information with more structured analyses of the relationship between computer technology and the social, legal, and ethical issues that arise. We hope readers will provide us with some feedback to guide us. We begin a new series of CuD with Volume II beginning next issue to symbolize the closing of one set of issues and the beginning a new set. Jim Thomas ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: Tue, 14 Aug 90 00:11:38 EDT From: tmsoft!moore!gompa! Ames) Subject: Password checking programs and trojan horses ******************************************************************** *** CuD #1.29: File 4 of 6: Password Checkers and Public Domain *** ******************************************************************** To the CUD people: Again, I find I must write as a result of an article in CUD. Last time, I had read the indictment of C. Neidorf, alleging, for example, that the software documentation in question was worth thousands of dollars, and that it was closely held and proprietary. My research, which is done for technical reasons only, indicated the truth to be entirely different - thus I had to speak up. So it is in the Len Rose indictment. There are two points I'd like to address: firstly, Ken Thomson, Bell Labs employee and author of UNIX, publicly admitted that he had installed a trojan horse in both the LOGIN.C program and in the C compiler. His paper to the ACM, presented while accepting a programming award, describes this trojan horse. The paper is, "Reflections on Trusting Trust", published in Communications of the ACM. Secondly, there are several password checking programs in circulation of the type described in CUD #128. The one I have here was obtained from ROGUE.LLNL.GOV by ftp. This is a U.S. government VAX computer. Here is an excerpt: =================================================================== >From CHECKPASS documentation: =================================================================== This program checks users passwords against some common words and names that are often used as passwords and against an on-line dictionary. The "idea" for this is based on the Arpa Internet Worm that made the news this past year. A report on the INFO-VAX Mailing list (see WORM.MES) talked about how the worm broke into accounts. The idea of checking passwords, for security reasons, came from that report. To run the programs you need to have enough privilige to read the information on the users to be checked from the UAF file using SYS$GETUAF functions. Both primary and secondary passwords are checked if they exist. The users to be checked are listed in the file USERS.DAT. The first line in USERS.DAT is the minimum password length for a password (read from the various source files) to be tested. The program allows up to 500 users to be listed. All the usernames are read in at th start of the program and the appropriate data read from the UAF. If a password is found it is stored in a data array and written out in a report after all the words in the dictionary and passwords files have been tested for all users. PLEASE NOTE that the LEXIC files are not supplied here. These files are part of the VASSAR Spelling checker program and make up the dictionary for that program. Those files need to obtained or that part of the program commented out before using this program. =============================================================== I encourage you to retrieve the entire package, to see for yourselves how similar this program is to Rose's. Robert Ames rca@gompa.UUCP P.O. Box 724, Station 'A', Toronto, CANADA ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: August 19, 1990 From: Reprint Subject: What is "CYBERSPACE?" ******************************************************************** *** CuD #1.29: File 5 of 6: What is CYBERSPACE? *** ******************************************************************** ++++++++++++++++++++++++++ Three "cyber-articles" appeared in the last few issues of CuD, prompting some to ask what it all means. The following article is old, but remains a nice overview, so we reprint it here. +++++++++++++++++++++++++++ "Viewpoint", by Paul Saffo _Communications of the ACM_, June 1989, volume 32 number 6, page 664-665 Copyright 1989 by the Association for Computing Machinery. Posted with permission. "Consensual Realities in Cyberspace" More often than we realize, reality conspires to imitate art. In the case of the computer virus reality, the art is "cyberpunk," a strangely compelling genre of science fiction that has gained a cult following among hackers operating on both sides of the law. Books with titles like _True Names_, _Shockwave Rider_, _Neuromancer_, _Hard-wired_, _Wetware_, and _Mona Lisa Overdrive_ are shaping the realities of many would-be viral adepts. Anyone trying to make sense of the social culture surrounding viruses should add the books to their reading list as well. Cyberpunk got its name only a few years ago, but the genre can be traced back to publication of John Brunner's _Shockwave Rider_ in 1975. Inspired by Alvin Toffler's 1970 best-seller _Future Shock_, Brunner paints a dystopian world of the early 21st Century in which Toffler's most pessimistic visions have come to pass. Crime, pollution and poverty are rampant in overpopulated urban arcologies. An inconclusive nuclear exchange at the turn of the century has turned the arms race into a brain race. The novel's hero, Nickie Haflinger, is rescued from a poor and parentless childhood and enrolled in a top secret government think tank charged with training geniuses to work for a military-industrial Big Brother locked in a struggle for global political dominance. It is also a world certain to fulfill the wildest fantasies of a 1970s phone "phreak." A massive computerized data-net blankets North America, an electronic super highway leading to every computer and every last bit of data on every citizen and corporation in the country. Privacy is a thing of the past, and one's power and status is determined by his or her level of identity code. Haflinger turns out to be the ultimate phone phreak: he discovers the immorality of his governmental employers and escapes into society, relying on virtuoso computer skills (and a stolen transcendental access code) to rewrite his identity at will. After six years on the run and on the verge of a breakdown from input overload, he discovers a lost band of academic techno-libertarians who shelter him in their ecologically sound California commune and... well, you can guess the rest. Brunner's book became a best-seller and remains in print. It inspired a whole generation of hackers including, apparently, Robert Morris, Jr. of Cornell virus fame. The _Los Angeles Times_ reported that Morris' mother identified _Shockwave Rider_ as "her teen-age son's primer on computer viruses and one of the most tattered books in young Morris' room." Though _Shockwave Rider_ does not use the term "virus," Haflinger's key skill was the ability to write "tapeworms" - autonomous programs capable of infiltrating systems and surviving eradication attempts by reassembling themselves from viral bits of code hidden about in larger programs. Parallels between Morris' reality and Brunner's art is not lost on fans of cyberpunk: one junior high student I spoke with has both a dog-eared copy of the book, and a picture of Morris taped next to his computer. For him, Morris is at once something of a folk hero and a role model. In _Shockwave Rider_, computer/human interactions occurred much as they do today: one logged in and relied on some combination of keyboard and screen to interact with the machines. In contrast, second generation cyberpunk offers more exotic and direct forms of interaction. Vernor Vinge's _True Names_ was the first novel to hint at something deeper. In his story, and small band of hackers manage to transcend the limitations of keyboard and screen, and actually meet as presences in the network system. Vinge's work found an enthusiastic audience (including Marvin Minsky who wrote the afterword), but never achieved the sort of circulation enjoyed by Brunner. It would be another author, a virtual computer illiterate, who would put cyberpunk on the map. The author was William Gibson, who wrote _Neuromancer_ in 1984 on a 1937 Hermes portable typewriter. Gone are keyboards; Gibson's characters jack directly into Cyberspace, "a consensual hallucination experienced daily by billions of legitimate operators ... a graphic representation of data abstracted from the banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the nonspace of the mind, clusters and constellations of data..." Just as Brunner offered us a future of the 1970s run riot, Gibson's _Neuromancer_ serves up the 1980s taken to their cultural and technological extreme. World power is in the hands of multinational "zaibatsu", battling for power much as mafia and yakuza gangs struggle for turf today. It is a world of organ transplants, biological computers and artificial intelligences. Like Brunner, it is a dystopian vision of the future, but while Brunner evoked the hardness of technology, Gibson calls up the gritty decadence evoked in the movie _Bladerunner_, or of the William Burroughs novel, _Naked Lunch_ (alleged similarities between that novel and _Neuromancer_ have triggered rumors that Gibson plagiarized Burroughs). Gibson's hero, Case, is a "deck cowboy," a freelance corporate thief-for-hire who projects his disembodied consciousness into the cyberspace matrix, penetrating corporate systems to steal data for his employers. It is a world that Ivan Boesky would understand: corporate espionage and double-dealing has become so much the norm that Cases's acts seem less illegal than profoundly ambiguous. This ambiguity offers an interesting counterpoint to current events. Much of the controversy over the Cornell virus swirls around the legal and ethical ambiguity of Morris' act. For every computer professional calling for Morris' head, another can be found praising him. It is an ambiguity that makes the very meaning of the word "hacker" a subject of frequent debate. Morris' apparently innocent error in no way matches the actions of Gibson's characters, but a whole new generation of aspiring hackers may be learning their code of ethics from Gibson's novels. _Neuromancer_ won three of science fiction's most prestigious awards - the Hugo, the Nebula and the Philip K. Dick Memorial Award - and continues to be a best-seller today. Unambiguously illegal and harmful acts of computer piracy such as those alleged against David Mitnick (arrested after a long and aggressive penetration of DEC's computers) would fit right into the _Neuromancer_ story line. _Neuromancer_ is the first book in a trilogy. In the second volume, _Count Zero_ - so-called after the code name of a character - the cyberspace matrix becomes sentient. Typical of Gibson's literary elegance, this becomes apparent through an artist's version of the Turing test. Instead of holding an intelligent conversation with a human, a node of the matrix on an abandoned orbital factory begins making achingly beautiful and mysterious boxes - a 21st Century version of the work of the late artist, Joseph Cornell. These works of art begin appearing in the terrestrial marketplace, and a young woman art dealer is hired by an unknown patron to track down the source. Her search intertwines with the fates of other characters, building to a conclusion equal to the vividness and suspense of _Neuromancer_. The third book, _Mona Lisa Overdrive_ answers many of the questions left hanging in the first book and further completes the details of the world created by Gibson including an adoption by the network of the personae of the pantheon of voodoo gods and goddesses, worshipped by 21st Century Rastafarian hackers. Hard core science fiction fans are notorious for identifying with the worlds portrayed in their favorite books. Visit any science fiction convention and you can encounter amidst the majority of quite normal participants, small minority of individuals who seem just a bit, well, strange. The stereotypes of individuals living out science fiction fantasies in introverted solitude has more than a slight basis in fact. Closet Dr. Whos or Warrior Monks from _Star Wars_ are not uncommon in Silicon Valley; I was once startled to discover over lunch that a programmer holding a significant position in a prominent company considered herself to be a Wizardess in the literal sense of the term. Identification with cyberpunk at this sort of level seems to be becoming more and more common. Warrior Monks may have trouble conjuring up Imperial Stormtroopers to do battle with, but aspiring deck jockeys can log into a variety of computer systems as invited or (if they are good enough) uninvited guests. One individual I spoke with explained that viruses held a special appeal to him because it offered a means of "leaving an active alter ego presence on the system even when I wasn't logged in." In short, it was the first step toward experiencing cyberspace. Gibson apparently is leaving cyberpunk behind, but the number of books in the genre continues to grow. Not mentioned here are a number of other authors such as Rudy Rucker (considered by many to be the father of cyberpunk) and Walter John Williams who offer similar visions of a future networked world inhabited by human/computer symbionts. In addition, at least one magazine, "Reality Hackers" (formerly "High Frontiers Magazine" of drug fame) is exploring the same general territory with a Chinese menu offering of tongue-in-cheek paranoia, ambient music reviews, cyberdelia (contributor Timothy Leary's term) and new age philosophy. The growing body of material is by no means inspiration for every aspiring digital alchemist. I am particularly struck by the "generation gap" in the computer community when it comes to _Neuromancer_: virtually every teenage hacker I spoke with has the book, but almost none of my friends over 30 have picked it up. Similarly, not every cyberpunk fan is a potential network criminal; plenty of people read detective thrillers without indulging in the desire to rob banks. But there is little doubt that a small minority of computer artists are finding cyberpunk an important inspiration in their efforts to create an exceedingly strange computer reality. Anyone seeking to understand how that reality is likely to come to pass would do well to pick up a cyberpunk novel or two. Paul Saffo is a research fellow at Institute for the Future in Menlo Park, California, and a columnist for Personal Computing magazine. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: August 19, 1990 From: Various Subject: The CU in the News ******************************************************************** *** CuD #1.29: File 6 of 6: The CU in the News *** ******************************************************************** ------------------------------ Date: Fri, 17 Aug 90 18:05:08 EDT From: Michael Rosen Subject: Airforce airman pleads guilty to computer fraud Computerworld, August 6, 1990, pg. 8: TOO MUCH ACCESS Pensacola, Fla. - A former U.S. Air Force airman, alleged to be a member of the Legion of Doom, pleaded guilty last week in U.S. District Court to possession of at least 15 access codes with intent to defraud. Peter J. Salzman, 19, an airman at Elgin Air Force Base, used an Apple Computer, Inc. IIE to enter telephone systems operated by Bellsouth Corp., Bell Atlantic Corp. and other carriers, said Stephen Preisser, assistant U.S. attorney for the Northern District of Florida. A device that logs outgoing calls indicated that Salzman was "burning the wires" without paying for the telephone calls, Preisser said. The airman is alleged to be a member of the Legion of Doom, a group of hackers under investigation by federal and state authorities. Authorities searching Salzman's home uncovered correspondence that indicated Salzman was a member of the group, Preisser said. Salzman will be sentenced on Oct. 5 and could receive a maximum of 10 years imprisonment and a $250,000 fine. MICHAEL ALEXANDER ------------------------------ Date: Fri, 17 Aug 90 17:04:44 MDT From: siegel@spot.Colorado.EDU Subject: New York youths charged with "hacking" BOY, 14, ONE OF 13 HELD IN HACKER BUST From: The New York Times NEW YORK - Thirteen people, including a 14-year-old boy who is a suspect in a computer break-in at the office of the Air Force secretary, were arrested Thursday and charged with breaking into and stealing information from a variety of computers. Eight are juveniles, New York State Police said. Police spokesmen said warrants had been issued for two other people and as many as 40 people may have been involved in the computer hacker ring. The name of the 14-year-old who was arrested - he went by the computer handle of "Zod" - was not released because of his age. The boy was specifically charged with breaking into and stealing software from the mainframe computer at City University in Bellevue, Wash. School officials said Zod had either stolen or used about $15,000 worth of computer time and software. State police Maj. Peter J. Brennan said Zod is also a suspect in the November break-in of the secretary of the Air Force computer in the Pentagon. At the houses of those arrested, police seized computers and other electronic equipment reportedly used in the break-ins. The police identified the adults arrested as Bruce Monroe, 32, of Astoria, N.Y.; Jeff Miller, 21, of Franklin Square, N.Y.; Chai Hung Ling, 17, of Bayside, N.Y.; Anhtu Nguyen, 21, of Brooklyn, N.Y.; and Teerawee Unchalipongse, 19, of Staten Island, N.Y. They were charged with computer tampering, computer trespassing and theft of services. ------------------------------ Date: Fri, 17 Aug 90 18:05:08 EDT From: Michael Rosen Subject: Robert Morris and Craig Neidorf blurbs (Computerworld) Computerworld, August 6, 1990, pg. 114, Inside Lines: Convalescent time Robert T. Morris, convicted earlier this year for creating a worm program that shut down thousands of computers on the Internet network in November 1988, is "at a local hospital pushing a broom" to fulfill his court-ordered 400 hours of community services, according to his lawyer, Thomas Guidoboni. Morris also has a programming job at an unnamed Cambridge, Mass.-based software company. Guidoboni said he plans to file a brief in the court of appeals but has been waiting for the court reporter in Syracuse federal district court to turn over court transcripts of the trial. ...Craig Neidorf - the electronic newsletter editor whose publication of a "secret" Bellsouth file wasn't such a federal case after all (see page 8) - apparently had at least a partial electronic alibi. U.S. Secret Service agents attended Summercon, a hacker convention held in July 1988, to surreptitiously videotape Neidorf drinking beer and eating a pizza with his alleged co-schemers on the same date that the government alleged he was carrying out the scheme. Before the trial abruptly concluded, prosecutors succeeded in preventing use of the tape as evidence. If you've got facts that shouldn't be quashed, contact News Editor Pete Bartolik at 800-343-6474, fax the incriminating lingo to 508-875-8931, or address concerns to COMPUTERWORLD on MCIMail. ------------------------------ Date: Sat, 18 Aug 90 19:32:08 CDT From: TELECOM Moderator Subject: Phreak Pleads Guilty, Gets Two Years in Prison An interesting case in federal court here in Chicago Friday involved the sentencing of a woman who Judge Milton Shadur referred to as 'the mastermind behind 152 hackers and phreaks nationally ...' Judge Shadur sentenced her on Friday to two years in the custody of the Attorney General, based on her plea of guilty to one count of a seventeen count indictment. Leslie Lynn Douchette, 36, and mother of two small children was referred to by Secret Service investigators as 'the head of the largest ring of hackers and phreaks ever uncovered in the United States'. In TELECOM Digest, notice was made of Ms. Douchette at the time of her indictment and arrest, but unlike other high-profile cases, little more was noted about her in the media over the past few months. Ms. Douchette, of 6748 North Ashland Avenue in Chicago, along with her ring of phreaks and crackers (the term I prefer) allegedly cost various telephone companies in excess of one million dollars. In addition, Ms. Douchette and associates are alleged to have obtained over $600,000 from illicitly obtained Western Union money orders and merchandise acquired with fraudulent credit cards using the computer. Many members of her ring were juveniles, and many were associated with or considered themselves active in the Legion of Doom, although there is no evidence Ms. Douchette was a member of, or associated with the Legion. Six juveniles in four other states have been convicted as part of the ring operated by Ms. Douchette, and investigations of other ring members is continuing. Some of the pending investigations center around phreaks and crackers already under investigation for Legion of Doom activities, according to US Attorney William J. Cook, who prosecuted the case with attorney Colleen Coughlin. As part of her plea-bargained sentence, Ms. Douchette is cooperating fully with the government on pending investigations. She has given *additional names* and details to Secret Service investigators. Although Ms. Douchette said she once worked as a day care employee in Canada, Mr. Cook said she had been unemployed for some time, and appeared to be 'completely unskilled, unable to obtain any gainful and legitimate employment.' He continued, "her only skill seems to be her ability to use the telephone to manipulate people and computers." The sentence (actually two years and three months) is believed to be the stiffest ever given out to a phreak, and Mr. Cook noted this was given to her *despite* her plea of guilty. At the time of her sentencing, Judge Shadur remarked that he thought Ms. Douchette also needed psychiatric help, and his order calls for her to receive therapy while in prison. Ms. Douchette was represented by attorney Robert Seeder of the Federal Defender's Office here. At the time of sentencing, Mr. Seeder noted that Ms. Douchette's activities have now cost her the custody of her two children (both were taken from her and are now cared for elsewhere), and that by her plea, she had recognized and acknowledged responsibility for her actions. He asked Judge Shadur to show mercy upon the defendant and impose probation, with therapy as a condition. Judge Shadur refused, calling her 'the control center for phreaks and hackers everywhere.' Her motive, according to Mr. Cook, was the 'ego boost' she received as leader of the ring. Judge Shadur said 'phreaks and hackers need an example of what to expect when they are caught', and that Ms. Douchette's punishment and loss of custody of her children would serve that purpose. Patrick Townson ------------------------------ Date: 29 Jul 90 19:29:22 EDT From: Anonymous Subject: US Army virus research From: TIME, June 25, 1990, p. 5 "Grapevine" by Paul Gray, reported by David Ellis QUICK, THE RAID. Everyone knows that the computer industry is fighting against viruses, malicious programs that can infect whole networks and crash them. So it stands to perverse reason that hush-hush agencies like the CIA and NSA are trying to create such bugs as offensive weapons. The latest entrant in this quest is the U.S. Army, which is soliciting bids on a half-million dollar contract to develop tactical virus weapons capable of disabling enemy computers on the battlefield. The proposal has raised eyebrows among the military's hackers. Says one Army computer-security officer: "Many of my colleagues are quite surprised that something of this nature would be put o the streets for research rather than using the expertise internally available." ------------------------------ ******************************************************************** **END OF CuD #1.29** ******************************************************************** scotty:kehoe %


E-Mail Fredric L. Rice / The Skeptic Tank