Computer Underground Digest Volume 2, Issue #2.03 (Sepember 14, 1990)

---
Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 2, Issue #2.03 (Sepember 14, 1990) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith USENET readers can currently receive CuD as alt.society.cu-digest. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. It is assumed that non-personal mail to the moderators may be reprinted, unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS: File 1: Moderators' Corner File 2: Len Rose's experience with the Secret Service File 3: Tim Wolfson's address, cite list File 4: A comment on Zod's case ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #2.03, File 1 of 4: Moderator's corner *** ******************************************************************** Date: Sepember 14, 1990 From: Moderators Subject: Moderators' Corner ++++++++++ In this file: 1. BBS AND THE LAW PAPER ADDED TO ARCHIVES 2. GATEWAY TO USENET ++++++++++++++++++ BBS and the Law Paper added to Archives ++++++++++++++++++ We have added a paper by Mike Riddle, a law student, to the CuD archives. It's entitled: "The Electronic Pamphlet--Computer Bulletin Boards and the Law." It provides a nice overview of privacy and other issues and is worth reading. ++++++++++++++++ Gateway to Usenet Newsgroup ++++++++++++++++ A Gateway service is available for people who cannot read or post to the Usenet newsgroup comp.org.eff.talk. To subscribe send mail to EFF-REQUEST@NETSYS.COM. You will receive a copy of every article appearing in the newsgroup. To post to comp.org.eff.talk send your article to EFFTALK@NETSYS.COM. It will be gatewayed automatically without modification. This service has no connection with the Electronic Frontier Foundation. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: Tue, 11 Sep 90 01:34:49 -0400 From: len@NETSYS.NETSYS.COM Subject: Len Rose's experience with the Secret Service ******************************************************************** *** CuD #2.03: File 2 of 4: Len Rose's Experience with the S.S. *** ******************************************************************** [Jim Thomas suggested I write something for the digest and I have been casting around for ideas.. All I really can think about nowadays is my own situation. I have become quite a bore to my friends I am sure.] Please excuse any vestiges of self-pity you may detect. The Day It Happened: I left my home around eleven am to drive down to Washington DC to meet with a potential client. After several hours with them , I started the drive back through the rush hour traffic. It was just a few minutes after five pm that I pulled into my driveway in Middletown Md. I remember getting out of the car and noticing that someone was in the back yard. He was wearing a blue wind breaker and was neatly dressed. We had been trying to sell a Jeep , and I assumed he was interested in buying the car. "What can I do for you" I asked.. I remember being slightly pissed that this person had just been hanging around the back of my home. He flipped his jacket aside and I saw a badge on his belt and a gun in a shoulder holster. "Please go into the house" he replied. I was pretty shaken and asked "What have I done wrong?" .. without answering the question, he took my arm and sort of marched me into the front door of my home. Upon entering, two agents pulled me up from the foyer, and put me against the wall while searching me. Then I remember being shown the front of a search warrant and then taken into my master bedroom. The door was shut and I didn't leave the room for more than five hours. They introduced themselves, and I asked them what this was about. Foley replied "We will ask the questions" .. "Do you know any of these hackers?" I was asked about 10 or 15 names, and out of them I said I recognized one or two from seeing articles here and there but hadn't had any contact with them. I remember Foley getting angry. "You had better cooperate, let's try again". I reiterated that I knew none of them. He said "You are not telling us the truth" ... I told him I had little contact with hackers and had been away from that scene for quite some time. He then scoffed and said "You have a hacker handle don't you... What is It?" I paused, and then replied "Terminus, but I haven't used it or gone by that in a very long time" He said "Right, like last month..." I thought about that and then I started to feel sick inside.. I knew that I had sent Craig Neidorf a copy of login.c which had been modified to perform certain functions that basically made it a trojan horse. I used that handle since I didn't want the world to know that Len Rose was sending someone proprietary source code through mail.. He shoved a photocopy of a printout under my nose and asked me if I recognized it.. I looked at it and said, "Yes.. " .. He asked me If I had made the modifications and placed certain comments within the source. "Yes" again. "But I never used it" I blurted out. "We are only interested in the 911 software and Rich Andrews" they said. [I never had anything to do with 911 software and after an extensive search of my systems that night by a certain AT&T employee they seemed to agree.] "Did Rich Andrews send you a copy of the 911 software?" Foley asked me. I told them no, no one had sent me anything of the sort. I told them that Rich had found some portion of 911 software on his system and sent it to Charley Boykin at killer to see if it was serious. Rich had told me before, and I sort of approved of the idea. I remember Rich saying that he'd had no response whatsoever.. [I wish he had told me the truth, but that is for him to explain why] "We want dirt on Rich Andrews.." Special Agent Timothy Foley said. "We feel he has been less then cooperative.." and "Do you know he is a convicted felon" I replied "Yes" but he is a good friend and I know he hasn't done anything wrong. He is not involved with hackers. Foley asked me about any dealings I had with Rich. I realized then that lying wouldn't do me any good, so I told them everything I could remember. What I had to say must not have been good enough, as Foley kept saying I wasn't going to get anywhere unless I told them all the truth. It took me a long time to convince them that was all I knew. During the interrogation, my legal problems in Virginia were brought up, and I mentioned that I might be acquitted. Jack Lewis said "If you get off in Virginia, I'll make sure we burn you for this" .. I felt then that I was completely shut off from reality. Foley then asked me to tell them anything illegal I had done. Jack Lewis said "It would be better if you tell us now, because if we discover anything else later it will be very serious". By this time, I was scared and I remember telling them that I had copies of AT&T System V v3.1, System V v3.2 and various other pieces of software which had been given to me by certain employees of AT&T (without the benefit of a license agreement). "Where is it" they asked.. I told them that I had a couple 9 track tapes with prominent labels on a tape rack. I remember asking several times to see my wife, and to go to the bathroom. Each time I was told I couldn't. If I hadn't been so scared I would have asked for an attorney, but my mind had shutdown completely. About 6 hours later I was finally led out of my bedroom and told to sit at the kitchen table and not to move. Foley and Lewis sat with me and put a sheet of paper in front of me and told me to write a statement. "What do you want me to write about" I asked. Foley said "Everything you told us about Rich Andrews and also everything about the Trojan horse login program." "Make sure you mention the System V source code".. So, as they were finishing loading up the moving truck, I sat there and wrote about two pages of information. It was about midnight, when they left, but not before handing me a subpoena to appear before the Grand Jury. They told me to tell Rich Andrews my main Unix system had crashed, and not to let him know that the SS had been there. I felt pretty bad about this because I kept thinking they were going to get him. He must have called siz or seven times the day after the "raid". I couldn't tell him anything, since I assumed my line was tapped. I remember going outside as they were starting to leave and looking into the back of the moving truck. The way some of the equipment was packed, I knew it wouldn't survive the trip into Baltimore. I asked for permission to re-pack several items (CPUs,Hard Disks, and a 9 track drive) and received it. As I watched my belongings pull away , I remember feeling so helpless, and confused. It was only then did it sink in that every material possession that really mattered to me (other than my home), was gone. All I had to show for it was a sketchy 20 page inventory.. Later, my wife told me what had gone on until I came home. The SS arrived around 3 pm, and had knocked on the door. She opened the door, and 5 or 6 agents pushed her back into the foyer. They took her by the arms and moved her over to a sofa in the living room. They had a female agent with them, and this person was detailed to stay with her. She was not allowed to make phone calls, or answer them (until much later in the evening.) My children were also placed there. My son, who was 4 at the time refused to submit to their authority (guns didn't scare him) would get up often and follow agents around. From what my wife recalls, they were amused at first , then later became less enthusiastic about that. She wasn't allowed to feed the kids until after I had been released from the interrogation session. She remembers getting up several times, to go to the bathroom or to retrieve diapers,etc. and being told to get back onto the sofa. The female agent even followed her into the bathroom. The massive search of every nook and cranny of our home encompassed much more than computer equipment. To this day, I feel there is a direct link between my previous legal problem in Virginia, and the extent of the search that day. In fact, the SS had obtained items seized from me by Virginia and had them in their posession before the raid ever took place. I remember going down to the SS office a couple days later to voluntarily answer the subpoena. I set up my equipment for them. Although they had labled most cables and connectors, there was some confusion. I remember showing them how to use my systems, and in particular how to do a recursive directory listing of every file contained within. After a while, once they made sure they had backups , I was allowed to type a few commands at a terminal in order to retrieve an ascii text file (a resume). Later, while being escorted back out to the front of their offices, I saw a large room filled with stacks of boxes and equipment cases which had constituted the entire sum of my office and all equipment,software,and documentation. I was feeling pretty numb, and remember asking the agents there to please take care of everything, since I hoped to get it back. In reflection, it seems pretty pitiful. It was this day that they told me I would be prosecuted, and I remember driving back from Baltimore feeling betrayed. Even though I had completely cooperated with them, and had been told I would not be prosecuted. When I got home, I was crying .. I couldn't handle this anymore. My sister was there and I remember she gave me three vallium.. I calmed down and in fact got pretty high from it. [The following is something the SS allege I did] Allegedly from a phone booth that night I called Rich Andrews and warned him to get rid of any source code or software he shouldn't have.. At this time I was also alleged to have told Rich that I was leaving the country, and would go to Korea with my wife and kids. [If I did do this, I never said anything about leaving] .. They apparently had either tapped his line, or he told them about my call. [I would have been stupid to say this, since Korea has extradition treaties with the US] My Arrest: Several days later, I received a sudden call from Special Agent John Lewis and he told me to come down and pick up my fax machine. (I had been pestering them about it so I could fax my resume out to headhunters so I could find a job).. [ Ironically, I had been hired a week before by Global Computer Systems, in New Jersey to work as a contractor at AT&T's 3B2 Hotline in South Plainfield New Jersey .. I knew that after this AT&T wouldn't have anything to do with me and in fact was informed so the night of the raid ] Upon entering the SS office (Feb. 6) around 5 pm, I waited outside in the waiting room.. I had been doing some house painting and wasn't dressed very well. Jack Lewis came out and brought me back to one of their offices He held out his hand (as if to shake it) and instead put hand cuffs on my hand. He then locked the other to an eyebolt on the desk. He sat down across from me and told me to empty my pockets.. I complied, and then he started writing an inventory of my posessions. Jack Lewis looked up from his writing and said "You fucked us,Len!" "What do you mean?" I said. "You called Rich Andrews, and warned him to get rid of anything he shouldn't have,you fucked us!" .. I didn't reply. He then told me to pull my shoestrings out of my sneakers, and I did.. He called another agent in to witness the contents of his inventory,sealed the envelope and then told me I was going to jail.. About 15 minutes later he released the handcuffs from the desk, and put my arms behind my back and handcuffed them. I was led into the hallway, while he finished some last minute details.. He was nice enough to let me make a phone call, when I asked him..I promptly called a friend in Philadelphia. I knew he would know what to do.. Because my wife didn't speak English well, and would also have been hysterical I couldn't count on her to be much help. They drove me over to the Baltimore City Jail,told the bored looking turnkey at the desk to hold me for the night. I was pretty hungry but I had missed the evening meal , and despite repeated pleas to make my "phone call" the jailers ignored me. The people in the cells next to mine were an interesting lot. One was in for killing someone, and the other was in for a crack bust.. Someone in the cell block was drugged out, and kept screaming most of the night.. I didn't sleep much that night, and the with the cold steel slab they call a bed it wouldn't have been possible anyway. Sometime around 9 am a jailer appeared and let me out. I was then turned back over to the SS and they drove me back to the Federal Building... They put me in another holding cell and I was there for about 2 hours. A Federal Marshal came and took me to a court room, where I was charged with a criminal complaint of transporting stolen property over interstate lines with a value of $5000 or more. The conditions for my release were fairly simple.. Sign a signature bond placing my home as collateral, and surrender my passport. Fortunately my wife had come down earlier and Agent Lewis had told her to get my passport or I wouldn't be released .. She drove the 120 mile round trip and found it.. She returned, I was brought down to the courtroom and the magistrate released me. We retained an attorney that day, and several weeks later they agreed to drop all charges. I am told this was to give both sides some time to work out a deal. Against the better judgement of my (then) attorney I offered to meet with the Assistant U.S. attorney if they would bring someone down from Bell Labs. My thinking was that surely a Unix hacker would understand the ramifications of my changes to the login.c source and corroborate my explanations for the public domain password scanner. They also wanted me to explain other "sinister" activities , such as why I had an alias for the Phrack editors, and I knew a Unix person from the labs would know what I meant when I said it made it easier for people to get to .BITNET sites. I was a complete fool,and the person from Bell Labs got me in even worse trouble when he told them I had other "trojan" software on the systems. He was referring to a public domain implementation of su.c which David Ihnat (chinet) had written to allow people to share su access without actually knowing the root password. "But it is public domain software," I cried. The Bell Labs person turned and told David King (Asst. US Attorney) that I was lying. He went on to say that there was a considerable amount of R&D source code on my machines. Things that no one should possess outside of AT&T, like Korn shell and AwkCC. My attorney (Mr. Carlos Recio of Deso, and Greenberg - Washington DC) was furious with me. All he could say was that "I told you so.." and I realized I had been stupid. I had hoped if I could explain the situation to the govt. and have someone from AT&T verify what I said was true, then they would realize I was just a typical Unix freak, who hadn't been involved in anything more sinister than possibly having things I shouldn't have. After a few months the best deal Mr. King offered was for me to plead guilty to 2 felony counts (Computer Fraud) and I would receive a sentence of 17 months in prison. I refused to take the deal, [ Perhaps I may live to regret that decision when my trial begins in 91.. ] In May I was formally charged with 5 felony counts.. The rest is history.. Present Day: In better times I never lacked for work, and lived in a world where I spent more on phone bills per month (uucp traffic), than I have earned in the last four months. I am sitting here (rather lying, since I cannot get up) by the laptop computer (on loan to me from a friend) . Lately, I have grown to feel that without this little laptop and it's modem linking me to the network I would have been driven mad a long time ago.Reading Usenet news has been my only solace lately. During the day I spend hours calling around to all the head hunters asking for work.Since I still have a fax machine, I am able to fax my resume around. So far, I haven't had much luck in finding anything at all. Since all this happened , it seems that I have been blacklisted. A few companies expressed interest, but later called back and asked me if I was the "LoD hacker" and I told them yes.. They weren't interested anymore (I cannot blame them). I guess the Unix Today articles have cost me more than any of the others.. I lost a great contract ($500 a day) with a major bank in Manhattan when they saw the first article.. In various articles from various newspapers, I have been called the "Mastermind of the Legion of Doom" and other bizarre things. The lies told by the US Attorney in Baltimore in their press release were printed verbatim by many papers.. The usual propaganda about the Legion's activities in credit card fraud, breakins and the threat to the 911 system were all discussed in that press release and cast a bad light on me. I have had the good fortune to have a friend in Philadelphia who has loaned me office space in his firm's building. Such an arrangement lends an air of credibility to Netsys Inc. Too bad I have no clients or contracts. Since I broke my leg pretty badly (The doctor says I will be in a cast for six months and maybe some surgery) ,I haven't been able to visit the "office" but I have an answering machine there and I check my calls daily. We (my wife and two children) moved to the Philadelphia suburbs in order to put as much distance as possible from the SS Agent John "Jack" Lewis who is based in Baltimore. I realize that the SS have offices in every city, and agents to spare but it made me feel better knowing that he is in Baltimore and I am here. Anyway, at this point I am trying to find a few system admin jobs, and would take any salary they offered me. I am scared about the next few months since I cannot even get a job as a laborer or a 7-11 clerk since my leg is screwed.. My wife (who has a liberal arts degree) is looking for a job in this area.. We hope she can get a job working minimum wage in some department store or as a waitress. We have enough money to last another month I guess. Then I am not sure what we will do, since we haven't any relatives who will take us in. I have never been un-employed since leaving high school, and It's a pretty bad feeling. One day , If I survive this, I will never forget what has happened. I can't help feeling that there is a thin veneer of freedom and democracy in this country, and agencies like the Secret Service are really far more powerful than anyone had realized. I know that my friends within AT&T (E. Krell for one) feel I have "stolen" from their company. I can only laugh at this attitude since I have probably done more for AT&T than he has. Those of you who knew me before can attest to this. While it was "wrong" to possess source code without a license,I never tried to make money from it. I wrote a Trojan Horse program, which in all honesty was done to help defend my own systems from attack (it is currently installed as /bin/login on my equipment). Any allegations that I installed it on other systems are completely false. [ in fact, most of the source code was given to me by AT&T employees ] As far as the public domain password scanner program, well.. I realize that most of you know this, but items far more powerful can be obtained from any site that archives comp.sources.unix,and comp.sources.misc .. I used it as a legitimate security tool when doing security audits on my own systems and clients. It wasn't very good really, and considering it was obsolete (System V 3.2 /etc/shadow) anyway, it's usefulness was limited. Since the SS will be reading this article with interest, I want to point out that I will fight you to the end. Someday I hope you will realize you made an honest mistake and will rectify it. Perhaps there was some justification I am not aware of, but I doubt it. If I have to go to prison for this, perhaps it will benefit society. Who knows what what Len Rose would have done if left to continue his criminal pursuits. I hope to get my equipment, and software back and then re-start my life. There have been repeated motions to get my equipment back , but the judge has summarily denied them saying I will commit crimes If I get it back. I have offered to assist the SS in saving evidence,and to sign any agreement they choose regarding validity of that evidence. I may take up begging soon , and ask for help from someone who is rich. It's going to be winter soon and I don't look forward to being on the street. Len ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: Mon, 10 Sep 90 22:24:24 -0400 From: Timothy C Wolfson TTUNIX.BITNET Subject: Tim Wolfson's address, cite list ******************************************************************** *** CuD #2.03: File 3 of 4: Bibliography of Law Articles *** ******************************************************************** Below is a list of articles published in legal periodicals that may be of interest to your readers. This list is in no way meant to be all inclusive, I'm sure I've left out (or not yet discovered) many pertinent pieces. 24 Am. Crim. L. Rev. 623 MAIL AND WIRE FRAUD Winter, 1987 Kimi N. NuraKami 24 AMCRLR 623 PLI Order No. C4-4175 Civil RICO 1986 PREDICATE ACTS OF MAIL FRAUD AND WIRE FRAUD June 1, 1986 Brad D. Brian 141 PLI/Lit 79 63 U. Det. L. Rev. 843 COPYRIGHT--Bootleg Records--Copyright infringement in the form of unauthorized phonograph recordings, when such records are shipped interstate, does not fall within the reach of the National Stolen Property Act. Dowling v. United States, 105 S. Ct. 3127 (1985). Summer, 1986 Kenneth Adamczyk 13 Legal Econ. 44 ELECTRONIC BULLETIN BOARD SYSTEM PROVER BBS November/December, 1987 Rees W. Morrison 13 LEGEC 44 39 Fed.Com.L.J. 217 An Electronic Soapbox: Computer Bulletin Boards and the First Amendment October, 1987 Eric C. Jensen 39 FCLJ 217 Public Utilities Fortnightly The March of Events November 9, 1989 NEW MEXICO ELECTRONIC BULLETIN BOARD AVAILABLE AT COMMISSION 124 No. 10 Fortnight 50 PLI Order No. G4-3847 How to Handle Basic Copyright and Trademark Problems A Satellite Program PATENT AND TRADEMARK OFFICE: PROSECUTING APPLICATIONS FOR TRADEMARK REGISTRATION, AND INTER PARTES PRACTICE BEFORE THE TRADEMARK TRIAL AND APPEAL BOARD February 13, 1990 Roberta S. Bren 288 PLI/Pat 135 PLI Order No.G4-3844 Patents, Copyrights, Trademarks, and Literary Property Course Handbook Series THE LICENSING OF COMPUTER SOFTWARE PROGRAMS January 1, 1990 Gerald E. Lester 287 PLI/Pat 293 PLI Order No. 64-3839 Communications Law 1989 THE MEDIA AND THE COMMUNICATIONS REVOLUTION: AN OVERVIEW OF THE REGULATORY FRAMEWORK AND DEVELOPING TRENDS November 9,1989 Richard E. Wiley 283 PLI/Pat 327 57 Geo. Wash. L. Rev. 1459 THE FIRST AMENDMENT AND TECHNOLOGICAL CHANGE: THE NEW MEDIA HAVE A MESSAGE August 1, 1989 M. Ethan Katsh 57 GWLR 1459 75 A.B.A.J. 82 THE FUTURE OF TECHNOLOGY IN LAW FIRMS July, 1989 Jon E. Klemens 75 ABAJ 82 44 Bus. Law. 1081 ELECTRONIC FUND TRANSFERS May, 1989 David B. Goldstein, Edward L. Rubin, Dewey B. Morris, Charles P. Seibold, Richard P. Kessler, Jr., Richard S. Wyde. PLI Order No. G4-3831 Protecting Trade Secrets 1989 PROTECTING TRADE SECRETS: LEGAL THEORIES April 1, 1989 Michael J. Hutter 269 PLI/Pat 9 PLI Order No. A4-4255 Law Practice Management for the Solo and Small Office Practitioners Conquer the Computer It's your ticket to tomorrow and the key to a more effective and competitive practice April 1, 1989 JAMES A. EIDELMAN 492 PLI/Comm 353 54 W.Educ.L.Rep. 761 COMPUTER VIRUSES: LEGAL AND POLICY ISSUES FACING COLLEGES AND UNIVERSITIES 1989 David R. Johnson, J.D. Thomas P. Olson, J.D., David G. Post, Ph.D., J.D. 54 WELR 761 PLI Order No. G4-3821/3 Communications Law 1988 THE MEDIA AND THE COMMUNICATIONS REVOLUTION: AN OVERVIEW OF THE REGULATORY FRAMEWORK AND DEVELOPING TRENDS November 10, 1988 Richard E. Wiley 262 PLI/Pat 681 XXIX B.C.L.Rev. 803 COPYRIGHTED SOFTWARE: SEPARATING THE PROTECTED EXPRESSION FROM UNPROTECTED IDEAS, A STARTING POINT September, 1988 J. Dianne Brinson XXIX BCLR 803 21 J. Marshall L. Rev. 735 COMMUNICATIONS TECHNOLOGY: NEW CHALLENGES TO PRIVACY Summer, 1988 Fred W. Weingarten 21 JMARLR 735 63 N.Y.U.L.Rev. 416 DON'T TOUCH THAT DIAL: RADIO LISTENING UNDER THE ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 May, 1988 Fred Jay Meyer 63 NYULR 416 14 Legal Econ. 30 ELECTRONIC COMMUNICATIONS A LAWYER'S PRIMER April, 1988 Carl G. Roberts Rees W. Morrison Greg H. Schlender 14 LEGEC 30 PLI Order No. G4-3804 Telecommunications 1987: Current Developments In Policy and Regulation AN OVERVIEW OF INTERNATIONAL ISSUES December 10, 1987 P. Michael Nugent 244 PLI/Pat 145 PLI Order No. G4-3804 Telecommunications 1987: Current Developments In Policy and Regulation REALITY RELEARNED December 10, 1987 Lawrence W. DeMuth, Jr. 244 PLI/Pat 133 24 Am. Crim. L. Rev. 623 MAIL AND WIRE FRAUD Winter, 1987 Kimi N. NuraKami 24 AMCRLR 623 13 Legal Econ. 28 LEGAL TECHNOLOGY: PRESENT AND FUTURE TRENDS November/December, 1987 Gordon L. Jacobs 13 LEGEC 28 73 A.B.A.J. 50 HOW COMPUTERS MADE US BETTER LAWYERS May 15, 1987 Joshua Stein 73 ABAJ 50 72 Iowa L.Rev. 1015 The National Security Agency and Its Interference with Private Sector Computer Security May, 1987 Renae Angeroth Franks 72 IALR 1015 27 Va. J. Int'l. L. 575 Statutory Improvements to the Foreign Availability Process for High Technology National Security Export Controls Spring, 1987 Richard T. Horan, Jr. 42 Bus.Law. 614 COMPUTER LAW February, 1987 Bernard G. Helldorfer, Harold J. Daw, William E. Hirschberg, Darrell K. Fennell, and Andrew W. Hoffmann 42 BUSLAW 614 67 B.U.L.Rev. 179 WARRANT REQUIREMENT FOR SEARCHES OF COMPUTERIZED INFORMATION January, 1987 C. Ryan Reetz 40 Vand.L.Rev. 1 Free Speech, Copyright, and Fair Use January, 1987 L. Ray Patterson 10 U.Ark.Little Rock L.J. 55 WHAT IS COMPUTER CRIME, AND WHY SHOULD WE CARE? 1987-88 Michael C. Gemignani 10 UARLRLJ 55 13 Rutgers Computer And Tech.L.J. 451 THE ELECTRUNIC COMMUNICATIONS PRIVACY ACT OF 1986: THE CHALLENGE OF APPLYING AMBIGUOUS STATUTORY LANGUAGE TO INTRICATE TELECOMMUNICATION TECHNOLOGIES 1987 Russell S. Burnside 13 RUCTLJ 451 PLI Order No. G4-3790 Protecting Trade Secrets 1986 LEGAL THEORIES AND RECENT DEVELOPMENTS May 1, 1986 Michael J. Hutter 224 PLI/Pat 11 20 Colum.J.L.Soc.Prob. 89 Teleinformatics, Transborder Data Flows and the Emerging Struggle for Information: An Introduction to the Arrival of the New Information Age 1986 ANTHONY PAUL MILLER Judicature Articles August-September 1989 TECHNOLOGY IN APPELLATE COURTS: THE NINTH CIRCUIT'S EXPERIENCE WITH ELECTRONIC MAIL Stephen L. Wasby 73 JUDICATURE 90 Judicature Focus August-September, 1988 TECHNOLOGY COMES TO THE COURTS Paul Nejelski 72 JUDICATURE 136 38 Cath.U.L.Rev. 401 THE FIRST AMENDMENT INVALIDITY OF FCC OWNERSHIP REGULATIONS Winter, 1989 Jonathan W. Emord 38 CATHULR 401 38 Cath.U.L.Rev. 299 RED LIONS, TIGERS AND BEARS; BROADCAST CONTENT REGULATION AND THE FIRST AMENDMENT Winter, 1989 Charles D. Ferris Terrence J. Leahy 38 CATHULR 299 38 Cath.U.L.Rev. 471 THE DIVERSITY PRINCIPLE AND THE MFJ INFORMATION SERVICES RESTRICTION: APPLYING TIME-WORN FIRST AMENDMENT ASSUMPTIONS TO NEW TECHNOLOGIES Winter, 1989 Richard A. Hindman 38 CATHULR 471 57 Geo. Wash. L. Rev. 1459 THE FIRST AMENDMENT AND TECHNOLOGICAL CHANGE: THE NEW MEDIA HAVE A MESSAGE August 1, 1989 M. Ethan Katsh 57 GWLR 1459 57 Geo. Wash. L. Rev. 1495 ON UNDERSTANDING THE FIRST AMENDMENT STATUS OF CABLE: SOME OBSTACLES IN THE WAY August 1, 1989 Jerome A. Barron 57 GWLR 1495 38 Emory L.J. 715 THE ILLEGITIMACY OF THE PUBLIC INTEREST STANDARD AT THE FCC July 1, 1989 William T. Mayton 38 EMORYLJ 715 PLI Order No. G4-3826/1 Cable Television Law 1989: Dealing with the New Challenges TELEPHONE COMPANY ENTRY INTO VIDEO PROGRAMMING March 1, 1989 Frank W. Lloyd 266 PLI/Pat 9 87 Mich.L.Rev. 499 FREE SPEECH AND THE 'ACID BATH': AN EVALUATION AND CRITIQUE OF JUDGE RICHARD POSNER'S ECONOMIC INTERPRETATION OF THE FIRST AMENDMENT November, 1988 Peter J. Hammer 87 MILR 499 86 Mich.L.Rev. 1269 QUESTIONING BROADCAST REGULATION May, 1988 Jonathan Weinberg 86 MILR 1269 1988 Duke L.J. 329 CABLE TELEVISION AND THE FREEDOM OF EXPRESSION April/June, 1988 Daniel Brenner 1988 DUKELJ 329 VI Yale L. Pol'y Rev. 449 Ad Hoc Access: The Regulation of Editorial Advertising on Television and Radio 1988 Rhonda Brown VI YLLPR 449 39 Hastings L.J. 165 The TRAC to Fairness: Teletext and the Political Broadcasting Regulations November, 1987 GAIL A. FLESHER 39 HSTLJ 165 21 U.Mich.J.L.Ref. 137 THE RIGHT TO SPEAK, THE RIGHT TO HEAR, AND THE RIGHT NOT TO HEAR: THE TECHNOLOGICAL RESOLUTION TO THE CABLE/PORNOGRAPHY DEBATE Fall/Winter, 1987-88 Michael I. Meyerson 21 UMIJLR 137 8 Cardozo L.Rev. 317 AN EXCESS OF ACCESS: THE CABLE COMMUNICATIONS POLICY ACT OF 1984 AND FIRST AMENDMENT PROTECTION OF EDITORIAL DISCRETION December, 1986 Adam R. Spilka 8 CDZLR 317 75 Geo.L.J. 361 A Press Privilege for the Worst of Times October, 1986 David Joseph Onorato 35 Emory L.J. 563 CABLE LEASED ACCESS AND THE CONFLICT AMONG FIRST AMENDMENT RIGHTS AND FIRST AMENDMENT VALUES Summer, 1986 William E. Lee XX Suffolk U.L.Rev. 1 FREE SPEECH IN AN ECONOMIC PERSPECTIVE Spring, 1986 Richard A. Posner 33 U. Kan. L. Rev. 305 INDEPENDENT BUT INADEQUATE: STATE CONSTITUTIONS AND PROTECTION OF FREEDOM OF EXPRESSION Winter, 1985 Todd F. Simon 58 S.Cal.L.Rev. 1351 CONTROLLING THE CONTENT OF PRINT AND BROADCAST September, 1985 MATTHEW L. SPITZER 22 Harv.J.Legis. 503 TELEPHONE PORNOGRAPHY: FIRST AMENDMENT CONSTRAINTS ON SHIELDING CHILDREN FROM DIAL-A-PORN Summer, 1985 JOHN C. CLEARY 133 U. Pa. L. Rev. 661 A PROPOSED MODEL OF THE SOVEREIGN/PROPRIETARY DISTINCTION March, 1985 Teresa Gillen 98 Harv.L.Rev. 747 INFORMATION TECHNOLOGY AND THE STRUCTURE OF SECURITIES REGULATION February, 1985 Donald C. Langevoort 98 Harv.L.Rev. 205 Leading Cases of the 1983 Term--Constitutional Law: Freedom of Speech, Press, and Association--Restrictions on Public Broadcasters' Rights to Editorialize November, 1984 98 HVLR 205 38 U.Miami L.Rev. 769 A Common Law for the Ages of Intellectual Property Septemer, 1984 DAN ROSEN 25 Harv. Int'l L.J. 299 The British Telecommunications Decision: Toward a New Telecommunications Policy in the Common Market March, 1984 Slida A. Wall 8 Nova L.J. 631 Communications Revolutions and Legal Revolutions: The New Media and the Future of Law March, 1984 M. Ethan Katsh 82 Mich.L.Rev. 981 FREE SPEECH AND HIGH TECH February, 1984 Francis Dummer Fisher 82 MILR 981 XIII Fordham Urb.L.J. 801 ELECTRONIC PUBLISHING: FIRST AMENDMENT ISSUES IN THE TWENTY-FIRST CENTURY 1984 Lynn Becker 97 Harv.L.Rev. 584 SAFEGUARDING THE FIRST AMENDMENT IN THE TELECOMMUNICATIONS ERA TECHNOLOGIES OF FREEDOM. By Ithiel de Sola Pool. Cambridge, Massachusetts: Belknap Press of Harvard University Press. 1983. Pp. 299. $20. December, 1983 Mario L. Baeza 36 Vand.L.Rev. 985 Global Governance of Global Networks: A Survey of Transborder Data Flow in Transition May, 1983 Anne W. Branscomb 36 VNLR 985 38 Cath.U.L.Rev. 365 INFORMATION AS PROPERTY: DO RUCKELSHAUS AND CARPENTER SIGNAL A CHANGING DIRECTION IN INTELLECTUAL PROPERTY LAW? Winter, 1989 Pamela Samuelson 38 CATHULR 365 47 U.Pitt.L.Rev. 1185 ALLOCATING OWNERSHIP RIGHTS IN COMPUTER-GENERATED WORKS Summer, 1986 Pamela Samuelson 47 U. Pitt. L. Rev. 1131 THE UNCERTAIN CASE FOR SPECIAL LEGISLATION PROTECTING COMPUTER SOFTWARE Summer, 1986 Leo J. Raskind 32 Wayne L.Rev. 1191 PROPOSED JUDICIAL GUIDELINES FOR DECIDING SOFTWARE INFRINGEMENT ACTIONS Spring, 1986 SUSAN L. MASHOUR 16 Rutgers Computer and Tech.L.J. 323 DIGITAL MEDIA AND THE CHANGING FACE OF INTELLECTUAL PROPERTY LAW Winter, 1990 Pamela Samuelson _____________________________________________________________________ | Tim Wolfson | Internet: tcwst@unix.cis.pitt.edu | | Pitt Law | CCNet : tcwst@CISUNX | | PGH, PA 15260 | UUCP : tcwst@cisunx.uucp | | (412) 486-0182 | Bitnet : TCWST@PITTVMS.BITNET | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Date: September From: Entity Subject: A comment on Zod's case ******************************************************************** *** CuD #2.03: File 4 of 4: A Comment on the Zod Case *** ******************************************************************** I hope to present you with some of the details regarding Zod's bust so that your readers can be more familiar with the case. Sometime around late October 1989 or so, Zod set up a multi user chat system on a US Air Force system. The program he was using was Hans Kornedor's chat program , which many of you may recognize as the chat program used on the ALTOS german hacker chat systems. In any case, Zod modified this program, making superficial changes and labelled it TDON chat. What he did was infiltrate a US Air Force UNIX system at Andrews Air Force Base. Because of the extremely lax security on the system, he was easily able to gain super user privileges and set up an SUID shell in one of the directories. He then changed the password on an unused account (Foster. Password was TDON) and set his TDON chat system up. He then went onto places such as TCHH (Germany), ALTGER (Germany) and QSD (France) and started spreading the news of this great new chat. Thankfully, not many people paid any attention to Zod (who is world reknown to be a class "A" bozo.) Very few people called and of those who did, it was mostly american users on telenet, although there were a few european callers as well. I was actually invited to the system by an up and coming VAX/VMS hacker who used the alias 'Corrupt' (he was part of the group HiJiNx!). I knew him from meetings on the various european chat systems as well as him being on the Corrupt Computing Canada BBS System in Toronto, Canada. Last I heard, he was busted as well, although I am not sure of on what charges. The chat itself was up for maybe a week -- a week and a half at best. At this point you are probably wondering who would be suicidal enough to set up a hacker chat system on a US Air Force system, right? Well, there's more to Zod's stupidity than just that. In addition to setting up the chat, Zod decided that he would be smart and in the .login script for the foster account he added in the TEE command to log everything to a file. For those unfamiliar with UNIX, the tee command basically takes the input coming into the user's TTY, and makes a copy of it into a specified file. Zod had this input go into a directory with the filename the same as the user's process ID. I guess Zod's intention was to at a later time peruse these files for useful information, but what he ended up doing was handing us all to the authorities on a silver platter. Now one of the modifications that Zod had made to the chat program was to add in a shell escape. I never did figure out what the escape sequence was (not that I ever looked very hard), but I noticed that if I lifted my phone up, (thereby sending garbage over the modem) and put it back down, I would automatically be plopped into the shell! It was here that I discovered all the craziness that Zod had set up. You can imagine my surprise when I looked at some of the files in my directory and discovered that this chat system had been set up on a military unix machine! It was then that I found all the TEE'd files, the source code to his TDON chat, and the SUID root shell. Again for those unfamiliar with unix, an SUID root shell basically allows a user to run this file and gain superuser privileges by temporarily changing their User ID to that of root (superuser). Those familiar with hacking unix's will agree that it is never a good idea to leave such a file around on a system since it can be easily detected if not hidden properly. Not only was this file NOT hidden, it was put in plain view of the system administrator! If my memory serves correctly, it was put into the /tmp directory under a very obvious filename! Of course, the biggest problem with this particular set up was the TEE'd log files that zod had created. Those files had some very far reaching consequences as I shall describe in just a minute. Because of Zod's generosity in logging all chat sessions, Air Force Security staff had no reason to do any additional logging of information. What the security staff did was first of all change the password on the foster/tdon account and then made backups of all the chat session files. These were then compiled into a huge document (looks to be about 800-900 pages) and was edited to take out overlapping chat processes. I have managed to acquire this document through a friend of mine who was recently charged for infiltrating several systems. Part of the evidence was that document submitted by the Andrews Air Force base. For the benefit of those people who called this chat and who gave out incriminating evidence, I will just briefly list their names. You guys should realize that your particular sessions were logged and are included as part of the evidence. I would not be surprised if a further investigation stemming from Zod's bust were to be carried out. The people who should be watching their tails are: Sam Brown, Hunter, Phreakenstein, Outlaw, Corrupt and Jetscream. These are obviously not the only people who were logged, but they do represent those who passed out accounts and passwords and other incriminating information on the chat, as well as having spent the most amount of time on there. So how does this lead up to Zod's arrest? Well, I'm not positive. On the Air Force machine, zod was dumb enough to leave his name plastered all over the chat including on the logon screen. Of course this cannot be used solely as evidence enough to convict, but it sure as hell points in his direction. Zod was also not a very careful person -- this is of course obvious from him having set up the Air Force Chat, but in addition, he left behind a lot of clues. He wasn't a very competent hacker and never cleaned up after himself. I assume it wasn't very difficult to track him down from his blatant misuse of the City University system in Washington. It is my understanding that Corrupt and others were busted indirectly because of him. Perhaps someone closer to the source can confirm this. In any case, what all this goes to show you is how the stupidity of one individual can lead to the problems of so many others. By setting up a hacker chat system on the Andrews Air Force base system, he committed a great mistake. By then inviting so many hackers from the international hack scene, he committed a greater sin. But for actually logging all this information and never deleting it, he committed the ultimate crime. This kid is a royal pain in the posterior and a serious threat to all hackers. - Entity/CCCAN! (Corrupt Computing Canada) ******************************************************************** ------------------------------ **END OF CuD #2.03** ********************************************************************

---

E-Mail Fredric L. Rice / The Skeptic Tank