Computer underground Digest Sun, Nov 16, 1991 Volume 3 : Issue 41 Moderators: Jim Thomas a

Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

Computer underground Digest Sun, Nov 16, 1991 Volume 3 : Issue 41 Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) CONTENTS, #3.41 ( November 16, 1991) File 1--Moderators' Corner File 2--"CRIME IN CYBERSPACE" Panel Discussion File 3--Bill Cook's opening statement in the Neidorf trial Issues of CuD can be found in the Usenet news group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from (,, and To use the U. of Chicago email server, send mail with the subject "help" (without the quotes) to COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Thu, 16 Nov 91 9:39:58 EST From: Moderators Subject: File 1--Moderators' Corner ------------------------------ Date: Thu, 16 Nov 91 9:39:58 EST From: Moderators Subject: File 2--"CRIME IN CYBERSPACE" Panel Discussion The CuD moderators, Mike Godwin of the Electronic Frontier Foundation, and several other prominent scholars will participate in a panel on "CRIME IN CYBERSPACE" at the American Criminological Society annual meetings in San Francisco on Friday, November 22. Their session will be in the Yorkshire Room of the St. Francis hotel from 1:15 to 2:45. For more information, contact: Jim Thomas ( or (815) 756-3839). The complete session: Chair: Gordon Meyer: Co-editor Computer underground Digest Mike Godwin (Staff Attorney, Electronic Frontier Foundation): "Criminal law and the computer youth culture" Richard C. Hollinger (University of Florida): "Hackers, Crackers, and Pirates: Rethinking Social Control" Lee Tien (University of California, Berkeley): "Folk Notions of Property & Privacy in the Information Society" Jim Thomas (Northern Illinois University): "From Disk to Discourse: The Images of Techno-Evil" Gary T. Marx (Department of Urban Studies and Planning): Discussant Albrecht Funk (University of Hamburg): Discussant ------------------------------ Date: Thu, 16 Nov 91 9:39:58 EST From: Moderators Subject: File 3--Bill Cook's opening statement in the Neidorf trial JURORS: Good morning. MR. COOK: My name is Bill Cook. I'm an Assistant United States Attorney. I am going to be substantially aided in this prosecution by Colleen Coughlin, who is an Assistant United States Attorney, and Dave Glockner, who is also an Assistant United States Attorney. We will be having Special Agent Tim Foley of the United States Secret Service working with us. He is sitting at the trial table with us. In 1876, the first telephone communication ever made was: "Mr. Watson, come here, I want you". That was also the very first emergency telephone call ever made. Since that time, the telephone company has, obviously, sophisticated their operation to a large degree so that where we stand today in 1990, we are the beneficiaries of what is known as the Enhanced 911 system. That system is a life line for every person certainly in the Southern Bell region of the United States. It's taken for granted. It is an extensively developed system. You're going to hear a great deal of information about the development of that system and the architecture that that system is based upon. It is built on computers from bottom to top. In 1988, a road map to that computer system, that life line, was stolen from a computer in Atlanta, Georgia, by a man by the name of Robert Riggs, who is a member of an organization known as the Legion of Doom. That document, with its proprietary markings, its warnings on it, and the clear indications that it was the property of BellSouth, was transferred electronically to Mr. Craig Neidorf, the defendant here, seated right here. Mr. Riggs is a hacker, a person that breaks into computers. He answers to no one but his own ability to get into those computers. We anticipate that the evidence will show that in February of 1989, Mr. Neidorf published that extensive road map to the life line of the entire hacker community so far as he was able to determine it and define it. In many respects, I submit to you that this is not going to be a, "Whodunit", or "What was done?". There are two sets of violations charged in the indictment. Very briefly, they are the interstate transportation of stolen property and what is referred to in legal jargon as a wire fraud. With respect to the interstate transportation of stolen property, the evidence will show that Mr. Neidorf admitted to receiving the stolen property, the stolen E911 text file from Robert Riggs. He further admitted to Agent Foley that at the time he received the document, he knew it was stolen. With respect to the wire fraud the evidence will show that the wire fraud was really an outgrowth of what you are going to be hearing about and what will be described as the Phoenix Project, an effort by Mr. Neidorf to consolidate a group of hackers. The object of that wire fraud scheme was extensive, but it included providing hackers with information about how to crack into other people's computers, soliciting them to try to provide him articles, articles for his publication PHRACK newsletter which he would then distribute to other hackers. The evidence will also show that Mr. Riggs knew of the hacker activities, the break-ins that were occurring as he would follow along with their activities. In that respect, he was almost a "hacker groupie", except a groupie that sought to be in control and direct many of the operations. He received stolen property, property stolen from computers, stored on computers. Now, just one more set of observations about the indictment and the format of the indictment, and then I'll move on to what some of our more immediate concerns might be. = . = . = . = MR. Cook: Mr. Neidorf is charged in each count of the indictment, except for the first count here. The coding here is this is the second count of the indictment on down to Count Eleven. These are the approximate dates that the violations or the activities occured that are alleged in the indictment. Specifically, in the second, the second count of the indictment alleges that on July 22, 1988 as part of the wire fraud scheme, Mr. Neidorf generated an issue of PHRACK World News in which he announced the instigation of the Phoenix Project, the Phoenix Project because it had been a year since the 1987, in their parlance, collapse of the computer world by virtue of a series of law enforcement raids. Mr. Neidorf announced here that he wanted the hacker community to come together again to be more effective than ever. The next activity is the third count of the indictment, September 19, 1988, a wire fraud allegation again, E-mail, electronic mail, generated from Mr. Neidorf to Mr. Riggs and Mr. Scott O, a computer hacker. This electronic mail, this electronic mail here also, these are efforts by Mr. Neidorf reaching out to consolidate, identify and pull together a group of hackers that he could be working with for the publication of PHRACK, people that would supply him with information and articles, and, as it turned out, people that in fact, supplied him with stolen information, stolen from computers. These allegations refer more directly to the interstate transportation and movement and file transfers of the E911 text file. Count Seven refers to the publication of a series of computer articles that deal with how to break into a UNIX operating system. Counts Eight and Nine refer to the text file being sent from Neidorf back to Riggs, from Neidorf in Missouri to Riggs who was physically in Atlanta, but who used the bulletin board, computer bulletin board, in Lockport, Illinois, sending it back for review and to make sure that Neidorf had done an adequate job of concealing the nature of the file fro the point of view not the contents so much of the file, but concealing where Riggs had stolen it from to protect Riggs, and, to a large degree, to protect himself so that it couldn't be identified exactly where the document had been stolen from. Finally, we have the publication of the E911 text file in the PHRACK newsletter by Mr. Neidorf. you will be seeing the indictment in the jury room as you deliberate. This is just an overview to give you an overfocus of where the allegations are going to fall and the types of information that you are going to be hearing about. Now, if I were you, if I were you, I would be sitting there, as some of you may be, thinking to myself, "What have I gotten myself in for? He's talking about computers. He's talking about operating systems. Whooooaaaa!" First of all, you don't need to be a computer user, or a computer ace, to understand what this case is going to be about. It really deals with, in its most essential form, stealing property and transferring property, the interstate transportation of stolen property. So it's a simple stealing and a simple fraudulent taking, taking by deception. But it just involves some relatively high-tech tools. Don't let the tools confuse you from the fact of the taking and the bottom-line information. I'm telling you to relax about the computer jargon. There are several concepts that we're going to be talking about here. What I'm going to give you is a kind of a lawyer's description. That is supposed to let you know that it is far from an expert's opinion on some of the things you're going to be hearing. (Blackboard) Well, let's talk about some of the technology that's involved, and see if we can't make ourselves more comfortable with it. I referred to the UNIX operating system. UNIX...U-N-I-X. What is that? Well, computers speak a language. Computers speak the language that the people that built the computer want them to speak, or they speak the language that the people that run the computer want it to speak. Sometimes computers can be set up so that you can have them speak several different languages. UNIX is just a language. It is just the language that the computer speaks. It talks UNIX. Some of you talk about MS/DOS. It's a microsoft disk operating system. Forget it! It's just the language that the computer speaks. (Blackboard) Now, this is a theft of information. You are gong to be coming in contact with the concept that when you take information from a computer, what you really do is you order the computer to make a duplicate original o what its memory is or what it contains with respect to that particular item. And when you are asking the computer to send that information to you, you are doing a file transfer. I'll get to that later. You are just telling the computer to send it to you. What the computer sends to you is a copy. It's an exact copy in every respect of the original information on the computer. So the value of the property comes from the fact that it contains information. There is an expression that, "Information is power". It is only power if it's communicated. That's where the value of information comes from in our society. Certain types of information are protected by companies. They are reasonably protected by companies, especially when they become sensitive. The E911 road map and the information about where all the stops along the way are, that was a sensitive piece of information. You're going to be hearing about the protections that BellSouth put on that information, and the efforts that they made to safeguard it. So when the information is stolen, what is stolen is a copy of the information. You will be receiving further instructions from the judge on all that. So it is the information that is being stolen. (Blackboard) Now, the next concept--I talked about protection--file transfers. File transfers. Here's a riddle for you: "Why is a file transfer the same as a high school graduation?" Here's the answer. When you hear about this, think about a high school graduation. They call your name from the audience. You come up to the stirs, probably by the path that the nun ordered you to take to get to the stage, and you had better not vary from the path. You follow that route up to the stage, across the stage, and a file transfer takes place at center stage in the auditorium. You reach out, you shake hands with the principal, and with the other hand, after you have shaken hands with the principal, you receive your diploma, or you receive your information, you receive your file. That's really all a file transfer is on a computer. You come up, you are ordered, someone in a remote location, the principal in this case, calls your name, you come up to the stage, you are the computer on one side and he is the computer on the other side. You shake hands. And in the computer world, all that means is that you are able to communicate. It's actually called that. It is called a "handshake relationship" with another computer. There are some other words, like "protocol" and things like that, but, really, it is just a handshake relationship with another computer. After the handshake is there and the principal recognizes you to be the problem kid that he's glad to get rid of--he didn't like you--then he gives you the file. That's the file transfer. It is no different transferring information from one computer to another. (Blackboard) Computer network. Well, that is probably a pretty easy concept to get hold of these days. It is really not much different than with your televisions, especially if you have cable television where you have some designated programming and it comes in to your machine, your television in this case. Of course, the difference is with cable television as opposed to a computer, with the computer you are able to have more of an interchange with the TV and what is going on with the program. So don't be concerned about the network idea. Keep in mind the idea of a cable coming into your computer as part of a centralized system. That is really all the network is, a series of computers joined together. In the case of BellSouth, you are going to see that that is a very expensive computer network. In order to provide service to their customers, they hang a lot of computers on that network, computers that do different things, computers that keep track of where the people that are using the phones are at, computers that keep track of what telephone number goes with what address, computers that keep track of the switches, the computer switches. Now, that's another concept I'll talk about for a second. (Chart) When people think of computer switches, they are telephone switches. The concept of a lady at the switchboard always comes to mind with a knob here that goes to a hole up here, connecting one person to another person. Today, all of that is done by high-speed computers, high-speed switches. They are electrical. Because they are electrical, they are referred to as ESS. All this means is an electronic switch. This is a computer. This computer has the memory of how to get the numbers that are diales to the phone that corresponds with those numbers. These computers also have the information about how to get your call all the way across the country, which route are we going to take to get there, which road are we going to take. The Enhanced 911 system was built on these computers. Part of the reason was because of the high speed that is involved. You can get the emergency call through faster if it goes like thing. Now, the switches at various areas: Switch 1, Switch 2. This is the first switch we produced, Switch 1. And the second switch we produced, Switch 2. The fifth switch, Switch 5. When they increased the capabilities of those switches, the way they kept track of which switch they were talking about was to label the switches: 1 or 1A, 2, 3, 4, 5, a fairly easy way to keep track of the switch development. But the idea is that all electronic switches operate essentially the same. So if you have the key to get into this (indicating), you have the keys to get into them all. The evidence will show that the hackers in the BellSouth Region had the keys to get into them for a period of time. Now, another question, a riddle: "Why is computer security like a hotel?" Mr. Garcia is going to be explaining that to you. Actually, it's a lot like staying in a private hotel. In the case of the computers at BellSouth, the computers that drive the E911 system and support the phone company system aren't known to the public. They are unpublished numbers. They have their own network. The network, to be sure, has interlinks with the private sector and can be reached by field people in the telephone company, but it is really a closed system. It is designed to be for protection. So the hotel, the computer, is not known to the outside world. Where the door is is not known to the outside world. When you walk into the hotel, it's like if you try to walk into a hotel in downtown Chicago. If you go to the desk and ask them, you know, "I want to have Joe Jones' room". Well, first of all you say: "I want to see Mr. Jones." "Well, we can't tell you if he's here." "Well, if you tell me he's here, I want to talk to him. I want to speak to him. Give me his room number. "Well, we're not going to give you his room number. You are going to have to call him on the house phone and he'll have to verify that you're somebody he knows." So there are a series of checks that are set up inside the system. But once you get inside the hotel, you can make contact with Jones. And you will see, just as in real life, you have a number of people at one hotel. You will have people going back and forth in the hotel. And the person that runs the hotel assumes that they're all there for good valid reasons. He's not going to do anything but just a cursory check to make sure that everything is still in order. It is really the same thing and the same principle is involved if you are the system administrator on one of these computers. You are in the position, in the shoes, of the hotel operator, the guy that runs the hotel or the lady that runs the hotel. You make sure that the right people show the right credentials to get in and you exercise and upfront control. You also exercise control over some of the common spaces. You make sure the halls are lit. You make sure that things aren't being badly destroyed to the best of your knowledge, although you don't know always what's going on inside each of the rooms. It's very much the same. So when you hear a person talk about running a system or computer system security, think to the analogy of being a hotel operator. We have a man, Mr. Garcia, from BellSouth, who will be testifying to that and to that analogy, and I think you'll find it most interesting. (Blackboard) Text file. You will hear a lot about that. That is probably a new term for you when you walked in: text file. Just think of it as a book or a pamphlet stored on a computer. That's it. That's the end of the mystery. A book or a pamphlet stored on a computer. But because it is stored on a computer, it can be copied if you can get into the computer. That's what happened here. (Blackboard) BBS. It means bulletin board system. Sometimes it will have a "C" in front of it. All that means is computer bulletin board system. Now, here's my analogy to that. The computer bulletin board system is a lot like a private high school where you have to have permission to get in the front door. And the people that run the high school have to give you permission to get into their private location. But once you get into their private high school and as you walk through, one of the first things that meets you as you walk into the private high school is a bulletin board with messages posted on it. And what you will also see along the sides of it are going to be lockers, student lockers. The principal bulletin board that you are going to be hearing about during the course of this case is the Jolnet bulletin board in Lockport, Illinois. The Jolnet bulletin board in Lockport, Illinois, acted as a central clearing house for the information that was being sent from Riggs in Atlanta to Neidorf in Missouri. To carry the analogy a little further, the evidence is going to show that Riggs used the bulletin board. He used it under a false name which he used to disguise his real identity. He use it under the name of Robert Johnson instead of Robert Riggs. He had authorization to use the bulletin board section where you post messages generally, and he also had a storage locker on the bulletin board, on of those lockers along the wall in a high school, where he thought he could safely store the text file, the E911 text file that he had stolen. The evidence is going to be, though, that law enforcement, Hank Kluepfel, found out about it. Mr. Kluepfel's efforts to get into and to use Jolnet in that storage area will be testified by Mr. Kluepfel. But the only thing we need to remember here at this point is that the information was stored in Lockport, Illinois. That is where the private high school is located. It was stored in the locker of a private high school in Lockport. But because computer technology is the way it is, Riggs is able to transfer the file by E-mail or a file transfer down to Neidorf in the computers at the University of Missouri. Again, this analogy is not quite the same as the bulletin board, but the University of Missouri has a capability there at the university to allow students to have essentially a locker on their computer system where Neidorf generated PHRACK Magazine from. Just a final note of reassurance. As we go through the evidence here, we are going to try to have the witnesses explain as each step progresses what the technology is again. So hang in there and listen with an open mind, as I know you will anyhow, listen to the explanations of the technology. (Chart) The evidence in this case is going to show that the text file that was stolen here described in vivid detail each of the locations along the E911 path to an emergency call. It's going to show and it did show the central location and the central significance of two places. When an emergency call is made in the BellSouth area, BellSouth region--it is really the area geographically that southerners describe as "Ol' Dixie"--when an emergency call is made there, it goes to a thing called a PSAP, public safety access point. The public safety access point is the one that is in direct communication on secure lines with the fire, police, and ambulance. Under the old 911 system, the old emergency dialing system, the call would come in, and they would have to trace it back to the origin in many cases. You have a situation potentially where someone would call, perhaps a child, and say, "My dad's hurt", and before the operator could talk to the child, they hang up the phone. The child, of course, figures, "Well, I called them. I told them y dad was hurt. They'll e here". So it is, obviously, not that easy. Under the old 911 system, a complicated tracing procedure had - 20 - to be established. They had to try to find out where the call had come from, and it's all done in an emergency posture. Now comes Enhanced 911. You will hear the lady that is operating that system, or operated it for the balance of time involved in this case. You will also hear from the man, Richard Helms, that brought all the pieces together for the bellSouth region, and put them in one central location so that all the phone companies supporting the 911 system, the Enhanced 911 system, would all be on board and be working with the same game plan, never thinking that that game plan was going to be over over to hackers. The Enhanced 911 gives you this capability within three to five seconds of the time that the person picks up an emergency call and that 911 is entered in, sometimes even before the person at the public safety access point can pick up the phone. The computers that drive the 911 system have done this: They have gone, in this case, to the remote location in Sunrise, Florida, where the back-up systems and the support systems for the control, the maintenance and the operation of 911 are kept, and it has pulled up all kinds of information about the person making the call. When the person picks up the phone, it's connected wit police, fire and ambulance. They have a TV monitor in front of them or a computer monitory, if you will, which has all kinds of information. It has the name of the caller or the people that the are known to be at the calling address. It will have location information with respect to where the closest department is, fire department, police department, to that person. It will also contain information in their computer storage banks about special problems that may exist. If it's a business, if it's a business involving chemicals, the fact that those chemicals are explosive will be reflected on that screen. If it is a private home, if there is a handicapped person there, it will be reflected on that screen. And it's all done within a matter of three to five seconds. They have it captured there. That is what Enhanced 911 is about. That's the system that Robert Riggs stole: how that all works together, and how the computers at BellSouth support that kind of capability, consistent with the telephone company's long history, going back to that first phone call, "watson, I want you", their tradition of providing emergency services as the first priority of the phone system. You will be hearing from essentially three groups of witnesses. You will be hearing from people at bellSouth that will tell you about the steps taken to protect the system. They will tell you about the way the file was defined. They will also tell you that at the same time that they were having these problems with 911 in terms of the los of the file, at the same window, they recognized that there was a larger problem throughout the network as a result of hacker intrusions, that there were a series of bellSouth computers along the network that had been attacked or were under attack. Some of those computers included the ESS switches. They recognized that the Enhanced 911 theft was a symptom of a disease. The disease was the hackers into switches, and they took remedial steps. They started out slowly to try to identify it, and then they rapidly expanded, trying to solve the disease along with the problem of E911. So you will hear from the BellSouth people. You are also going to be hearing from three members of the Legion of Doom, three hackers. You're going to be hearing from Robert Riggs, Frank Darden and Adam Grant. They have hacker handles. These hacker handles sometimes seem to get to be a little on the colorful side, a little bit like "CB" handles. You are going to be hearing the testimony of the hackers. You're going to be hearing the testimony of Robert Riggs who will testify that Mr. Neidorf had been after him to give him information to put into PHRACK, this hacker newsletter. That when Riggs had broken into the AIMS-X computer in BellSouth, he saw on that AIMX-X computer at BellSouth the 911 text file. You're going to hear that he contacted Neidorf in advance, that in that advance conversation or communication, he advised Neidorf that he had the text file, he was sending him the text file to put in PHRACK, that he had gotten it from an unauthorized account that he had on the BellSouth computer. Essentially, what he told Neidorf is, "This is a stolen piece of material you're getting". He indicated to Neidorf and Neidorf agreed...first, he agreed to take the stolen property, and he agreed to disguise the identity of the stolen property to some degree so that it wouldn't run off on Riggs. Riggs' name wouldn't appear on the file when it was published in PHRACK. He would try to disguise some of the indiations that it was stolen from the BellSouth area...Neidorf would. You will hear evidence that that is exactly what Neidorf did to some degree or another. You will hear evidence bout Neidorf seeing and noting the proprietary warnings that made it clear that this was stolen property belonging to BellSouth. He even made a joke of it. He put a little, "Whoops"next to it when he sent it back to Riggs because he didn't want BellSouth to know that he was inside their computers. You're also going to hear evidence that Riggs was never satisfied with the final result that Neidorf had because it always contained too much information even for Riggs. But the E911 system, the text file and the road map, was published by Neidorf all the same. You are going to be hearing from Agent Foley who will testify that he talked to Neidorf about this at his fraternity house at the University of Missouri. Neidorf said he has freedom of expression. That was his response to Foley: Freedom of expression to publish it in PHRACK. The First Amendment can't be used as a defense to theft. When you steal something, you can't claim that coming up the back door, the First Amendment protected you. You will be hearing from Agent Foley though that as part of this discussion with Mr. Neidorf, Mr. Neidorf, in fact, admitted that he knew the file was stolen, the text file was stolen, and he published it in PHRACK. He also turns over to Foley a hacker tutorial, a hacker lesson to other hackers on how to break into the ESS switches. He turns that over. The evidence will also indicate that in addition to that stolen information was information about a stolen AT&T source code document. Here he goes again...source code! The source code program had a Trojan horse in it. It made it clear right on the face of it that it was a Trojan horse, a way of stealing passwords from a computer. I am going to have to pause here for a second to make sure that I reassure you again on the descriptions and the items we'll talk about. The source code is a type of language. It is kind of a way human beings write things down as a first step toward communicating with computers. They write it down in source code, which is directions. A rough analogy would be if I'm going to give you directions on how to get to my house. The source code for that kind of program might be something like: "Go to the door. "Open the door. "Go through the door. "Go forward to the sidewalk. "Go the the sidewalk and stop. "Stop at the sidewalk. Turn left. "After you turn left, start walking. Step by step by step progression along the way. That is kind of what the source code is about. You will hear, fortunately, a much better description of this from the witnesses on the stand. The source code program that was stolen here that Mr. Neidorf received, again, basically was clear from the face of the document that it was stolen. And, again, Mr. Neidorf transferred it out to somebody else. Again, stolen property was received and distributed in interstate commerce. The nature of this source code was that it would act a lot like a false front door to a computer, where you walk up to the false front door of the computer, you knock on the door, and somebody inside the door or inside the house says, "Who is it?" The person knocking on the door uses their secret word, or their name or an identifier, or it's recognized by the person inside the house: "My name is Joe Jones." "My name is Bill Cook." "My name is Colleen Coughlin." "My name is Tim Foley." Except with this door, it was a false door, and what it had the capability to do is it would record the information. It would record, "Bill Cook," "Joe Jones," "Colleen Coughlin," "Tim Foley". Those are the passwords to get into the house that a legitimate user of the house would use. But this Trojan horse, what it would do is it would store those, and after it had stored all that information, it would essentially disappear. And the person trying to get in the house would all of a sudden get a communication from the other side that would say, "I didn't hear you. Try it again". It would steal those passwords, and it would then put them in a private place where the hacker would come back whenever he wanted to, and just pick up the bucketful of passwords and log-ons, and use them to break into the same computer systems again and again, kind of an elaborate piced of scientific perversion but that is what it is about. That was the document that Mr. Neidorf also trafficked in as part of this fraud scheme. The final expert that you will probably hear from on the government's side is going to be a man from inside the phone company, a man who was with bell laboratories before he was with the phone company. His name is Mr. Williamson. Mr. Williamson will talk to you about the property, the property being the text file, and the way in which and the reason that the phone company protects this kind of property, this information. He will testify, we anticipate, to the obligations of the phone company, to the significance of the text file, along with other people, and the fact that the theft was the theft of critical information for the operation of that system, and that the proprietary markings made it clear to anyone who took it that that was stolen and that they didn't have authorization for that document. No matter what other information floating around about 911 that might be out there, this document was proprietary and contained the inside information about what this system was all about, and how an emergency call is driven from the point of someone picking up the receiver to the time when the help is actually generated from the fire, police and ambulance stations. As I've said before, it's that text file that Mr. Neidorf deliberately compromised into the hacker community. At the conclusion of this case, we are going to be coming back here and asing you to find a guilty verdict against Mr. Neidorf for the interstate transportation of that stolen text file both from the time he got it from Riggs, and it was sent from Rigs in Georgia to the bulletin-board in Lockport down to Neidorf at the University of Missouri, that's one interstate transportation of stolen property, and the interstate transportation of stolen property, that same stolen information back from Neidorf to Riggs in Lockport. In this situation, it was reviewing the stolen property to make sure that they could disguise themselves. And then the final interstate transportation of that stolen property when Mr. Neidorf compromised the text file into the hacker community. (end of excerpts / entire opening can be obtained from CuD ftp sites) ------------------------------ End of Computer Underground Digest #3.41 ************************************


E-Mail Fredric L. Rice / The Skeptic Tank