**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 2, Issue #2.15 (December 5, 1990) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith / Brendan Kehoe USENET readers can currently receive CuD as alt.society.cu-digest. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors, however, do copyright their material, and those authors should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS: File 1: Moderators' Corner File 2: Len Rose Indictment in Illinois File 3: 2600 Magazine Response to Atlanta Sentencing File 4: List of Computer Underground Clippings File 5: Computer Crime Laws list File 6: Media and the CU File 7: The Hermetic Underground ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #2.15: File 1 of 7: Moderator's corner *** ******************************************************************** From: Moderators Subject: Moderators' Corner Date: December 5, 1990 ++++++++++ In this file: 1. FTP INFORMATION 2. WITNESSES FOR LEN ROSE'S BALTIMORE CASE 3. ADDRESS CHANGES ++++++++++ +++++++++++++++++++++ FTP Information +++++++++++++++++++++ The current address for the widener ftp site is: ftp.cs.widener.edu The hours have been extended, and a number of files, including IIRG and NIA (Network Information Access), individual state computer crime statutes (eg, Calif, Fla, Ill.) have been added to all three sites. ++++++++++++ Request for Unix Witnesses for Len Rose ++++++++++++ Len Rose is currently planning the defense for his trial in Baltimore in February, and is looking for Unix experts/gurus able to testify about the Unix system. If you can recommend anyone, drop us a note or, better, call Len at (708) 527-1293. ++++++++++++++++ ADDRESS CHANGES ++++++++++++++++ If you are going to lose your account for any reason, be sure to drop us a line so we can delete your name from the mailing list. It reduces bounced mail and helps net traffic. Thanks. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Moderators and others Subject: Len Rose Indictment in Illinois Date: December 5, 1990 ******************************************************************** *** CuD #2.15: File 2 of 7: Len Rose Indictment and News Article*** ******************************************************************** "Innocent Plea in Computer Case: Naperville Man Denies Taking Key Program from Firm" From: Chicago Tribune, December 4, 1990: Sect. 2, p. 7) By Joseph Sjostrom One of the first persons ever charged with computer tampering in Du Page County pleaded not guilty Monday. Leonard Rose, 31, of Naperville, entered the plea before Associate Du Page County Judge Thomas Callum, who set the next hearing for January 14. Rose is charged with gaining access to a computer at Interactive Systems, Inc., a Naperville software company where he worked for only a week last month, and with "removing" a program called AT&T Unix Source Code, which is the basic operating instructions that tell a computer how to receive and use all the other programs. If the case goes to trial, the prosecutor, Assistant State's Atty. David Bayer, will have to convince a jury that Rose removed the source code and that such action was illegal, even though the code remained in the computer from which he allegedly took it. Rose's attorney, Sheldon Zenner of Chicago, expects the case will never get beyond the first of those questions. "Quite simply, he didn't do it," Zenner said. Rose is under federal indictment in Baltimore for copying a similar program from a computer there and putting it on a computer bulletin board, where computer users could copy and use it without paying fees to AT&T. Rose was indicted on November 21 in Du Page County. Naperville police and state's attorney's investigators searched his apartment and confiscated two computers and a number of computer discs. "There were certain commands made on %the Interactive Systems% computer which suggest the source code was copied, or down-loaded %onto another computer%," Zenner said. "So they looked for the source code on Rose's computer, but it wasn't there. So they'll have to try to analyze the commands made on his computer and I expect they'll have an expert testify that, based on his analysis, the code was downloaded %onto Rose's computer%. "But the source code isn't there because Rose didn't do it," Zenner said. "I expect to show the court that a serious mistake has been made." Despite the large number of sophisticated research and business computers in Du Page County, the only other recent prosecution for computer tampering was the case of a woman who used a computer about two years ago to take revenge on an employer for firing her. She was put on probation after admiting that, in a fit of anger, she purged several programs from the company computer before departing the office for the last time. Otherwise, the extent of computer tampering and fraud is impossible to know, though experts say the opportunities for such activities are extensive. (end article) ******************************* %Moderator's note: The story is a fair overview, but there is one major inaccuracy. Len Rose's Baltimore five count indictment *DOES NOT* charge him with "copying a similar program from a computer there and putting it on a computer bulletin board, where computer users could copy and use it without paying fees to AT&T." The federal indictment in Baltimore charges him with two counts of sending a trojan horse login file (which is not, in itself, illegal), and with three counts of transporting a very small portion of a Unix file across state lines. He is *NOT* charged with theft of that program in the indictment. Nor is he charged with downloading it or with placing it on a BBS where it could be downloaded. This portion of the story sounds like information provided by a prosecutor, because the reporter indicated he had not read the Baltimore indictment. ******************************* The following is a voice-transcribed version of Len Rose's indictment of December 3, 1990 (Illinois, Du Page County; Case # 90-CF-2635). The form may not correspond exactly with the original, but it approximates the wording as closely as possible. The status hearing is set for January 14, 1991. ****************** The grand jurors chosen, selected, and sworn, in and for the County of Du Page in the State of Illinois, IN THE NAME AND BY THE AUTHORITY OF THE PEOPLE OF THE STATE OF ILLINOIS, upon their oaths present that on or about the 17th day of October, 1990, at and within Du Page County, Illinois, Leonard Rose committed the offense of Computer Tampering in that said defendant accessed a computer belonging to Interactive Services, a corporation doing business at 1901 S. Naper Boulevard, Naperville, Du Page County, Illinois, and removed a program known as AT&T Unix System without the authority of the computer's owner, in violation of Illinois revised statutes, 1989, Chapter 38, Section 16D-3(a)(3) AGAINST THE PEACE AND DIGNITY OF THE SAME PEOPLE OF THE STATE OF ILLINOIS. (end indictment) ************************ Following is the relevant language of the Illinois Criminal Code (Chapter 38): ************************ 16D-3. COMPUTER tampering s 16D-3. COMPUTER Tampering. (a) A person commits the offense of COMPUTER tampering when he knowingly and without the authorization of a COMPUTER'S owner, as defined in Section 15-2 of this Code, or in excess of the authority granted to him: (1) Accesses or causes to be accessed a COMPUTER or any part thereof, or a program or data; (2) Accesses or causes to be accessed a COMPUTER or any part thereof, or a program or data, and obtains data or services; (3) Accesses or causes to be accessed a COMPUTER or any part thereof, or a program or data, and damages or destroys the COMPUTER or alters, deletes or removes a COMPUTER program or data; (4) Inserts or attempts to insert a "program" into a COMPUTER or COMPUTER program knowing or having reason to believe that such "program" contains information or commands that will or may damage or destroy that COMPUTER, or any other COMPUTER subsequently accessing or being accessed by that COMPUTER, or that will or may alter, delete or remove a COMPUTER program or data from that COMPUTER, or any other COMPUTER program or data in a COMPUTER subsequently accessing or being accessed by that COMPUTER, or that will or ma cause loss to the users of that COMPUTER or the users of a COMPUTER which accesses or which is accessed by such "program". (b) Sentence. (1) A person who commits the offense of COMPUTER tampering as set forth in subsection (a)(1) of this Section shall be guilty of a Class B misdemeanor. (2) A person who commits the offense of COMPUTER tampering as set forth in subsection (a)(2) of this Section shall be guilty of a Class A misdemeanor an a Class 4 felony for the second or subsequent offense. (3) A person who commits the offense of COMPUTER tampering as set forth in subsection (a)(3) or subsection (a)(4) of this Section shall be guilty of a Class 4 felony and a Class 3 felony for the second or subsequent offense. (c) Whoever suffers loss by reason of a violation of subsection (a)(4) of this Section may, in a civil action against the violator, obtain appropriate relief. In a civil action under this Section, the court may award to the prevailing party reasonable attorney's fees and other litigation expenses. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: well!emmanuel@APPLE.COM(Emmanuel Goldstein) Subject: 2600 Magazine Response to Atlanta Sentencing Date: Fri, 30 Nov 90 00:23:06 pst ******************************************************************** *** CuD #2.15: File 3 of 7: 2600 Response to Atlanta Sentences *** ******************************************************************** The following article is from the Autumn 1990 issue of 2600 Magazine, The Hacker Quarterly. We encourage its distribution to anyone interested. If anyone needs to get in touch with us, we can be reached at: 2600@well.sf.ca.us or (516) 751-2600. ******************************************************************** Over the past year there has been a great deal of publicity concerning the actions of computer hackers. Since we began publishing in 1984 we've pointed out cases of hackers being unfairly prosecuted and victimized. We wish we could say things were getting better but we cannot. Events of recent months have made it painfully clear that the authorities, above all else, want to "send a message". That message of course being that hacking is not good. And there seems to be no limit as to how far they will go to send that message. And so we come to the latest chapter in this saga: the sentencing of three hackers in Atlanta, Georgia on November 16. The three, Robert Riggs (The Prophet), Frank Darden, Jr. (The Leftist), and Adam Grant (The Urville) were members of the Legion of Doom, one of the country's leading hacker "groups". Members of LOD were spread all over the world but there was no real organization, just a desire to learn and share information. Hardly a gang of terrorists, as the authorities set out to prove. The three Atlanta hackers had pleaded guilty to various charges of hacking, particularly concerning SBDN (the Southern Bell Data Network, operated by BellSouth). Supposedly Riggs had accessed SBDN and sent the now famous 911 document to Craig Neidorf for publication in PHRACK. Earlier this year, BellSouth valued the document at nearly $80,000. However, during Neidorf's trial, it was revealed that the document was really worth $13. That was enough to convince the government to drop the case. But Riggs, Darden, and Grant had already pleaded guilty to accessing BellSouth's computer. Even though the facts in the Neidorf case showed the world how absurd BellSouth's accusations were, the "Atlanta Three" were sentenced as if every word had been true. Which explains why each of them received substantial prison time, 21 months for Riggs, 14 months for the others. We're told they could have gotten even more. This kind of a sentence sends a message all right. The message is that the legal system has no idea how to handle computer hacking. Here we have a case where some curious people logged into a phone company's computer system. No cases of damage to the system were ever attributed to them. They shared information which we now know was practically worthless. And they never profited in any way, except to gain knowledge. Yet they are being treated as if they were guilty of rape or manslaughter. Why is this? In addition to going to prison, the three must pay $233,000 in restitution. Again, it's a complete mystery as to how this staggering figure was arrived at. BellSouth claimed that approximate figure in "stolen logins/passwords" which we have a great deal of trouble understanding. Nobody can tell us exactly what that means. And there's more. BellSouth claims to have spent $1.5 million tracking down these individuals. That's right, one and a half million dollars for the phone company to trace three people! And then they had to go and spend $3 million in additional security. Perhaps if they had sprung for security in the first place, this would never have happened. But, of course, then they would have never gotten to send the message to all the hackers and potential hackers out there. We think it's time concerned people sent a message of their own. Three young people are going to prison because a large company left its doors wide open and doesn't want to take any responsibility. That in itself is a criminal act. We've always believed that if people cause damage or create a nuisance, they should pay the price. In fact, the LOD believed this too. So do most hackers. And so does the legal system. By blowing things way out of proportion because computers were involved, the government is telling us they really don't know what's going on or how to handle it. And that is a scary situation. If the media had been on top of this story and had been able to grasp its meaning, things might have been very different indeed. And if BellSouth's gross exaggerations had been taken into account at the sentencing, this injustice couldn't have occurred. Consider this: if Riggs' sentence were as much of an exaggeration as BellSouth's stated value of their $13 document, he would be able to serve it in full in just over two hours. And the $233,000 in restitution would be under $40. So how much damage are we really talking about? Don't look to BellSouth for answers. In early 1991, the three are to begin their sentences. Before that happens, we need to reach as many people as possible with this message. We don't know if it will make a difference in this particular case if the general public, government officials, and the media hear this side of the story. But we do know it would be criminal not to try. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Subject: List of Computer Underground Clippings Date: Fri, 30 Nov 90 21:41 EDT ******************************************************************** *** CuD #2.15: File 4 of 7: List of CU News Articles *** ******************************************************************** Computer Hackers News Articles Compiled By Bob Krause KRAUSER@SNYSYRV1.BITNET The following is a list of articles that I have found concerning the computer underground in various magazines and news-papers. The list is in chronological order. If you know of an article that should be included in this list or correction, send me the information and I will add it to the listing. Nov 18 '90 Crackdown on computer crime is raising question of computer rights. Chicago Tribune pg.17 Oct 29 '90 Users paying big price for PBX fraud. Network World pg.1 Oct 28 '89 Halting hackers. The Economist pg.18 Oct 15 '90 Target: The Corporate PBX Information Week pg.24 Sept 9 '90 Can invaders be stopped but civil liberties upheld? The New York Times pg.F12 Sept 1 '90 United States v Zod The Economist pg.23 Sept '90 Digital Desperados; hackers indictments raise constitutional questions. Scientific American pg.34 Aug 26 '90 The rights of computer users. Los Angles Times pg.D9 Aug 22 '90 Open sesame; in the arcane culture of computer hackers, few doors stay closed. The Wall Street Journal pg.A1 Aug 20 '90 NY State Police round up hackers. Computerworld pg.99 Aug 17 '90 U.S. Arrests boy, 5 others in computer hacker case. The Wall Street Journal pg.82 Aug 6 '90 Computer anarchism calls for a tough response. Business Week pg.72 Aug 6 '90 Charges dropped against alleged BellSouth hacker. Telephony pg.12 July 30 '90 Hacker trial begins in Chicago. Computerworld pg.8 July 30 '90 'Hacking' crackdown is dealt a setback in trial in Chicago The Wall Street Journal pg.B3 July 21 '90 Crackdown on hackers 'may violate civil rights'. New Scientist pg.22 July 21 '90 Group to defend civil rights of hackers founded by computer industry pioneer. The Wall Street Journal pg.B4 July 10 '90 Group to fight for computer users' rights. Los Angles Times pg.D5 July 10 '90 Computer hackers plead guilty in case involving BellSouth. The Wall Street Journal pg.84 July 2 '90 Hackers of the World, Unite! Newsweek pg.36 May 21 '90 Throwing the book at computer hackers. Business Week pg.148 May 14 '90 Justice failed in refusing to make Morris an example. Computerworld pg.23 May 14 '90 Morris sentence spurs debate. Computerworld pg.128 May 14 '90 Wheels of justice grind to a halt in 'worm' case. PC Week pg.16 May 7 '90 Three-year probation for Morris. Computerworld pg.1 May '90 Just say No Communications of the ACM pg.477 May '90 Uncovering the mystery of Shadowhawk. Security Management pg.26 Apr 30 '90 The hacker dragnet: the Feds put a trail on computer crooks - and sideswipe a few innocent bystanders. Newsweek pg.50 March 26'90 Internet interloper targets hacker critics. Computerworld pg.127 March '90 Cyber Thrash SPIN pg.24 March '90 Is Computer Hacking a Crime? Harper's pg.45 Wntr '90 Comp. crime and the Computer Fraud and Abuse Act of 1986 Computer Law Journal pg.71 Feb 19 '90 Morris code. The New Republic pg.15 Feb 12 '90 Alleged hackers charged wit theft of BellSouth 911 data. Telephony pg.10 Feb 12 '90 Babes in high-tech toyland nabbed. Computerworld pg.8 Feb 11 '90 Revenge on the nerds; sure, jail our hackers - who needs software stars anyway? Washington Post pg.C5 Feb 9 '90 Hacked to pieces. New Statesman and Society pg.27 Feb 2 '90 Prevention is better than cure. Public Finance and Accountancy pg.9 Jan 5 '90 Computer hacking: is a new law needed. Public Finance and Accountancy pg.7 Feb 7 '90 Four charged with scheme against phones. The Wall Street Journal pg.B5 Dec 4 '89 Hackers: Is a cure worse than the disease? Business Week pg.37 Sept '89 Free the hacker two. Harper's Magazine pg.22 June 19 '89 Hacker invades So. Bell switch. Telephony pg.11 June '89 Consensual realities in cyberspace Communication of the ACM pg.664 Apr 3 '89 Strong scruples can curb computer crime. Computerworld pg.100 March 9 '90 Hackers revealed as spies. Nature pg.108 March 6 '89 Are ATM's easy targets for crooks? Business Week pg.30 Feb 20 '89 Prison term for first U.S. hacker-law convict. Computerworld pg.1 Jan 9 '89 Hacker prosecution: suspect held, denied phone access by district court. Computerworld pg.2 Jan 9 '89 Drop the phone: busting a computer whiz. Time pg.49 Dec 26 '88 The Cyberpunk People pg.50 Dec 11 '88 Computer intruder is urged by authorities to contact the laboratory he invaded. The New York Times pg.24 Nov 14 '88 Portrait of an artist as a young hacker. Computerworld pg.6 Nov '88 Robopsychology Omni pg.42 Aug 1 '88 Is your computer Secure? Business Week pg.64 Apr 28 '88 Hacker runs rings around military security. New Scientist pg.25 April '88 Computer hackers follow Guttman-like progression. Sociology and Social Research pg.199 Oct '87 Brian Reid, A Graphics Tale of a Hacker Tracker Communications of the ACM pg.820 April '86 Positive Alternatives: A report on an ACM Panel on Hacking Communications of the ACM pg.297 Jan '84 Hacking away at morality. Communications of the ACM pg.8 ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: brendan@CS.WIDENER.EDU(Brendan Kehoe) Subject: Computer Crime Laws list Date: Sun, 2 Dec 90 18:15:07 EST ******************************************************************** *** CuD #2.15: File 5 of 7: State Computer Crime Laws *** ******************************************************************** The following are the computer crime laws for various states for those wishing to track them down. AL Computer Crime Act, Code of Alabama, Sections 13A-8-100 to 13A-8-103 AK Statutes, Sections 11.46.200(a)(3), 11.46.484(a)(5), 11.46.740, 11.46.985, 11.46.990 AZ Revised Statues Annotated, Sections 13-2301(E), 13-2316 CA Penal Code, Section 502 CO Revised Statutes, Sections 18-5.5-101, 18-5.5-102 CT General Statutes, Sections 53a-250 to 53a-261, 52-570b DE Code Annotated, Title 11, Sections 931-938 FL Computer Crimes Act, Florida Statutes Annotated, Sections 815.01 to 815.07 GA Computer Systems Protection Act, Georgia Codes Annotated, Sections 16-9-90 to 16-9-95 HI Revised Statutes, Sections 708-890 to 780-896 ID Code, Title 18, Chapter 22, Sections 18-2201, 18-2202 IL Annotated Statutes (Criminal Code), Sections 15-1, 16-9 IN Code, Sections 35-43-1-4, 35-43-2-3 IO Statutes, Sections 716A.1 to 716A.16 KS Statutes Annotated, Section 21-3755 KY Revised Statutes, Sections 434.840 to 434.860 LA Revised Statutes, Title 14, Subpart D. Computer Related Crimes, Sections 73.1 to 73.5 ME Revised Statutes Annotated, Chapter 15, Title 17-A, Section 357 MD Annotated Code, Article 27, Sections 45A and 146 MA General Laws, Chapter 266, Section 30 MI Statutes Annotated, Section 28.529(1)-(7) MN Statutes (Criminal Code), Sections 609.87 to 609.89 MI Code Annotated, Sections 97-45-1 to 97-45-13 MS Revised Statutes, Sections 569.093 to 569.099 MT Code Annotated, Sections 45-2-101, 45-6-310, 45-6-311 NE Revised Statutes, Article 13(p) Computers, Sections 28-1343 to 28-1348 NV Revised Statutes, Sections 205.473 to 205.477 NH Revised Statutes Annotated, Sections 638:16 to 638:19 NJ Statutes, Title 2C, Chapter 20, Sections 2C:20-1, 2C:20-23 to 2C:20-34, and Title 2A, Sections 2A:38A-1 to 2A:38A-3 NM Statutes Annotated, Criminal Offenses, Computer Crimes Act, Sections 30-16A-1 to 30-16A-4 NY Penal Law, Sections 155.00, 156.00 to 156.50, 165.15 subdiv. 10, 170.00, 175.00 NC General Statutes, Sections 14-453 to 14-457 ND Century Code, Sections 12.1-06.1-01 subsection 3, 12.1-06.1-08 OH Revised Code Annotated, Sections 2901.01, 2913.01, 2913.04, 2913.81 OK Computer Crimes Act, Oklahoma Session Laws, Title 21, Sections 1951-1956 OR Revised Statutes, Sections 164.125, 164.377 PA Consolidated Statutes Annotated, Section 3933 RI General Laws (Criminal Offenses), Sections 11-52-1 to 11-52-5 SC Code of Laws, Sections 16-16-10 to 16-16-40 SD Codified Laws, Sections 43-43B-1 to 43-43B-8 TN Code Annotated, Computer Crimes Act, Sections 39-3-1401 to 39-3-1406 TX Codes Annotated, Title 7, Chapter 33, Sections 33.01 to 33.05 UT Computer Fraud Act, Utah Code Annotated, Sections 76-6-701 to 76-6-704 VA Computer Crime Act, Code of Virginia, Sections 18.2-152.1 to 18.2-152.14 WA Revised Code Annotated, Sections 9A.48.100, 9A.52.010, 9A.52.110 to 9A.52.130 WI Statutes Annotated, Section 943.70 WY Statutes, Sections 6-3-501 to 6-3-505 ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Moderators, Joe Abernathy, and "4 8" Subject: Media and the CU Date: December 4, 1990 ******************************************************************** *** CuD #2.15: File 6 of 7: Media and the CU *** ******************************************************************** %Moderators' note: We received a number of responses, including logs from various net sources, about the DEA/PBX story in CuD 2.14. We invited Joe to respond, and received another, unsolicited, commentary. We add a final concluding comment at the end of this file%. ***************** From: chron!magic322!edtjda@UUNET.UU.NET(Joe Abernathy) Subject: A Response to recent critics by Joe Abernathy Date: Thu, 29 Nov 90 20:35:30 CST The debate of the word hacker, while worthy and fascinating, is not something that makes proper material for a daily newspaper. The fact is that the force of society has made "hacker" into the bad guys, despite the fact that it used to refer to people like myself, who sit around playing with modems and assembly language. Most people in the press possess more knowledge about things like this -- and things like the difference between worm and virus, or usenet and Internet -- than they're given credit for. What the critics always miss is that reporters don't write just for computer scientists --they write for their grandmothers, their children, and for the public record. So what happens is that the reporters always choose the most accurate word or description that can be understood by the largest number of people. Screaming at reporters, or suggesting their ignorance, won't change the way hacker is used in stories. That definition is already written in the public consciousness, and in the laws of the land. Jack Minard, the second correspondent, invalidated his complaint by failing to read my article. I don't have time to do his reading for him, but I will respond to the one thing he alluded to that really does matter from a standpoint of journalist ethics: why the "hackers" weren't identified. They weren't because they wanted it that way ... which raises the issue of why anyone would allow one's accusers to go faceless. The answer is that we didn't -- the facts of that story were provided by the DEA itself, albeit upon my request, with the members of the computer underground identified only to provide color and perspective. Best Regards. *************************************************** From: 4 8 (Figure it out) Subject: In regards to the comments about the "DEA article" in the last CuD Date: 11/30/90 @ 4:43 PM In regards to the comments about the "DEA article" by Joe Abernathy of the Houston Chronicle: I find that what you have stated is limited in your knowledge to the story and exactly what happened. I'm very upset at the fact that you present Joe Abernathy as an "anti-hacker" journalist. Furthermore, you continue to present the quotes in the article as also being "anti-hacker". As it may be, I tipped off Joe about the story and it's background so he could publish it. Now, you may not know who wrote this, but if you did-- I'm almost positive you wouldn't dare to call me an "anti-hacker". Hell man, I'd make you eat those words. [And trust me, you don't want that] (Thank you for letting my ego surpass yours for that last paragraph) The PBX that was mentioned was abused ridiculously to the point at which someone had to come forward and tell who owned the lines. As many as 200+ were using this PBX nationally. The story wasn't done to "thrash" hackers, nor to embarrass the government (Well.. maybe a little bit!), it was done to show how stupid toll fraud can be if not exposed over a period of time. Now, I have something to say regarding the author of the article. Joe Abernathy is a very important symbol of these times. He what the community needs more of: A journalist who sees "grey" and has the power to reach people. I think you've made a great mistake in publicly voicing your opinion on the article and Joe. We need more Journalists like Abernathy who do see "grey" in this community. It appears to me that you didn't actually read the story. Otherwise, it would be obvious to you that it wasn't one sided. The quotes taken were from REAL hackers, ones that fed up with the BS of the current state of the community. You are "ragging" on a very good ally of this community, the press. In the past the press "bashed" hackers. I seldom see journalists hacker-bash anymore. Furthermore, the 1.8 million figure that Joe published was incorrect. Hell, I think it was more than 1.8 million! The PBX was accessable for about 1 year. And don't tell me that it would take 9.7 hackers dialing 24 hours a day to get that total. Hell! One hacker could EASILY surpass that total. I suggest you re-evaluate your views. YOU ARE THE ONE-SIDED STORY. Take heed to this warning: Your comments were taken personally by me. I believe that if YOU continue to bash the "grey-journalists" of this period, than you'll destroy a needed link between these journalists and the community. Regards, 4 8 PS: Most of the material that was in your comments came directly from various other news-posts around the net ************************************ %Moderators' Comment%: An important goal of CuD remains that of stimulating debate, and we try to print, uncensored and without commentary, the views as expressed by contributors, whatever they may be. The media stands in an ambiguous relationship with the CU. One one hand, we encourage them to print favorable, or at least factual, stories but, on the other, we are suspicious or hostile when those stories are not to our liking. Reporters, like the rest of us, learn, and when we feel they are in error, it's most helpful to engage in dialogue and let the "dialectic of knowledge" take its course, keeping an ever-watchful eye that the course paints a clearer picture not only of "reality," whatever and wherever that may be, but also tries to understand the "reality" of others as well. The danger in criticizing individual reporters, especially those who are actively reporting on issues in which we are interested, is that we remain blind to their positive contributions and remain focused on a perceived past grievance. This, in the long run, seems unproductive. We run the risk of becoming our own worst enemy, fragmenting into splinter groups supporting, opposing, squabbling, over sometimes important , but--more often--short-term issues. When this happens, we divert attention from the broader issues of Constitutional rights, civil liberties, crackdowns, and the rest. Rather than castigate an individual, we would, as moderators, prefer to see reasoned alternatives developed, argued, examined, and clarified. We printed both articles in the last issue because they typified the shorter concerns we read. One contributor identified four points that, despite the tone of the post, we thought legitimate for debate. Borrowing from that article, and paraphrasing (perhaps beyond the original meaning of the post), we identify: 1. What is a hacker, and who gets to define the term? This is a crucial issue, and not merely a semantic quibble, because law enforcement defines hackers as felons by definition. 2. What is the relationship between law enforcement and media? We tend to agree that the figure of $1.8 seems high when one calculates it. This is an issue that extends beyond our own interests (as the recent uncritical articles of the "earthquake scare" and other stories indicate). The question, as we see it, is: To what degree do those with an interest in prosecuting hackers manipulate the media by distorting definitions, the English language, and facts and figures to create an alternative reality more to their liking? It would seem we should be working to alert the media to be more critical of the information they receive. 3. News media tend to rely on law enforcement sources because most do not know any hackers and because many reports perhaps give law enforcement more credibility than to their targets. Punching them in the nose is not likely to make the media want to get to know us. Like all of us, most reporters are just doing their job, and most who write these stories cover a variety of other topics as well. Therefore, they are often simply not computer literate. One of our goals is to expand their literacy. Sometimes this is successful, but other times not. But, the struggle must continue, and struggle is as long as history. We see most of the CU issues (privacy, judicial process, who gets to define "crime") as broader issues, and our collective participation is not simply an attempt to make the world safe for hackers, a rather silly and myopic goal, but to address broad issues in one tiny slice of our existence, that of cyberspace, and hopefully the implications will, in the aggregate, contribute to a more tolerable world. When aging radicals begin to sound like moderate liberals, perhaps they've fought one fight too many. Nonetheless (there's always a "nonetheless"), we find it more productive to "keep our eye on the prize" rather than continue internal bickering over "who's right" or "who's wrong." ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Subject: The Hermetic Underground From: Dark Adept Date: Wed, 28 Nov 90 2:15:52 CST ******************************************************************** *** CuD #2.15: File 7 of 7: The Hermetic Underground *** ******************************************************************** Reinforcing the cloak of the Underground... The Hermetic Underground by The Dark Adept Greetings! This phile will take a different twist than the previous ones. In the past few philes, I have given security (common sense) advice to the members of the "real" world. The purpose was to try and build a rapport between industry and computer society. However, there is a question as to whether computer society will survive or not. In an effort to keep the Underground alive, I will be relating some ideas for survival during the "witch-hunt." ---------------------- | Modern-day Wizards | ---------------------- A long time ago in a place far, far away there were once many wizards. Now wizards did not really raise the dead or turn gold into lead. What they did do was to try and learn about and explain the universe as best as they could. They delved into dark territories such as death, alchemy, and mechanical engineering in order to improve the world they lived in. From these evil doings, two things were produced. Science, including Philosophy, Logic, Math, Chemistry, Physics, etc. And witch-hunts. They weren't witch-hunts as one may see by looking at Salem. The effect was much more devastating. Not only were wizards wiped from the face of the earth, but the way they viewed life was also removed. You see, a wizard was a jack-of-all-trades. The wizards believed that everything was interrelated. Physics was actually related to Philosophy, and Alchemy was a form of religion. So, the wizards studied everything possible so as to see how the ideas interrelate. (Sort of a twisted Unified Field Theory). There was also another reason why wizards tried to master everything. This was because they could not come together and form a wizards guild. They were not liked or trusted by society since they had access to information that society did not. If they had come together they would have been wiped from the face of the earth. Yes, I lied. In the previous paragraph I said that wizards no longer existed. The fact is that they do and always will. A wizard is a person who believes everything is interrelated and attempts to find the interrelation and control his universe by it. One such branch of wizardry is known as the Computer Underground. (To read about a real wizard who lived in ancient times, pick up John Dee by Peter French. You will see everything I have said is true). So, what can we modern-day mages learn from the wise wizards of yesteryear? -------------------- | Atomic Particles | -------------------- The worst thing the underground could do now is organize on a mass level. Our strength is to be found in that we are a mass of atomic entities operating against a concerted effort. The attacks on the Underground by the witch-hunters may smash a few individuals here and there, but the overall body lives on. Just as the United States Army failed to fight effectively against a dispersed phantom force like the Vietnamese, so too will the onslaught fail against a patternless weaving of hackers. What the opposition is trying to do is like trying to shoot gnats with a shotgun. As long as the Underground remains dispersed and loosely organized, there is no way they can search out and destroy the entire bunch of us. If we band together, then, of course, they have a much larger target. ---------------------- | As Above, So Below | ---------------------- The Underground is shaped by the events that occur in the "real" world. If Company ABC gives a grant to University XYZ to add a node to the Net, then the Underground is expanded. If there are laws passed banning cross-state telecommunications, then the Underground is diminished. The topics of discussion in the Underground are also determined by "real" world events. For this reason, the battle must be fought in the "real" world and in the "real" world alone. The only way to conclusively affect the existence of the Underground is to affect society. This means to affect society in the Courts, Congress, and Senate. There are already legitimate and capable vehicles for doing so: the EFF, for example. These organizations need your support. Support them, but as citizens of the United States, and not as hackers. The only way to decisively defeat our opponents is to defeat them in their own lairs, and by using their means. To win the fight to get the Constitution to protect the rights of the computer user, we must fight intelligently, morally, and ethically. We must not succumb to the temptation to use terrorist tactics in order to extort rights from the opposition. To do so would just anger potential supporters. To do so would be to lower ourselves to the level of our antagonists. We must fight with honor, with dignity, and with tenacity. ----------------------------------------------- | Of the Bloody Sacrifice and Matters Cognate | ----------------------------------------------- We have lost a few valuable members during the Computer Revolution. We should not let their "deaths" be in vain. Let us learn from their mistakes in order to better ourselves. One example is security hacking. Yeah, it's fun. Yeah, it's better than the last Zork (tm Infocom, Inc.) game that came out. But it's illegal. It gives the Underground a bad name. It causes problems, and things get real ugly real fast. Way back when security hacking first started, there were no problems since no one caused any real trouble. Then came the few idiots who tried such things as mercenary work, extortion, and a couple of other assorted nasty dealings that caused corporations to RIGHTFULLY fear and dislike hackers. We caused the problem ourselves. The blame cannot be laid on people who are trying to protect their own property. I am therefore asking that we all cease and desist from hacking into private computers from this point on. There are plenty of things we can do without inciting death threats from telephone companies. Why not set up our own networks? A decent Unix system can be built for under $8,000. If we can get a bunch of people together to donate some money (hey, you big businesses, here's a hint!), then we can have our own "playground" so that the "adults" won't be bothered by us snot-nosed (Cyber)punks. Slap together a couple of nodes, and we can send worms and hack all we want LEGALLY. Again, there are other methods that can be used to gain the free flow of information than illegal system entry. Laws could be passed that require detailed descriptions of systems to be made public if the use of those systems directly affects the public. An example is the infamous 911 info. The 911 system is paid for by the public, services the public, and the public is now dependent on it. Yet, the public knows nothing about it. Does it make sense that something upon which human lives depend should be classified as a "trade secret"? Should not the public be made aware of its limitations so as to know whether it is feasible? This obviously does not require disclosure of the source code, but it does require the disclosure of specifications, limitations, testing data, and all instances of failure. It would also require the general algorithm so as to prove the value of the method. The whole point of this section is that the day of the security hacker is dead along with that of the Blue Boxer. Let them lie peacefully. We can still hack code, transfer messages across the country, access tons of information, and many other things. Is it worth risking that in order to get into some TSO system? --------------------- | Forbidden Secrets | --------------------- The final icing on the cake is the fact that the people persecuting the Underground are incompetent for the task at hand. After reading the SJG affidavit, I am positive that they are excellent purveyors of law enforcement, but don't know beans about computers. The belief that Kermit was some type of illegal information is, obviously, ridiculous. When all of this explodes, it is they who will have egg on their faces, and not we. While doing research on the events, I came across a statement by someone in law enforcement who said that when the results of Operation Sundevil are made public, Mitch Kapor will be embarrassed since he is defending common criminals. No, in reality I think it is they who will be embarrassed. They are the ones who destroyed private property and valuable data. They are the ones who destroyed lives and businesses with incompetence, not hackers. -------------------- | And finally..... | -------------------- To sum up: Stay dispersed and unorganized. Help out the EFF. Fight for your rights using legal means in court. Don't hack security, but start building public access systems. Expose the truth every chance you get. My next article will once again deal with security issues in general. Specifically, I will begin talking about the problem of copyrighting and patenting things other than source code. Keep up the faith, people. We can't lose. I chose the handle The Dark Adept because I believe that out of darkness comes light. Out of the darkness of lies and oppression comes the light of truth and freedom. One just needs to be Adept enough to catalyze the reaction. So, as always, I remain.... The Dark Adept 11/26/90, Chicago, IL E-Mail: Ripco BBS (312)-528-5020 ******************************************************************** ------------------------------ **END OF CuD #2.15** ********************************************************************