**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 3, Issue #3.12 (April 15, 1991) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto POETICA OBSCIVORUM REI: Brendan Kehoe +++++ +++++ +++++ +++++ +++++ CONTENTS THIS ISSUE: File 1: Moderators' Corner File 2: From the Mailbag File 3: Business Week Article on The Dread Hacker Menace File 4: Using the CuD email archive server +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ USENET readers can currently receive CuD as alt.society.cu-digest. Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig), PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet. Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132); (2) cudarch@chsun1.uchicago.edu; (3) dagon.acc.stolaf.edu (130.71.192.18). E-mail server: archive-server@chsun1.uchicago.edu. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors, however, do copyright their material, and those authors should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Moderators Subject: Moderators' Corner Date: 15 April, 1991 ******************************************************************** *** CuD #3.12: File 1 of 4: From the Moderators *** ******************************************************************** +++++++++++++ NEW FTP SITE +++++++++++++ Another ftp site has been added where back issues of CuD, Phrack, and other documents can be obtained. Anonymous ftp to: dagon.acc.stolaf.edu (130.71.192.18 is the IP address for dagon). CD to the 'Next-ug/phrack' directory. NOTE: *!PLEASE!* use only between 1700-0600 (5 pm and 6 am)! We depend on courtesy of users to keep the sites running. Thanks. And thanks to the new ftpmaster for setting this up! For those wanting additional instructions on using the mail server, see file # 4 below. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Assorted Subject: From the Mailbag Date: April 15, 1991 ******************************************************************** *** CuD #3.12: File 2 of 4: From the Mailbag *** ******************************************************************** Subject: Len Rose, licenses, and piracy From: peter@TARONGA.HACKERCORP.COM(Peter da Silva) Date: Sun, 7 Apr 91 13:44:05 CDT We have some odd numbers here: could someone explain them? > The UNIX operating system, which is > licensed by AT&T at $77,000 per license, Last time I checked the UNIX source code was considerably more than this. The version of UNIX that was licenced for $77,000 for source is no longer offered. > The login program is licensed by AT&T at $27,000 per license. Is this true, that "login" is licensed separately? If so, it's unlikely that it was licensed separately back in V7 days. So what's the story? Is AT&T actually lowering the estimated value of UNIX here, or inventing a separate license for the login program, or is there actually some boilerplate license for portions of the UNIX source? In any case, the people claiming that the 77,000 figure is "obviously" just another exaggerated pricing are mistaken: that figure is an extreme understatement of the value of teh UNIX source. The price on the login.c program, $27,000, does seem out of line though. Finally, I would like to note that unlike many of the posters here I'm not going to try to excuse Rose's adding trapdoors to login.c as either educational or providing support to AT&T customers. His posession of this code was definitely illegal. His use of it was, while perhaps protected under the first amendment, hardly wise. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Subject: Len Rose From: jrbd@CRAYCOS.COM(James Davies) Date: Mon, 8 Apr 91 14:15:51 MDT Keith Hansen and Arel Lucas in CuD #3.11 shared with us their letter to AT&T expressing their anger at the arrest and conviction of Len Rose (among other things). Well, I have to disagree with their conclusions in this case -- Len Rose is not an innocent martyr, crucified by an evil corporation for benevolently giving unpaid support to AT&T software users, as Hansen and Lucas attempted to portray him. The press release published earlier in the same CuD issue makes it clear that Rose's intent was to steal passwords and invade systems. While the possession of AT&T source code was the charge of which Rose was convicted, his actual crime (in a moral sense) was the equivalent of manufacturing burglar's tools, or perhaps of breaking and entering (although there isn't any evidence that he actually did any of this, his intent was clearly to help others do so). Nothing makes this more obvious than Rose's own words, as quoted from the comments in his modified login.c by the Secret Service press release: Hacked by Terminus to enable stealing passwords. This is obviously not a tool to be used for initial system penetration, but instead will allow you to collect passwords and accounts once it's been installed. (I)deal for situations where you have a one-shot opportunity for super user privileges.. This source code is not public domain..(so don't get caught with it). I'm sorry, but these aren't the words of an innocent man. Personally, I think that Rose is guilty of the exact same sort of behaviour that gives hackers a bad name in the press, and I think that you're crazy to be supporting him in this. Save your indignation for true misjustices, ok? +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++= Subject: Re: Computers and Freedom of Speech From: elroy!grian!alex@AMES.ARC.NASA.GOV(Alex Pournelle) Date: Tue, 9 Apr 1991 09:02:53 GMT In CuD 3.11, works!LC1%das@HARVUNXW.BITNET wrote: >In response to an article in CuD 3.09 on computer publications... >What gives people the right to censor and deem something illegal in >the electronic media when paper, TV, radio, and the spoken word is >perfectly legal and protected by the first amendment. Why am I having to answer this? Wasn't this mentioned ten times in the past? I'll repeat: TV and radio are federally-minded resources "of the people", which have guidelines set up by the FCC, nominally in the interest by/for/of the people. (The rationale for the government minding the spectrum is that it's a scarce resource and one prone to huge abuse if not minded. That argument cuts both ways, doesn't it?) Telephones are covered by "common-carrier" laws, which prevent Pac*Bell from being confiscated because someone plans a murder over the wires. Ditto for cellular, Tymnet, telegraph and everything like them. This is a two-edged sword: the telcos have to give access to anyone who carries money, whether they "like" them or not. And they can have nothing (well, little--see "The Cuckoo's Egg" for one exception) to do with the content of what they carry. BBSes and for-pay services are NOT covered by common-carrier: THEY ARE PRIVATE SERVICES. The reason that CompuServe and BIX aren't confiscated every month is because H&R Block and McGraw-Hill have more lawyers than the Dept. of Justice--and they'd sue like crazy, and the government knows it. But since they're private, Prodigy can take off whatever messages it wants to. Whether it's violating privacy laws by reading people's mail is a matter I am not qualified to discuss. %I have, in fits of anger, wanted to take this "too big to confiscate" argument another step--say, building the computer into the foundation of a house, or better yet, into the foundation of an apartment building whose owner I didn't like. Or running it on an H-P 3000, the old kind that takes up an entire garage. And videotaping the attempts to remove the thing. But I digress.% >Q: Shouldn't electronic publications be protected under the same >article of the constitution that allows free presses? If they can be shown to be the same thing. Can you make this stand in a court of law? I can't; the EFF is trying to. It's incredibly important, no doubt. >A: Most definitly. [sic] Why? Stand right there and tell the judge why your PC and a modem should be accorded the same shield laws as the L.A. Times. Then explain that to the same L.A. Times, in short words, and get it printed. >The question now is why aren't they? No, that's only one question. Ignorance is probably the main reason for this state of affairs; ignorance that spawns "YOUR KIDS COULD BE TARGETS OF WHITE-SUPREMACIST PEDERASTS WHO NUKE DOLPHINS WHILE EATING HIGH-CHOLESTERAL FATS!!!! SCENES OF THEIR ILLICIT IMMORAL COMPUTER NETWORK LIVE FROM THE SCENE!!! FILM AT ELEVEN, RIGHT AFTER THE MISS NUDE BIKINI CONTEST WINNER INTERVIEW!!!!" so-called journalism on television. But that same ignorance, I'm afraid, pervades this very conference. If the Sixties, that period of unbounded and unfocussed optimism, taught me anything by hindsight, it's this: Know Reality. Wishful thinking won't change a thing. If you're concerned about the issues of electronic freedom--and we all should--Know Reality. That means understanding RCCs, RFCs, PSTNs, POTS, CLASS, CLIDs and FOIAs. For that scary future we can't stop _will_ be based on the past. It is up to us to make sure it is based on the right parts. Sincerely, Alex Pournelle +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++= From: chron!magic322!edtjda@UUNET.UU.NET(Joe Abernathy) Subject: Defining Hackers for the Media Date: Wed, 10 Apr 91 19:31:01 CDT From the you asked for it, you got it department: We've decided to do a brief sidebar treatment of the controversy over the use of words such as hacker, cracker, phreaker, codez kids, etc. Your brief, to-the-point comments are hereby invited for publication. Please fully identify yourself and your organization (or whatever job description best qualifies you to have an opinion on the subject). Please respond via electronic mail to: edtjda@chron.com or %nearbybighost%!uunet!chron!edtjda If there is an overwhelming volume of responses, I will not make individual acknowledgements. The resulting story will in any case be submitted for possible distribution in cud; and will be available electronically to those submitting their thoughts on the subject. Thanks in advance. Joe Abernathy Houston Chronicle (800) 735-3820 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++= From: kadie@EFF.ORG(Carl Kadie) Subject: Computers and Academic Freedom - a new mailing list Date: Wed, 10 Apr 91 12:05:43 EDT Announcing a new mailing list: comp-academic-freedom-talk Purpose: To discuss questions such as: How should general principles of academic freedom (such as freedom of expression, freedom to read, due process, and privacy) be applied to university computers and networks? How are these principles actually being applied? How can the principles of academic freedom as applied to computers and networks be defended? To join: send email to listserv@eff.org. The body of the note should contain the line add comp-academic-freedom-talk To leave the list, send email with the line delete comp-academic-freedom-talk For more information about listserv, sent email with the line help After you join the list, to send a note to everyone on the list, send email to comp-academic-freedom-talk@eff.org (or caf-talk@org). The long version: When my grandmother attended the University of Illinois fifty-five years ago, academic freedom meant the right to speak up in class, to created student organizations, to listen to controversial speakers, to read "dangerous" books in the library, and to be protected from random searches of your dorm room. Today these rights are guaranteed by most universities. These days, however, my academic life very different from my grandmother's. Her academic life was centered on the classroom and the student union. Mine centers on the computer and the computer network. In the new academia, my academic freedom is much less secure. It is time for a discussion of computers and academic freedom. I've been in contact with Mitch Kapor. He has given the discussion a home on the eff.org machine. The suppression of academic freedom on computers is common. At least once a month, someone posts on plea on Usenet for help. The most common complaint is that a newsgroup has been banned because of its content (usually alt.sex). In January, a sysadmin at the University of Wisconsin didn't ban any newsgroups directly. Instead, he reduced the newsgroup expiration time so that reading groups such as alt.sex is almost impossible. Last month, a sysadmin at Case Western killed a note that a student had posted to a local newsgroup. The sysadmin said the information in the note could be misused. In other cases, university employees may be reading e-mail or looking through user files. This may happen with or without some prior notice that e-mail and files are fair game. In many of these cases the legality of the suppression is unclear. It may depend on user expectation, prior announcements, and whether the university is public or private. The legality is, however, irrelevant. The duty of the University is not to suppress everything it legally can; rather it is to support the free and open investigation and expression of ideas. This is the ideal of academic freedom. In this role, the University acts a model of how the wider world should be. (In the world of computers, universities are perhaps the most important model of how things should be). If you are interested in discussing this issues, or if you have first-hand experience with academic supression on computers or networks, please join the mailing list. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++= From: Anonymous Subject: Fox Broadcasting, Hollywood Hacker, and Evil-doings Date: Sat, 7 Apr 91 19:18:15 MDT Given what Fox Television did to the Hollywood Hacker, I thought this might be of interest if anybody wants to read it. The following story appeared in the New York Times today: "Guns Found at Airport During Visit by Bush" LOS ANGELES, April 6 (AP)--Two television employees were detained but not arrested Friday night after two .22 caliber pistols were found intheir vehicles as they tried to enter an area at Los Angeles Airport that was secured for President Bush's departure. It was the first time that firearms had been found so close to a President, the White House spokesman, Marlin Fitzwater, said. --(stuff omitted) The two men were a cameraman from Fox Television and a courier for Cable News Network. Neither was identified. The article concludes by saying that the gun was carried in violation of company policy. Now, I ask this: If the HH was set up, I wonder if it's possible that Fox was maybe trying to do a sting of its own to see how close they could get The Prez without being caught? Did this story make the same splash on Fox that the HH story did? Did Fox come up with a cute name for these guys? Why didn't it have television cameras present when they got caught? Seems to me that getting caught with weapons so near the President is far more serious than logging on to a computer somewhere. I just wonder if Fox terminated its employee, and applied the same standards of fairness, lose as they may be, to these guys as they did to the HH? It's all gotta make ya wonder about Fox's credibility, doesn't it? +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++= FROM: cybrview@EFF.ORG Subject: Looking at CyberSpace from Within Date: Thu, 11 Apr 91 16:20 CDT Looking At CyberSpace From Within On January 18, 1990, Craig Neidorf was visited by the United States Secret Service. Shortly afterwards he became the first victim in a war to preserve the rights guaranteed to all by the United States Constitution. He would not be alone. Steve Jackson Games, though not a target of any criminal investigation, was treated worse than most criminals when his company was inexplicably raided by the Secret Service. A dangerous trend was in evidence throughout the nation when Secret Service agents -- during Operation Sun-Devil and other related cases -- acted as if the interests of corporations like Bellcore are more important than those of individual citizens. Mitch Kapor, John Barlow, and others banded together to meet the challenge. They became the Electronic Frontier Foundation and they set forth to not only defend those wrongly accused of crimes, but to educate the public and law enforcement in general about computers and today's technology. EFF participated in a large public forum in March 1991. It was the first conference on Computers, Freedom, & Privacy, which was in general an opportunity to teach and learn from law enforcement officials, defense attorneys, and others with a more professional interest in the field. Now it is time to change gears a little and focus on a different group of people. Announcing... CyberView '91 St. Louis, Missouri The Weekend of June 21-23, 1991 A face-to-face opportunity to learn views, perspectives, and ideas from the people who live in CyberSpace on a day-to-day basis. CyberView '91 is a conference to discuss civil liberties in CyberSpace with the group of people that have been affected the most -- Hackers. It is not a forum to discuss computer or telecommunications systems in the context of security or accessibility. Instead this is the chance for the people who call themselves hackers to meet the Electronic Frontier Foundation in person and share their feelings with the people who might be able to make a difference and hopefully learn a few things at the same time. This conference is by INVITATION ONLY. If you are interested in attending this noteworthy event please leave electronic mail to "cybrview@EFF.ORG." +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++= From: cosell@BBN.COM(Bernie Cosell) Subject: Re: Is hacking the same as Breaking and Entering? Date: 10 Apr 91 13:15:09 GMT The Works BBS Admin <works!root@UUNET.UU.NET> writes: %In response to the question: "Is computer hacking the same as B&E?" %Not by far. Breaking and entering has malicious intent, and usually is %solely to steal things and/or hurt something. Hacking although %portrayed negatively in the press is not like this at all. It is %merely looking around at what is in various systems, and learning from %it. ... While I'm sure this is sincerely felt, it so egregiously distorts the real issues involved it makes one wonder if Mr "root" even UNDERSTANDS what the dispute is all about. Consider: it is the middle of summer and you happen to be climbing in the mountains and see a pack of teenagers roaming around an abandoned-until-snow ski resort. There is no question of physical harm to a person, since there will be no people around for months. They are methodically searching EVERY truck, building, outbuilding, shed, etc,. Trying EVERY window, trying to pick EVERY lock. When they find something they can open, they wander into it, and emerge a while later. From your vantage point, you can see no actual evidence of any theft or vandalism, but then you can't actually see what they're doing while they're inside whatever-it-is. Should you call the cops? What should the charge be? Would the answer be different if you OWNED the ski resort and it was YOUR stuff they were sifting through? I grant you that one should temper the crime with the assessment of the ACTUAL intent and the ACTUAL harm done, but that certainly doesn't argue that the intrusion, itself, shouldn't be a crime. %... the majority of %hackers (in my opinion) are not trying to hurt anything, and only %allow themselves a little room to look at, and possible a small chair What a load of crap.... If you want a room and a chair, ask one of your friends for one, but include me out. % Say you find an unknown account %mysteriously pop up? Why not find out who it is, and what they are %looking for first, because as odds go, if they got in there once, %they can do it again, no matter what you do. For two reasons: 1) just because YOU have such a totally bankrupt sense of ethics and propriety, that shouldn't put a burden on *me* to have to waste my time deailing with it. Life is short enough to not have it gratuitously wasted on self-righteous, immature fools. 2) I'm just as happy having that kind of "finding out" done by the police and the courts --- that's their job and I'd just as soon not get involved in the messy business [even if I could spare the time]. If you can't learn to act like a reasonable member of society for its own sake, perhaps somewhat more painful measures will dissuade you from "doing it again". If you want to 'play' on my system, you can ASK me, try to convince me *a*priori* of the innocence of your intent, and if I say "no" you should just go away. And playing without asking is, and should be, criminal; I have no obligation, nor any interest, in being compelled to provide a playpen for bozos who are so jaded that they cannot amuse themselves in some non-offensive way. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Moderators, J&B McMullen, and H. Silverglate and S. Beckman Subject: Business Week Article on The Dread Hacker Menace Date: April 15, 1991 ******************************************************************** *** CuD #3.12: File 3 of 4: Responses to Business Week Article *** ******************************************************************** In the April 15, 1991, issue of BUSINESS WEEK (p. 31), Mark Lewyn and Evan I. Schwartz combined to write "Why 'the Legion of Doom' has Little Fear of the Feds." The article has been criticized by attorneys, journalists, and computer professionals for its flagrant inaccuracies, potentially libelous commentary, and distortion of facts and issues. A superficial reading of the article might lead others to agree with the criticisms we print below. We, however, rather like the article and find it a refreshing narrative. Clearly, as we read Lewyn and Schwartz, they were writing satire. The article is obviously an attempt at postmodernist fiction in which truth is inverted and juxtaposed in playful irony in an attempt to illustrate the failure of Operation Sun Devil. The clever use of fiction underscores the abuses of federal and other agents in pursuing DHs ("Dreaded Hackers") by reproducing the symbols of bad acts (as found in government press releases, indictments and search affidavits) *as if* they were real in a deconstructionist style in which the simulacra--the non-real--become the substance. Let's take a few examples: In a table listing the suspect, the alleged crime, and the outcome of five hackers to show the "latest in a a series of setbacks for the government's highly publicized drive against computer crime (table)," the table lists Robert Morris, Steve Jackson, Craig Neidorf, the Atlanta Three, and Len Rose. Steve Jackson was not charged with a crime, even though the table tells us the case was dismissed for lack of evidence. The article calls Craig Neidorf a hacker (he was never charged with, nor is there any indication whatsoever, that he ever engaged in hacking activity), and fails to mention that the case was dropped because there was, in fact, no case to prosecute. We interpret this as a subtle way of saying that all innocent computerists could be accused of a crime, even if there were no evidence to do so, and then be considered a computer criminal. This, and other factual errors of readily accessable and common public knowledge suggests to us that the table is a rhetorical ploy to show the dangerous procedures used by the Secret Service. Why else would the authors risk a libel suit? In another clever bit of satirical prose, the authors write: Jerome R. Dalton, American Telephone & Telegraph Co.'s corporate security manager, is convinced that the feds simply can't convict. He points to Leonard Rose Jr., a computer consultant who pleaded guilty on Mar. 22 to wire-fraud charges in Chicago and Baltimore. Prosecutors said he sent illegal copies of a $77,000 AT&T computer-operating system known as Unix to hackers around the country after modifying it so it could be used to invade corporate and government systems. The article adds that Dalton contends that without AT&T's help, the government wouldn't have had a case. It was AT&T--not the feds--that verified that Rose wasn't a licensed Unix user and that the program had been modified to make breaking into computer systems easier." Now, this could be considered an innocuous statement, but the subtleness is obvious. To us, the authors are obviously saying that AT&T helped the feds by inflating the value of material available for about $13.95 to an astronomical value of $78,000 (later lowered to $23,000). And, why should the feds know who Unix is licensed to? Last we checked, AT&T, not the government, was responsible for keeping track of its business records, and AT&T was responsible for pursuing the charges. The Len Rose case was not a hacker case, the program was not sent to other "hackers," there was no evidence (or charges) that anybody had even tried to use the login.c program that allegedly was modified, and the case was not a hacker case at all, but rather a case about unlicensed software. So, it seems to us that the authors are trying to illustrate the arrogance of AT&T and the evidentiary aerobics used to try to secure indictments or convictions in cases that are more appropriately civil, rather than criminal matters. So, we say congrats to the authors for taking the risk to write news as fiction, and suggest that perhaps they should consider changing their career line. But, we recognize that others might interpret article as irresponsible, ignorant, and journalistically bankrupt. We reprint (with permission) two letters sent to Business Week in response to the article. Others wishing either to complain to BW or to commend their reporters on their fiction writing can fax letters to Business Week at (212) 512-4464. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ MCMULLEN & MCMULLEN, INC April 9, 1991 Readers Report Business Week 1221 Avenue of the Americas New York, NY 10020 Dear Madam or Sir, As a long time admirer of your coverage of technological issues, I was dismayed to find an appalling number of inaccuracies in "Why 'The Legion OF Doom' Has Little Fear Of The Feds" (BW, 04/15/91). The article, unfortunately, shows little attention to detail in its presentation of "facts" and winds up being unfair to those "accused" and law enforcement officials alike. The article states that Steve Jackson, "President of computer-game maker accused of publishing a 'handbook of computer crime' had his "case dismissed because of lack of evidence." In fact, Steve Jackson was never accused of anything (there was a remark made by a Secret Service Agent that the game about to be published read like a "handbook of computer crime" -- the game is a role playing game set in a future totalitarian society). Steve Jackson's computers, diskettes and printed records were seized pursuant to an investigation of one of his employees who was thought to be a recipient of information related to the investigation of Craig Neidorf's electronic publishing activities. Jackson's equipment has since been returned and law enforcement officials attending the recent "Computers, Freedom & Privacy" conference in San Francisco referred to the Jackson case as one that should not have happened (One of the authors of your piece, Evan Schwartz, was listed as an attendee at the conference. Copies of the search warrant used in obtaining Jackson's equipment were available to all attendees at the conference. The warrants clearly indicate that Jackson was not a subject of the investigation. It is my information that Jackson will shortly file suit against the government as a result of the damage that the "search and seizure" did to his business. I suggest that you, by your description, have made Jackson fit the public image of John Gotti -- a person "everyone knows is guilty" but for whom insufficient evidence exists to make him pay his just deserts. In Jackson's case, nothing could be further from the truth. The article states that Franklin Darden, Jr, Adam Grant and Robert Riggs were "each sentenced to one year split between a half-way house and probation." In fact, Riggs received 21 months in prison while Grant and Darden received 14 months with the stipulation that 7 may be served in a half-way house. Additionally, the three were ordered to jointly and/or separately make restitution to BellSouth for $233,000. After reading the article, I spoke to Kent Alexander, US Attorney responsible for the prosecution of Riggs, Darden and Grant to confirm the sentences. Alexander not only confirmed the sentences; he objected to the calling of the cases as other than a victory for the government (There are many in the computer community who feel that the sentence was, in fact, too harsh. None would consider it other than a government "victory".). Alexander also affirmed that each of the defendants is actually doing prison time, rather than the type of split sentence mentioned in the article. Alexander also told me, by the way, that he believes that he sent a copy of the sentencing memorandum to one of your reporters. The actual sentences imposed on Riggs, Darden and Grant also, of course, makes the article's statement that Rose's one-year sentence is "by far the stiffest to date" incorrect. The treatment of the Neidorf case, while perhaps not factually incorrect, was superficial to the point of dereliction. Neidorf, the publisher of an electronic newsletter, Phrack, was accused of publishing, as part of his newsletter, a document which later was proven to be unlawfully obtained by Riggs, Darden and Grant -- an activity that many saw as similar to the Pentagon Papers case. The case was, in fact, eventually dropped when it turned out that the document in question was publicly available for under $20. Many believe that the case should never have been brought to trian in the first place and it is to this kind of electronic publishing activity that Professor Tribe's constitutional amendment attempts to protect. It is a bit of a reach to call Neidorf a "hacker". He is a college senior with an interest in hacking who published a newsletter about the activities and interest of hackers. It is totally inaccurate to call Jackson a hacker, no matter what definition of that oft-misused terms is applied. The article further states that the target of the Sundevil investigation was the "Legion of Doom". According to Gail Thackeray, ex-Assistant Attorney General of the State of Arizona and one of the key players in the Sundevil investigation, and the aforementioned Kent Alexander (both in conversations with me and, in Thackeray's case, in published statements), this is untrue. The Legion of Doom was a loosely constructed network of persons who, it has been alleged and, in some cases, proven, illegally accessed computers to obtain information considered proprietary. The subjects of the Sundevil investigations were those suspected of credit card fraud and other crime for profit activities. On April 1st, commenting on the first major Sundevil indictment, Thackeray was quoted by the Newsbytes News Service as saying "The Sundevil project was started in response to a high level of complaint of communications crimes, credit card fraud and other incidents relating to large financial losses. These were not cases of persons accessing computers 'just to look around' or even cases like the Atlanta 'Legion of Doom' one in which the individuals admitted obtaining information through illegal access. They are rather cases in which the accused allegedly used computers to facilitate theft of substantial goods and services." The article further, by concentrating on a small number of cases, gives the reader the impression that so-called "hackers' are free to do whatever they like in the global network that connects businesses, government and educational institutions. There have been many arrests and convictions in recent months for computer crime. In New York State alone, there have been arrests for unlawful entries into PBX's, criminal vandalism, illegal access to computers, etc. Heightened law enforcement activity, greater corporate and government concern with security and a better understanding by "hackers" of acceptable limits are, if anything, making a safer climate for the global net while the concern of civil libertarians coupled with greater understanding by law enforcement officials seems to be reducing the possibility of frivolous arrests and overreaching. This improved climate, as evidenced by the recent conference on "Computers, Freedom and Privacy", is a far cry from the negative atmosphere evidenced in the conclusion of your article. I have spent the last few years discussing the issues of computer crime, access to information and reasonable law enforcement procedures with a wide range of individuals --police officers, prosecutors, defense attorneys, "hackers", civil libertarians, lawmakers, science fiction writers, etc. and have found that their opinions, while often quite different, warrant presentation to the general public. Unfortunately, your article with its factual errors and misleading conclusions takes away from this dialog rather than providing enlightenment; it is a great disappointment to one who has come to expect accuracy and insightful analysis from Business Week. I urge you to publish an article explaining these issues in full and correcting the many errors in the April 15th piece. Yours truly, John F. McMullen Executive Vice President +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Response #2 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ April 8, 1991 Readers Report Business Week 1221 Avenue of the Americas New York, NY 10020 Dear Editor, Mark Lewyn and Evan Schwartz are correct that the Secret Service's "Operation Sundevil" has been a disaster ("Why %The Legion of Doom' has little fear of the Feds", BW April 15th), but the rest of their article completely misses the point. The problem with the government's war on computers is not that "it's much harder to nail hackers for electronic mayhem than prosecutors ever imagined," but rather, that lack of computer sophistication has caused prosecutors and investigators to treat law-abiding citizens like criminals. Their reporting on Steve Jackson Games is particularly egregious. To call Steve Jackson a "suspect" in the "war on hackers" is to allege criminal conduct that even the government never alleged. Steve Jackson Games is a nationally known and respected, award-winning publisher of books, magazines, and adventure company was ever accused of any criminal activity. The government has verified that Jackson is not the target of any investigation, including "Operation Sundevil." There was no criminal case "dismissed because of lack of evidence" --there simply was no criminal case at all. Lewyn and Schwartz missed the real story here. Based on allegations by government agents and employees of Bellcore and AT&T, the government obtained a warrant to seize all of the company's computer hardware and software, and all documentation related to its computer system. Many of the allegations were false, but even if they had been true, they did not provide any basis for believing that evidence of criminal activity would be found at Steve Jackson Games. The Secret Service raid caused the company considerable harm. Some of the equipment and data seized was "lost" or damaged. One of the seized computers ran an electronic conferencing system used by individuals across the country to discuss adventure games and related literary genres. The company used the system to communicate with its customers and writers and to get feedback on new game ideas. The seizure shut the conferencing system down for over a month. Also seized were all of the current drafts of the company's about-to-be-released book, GURPS Cyberpunk. The resulting delay in the publication of the book caused the company considerable financial harm, forcing it to lay off half of its employees. Jackson has resuscitated his electronic conferencing system and his business. GURPS Cyberpunk was partially reconstructed from old drafts and eventually published. It has been nominated for a prestigious game industry award and is assigned reading in at least one college literature course. But what happened at Steve Jackson Games demonstrates the vulnerability of computer users -- whether corporate or individual -- to government ineptitude and overreaching. What the Secret Service called a "handbook for computer crime" was really a fantasy role playing game book, something most twelve-year-olds would have recognized after reading the first page. Sincerely, Harvey A. Silverglate Sharon L. Beckman Silverglate & Good Boston, Massachusetts Counsel for Steve Jackson Games ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: kusumoto@CHSUN1.UCHICAGO.EDU(Bob Kusumoto) Subject: Using the CuD email archive server Date: Mon, 8 Apr 91 18:23:52 CDT ******************************************************************** *** CuD #3.12: File 4 of 4: Using the CuD mailserver *** ******************************************************************** A note about the e-mail archive server at chsun1.uchicago.edu: please send any and all requests for files/help to: archive-server@chsun1.uchicago.edu this is not the address for receiving the latest issue of CuD from the mailing list. Either subscribe to alt.society.cu-digest on USEnet or send mail to TK0JUT2@NIU.BITNET (although I'm not sure, you might be able to do uunet!NIU.BITNET!TK0JUT2 if you do not have a definition for .BITNET sites). The archive server is automated and it only understands a few commands placed in the body of the message you send. These commands are HELP, INDEX, SEND, and PATH (case doesn't matter). In short: help: sends a help file describing each command in detail index: sends an index of available topics. If the topic is on the same line, it will send a detailed index of that topic. Available CuD topics are: ane ati bootlegger chalisti cud hnet law lod narc network nia papers phantasy phrack phun pirate school synd tap send: sends a file. Commands for send must be in the following format: send topic filename send topic filename1 filename2 filename3 ... Please note that the arguments are separated by spaces, not slashes or any other characters. Also, some mailers between this site and yours might not be able to handle mail messages larger than 50k in size. You will have to make special arrangements to receive these files (see address below). path: This command forces a specified return path. Normally, the server will guess what the return address should be (most of the time, successfully), but in some cases, it will cause the requested files to bounce, leaving you without your files. If this is the case, you should use the path command to set the return address. Please note, the mailer here cannot handle .uucp addresses, these addresses must be fully expanded. Here are some examples: path user@host.bitnet [for BITNET hosts, direct] path user%hosta.major.domain@hostb.major.domain path hosta!hostb!hostc@uunet.uu.net some useful commands to give to the server (once you know your mailing address is OK) are: send cud cud-arch which sends the master Index for the CuD archive. send cud chsun1.email.files which sends a directory of all files that are in the CuD archives by topic, filename, size of the file, and other less useful information. This file is updated whenever new files are added to the archives. If you have any problems and wish to have someone help you with the server, please send mail to: archive-management@chsun1.uchicago.edu (also cudarch@chsun1.uchicago.edu) Bob Kusumoto chsun1 archive manager ******************************************************************** ------------------------------ **END OF CuD #3.12** ********************************************************************