[comp.dcom.telecom] Legion of Doom Rebuttal to Moderator

72307.1502@compuserve.com (GORDON MEYER) (03/21/90)

In Telecom Digest v10 #160 the moderator suggested that I retract my
characterization of the recent LoD/Phrack busts as a "witch hunt" on
the basis of of an allegation about LoD involvement in a supposed
$66,000. theft from a Citibank VAX computer.  (Legal note: This is
heresay. I'm not suggesting that Citibank's computers have been
comprimised. I know of no such instance.)

Actually, this particular story is a _perfect_ example that it is
indeed a "witch-hunt".  A "witch-hunt", for those not familar with the
term, usually refers to a situation where people are presumed guilty
before being convicted, where associates of alleged "criminals" are
harassed, intimidated, and discredited, with the whole thing being fed
by culture misinterpretation and escalation by people whose opinions
are based solely on what they have read in the newspaper and other
media.

All of this applies to the subject at hand.  First off, no one has
been convicted of any charges, at least not yet.  The indictment for
Neidorf and Riggs lists 5-7 "facts" about the Legion of Doom.  All of
which are heresay and should not be included as "evidence" of
anything.  Also, there is indeed a "hit list" of known associates of
the LoD, and PHRACK contributors. (I don't know if our moderator is on
it, but I do know that things he has written were published in Phrack.
Perhaps w/out his permission but that's a moot point when putting
together a list of "suspects".  People who don't belive this aren't
familar with CoIntelPro.)

Finally, I have read the "How We Got Rich Through Electronic Fund
Transfer" article by the Legion of Doom.  It was published 11/27/89 in
Phrack #29.  As John Markoff surmised it is indeed _fiction_.  The
satire, humor, and obvious tounge-in-cheekness (sic) of it all is
quite obvious if you are computer literate and attentive to the
computer underground.  If you're a techno-phobic news reporter or
federal agent I could easily see how it could be believed, but one
can't interpret humorous articles from an outside perspective.  How
many times have people made tounge-in-cheek comments in this digest
that could, if taken out of context in terms of intent, be shocking to
much of the tele-phobic :) populace?

It is not my intent to write an apology for the computer underground.
What I am trying to do is inject some sanity and perspective into the
discussion (which seems to have died down, but it will be an issue
we'll face again in the future.)  Cultural ignorance, name-calling,
and emotional attachment aren't going to get us anywhere.  No one (at
least not me) is doubting the seriousness of the charges. But just
because the charges are serious doesn't preclude the possiblity that
the recent actions undertaken against people known to associate with
p/hackers aren't a "mean-spirited attempt to kill the fun of a couple
of kids" (a tip of the hat to Gene Spafford in v10 #164). The stories
reported here don't give the full picture.  Intimidation, threats,
disruption of work and school, "hit lists", and serious legal charges
are _all_ part of the tactics being used in this "witch-hunt".  That,
my friends, ought to indicate that perhaps the use of pseudonames
wasn't such a bad idea after all.

It has occured to me that I should clarify something I said in a
previous message.  I belive that the events described in the LoD
electronic fund transfer article are fictional.  The article (and
another in the same issue of PHRACK) does describe, in a narrative
form, the process and format of overseas electronic fund transfers.
That information may indeed be accurate.  I simply don't know. I doubt
that Citibank will confirm if it is or isn't.  Many would say that it
"isn't cool" to disclose the hows and where-fors of the EFT process.
Perhaps so.  But again I question the logical leap from _knowing_ how
to divert funds, to accusing them of actually doing it.

Thanks for letting me clarify that point. I'm sure it will save some
bandwidth in the long run.


Gordon Meyer
72307.1502@compuserve.com


[Moderator's Note: Thanks for your comments. I am not a contributor to
Phrack, per se. If they were using articles from TELECOM Digest in
their publication, I hope they at least were attributing the author
and this publication.  This Digest may be freely distributed anywhere.
The operative word of course, is *freely*. You cannot charge for its
distribution, nor pass it along to people or organizations you know
will charge for reading the Digest.  Exceptions are made for UUNET,
systems with mailbox fees where the reader has asked me to deliver to
a mailbox there, and public access sites like Chinet, Portal, etc.  PT]

spaf@cs.purdue.edu (Gene Spafford) (03/22/90)

Let me point out that the investigation that resulted in the four
indictements of the LoD folks has also included a number of other
indictments and arrests.  All of this APPEARS to be one large-scale
investigation into a pattern of repeated collaboration for purposes of
illegal activity (in legal terms, criminal conspiracy).  The
information I have available from various sources indicates that the
investigation is continuing, others are likely to be charged, and
there MAY be some national security aspects to parts of the
investigation that have yet to be disclosed.

Now maybe there are one or two people on the law enforcement side who
are a little over-zealous (but not the few I talk with on a regular
basis).  For someone to be indicted requires that sufficient evidence
be collected to convince a grand jury -- a group of 23 (24?  I forget
exactly) average people -- that the evidence shows a high probability
that the crimes were committed.  Search warrants require probable
cause and the action of judges who will not sign imprecise and poorly
targeted warrants.  Material seized under warrant can be forced to be
returned by legal action if the grounds for the warrant are shown to
be false, so the people who lost things have legal remedy if they are
innocent.

The system has a lot of checks on it, and it requires convincing a lot
of people along the way that there is significant evidence to take the
next step.  If these guys were alleged mafioso instead of electronic
terrorists, would you still be claiming it was a witch hunt?
Conspiracy, fraud, theft, violations of the computer fraud and abuse
act, maybe the ECPA, possesion of unauthorized access codes, et. al.
are not to be taken lightly, and not to be dismissed as some
"vendetta" by law enforcement.

Realize that the Feds involved are prohibited from disclosing elements
of their evidence and investigation precisely to protect the rights of
the defendants.  If you base your perceptions of this whole mess on
just what has been rumored and reported by those close to the
defendants (or from potential defendants), then you are going to get a
very biased, inaccurate picture of the situation.  Only after the
whole mess comes to trial will we all be able to get a more complete
picture, and then some people may be surprised at the scope and nature
of what is involved.


Gene Spafford
NSF/Purdue/U of Florida  Software Engineering Research Center,
Dept. of Computer Sciences, Purdue University, W. Lafayette IN 47907-2004
Internet:  spaf@cs.purdue.edu	uucp:	...!{decwrl,gatech,ucbvax}!purdue!spaf