[alt.society.cu-digest] Cu Digest, #3.17

TK0JUT2%NIU.BITNET@UICVM.uic.edu (05/20/91)

  ****************************************************************************
                  >C O M P U T E R   U N D E R G R O U N D<
                                >D I G E S T<
              ***  Volume 3, Issue #3.17 (May 17, 1991)   **
   ** SPECIAL ISSUE: EXHIBITS FROM RIGGS'S SENTENCING MEMORANDUM **
  ****************************************************************************

MODERATORS:   Jim Thomas / Gordon Meyer  (TK0JUT2@NIU.bitnet)
ARCHIVISTS:   Bob Krause / / Bob Kusumoto
GAELIC GURU: Brendan Kehoe

            +++++     +++++     +++++     +++++     +++++

CONTENTS THIS ISSUE:
File 1: Moderator's Corner
File 2: A Media Commentary on the RIGGS Sentencing
File 3: Exhibits from the Atlanta 3 Sentencing Memorandum
File 4: EXHIBIT A from Riggs' Sentencing Memorandum
File 5: EXHIBIT E from Riggs' Sentencing Memorandum
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

USENET readers can currently receive CuD as alt.society.cu-digest.
Back issues are also available on Compuserve (in: DL0 of the IBMBBS sig),
PC-EXEC BBS (414-789-4210), and at 1:100/345 for those on FIDOnet.
Anonymous ftp sites: (1) ftp.cs.widener.edu (192.55.239.132);
                     (2) cudarch@chsun1.uchicago.edu;
                     (3) dagon.acc.stolaf.edu (130.71.192.18).
E-mail server: archive-server@chsun1.uchicago.edu.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may be reprinted as long as the source is
cited.  Some authors, however, do copyright their material, and those
authors should be contacted for reprint permission.  It is assumed
that non-personal mail to the moderators may be reprinted unless
otherwise specified. Readers are encouraged to submit reasoned
articles relating to the Computer Underground.  Articles are preferred
to short responses.  Please avoid quoting previous posts unless
absolutely necessary.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Contributors assume all
            responsibility for assuring that articles submitted do not
            violate copyright protections.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Moderators
Subject: Moderator's Corner
Date: May 17, 1991

********************************************************************
***  CuD #3.17: File 1 of 5: Moderators Corner                   ***
********************************************************************

++++++++++++++++
Information on subversive software wanted
++++++++++++++++

(Gordon received a number of helpul replies from his earlier request,
but for those who missed CuD 3.14, we reprint it again.  Thanks to all
those who responded).

Gordon is in the beginning stages of research for a technical paper on
'subversive' software.   The article will discuss software that has
been written for unusual purposes and circumstances, not all of which
may be legal.  Examples in this "genre" would be 'Fuckin' Hacker',
'Code Thief', and 'Receipt Writer'.

It would be helpful to gather as many examples as possible, from many
different computer platforms. He is *not* seeking executable copies,
but just the name and description of the program.  Any additional
historical information, such as author name, date, innovative
features, etc would be a bonus.  If you can recall having seen, used,
or heard of any unusual software that you feel fits in this category
He would appreciate it if you'd drop me a line.  The article has not,
as of yet, been slated for publication, but he will supply a finished
copy to anyone who responds or requests one.  The finished work may
also appear in a future issue of CuD.

Thanks for your time and assistance!  Gordon Meyer
72307.1502@Compuserve.com GRMEYER (GEnie and Delphi) or via CuD at
tk0jut2@niu.bitnet

+++++++
New BBS
+++++++

A new BBS, similar in goals and philosophy to FACE-TO-FACE (which
crashed) began May 18. It's called FREE SPEECH (618-943-2399), and
will be open to all callers.  Computer security and law enforcement
agents are welcome.  The sysop (Crimson Death) aims to encourage
discussion and debate of Constitutional, computer security, and other
issues.  It's running Emulex, HST compatible, and users are encouraged
to upload news articles and related files.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From:  Silicon.Surfer@unixville.edu
Subject:  A Media Commentary on the RIGGS Sentencing
Date:     Tue, 14 May 91 20:39 EDT

********************************************************************
***  CuD #3.17: File 2 of 5: Media Comment on Riggs Sentencing   ***
********************************************************************

Here is an article I recently saw in the May/June 1991 issue of
Contingency Journal. The author seemed very glad of the judges
decision of restitution for Bell South by the computer hackers (I bet
the author would have approved of dismemberment of their hands also).
According to the story's bio sketch, the author is an attorney with 20
years of experience, including 10 years in computer security at a
major financial institution.

It is interesting to note that the author states that one of the
schemers published the information in a hacker's newsletter. But the
author never mentions that the case against the publisher was dropped
by the government, nor does the author correct the slur that the
publisher was in on the scheme (actually it was proved in court by the
government's own witness that the publisher was not part or any way
connected with the scheme).  I only wish that the government would
order restitution to the American taxpayer for what the S & L scheme
will cost us in the next few years.

+++++++++++++++++++++++++++++++++++

       Restitution Ordered For Bell South Hackers
            By Michael H. Agranoff, Attorney

The law is beginning to respond effectively to the problem of computer
hacking. In September 1988, three young men began implementing a
scheme to steal proprietary data from Bell South Telephone Co.
computers. They illegally gained access to Bell South from a home
computer, downloaded the data and tried to disguise the fraud by using
the IDs of legitimate users.

The stolen data was transferred on an interstate computer network and
stored on a bulletin board system. It was made known to others in a
hacker's newsletter published by one of the schemers.

If the fraud had continued, it could have disrupted telecommunication
channels throughout the country, according to government prosecutors.
The hackers were in a position to retrieve and modify credit
information, eavesdrop on telephone conversations and worse.

Various charges of fraud, theft and conspiracy were lodged against the
trio. They attempted to get the charges dismissed on technical
grounds, were unsuccessful and pleaded guilty to a smaller number of
charges.

A federal judge in Georgia imposed sentences last November.  One
hacker was given 21 months in prison and two years supervised
probation.

The other two hackers were each given 14 months in prison.  Seven of
those months were to be served in a half-way house, where they must
assist colleges and businesses in computer work. Following release,
the hackers must each complete three years community service, to
include 120 hours each year of computer-related work, during which
time they may not own or access a computer, except for employment,
without supervision approved by the court.

Each of the three hackers was also ordered to pay restitution to Bell
South amounting to $233,880 per hacker.  Readers may reflect upon this
sentence. In trying to

protect the public interest and yet not be vindictive, the judge
rendered (in this writer's opinion) a wise and thoughtful decision.
Will it send the appropriate message to potential hackers throughout
the country? Let us see.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Moderators
Subject: Exhibits from the Atlanta 3 Sentencing Memorandum
Date: 15 May, 1991

********************************************************************
***  CuD #3.17: File 3 of 5: Exhibits from Riggs' Sentencing     ***
********************************************************************

The author of the above file errs in the nature of the crime, the
nature of the evidence, and omits that the sentence included
restriction on computer use upon release.  He seems to rely upon
prosecutors' statements, and shows no awareness of the discussions
surrounding the sentence of the case when he refers to the judge's
"wise and thoughtful decision." There is not even a glimmering in the
story that the sentence may be too harsh (quite the contrary, in
fact), or that the sentencing memorandum may have been misleading.

When Riggs was sentenced late last fall to 21 months in a federal
penitentiary for "hacking," the prosecution submitted a lengthy
sentencing memorandum (reprinted in CuD 2.16) that was strongly
criticized for its inaccuracies and what some saw as an inappropriate
prejudicial attitude in both the tone and content (see CuD 2.17 for
EFF and other responses).  We, and presumably others, were informed
that there was considerable information in attached documents that
would justify the sentence and that we should be more patient.  The
Exhibits attached to the memorandum are now available, and they are
less than compelling, filled with non-sequitor logic, and fail to add
any new information that might reduce criticism of the sentence.

CONTENTS

The Government submitted five attachments to its sentencing memorandum
that, in a separate motion, it requested to be sealed.  These exhibits
raise a few questions both about the justification for the sentence
and the sentencing procedure itself.  Two of the Exhibits follow the
conclusion of this file. The original sentencing memorandum was
reprinted in CuD 2.16.

EXHIBIT A (File #4, below) is a history of the Legion of Doom, taken
from Phrack 31.

EXHIBIT B (not included here) is a collection of posts from Black Ice
BBS. In 23 pages, the Exhibit provides a few score posts selectively
abstracted from December 2, 1988 through March 12, 1989. The Exhibit
includes the BBS's help screen, a user list, and information ranging
from general one line comments to technical information, dialups and
network addresses.  Although some of the information boarders on what
some might justifiably consider stretching beyond the limits of
licitness, none of it provides evidence of a dangerous conspiratorial
group bent on destroying the nation's telecom system. However, such
information was blacked out of the Motion to Seal, so it is difficult
to assess. But, from what can be inferred from the context, it seems
that much of the "questionable" information is generally public and
the rhetoric, rather than content, provides the logs' drama.
According to the sentencing memorandum (p. 8), these logs appear to
show that the callers knew that hacking was illegal, that they took
precautions to avoid apprehension, and some posts make "frequent
references to law enforcement and national security computer systems."
Although the posts may reflect unacceptable behavior, the overall
interpretation gleaned by the government stretches credibility.

EXHIBIT C consists of an electronic post in November, 1988, requesting
the Riggs meet with the acting director of OCS, and 4 letters
exchanged between Riggs and Georgia Tech's Office of Computing
Services (OCS) and the Dean of Student Affairs From June 6, 1989 to
June 19, 1989. In the first letter, the OCS indicated to Riggs that
they possessed evidence that his account had been misused and asked
Riggs to contact them.  The second letter of two pages outlined
specific allegations of Riggs' abuse.  The third, from Riggs to the
Director of the OCS, was a written apology.  The final letter, from
the office of the Dean of Student Affairs to Riggs was a letter
saying, in essence, cool it in the future or else.  According to the
original sentencing memorandum (p.  9), the only reason for submitting
these letters was to "indicate that Georgia Tech was very concerned
about Grant's abuses of their system."

EXHIBIT D, a report of an earlier legal problem in North Carolina
involving Riggs, was not included, presumably because he was a
juvenile when it occured.

EXHIBIT E consists of five posts from various people taken from The
Phoenix Project discussing Robert Morris. They are reproduced in File
#5, below.

Even in the aggregate, the Government's exhibits are rather innocuous.
The logic by which conclusions are drawn from the Exhibits
is spurious as best, and--as is much of the rhetoric guiding arguments
for questionable procedures (see Steve Jackson Games' suit against
William Cook, Timothy Foley, Barbara Golden, et. al.)--represents
claims for which empirical evidence to the the contrary was clearly
present and known, or should have been known, to the prosecutors.

We in no way condone the activities to which the Atlanta 3 pled
guilty. Nor do we condone many of the behaviors of the type alleged in
their original indictment.  We do not believe that offenses in the
cyberworld should go without response or, when appopriate, without
sanctions.  However, we also believe that questionable actions by law
enforcement personnel should be equally subject to examination and
response.  The exhibits stage manage the allegations in a way that is
discomforting.  The sentencing memorandum and the Exhibits claiming to
support it should be carefully examined for the subtle ways in which
the "language of justice" serves unjust ends.  Innuendo, fabrication,
dubious logic, and unsubstantiated assertions in the guise of "facts"
do not reflect well on those entrusted with protecting federal law and
the Constitution.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Moderators
Subject: EXHIBIT A from Riggs' Sentencing Memorandum
Date: 15 May, 1991

********************************************************************
***  CuD #3.17: File 4 of 5: Exhibit A from Memorandum           ***
********************************************************************

Exhibit A is a reprint from "Phrack 31" summarizing the history of the
Legion of Doom. It reflects a "guilt by association" device, a
rhetorical ploy without factual foundation that makes a series of
leaps from a dangerous act to the possibility that the defendants
*could* have committed such an act:

      Aside from the hacker logic bomb threat, a June 1989
      intrusion into the BellSouth network also prompted the
      federal investigation.  A computer hacker broke into the
      BellSouth network and rerouted calls from a probation office
      in Delray Beach, Florida to a New York Dial-A-Porn number.
      Although creative and comical at first blush, the rerouting
      posed a serious threat to the security of the telephone
      system. If a hacker could reroute all calls to the probation
      office, he or she could do the same to calls placed to this
      Court, a fire station, a police station or any other
      telephone customer in the country. Again, none of the three
      defendants are implicated in this dangerous prank, though an
      investigation of the intrusion ultimately led investigators
      to the illegal activities of the three defendants and other
      members of a self-proclaimed elite group of hackers called
      the Legion of Doom. The Legion of Doom is described in a
      hacker "magazine" article filed separately as _Government
      Exhibit A_. (Sentencing Memorandum, p. 3).

After an earlier allusion to logic bombs, which were unrelated to the
Riggs case, the spectre of serious crimes are linked to the
defendants. Next, an example in which none of the defendants were
implicated is raised--the rerouting of a dial-a-porn number to a
probation officer. Here, prosecutors move beyond the slippery slope
thesis of behavior that suggests, by analogy, if you have a marijuana
cigarette today you'll likely be a junkie by morning.  Despite the
DENOTED disclaimer of non-involvement, they phrase the language in
such a way that it CONNOTES guilt by arguing that the possession of
"forbidden knowledge" COULD allow one to commit potentially dangerous
acts such as "jeopardizing the entire telephone industry" or "shutting
down telephone service throughout the country" (p. 7 of Sentencing
Memorandum).

The Exhibit provides nothing more than a brief history of the
LoD and its members. For conspiracy theorists who see organized
malevolence in any voluntary association of 2 or more people who
defy conventional social norms, the document may seem significant.
But, for some, the Fortune 500 would seem equally dangerous and
conspiratorial. We do not claim that the LoD can stake claim to
the moral high ground, but neither does our reading of the Exhibit
A suggest a subversive group capable of threatening our social
fabric. It hardly provides evidence that would justify a
few years of incarceration.
Judge for yourself:

++++ Begin Exhibit A

                               ==Phrack Inc.==
                Volume Three, Issue Thirty-one, Phile #5 of 10

The History of The Legion Of Doom
--- ------- -- --- ------ -- ----
During the summer of 1984 an idea was formulated that would ultimately
change the face of the computer underground forever.  This particular
summer, a huge surge of interest in computer telecommunications placed
an incredibly large number of new enthusiasts on the national computer scene.
This crowd of people all seeking to learn as much as possible
began to put a strain on the nation's bulletin board scene, as the novices
stormed the phonelines in search of knowledge.  From out of this chaos
came a need for learned instructors to help pass on their store of
information to the new throngs.
One of the most popular bulletin boards of the day was a system in New York
state called Plovernet, which was run by a person who called himself
Quasi-Moto.  This BBS was so heavily trafficked, that a major long
distance company began blocking all calls to its number (516-935-2481).
The co-sysop of Plovernet was a person known as Lex Luthor.  At the time
there were a few hacking groups in existence, such as Fargo-4A and Knights of
Shadow.  Lex was admitted into KOS in early 1984, but after making a few
suggestions about new members, and having them rejected, Lex decided to
put up an invitation only BBS and to start forming a new group.
Starting around May of 1984, Lex began to contact those people who he had
seen on BBSes such as Plovernet and the people that he knew personally
who possessed the kind of superior knowledge that the group he envisioned
should have.  Many phone calls and Alliance Teleconferences later, the
group of individuals who made up the original Legion of Doom were compiled.
They were:
               Lex Luthor
               Karl Marx
               Mark Tabas
               Agrajag the Prolonged
               King Blotto
               Blue Archer
               EBA
               The Dragyn
               Unknown Soldier
The group originally consisted of two parts:  Legion of Doom, and Legion
of Hackers.  The latter was a sub-group of the first, comprised
of people who were more advanced in computer related subjects.  Later on,
as members began to all become more computer-based, the Legion of Hackers
was absolved.  (The name "Legion of Doom" came from the cartoon series
"Superfriends," in which Lex Luthor, Superman's arch rival, led a group
by the same name)
The actual Legion of Doom bulletin board was quite ahead of its time.
It was one of the first "Invitation-only" hacking based BBSes; it was the
first BBS with security that caused the system to remain idle until
a primary password was entered; and it was the first hacking BBS to deal
with many subjects in close detail, such as trashing and social
engineering.  The BBS underwent three number changes and three different
login procedures during its life.  At its height, the BBS had over
150 users and averaged about 15 posts per day.  This may seem
high when compared to contemporary BBSes, but this was a private system,
with only very-competent users, so the quality of messages content was always
high.
There was always some confusion that falsely assumed since someone
was on the LOD BBS, that they were a member of the group.  In fact,
only a handful of the total LOD membership were ever on the actual
LOD BBS.
The Legion of Doom also had special subboards created for its members on
other BBSes after the home base BBS went offline.  The first was on
Blottoland, the next on Catch-22, followed by one on the Phoenix Project,
and the last on Black Ice Private.  The group's members have usually tried to
keep a low profile publicly, and usually limited their trade of information
to select private BBSes and personal telephone conversations.  This adherence
to privacy has always added to the LOD mistique.  Since most people didn't
know exactly what the group was involved in, or experimenting with, people
always assumed that it was something far too detailed or sensitive to be
discussed.  For the most part, this was not true, but it did not help to
diminish the paranoia of security personnel that LOD was after their
company's systems.
The group has undergone three distinct phases, each a result of membership
changes.  The first phase ended with the busts of Marx, Tabas, Steve Dahl,
Randy Smith, X-man, and the abandonment by Agrajag and King Blotto.
The group lay semi-dormant for several months, until a resurgence
in the summer of 1986, in which several new members were admitted, and a new
surge of would-be hackers appeared, ready to be tutored.  This phase again
ended in a series of busts and paranoia.  The third phase basically revolved
around Summercon of 1988, where several new members were admitted by those
LOD members attending the festivites.  The third phase is now at an end
brought on by busts and related paranoia, again, two years after its onset.
There is no indication that points to any resurgence in the future, but
nothing is certain until summer.
Since its creation, LOD has tried to put out informative files on a wide
variety of topics of interest to its contemporaries.  These files ranged from
the first actual scanned directory of Telenet, to files on various operating
systems.  The LOD Technical Journal was to be a semi-regular electronic
magazine comprised of such files, and other items of interest to the hacking
community.  Only three issues of the Technical Journal were produced.  As
the fourth issue was being pieced together, several members were raided, and
work on it was abandoned.
>From the time it was formed continuing up to the present, the Legion of
Doom has been quite a topic of controversy in the computer underground and
with computer security professionals.  The Legion of Doom has been
called everything from "Organized Crime" to "a Communist threat to national
security" to "an international conspiracy of computer terrorists bent
on destroying the nation's 911 service."  Nothing comes closer to the
actual truth than "bored adolescents with too much spare time."
LOD members may have entered into systems numbering in the tens of
thousands, they may have peeped into credit histories, they may
have monitored telephone calls, they may have snooped into files and
buffered interesting text, they may still have total control over
entire computer networks; but, what damage have they done?  None, with
the exception of unpaid use of CPU time and network access charges.  What
personal gains have any members made?  None, with the exception of three
instances of credit fraud that were instigated by three separate greedy
individuals, without group knowledge.
The Legion of Doom will long be remembered in the computer underground as
an innovative and pioneering force, that consistently raised the collective
level of knowledge, and provided many answers to questions ranging from the
workings of the telephone system to the structure of computer operating
systems.  No other group dedicated to the persuit of computer and
telecommunications knowledge has survived longer, and none probably will.
The Legion of Doom  1984--1990
------------------------------------------------------------------------------

Alumni of the Fraternal Order of the Legion of Doom  (Lambda Omega Delta)
Handle                Entered   Exited    Location       Reasons for leaving
------------------------------------------------------------------------------
Lex Luthor            Early 84--          Florida
Karl Marx             Early 84--Late  85  Colorado       Bust w/Tabas..College
Mark Tabas            Early 84--Late  85  Colorado       Too numerous to list
Agrajag the Prolonged Early-84--Late  85  California     Loss of Interest
King Blotto           Early 84--Late  85  Ohio           College
Blue Archer           Early 84--Late  87  Texas          College
EBA         Early 84--          Texas
The Dragyn            Early 84--Late  86  Minnesota      Loss of Interest
Unknown Soldier       Early 84--Early 85  Florida        Bust-Toll Fraud
Sharp Razor           Late  84--Early 86  New Jersey     Bust-Compuserve Abuse
Sir Francis Drake     Late  84--Early 86  California     Loss of Interest
Paul Muad'dib         Late  84--Early 86  New York       Modem Broke
Phucked Agent 04      Late  84--Late  87  California     College
X-Man                 Late  84--Mid   85  New York       Bust-Blue Boxing
Randy Smith           Late  84--Mid   85  Missouri       Bust-Credit Fraud
Steve Dahl            Early 85--Early 86  Illinois       Bust-Credit Fraud
The Warlock           Early 85--Early 86  Florida        Loss of Interest
Terminal Man          Early 85--Late  85  Massachusetts  Expelled from Group
Dr. Who               Early 85--Late  89  Massachusetts  Several Reasons
The Videosmith        Early 86--Late  87  Pennsylvania   Paranoia
Kerrang Kahn          Early 86--Mid   89  London, UK     Loss of Interest
Gary Seven            Early 86--Mid   88  Florida        Loss of Interest
The Marauder          Early 86--Mid   89  Connecticut    Loss of Interest
Silver Spy            Late  86--Late  87  Massachusettts College
Bill from RNOC        Early 87--Late  87  New York       Bust-Hacking
The Leftist           Mid   87--Late  89  Georgia        Bust-Hacking
Phantom Phreaker      Mid   87--          Illinois
Doom Prophet          Mid   87--          Illinois
Jester Sluggo         Mid   87--          North Dakota
Carrier Culprit       Mid   87--Mid   88  Pennsylvania   Loss of Interest
Master of Impact      Mid   87--Mid   88  California     Loss of Interest
Thomas Covenant       Early 88--Early 90  New York       Bust-Hacking
The Mentor            Mid   88--Early 90  Texas          Retired
Necron 99             Mid   88--Late  89  Georgia        Bust-Hacking
Control C             Mid   88--Early 90  Michigan
Prime Suspect         Mid   88--          New York
The Prophet           Mid   88--Late  89  Georgia        Bust-Hacking
Phiber Optik          Early 89--Early 90  New York       Bust-Hacking
** AKA **
Randy Smith           Poof!
Dr. Who               Skinny Puppy
Kerrang Kahn          Red Eye
Phantom Phreaker      ANI Failure / Psychedelic Ranger
Doom Prophet          Trouble Verify
Thomas Covenant       Sigmund Fraud / Pumpkin Pete
Necron 99             The Urvile
Control C             Phase Jitter

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

From: Moderators
Subject: EXHIBIT E from Riggs' Sentencing Memorandum
Date: 15 May, 1991

********************************************************************
***  CuD #3.17: File 5 of 5: EXHIBIT E from Memorandum           ***
********************************************************************

EXHIBIT E:

Exhibit E comes from The Phoenix Project, a BBS in Texas.  The
proseuctions' logic seems to claim that the six posts, five from 1990
and one from 1988, show how carefully the CU followed the
Morris case and and that the comments demonstrate that fear of
harsh sentences would be a deterrent. In fact, the logs show
no such thing.
(The following were reproduced from the original Phoenix Project logs
made available to us with the exception of the post of the December 8,
1988, post, which was typed in from the sentencing memorandum).

++++++++++++ BEGIN EXHIBIT E

58/64: morris
Name: The Mentor #1
Date: Tue Jan 23 21:57:27 1990

Robert Morris was found guilty. If he's sentenced to do time, it'll be a
*very* bad precedent.

<sigh>

Mentor



Read:(1-64,^58),? :

59/64: BLackmail?
Name: Erik Bloodaxe #2
Date: Tue Jan 23 22:51:58 1990

Geez...I'd like to think myself above things like that...

In anycase, not everyone has GOOD sensitive information...(not all of us who
ARE in this country have the balls to dig where that type of crap is...god I
want to move to Australia!)

Maybe they'll kick me out of the country!  Right...I'm not that important,
although I would like to think that I am...hehe

hell, maybe it IS time to start doing all the terrible things I always had the
capabilities to do on the internet...need to get some "Insurance"

maybe...who knows...

->ME



60/64: well
Name: Phoenix #17
Date: Wed Jan 24 01:29:23 1990

like i said... im open to better ideas.. coz i we do have sensitive ino...
then no matter what we do with it... it will be termed blackmail..

Phoenix4

<and once you have publicised it.. youve played your cards.. andthen theyll
mess you up real bad..>


Read:(1-64,^61),? :

62/64: i understand...
Name: Ravage #19
Date: Wed Jan 24 14:34:03 1990

that the prosecution had a hard time showing malitous (sp!) intent. does
anyone know if that is true? if it is true then i doubt he will get any
time. probably a fine, community service, a probated time. what is the
latest on the ccc guys? have they taken them out and shot them yet?

in my previous post i was refering to the publication, through tv,
radio,and paper, of sensitive information held by organizations. it
would not have to be identified as to sender. therer are plenty of
underground, small town, press services (hey how about the gossip
rags?) that would be ideal to send that kind of stuff to. not only
that but what about the up wire? you could put it in que and it
would go all over.

grey owl
The Urvile #9
11:46 am  Thu Dec 08, 1988
christ, i don't know c that well, now c++? fucking a.
wheter you realize it or not, the virus will hurt us a tremendous amount
in
the future. somebody go kill morrison.
even if the courts are lax on him, (which is the only silver lining ican
think
of), then security on all systems is going to increase. we don't need
that.
not one bit.  think about the hacker of tomorrow.  how the fuck are they
gong
to learn? fuck, how are we going to get in a system that we've
just dug
up
(no tricks, no, the brute force method).
fuck life.

+++++++++++++ END EXHIBIT E

The government reproduced sequential messages #58-62 from January
23-24, 1990, but excluded message #61. We obtained it from the
original logs. It reads:

++++ Start Post #61

61/64: Morris Convicted
Name: Phiber Cut #34
Date: Wed Jan 24 04:43:24 1990

If RTM get's jail time we should all be suprised.  What he did was morrally
and ethically wrong, and he fucked upt and will now have to pay the piper.
However, hej is a very bright person and should not be put in a jail cell
with a bunch of hardended ass f**king criminals!

Hopefully he'll get some sort of community service and a fine, and this will
be enough to kkeep him from fucking up the network in the future.

+++++ End Post #61

Exhibit E is used as evidence that "hackers" would be deterred by a
substantial sentence, and the Morris case is used as evidence that
hackers followed it closely. But, several fallacies underlie this
assumption:

1) It is not unusual for computer hobbyists to follow news about their
interests. Morris's worm affected many on the nets, and most were
aware of his action.  Contrary to the claim that "Computer bulletin
board services (BBS's) around the country were buzzing about the
Morris case" (Sentencing Memorandum, p. 20), there was surprisingly
little discussion on most boards other than a simple mention and some
brief discussion. On The Phoenix Project, from which the logs for the
exhibits were taken, the discussion was intermittent over a several
day period, and the exhibit lists only 5 following the conviction.
One post was actually taken from December, 1988, over a year before
the Morris conviction. Such a dubious selection of posts to try to
magnify a the prosecutors' interpretation of them is disingenuous at
best.

2) The exhibits totally distort the context of the discussions.  We
are curious about the omission of post #61 of January 24, 1990.
Perhaps it was omitted because the poster explicitly condemns Morris's
action as unethical, and this post contradicts the point the
prosecution is trying to make. In fact, the general tenor of posts
about the Morris incident reflected strong condemnation. But,
prosecutors, to the contrary, ignore this and their distortion
borders on blatant fabrication. While this may be "good lawyering," it
does little to instill respect for the integrity of or confidence in
those who fabricate.  The CU did not consider Morris a "hacker," and
he was never held up as hero or role model. "Hackers," like most
others, are as hostile (if not more so) to those who create or spread
viruses as law enforcement. Viruses, as Cliff Stoll once suggested (in
a quote taken out of context by the media) are like razor blades in
the sand. Because "hackers" spend considerable time on the beaches of
the cyberworld, they have little sympathy for those cyber-vandals who
trash systems.  If the prosecutors had been intellectually honest,
they would have explained that the meaning of the posts was couched in
a hostility for Morris's actions tempered by their understanding that
prison was not an appropriate sentence. In fact, even the selective
quotes from Exhibit E indicate that the fear that viruses might
tighten up security is based on the value that one must *never* trash
a system.

3) The prosecution claims that "Clearly, the (Morris) sentence had
little effect on defendants Grant, Riggs, and Darden" (Sentencing
Memorandum, p. 20). This is outrageously irresponsible. The memorandum
states that their activities occured from September, 1987, through
July 21, 1989.  The Morris incident first made the news in November,
1988, when the virus was released.  The verdict occured in January,
1990. MORRIS'S SENTENCE was handed down in MAY of 1990. The
prosecution seems to have discovered a revolutionary new approach to
causality and chronological sequencing: Riggs, et. al, are expected to
have learned in 1987-1989 from events that wouldn't occur until 1990!

Mike Godwin (CuD 2.17) and others have raised serious criticisms about
the sentence of Riggs especially. The Exhibits were not available at
the time of those criticisms. However, now that they are public, the
sentences appear even more unjust. Worse, the logic by which they were
justified by the prosecution's exhibits strike us as gross hyperbole.
More simply, drawing from the definition of police lying by Hunt and
Manning (Symbolic Interaction, "The Social Context of Police Lying,"
14(1): 51), a strong case might be made that the prosecution LIED!

********************************************************************

------------------------------

                         **END OF CuD #3.17**
********************************************************************