[alt.society.cu-digest] CuD 1.23

TK0JUT2%NIU.BITNET@UICVM.uic.edu (07/24/90)

  ****************************************************************************
                  >C O M P U T E R   U N D E R G R O U N D<
                                >D I G E S T<
              ***  Volume 1, Issue #1.23 (July 18, 1990)   **
  ****************************************************************************

MODERATORS:   Jim Thomas / Gordon Meyer
ARCHIVISTS:   Bob Krause / Alex Smith
REPLY TO:     TK0JUT2@NIU.bitnet

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
            views of the moderators. Contributors assume all responsibility
            for assuring that articles submitted do not violate copyright
            protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


CONTENTS:

File 1:  Moderators' Comments
File 2:  FTPing Thru Bitnet: BITFTP Help
File 3:  Phrack as "Evidence?"
File 4:  CU in the News
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

----------------------------------------------------------------------

********************************************************************
***  CuD #1.23, File 1 of 4: Moderators' Comments                ***
********************************************************************

++++++++++
In this file:
  1) Craig Neidorf's Trial
  2) Law Enforcement Contributions
  3) Berserker BBS
  4) The Well in Sausalito
  5) LoD/H Technical Journal, #4

+++++++++++++++++++++++++++++
CRAIG NEIDORF'S TRIAL
+++++++++++++++++++++++++++++

Craig Neidorf's trial begins Monday, July 23, in Chicago's Federal Court
building at 220 S. Dearborn in Judge Nicholas Bua's court. For those
planning to attend, the Federal Court is on the south edge of The Loop,
about a 10 minute walk from commuter trains. Jury selection begins in the
morning. The trial, originally expected to be fairly short, perhaps because
the prosecutor expected no opposition, could run for at least
two-and-a-half weeks. Judge Bua refused the prosecutor's request for a
postponement apparently intended to dig up more "dirt" and witnesses. Some
sources indicate that the prosecution has been attempting to amass
information intended to discredit the Craig's character that has nothing to
do with the charges, but might create an unfavorable imagery to persuade a
jury that he must be guilty of *something*!  Looks from this side like the
politics of desperation. Dorothy Denning will attend the entire trial, and
the CuD moderators will be on the scene as time allows.

******************
LAW ENFORCEMENT CONTRIBUTORS
******************

We have invited two high-level prosecutors to contribute their views of the
problems of evidence, defining computer crime, separating "real" criminals
from CU types, and other issues to CuD.  One has agreed when time allows,
the other is considering it.  We believe it is crucial to develop dialogue
between competing groups in order to address the complexity of the various
issues. Unless this happens, it will be more difficult to assure
Constitutional protections, to enact or change legislation, or to generally
establish some sort of peaceful co-existence.  So, we again encourage
contributions from all sides.

******************
BERSERKER BBS
******************

We have heard that Berserker BBS, one of the elite boards in the country,
went down. Does anybody have any information on this?

***************
THE WELL
***************

We have come across THE WELL (an acronym for Whole Earth 'Lectronic Link)
in Sausalito. It's more than a BBS, and offers files, net links, and
informed message sections. Anybody interested in the computer underground
should participate in the "Hacker's Conference," where a variety of
interesting topics are discussed by lawyers, journalists, hackers, and
many, many others. The hacker's conference was the source of HARPER'S Forum
on hacking this past March.  It's a bit expensive (a sign-up fee, monthly
fee, and user fee), but more than worth it for the price.  THE WELL'S data
phone: (415)-332-6106; Voice: (415)-332-4335.

***************************
LOD/H TECHNICAL JOURNAL, #4
***************************

LoD/H #4 came out in May and is available from the CuD archives.  The
introductory statement warned of confusion and potential imposters, so we
thought we'd reprint it. The issue also includes a history of the LoD from
the perspective of one participant that supplements the history found in
Phrack 31. Here's an excerpt from the introduction:

***************************************************************************


We are still alive. This publication is not released on any schedule. Past
attempts at scheduling issues have failed miserably. The editors refuse to
release issues which are not up to our self-defined standards. We have in the
past, and will continue in the future, to accept articles from anyone (e.g.
non LOD) as long as the articles adhere to our basic format and style. The
editors review all articles to verify accuracy and integrity however it may
not be  possible in all cases to check every fact. Plagiarized material is not
acceptable and we make every attempt to verify an article's originality. When
referenced material is used, the source for that material must be clearly
stated. The more articles we receive the sooner each issue is released. There
is a minimum 2 month review and editing period for each article. If you want
to contribute articles contact any member and they will forward articles to
the editors.

There seems to be some confusion as to what writers are (or were) in LOD/H and
what ones aren't. JUST BECAUSE SOMEONE WRITES FOR THIS PUBLICATION DOES NOT
MEAN THEY ARE AN LOD/H MEMBER! Just to clear up any confusion, a current
member list follows:

Erik Bloodaxe
Lex Luthor
Prime Suspect
Phase Jitter
Professor Falken
                        (End excerpt from LoD/H #4)

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

********************************************************************
***  CuD #1.23: File 2 of 4: FTPing thru Bitnet                  ***
********************************************************************

++++++++++++++++
Lang Zerner reminds us that bitnet users may be able to access FTP sites,
and has sent along the following instructions.
++++++++++++++++

        BITFTP -- Princeton BITNET FTP Server

BITFTP provides a mail interface to the FTP portion of the IBM TCP/IP
product ("FAL") running on the Princeton VM system, to allow
BITNET/NetNorth/EARN users to ftp files from sites on the Internet.

BITFTP currently accepts requests only via RFC822-format mail, IBM
NOTE-format mail, PROFS-format messages, or files with no headers at all.
BITFTP currently returns the requested files as NETDATA-format files or as
mail files containing UUENCODED data.  If you specify "UUENCODE" or
"NETDATA" on your "FTP" command, BITFTP will attempt to use that format.
If you do not specify the format, BITFTP will attempt to select the
appropriate format for your node.  BITFTP attempts to send NETDATA-format
files through the gateway from EARN into Janet via the NIFTP facility at
Rutherford Lab.

If BITFTP sends you a file you cannot read, THE FIRST THING TO DO is to
make sure that you specified ASCII if the file should contain textual
material or that you specified BINARY if the file should contain binary
data, executable programs, tar files, or the like.  VMS users should
specify BINARY F 512 and should use RECEIVE/BINARY to receive the
NETDATA-format binary files BITFTP sends them.

If BITFTP sends you a uuencoded file that you cannot uudecode, the first
thing to do is to translate all occurrences of 0x7E in the file to 0x5E and
then try uudecoding again.  (Some gateways are changing 5Es to 7Es when the
files pass through them.)

To use BITFTP, send mail containing your ftp commands to "BITFTP@PUCC".
The first command to BITFTP must be "FTP" or "HELP".

The recommended syntax for ftp requests is:

FTP hostname NETDATA    --or--    FTP hostname UUENCODE
USER username password
<other ftp subcommands>
QUIT

After the hostname on the FTP command, you may specify "UUENCODE" or
"NETDATA" to tell BITFTP the format in which you wish to receive files.

(If the username is "anonymous", no password is required; BITFTP will use
your userid and nodeid as the password.)

Note that on many systems passwords are case-sensitive; that is, the
password may be required to be in lower case or mixed case or upper case.
(The same is true of directory and file names.)

The following is an example of an ftp request:

FTP  f.ms.uky.edu  NETDATA
USER  anonymous
CD  /pub/msdos/Games
DIR
BINARY
GET  robotron.arc  msdos.robotron
QUIT

To request a list of some of the hosts that allow anonymous ftp, send
BITFTP mail or a message containing only the command "FTPLIST".  Note that
there is no guarantee that BITFTP can access all the hosts in this list.

BITFTP implements a subset of the ftp subcommands provided in the IBM
TCP/IP and uses the same syntax.  Therefore, you may find it useful to
obtain the "IBM TCP/IP for VM Command Reference Manual", IBM order number
GC09-1204.

The currently supported subcommands are:

  ACCT        -- to send host-dependent account information.
    format:   ACCT account-information

  ASCII       -- to change the file transfer type to ASCII.
    format:   ASCII

  BINARY      -- to change the file transfer type to image.
    format:   BINARY <FIXED record-len> <VARIABLE>

  CD          -- to change the working directory.
    format:   CD directory

  CLOSE       -- to disconnect from the foreign host.
    format:   CLOSE

  DIR         -- to get a list of directory entries.
    format:   DIR

  EBCDIC      -- to change the file transfer type to EBCDIC
    format:   EBCDIC

  GET         -- to get a file from the foreign host.
    format:   GET foreignfile <localfile>

              If you specify "localfile", it must be in
              the forms "filename.filetype" or "filename",
              and the filename and filetype may each be no
              more than 8 characters long and may not contain
              periods.

  LOCSTAT     -- to display local status information.
    format:   LOCSTAT

  LS          -- to list the files in a directory.
    format:   LS <name>

  PWD         -- to print the working directory.
    format:   PWD

  QUIT        -- to disconnect from the foreign host.
    format:   QUIT

  STATUS      -- to retrieve status information from a foreign host.
    format:   STATUS <name>

  SYSTEM      -- to get the name of the foreign host's operating system.
    format:   SYSTEM

  TYPE        -- to specify Image, ASCII, or EBCDIC file transfer.
    format:   TYPE <I|A|E>

The files you request will be sent to you in NETDATA format or UUENCODED
inside mail files.

You will also receive a mail file containing a log of your ftp session.  In
that mail file, entries prefixed by ">" are your original commands; those
prefixed by ">>" are your commands as interpreted by BITFTP and passed to
TCPIP; those prefixed by ">>>" are your commands as interpreted by TCPIP
and passed to the remote host; those prefixed by "<<<" are messages from
the remote host; and those prefixed by ">>>>" are completion messages from
BITFTP.

If BITFTP is unable to connect to the host you specify, it will send you
mail after the first attempt, but will keep trying at intervals over three
days.  The only additional mail files you will receive will be when the
connection is made successfully or when BITFTP gives up after three days.

The load on BITFTP is often very heavy, and network backlogs are often so
great that it may take several days for a file to get to you once BITFTP
sends it, so please be patient and don't send multiple requests for the
same file.  If your system allows you to send interactive messages, you can
inquire about BITFTP's backlog by sending the query "How are you?", e.g.,
on a VM system:

   TELL BITFTP AT PUCC How are you?


This service is currently under development and is far from complete.
Current plans for improvements include:

1.  Acknowledgments via MSG when mail is received and when
    processing has been completed.

2.  A much more complete HELP facility.

Questions about BITFTP and suggestions for improvements should be directed
to Melinda Varian, MAINT@PUCC on BITNET or MAINT@pucc.princeton.edu on the
Internet.

The author gratefully acknowledges the use of the FTP SUBCOM interface
written by David Nessl, the SENDJANI EXEC written by Alan Flavell, the
uuencoding utility written by John Fisher, and the RFC822 parsing routine
written by Eric Thomas.  NOTE:  If you have any complaints or suggestions
about the way any of these routines work in BITFTP, please send them to
MAINT@PUCC (Melinda Varian), not to the authors.

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

********************************************************************
***  CuD #1.23: File 3 of 4: Phrack as Evidence???               ***
********************************************************************

If a clever prosecutor wanted to introduce evidence that "proved" how dangerous
a defendant was, and if that evidence included something like what follows,
what would this evidence actually show?  Hypothetically, if the following
were evidence, would Bill Cook think it so dangerous as to have it sealed?
Can't blame him, though.  It's well known throughout the modem community
that PHRACK took its orders directly from the Kremlin, and secret codes and
meanings are incrypted in vowels.  Rumor also has it that if you change the
ascii to hex, stick it in the oven for 23 minutes at 420 degrees, dry it,
grind it up in the food processer and smoke it, it's better than crack.
Sometimes it seems like the prosecution has tried it--and found that it
works! What else could explain their actions?

_______________________________________________________________________________
                                ==Phrack Inc.==

                      Volume Two, Issue 23, File 3 of 12

       <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
       <>                                                            <>
       <>                        Subdivisions                        <>
       <>                        ~~~~~~~~~~~~                        <>
       <>          Part Three Of The Vicious Circle Trilogy          <>
       <>                                                            <>
       <>  A Study On The Occurrence Of Groups Within The Community  <>
       <>                                                            <>
       <>                Presented by Knight Lightning               <>
       <>                       August 8, 1988                       <>
       <>                                                            <>
       <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>

               A Rose By Any Other Name... Would Smell As Sweet

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

          The Administration \ Advanced Telecommunications, Inc./ATI
         ALIAS \ American Tone Travelers \ Anarchy Inc. \ Apple Mafia
  The Association \ Atlantic Pirates Guild/APG \ Bad Ass Mother Fuckers/BAMF
    Bellcore \ Bell Shock Force/BSF \ Black Bag \ Camorra \ C&M Productions
   Catholics Anonymous \ Chaos Computer Club \ Chief Executive Officers/CEO
 Circle Of Death \ Circle Of Deneb \ Club X \ Coalition of Hi-Tech Pirates/CHP
        Coast-To-Coast \ Corrupt Computing \ Cult Of The Dead Cow/-cDc-
    Custom Retaliations \ Damage Inc. \ D&B Communications \ The Dange Gang
            Dec Hunters \ Digital Gang/DG \ DPAK \ Eastern Alliance
          The Elite Hackers Guild \ Elite Phreakers and Hackers Club
  The Elite Society Of America \ EPG \ Executives Of Crime \ Extasyy (Elite)
   Fargo 4A \ Farmers Of Doom/FOD \ The Federation \ Feds R Us \ First Class
          Five O \ Five Star \ Force Hackers \ The 414s \ Hack-A-Trip
Hackers Of America/HOA \ High Mountain Hackers \ High Society \ The Hitchhikers
       IBM Syndicate \ The Ice Pirates Imperial Warlords \ Inner Circle
                        Inner Circle II \ Insanity Inc.
International Computer Underground Bandits/ICUB \ Justice League of America/JLA
     Kaos Inc. \ Knights Of Shadow/KOS \ Knights Of The Round Table/KOTRT
       League Of Adepts/LOA \ Legion Of Doom/LOD \ Legion Of Hackers/LOH
       Lords Of Chaos \ Lunatic Labs, Unlimited \ Master Hackers \ MAD!
            The Marauders \ MD/PhD \ Metal Communications, Inc./MCI
  MetalliBashers, Inc./MBI \ Metro Communications \ Midwest Pirates Guild/MPG
       NASA Elite \ The NATO Association \ Neon Knights \ Nihilist Order
Order Of The Rose \ OSS \ Pacific Pirates Guild/PPG \ Phantom Access Associates
                PHido PHreaks \ Phlash \ PhoneLine Phantoms/PLP
              Phone Phreakers Of America/PPOA \ Phortune 500/P500
               Phreak Hack Delinquents \ Phreak Hack Destroyers
         Phreakers, Hackers, And Laundromat Employees Gang/PHALSE Gang
     Phreaks Against Geeks/PAG \ Phreaks Against Phreaks Against Geeks/PAP
      Phreaks and Hackers of America \ Phreaks Anonymous World Wide/PAWW
             Project Genesis \ The Punk Mafia/TPM \ The Racketeers
 Red Dawn Text Files/RDTF \ Roscoe Gang \ SABRE \ Secret Circle of Pirates/SCP
   Secret Service \ 707 Club \ Shadow Brotherhood \ Sharp Inc. \ 65C02 Elite
    Spectral Force \ Star League \ Stowaways \ Strata-Crackers \ The Phrim
     Team Hackers '86 \ Team Hackers '87 \ TeleComputist Newsletter Staff
 Tribunal Of Knowledge/TOK \ Triple Entente \ Turn Over And Die Syndrome/TOADS
  300 Club \ 1200 Club \ 2300 Club \ 2600 Club \ 2601 Club \ 2AF \ Ware Brigade
           The Warelords \ WASP \ The United Soft WareZ Force/TuSwF
                       United Technical Underground/UTU

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Its literally unbelievable just how many different groups and organizations
there are or have been in the phreak/hack/pirate community.  The list of 130
groups displayed above is probably still just a fraction of the actual amount
of groups that there have been, but those are the only ones I am aware of at
this time.

In the past John Maxfield has estimated that there are about 50,000
hackers/phreaks/pirates operating in the United States today.  That figure has
multiplied to to a point where it probably comes close to 500,000.  Believe it
or not, almost everyone has been a member of one of the above groups (or
perhaps a group not mentioned) at one time or another.

Today's telecom security consultants and law enforcement agencies know this too
and that is how group affiliations can be turned against us.

What does being in a group mean?  In the modem community being in a group is
supposed to mean that the people in the group work on projects together and
trade specific information that people outside of the group are not allowed to
access and by the same token, have no way to get it.  However, obviously the
people in the group all feel that the other people with whom they are sharing
information, can be trusted and are worthy of associating with them to begin
with.  So when you stop and think about it, if there was no group, the people
in question would still be trading information and would still trust each other
because they would not have formed the group unless this criteria was met in
the first place.  So in truth, being in a group really means nothing on the
basis previously mentioned.

You see in the modem community, being in a group really is more like a power
trip or a "security blanket" for people who feel that they need to let people
know that they associate with a specific clique in the hopes that the
popularity of some of the other members will lend popularity to themselves.

Many groups form in such a way that they try to make it look otherwise and thus
begins the real problem.  Some groups are formed by a person who tries to get a
lot of guys together that he feels knows a lot or seems to post a lot of good
information - Bad Move; If you are going to form a group at all, stick with
people who you know can be trusted (can you really ever "know" who can be
trusted?) and then out of those people form your group or choose who you feel
should be in it.

Anyway, to prove that they are elite, most groups begin to gather specific data
for giving to group members, and this includes handing out their own names and
phone numbers with other members of the group.  They feel a false loyalty and
psychologically create such utter faith in all the members that the faith is
ultimately blind and based on hopes and aspirations of greatness.

What is the best way for a security agent or informant to blend in with the
modem community?  Join as many groups as possible, start gathering data on
the members, and spread your handle throughout the community to become "well
known."

Example:  Taken From Phrack World News Issue XV;

           [This article has been edited for this presentation. -KL]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Mad Hatter; Informant?                                            July 31, 1987
~~~~~~~~~~~~~~~~~~~~~~
We at Phrack Inc. have uncovered a significant amount of information that has
led us to the belief that Mad Hatter is an informant for some law enforcement
organization.

When Taran King, Cheap Shades, Forest Ranger, and Knight Lightning arrived at
Control C's in Chicago, Illinois, Mad Hatter had already searched the place and
had found some papers that could only have done ^C harm.   We destroyed this
information and thought everything was ok.  However, as it turns out, we
searched Mad Hatter's bags and found a duplicate set of this information and
the general hypothesis was they he intended to leave it behind as incriminating
evidence.

Mad Hatter had also brought down several disks for the purpose of copying
Phantasie Realm.  Please note; PR was an IBM program and MH has an apple.

Control C told us that when he went to pick Mad Hatter up at the bus terminal,
he watched the bus pull in and saw everyone who disembarked.  Suddenly Mad
Hatter was there, but not from the bus he was supposed to have come in on.  In
addition to this, he had baking soda wrapped in a five dollar bill that he
tried to pass off as cocaine.  Perhaps to make us think he was cool or
something.

Mad Hatter constantly tried to get left behind at ^C's apartment for unknown
reasons. He also was seen at a neighbor's apartment making unauthorized calls
into the city of Chicago.  When asked who he called, his reply was "Don't worry
about it."  Mad Hatter had absolutely no money with him during PartyCon (and
incidentally he ate everything in ^C's refrigerator) and yet he insisted that
although he had taken the bus down and had return trip tickets for the bus,
that he would fly back home.  How was this going to be achieved?  He had no
money and even if he could get a refund for the bus tickets, he would still be
over $200 short.  When asked how he was going to do this, his reply was "Don't
worry about it."

On Saturday night while on the way to the Hard Rock Cafe, Mad Hatter asked
Control C for the location of his computer system and other items 4 times.
This is information that Hatter did not need to know, but perhaps a SS agent or
someone could use very nicely.

When Phrack Inc. discovered that Dan The Operator was an FBI informant and made
the news public, several people were criticizing him on Free World II Private.
Mad Hatter on the other hand, stood up for Noah and said that he was still his
friend despite what had happened.  Then later when he realized that people were
questioning his legitimacy, his original posts were deleted and he started
saying how much he wanted to kill Dan The Operator and that he hated him.

Mad Hatter already has admitted to knowing that Dan The Operator was an FBI
informant prior to SummerCon '87.  He says the reason he didn't tell anyone is
because he assumed we already knew.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
When Mad Hatter first entered the phreak/hack world, he joined;

                     Phreaks Anonymous World Wide (PAWW),
                     MetalliBashers, Inc (MBI),
                     Order of The Rose, and
                     Cult of The Dead Cow (-cDc-).

If you were a security agent or a loser hacker turned informant and you wanted
to mix in with the phreak/hack community, wouldn't you try to join as many
groups as possible to spread your name?
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Phreaks Anonymous World Wide, MetalliBashers, Inc., Order of The Rose, and
Cult of The Dead Cow, not exactly the toughest groups to join and once there is
one security person in the group, he is bound to vouch for others, etc.  So
while he spreads his name as an elite modem user throughout the community, he
is busy gathering information on group members who are foolish enough to trust
him.

Its not bad enough that some groups are easy enough to infiltrate as it is, but
does anyone remember this?

Taken From Phrack World News Issue XI;
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Phortune 500:  Phreakdom's Newest Organization               February 16, 1987
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For those of you who are in the least bit interested, Phortune 500 is a group
of telecommunication hobbyists who's goal is to spread information as well as
further their own knowledge in the world of telecommunications.  This new
group was formed by:

    Brew Associates / Handsomest One / Lord Lawless / The Renegade Chemist
          Quinton J. Miranda / Striker / The Mad Hacker / The Spiker

These eight members are also known as Board Of Directors (BOD).  They don't
claim to be *Elite* in the sense that they are they world's greatest hacker,
but they ARE somewhat picky about their members.  They prefer someone who knows
a bit about everything and has talents exclusive to him/herself.

One of the projects that Phortune 500 has completed is an individual password
AE type system.  It's called TransPhor.  It was written and created by Brew
Associates.  It has been Beta tested on The Undergraduate Lounge (Sysoped by
Quinton J. Miranda).   It is due to be released to the public throughout the
next few months.

Phortune 500 has been in operation for about 4 months, and has released two
newsletters of their own.  The Phortune 500 Newsletter is quite like the
"People" of contemporary magazines.  While some magazines cover the deep
technical aspects of the world in which we communicate, their newsletter tries
to cover the lighter side while throwing in information that they feel is "of
technical nature."  The third issue is due to be released by the end of this
month.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
             *>=-> The Phortune 500 Membership Questionnaire <-=<*

Note:  The following information is of a totally confidential nature.  The
       reason you may find this so lengthy and in depth is for our knowledge of
       you.  We, with Phortune 500, feel as though we should know prospective
       members well before we allow them into our organization.  Pending the
       answers you supply us, you will be admitted to Phortune 500 as a charter
       member.  Please answer the following completely...
...............................................................................

Handle                          :
First Name                      :
Voice Phone Number              :
Data Phone Number               :
City & State                    :
Age                             :
Occupation (If Applicable)      :
Place of Employment (Optional)  :
Work Phone Number   (Optional)  :
Computer Type                   :
Modem Type                      :
Interests                       :
Areas Of Expertise              :
References (No More Than Three) :
Major Accomplishments (If Any)  :
...............................................................................
Answer In 50 Words Or Less;

^*^  What Is Phortune 500 in Your Opinion?

^*^  Why Do You Want To Be Involved With Phortune 500?

^*^  How Can You Contribute to Phortune 500?
...............................................................................

Please answer each question to the best of your ability and then return to any
Phortune 500 Board of Directors Member Or a Phortune 500 BBS:

           The Private Connection (Limited Membership) 219-322-7266
           The Undergraduate AE   (Private Files Only) 602-990-1573
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

An actual application form for joining a group.  Perhaps the concept was a good
one, perhaps not, but from a standpoint of publicity and security, this was a
complete and utter catastrophe.

Basically we are all here to learn in one way or another.  Groups and clubs
in our community only seem to segregate it and at a time when everyone should
be pulling together, this is not such a good idea.  Privacy and security are
important factors that motivate these sects within the society, but ultimately
are the final consequences worth the trouble of creating a group?

If groups had not been created, there would not be as much attention on the
phreak/hack community as there is right now.  When group names start spreading,
it starts the law enforcement agencies into a panic that its big time organized
crime.  This allows them to justify more time and money into the apprehension
of computer criminals and usually they go after the big names; the people in
the most "elite" groups.

Now before you, a member of a group, start criticizing this file, please
understand, I am not referring to any particular groups here, just groups in
general.  Any and all comments made about MBI, -cDc-, PAWW, OOTR, and P500
should not be taken personally and were used only as examples of how groups can
be potential security problems.

There are some groups that are worthwhile organizations and its obvious because
that have existed through the years and been productive.  However, the only way
to keep this community alive is for everyone to work together to protect and
learn from each other.

:Knight Lightning

                              "The Future Is Now"

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

********************************************************************
                           >> END OF THIS FILE <<
***************************************************************************

------------------------------

********************************************************************
***  CuD #1.23: File 4 of 4: The CU in the News                  ***
********************************************************************

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-

From: ekrell@ulysses.att.com
Date: Mon, 9 Jul 90 16:14:38 EDT
Subject: Legion of Doom Members Plead Guilty


Extracts from an AP news wire:

Three members of the Legion of Doom group pleaded guilty to federal
conspiracy charges Monday. U.S. Attorney Joe Whitley said the group
disrupted telecommunications, stole computer source codes and information,
stole credit card information and fraudulently obtained money and property.

In May, authorities in Indiana prosecuted a juvenile who pleaded guilty
to 11 counts of fraud and agreed to testify against the three Atlanta men,
in a trial scheduled to start today.

Instead, the three pleaded guilty. They are E. Grant, 22 and Robert
Riggs, 22 (both from Atlanta) and Franklin E. Darden Jr, 24 of Norcross.

Whitley said in a statement that they illegally accessed various
BellSouth computers between Sept. 10, 1987 and July 21, 1989. Grant and
Darden also monitored private telephone conversations. They were carged
with conspiracy to commit computer fraud, wire fraud, access code fraud and
interstate transportation of stolen property.

Darden and Riggs pleaded guilty to one count of conspiracy each and face
a maximum of 5 years in prison and a $ 250,000 fine. Grant pleaded guilty
to possessing 15 or more BellSouth access devices with intent to defraud
and faces up to 10 years in prison and a $ 250,000 fine.


Eduardo Krell                   AT&T Bell Laboratories, Murray Hill, NJ

UUCP: {att,decvax,ucbvax}!ulysses!ekrell  Internet: ekrell@ulysses.att.com

++++++++++++++++++++++++++++++

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

And here's another little article from Computerworld, July 2, 1990 issue,
p. 78, in the column "Inside Lines," no definite author given, only the
Assistant News Editor Jim Connolly (a phone number is given for news tips,
800-343-6474):

"That old hack magic The infamous Internet worm, created by ex-Cornell
graduate student and hacker Robert T. Morris, still rears its head from
time to time, according to one security expert.  "It's taken on a life of
its own," he said.  Admirers of Morris' handiwork have added names to the
worm's built-in password-cracking dictionary to make it more effective.
One estimate puts the dictionary at 560 passwords, up from the original
430, the expert said.  Morris, meanwhile, is still trying to work out a
deal with his probation officer on how he will spend his 400 hours of
community service -- part of his sentence for writing the untamed program,
according to his lawyer.  A decision will come next week, he added."

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

          COMPUTER TRANSFER OF STOLEN DATA RULED A FEDERAL CRIME
                              By Janan Hanna
        (From Chicago Daily Law Bulletin, June 13, 1990, pp 1, 14)

The transfer of confidential information from one computer to another
constitutes a violation of the federal law prohibiting the interstate
transportation of stolen property, a federal judge has ruled.

U.S. District Judge Nicholas Bua made this first-impression ruling in a
criminal computer "hacker" case brought against two young men.

Attorney Sheldon T. Zenner, representing one of the defendants, said the
ruling improperly broadens the federal statue against interstate
transportation of stolen property--18 U.S.C. {section} 1343.

Under the ruling, Zenner argued, simple communications between persons or
news organizations could be construed as illegal.

Bua denied a motion to dismiss by defendant Craig Neidorf, who was indicted
along with Robert J. Riggs for allegedly breaking into Bell South Telephone
Co.'s computer system, copying its emergency 911 system and publishing the
information on a computer bulletin board.

Riggs allegedly gained acess to Bell South's computer, downloaded the
system into his home computer and sent it to Neidorf who allegedly
published it in a computer newsletter known as "PHRACK," according to Bua's
decision.

Neidorf, who was charged with violating the wire fraud and interstate
transport statutes, argued that the government's allegation did not fall
within the definition of those statutes because no goods, wares, or
merchandise was transferred. The original indictment also charged Neidorf
with violations of the Computer Fraud and Abuse Act of 1986, but government
prosecutors dropped those charges in a superseding indictment and added
additional wire fraud charges.

18 U.S.C. {section} 2314 provides, in part, that "whoever transports,
transmits, or transfers in interstate or foreign commerce any goods, wares,
merchandise, securities or money, of the value of $5,000 or more, knowing
the same to have been stolen, converted or taken by fraud...shall be fined
not more than $10,000 or imprisoned not more than 10 years or both."

"The question is, where what takes place is merely a telephone call, where
information is transported and the property never leaves Bell, because they
still have it, is that interstate transportation of stolen property?"
Zenner asked.  "Other cases have held that property must be tangible
property. If a kid...had stolen a computer disk, gotten in his car and
drove it {to another person} or mailed it, that's ITSP {interstate
transportation of stolen property}."

But Bua disagreed.

"This court is unpersuaded by Neidorf's disingenuous argument that he
merely transferred electronic impulses across state lines," Bua said.
"Several courts have upheld section 2314 charges based on the wire transfer
of fraudulently obtained money, rejecting the arguments of the defendants
in those cases that only electronic impulses, not actual money, crossed
state lines.  " Bua noted that no other court has ever held that the
electronic transfer of confidential, proprietary business information from
one computer to another across state lines constitutes a violation of
section 2314, but he added that no other court has addressed the issue.

"Over the course of the past decade, advances in technology and growing
respect and acceptance for the powers of computers have created a true
explosion in the computer industry," Bua said.  "Quite naturally, the
growth of computer availability and application has spawned a host of new
legal issues.

"This case requires the court to wrestle with some of these novel legal
issues which are a product of the marriage between law and computers."

Drawing a parallel between this case and cases involving the wire transfer
of funds, Bua characterized Neidorf's alleged conduct not merely as the
transmission of electronic impulses, but as the transfer of properitary
{sic} business information.

"The question this case presents, then, is not whether electronic impulses
are 'goods, wares or merchandise' within the meaning of {page break}
section 2314, but whether the proprietary information contained in Bell
South's E911 file constitutes a 'good, ware, or merchandise' within the
purview of the statute," Bua said. "This court answers that question
affirmatively."

The case is schedule to be tried July 23. U.S. v. ROBERT J. RIGGS AND CRAIG
NEIDORF, No. 90 CR 0070.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
             "U.S. Raid Stirs Drive for Computer Rights"
     By Linda P. Campbell, The Chicago Tribune, 7/11/90: Page 6.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Washington--Steve Jackson says he still doesn't know exactly why Secret
Service agents raided his computer-game business last March in Austin,
Texas, and confiscated computers, software, vital business data and a game
book that was soon to be published.

But at a Washington news conference Tuesday, Jackson suggested that it may
be because the book described a "totally imaginary" futuristic fantasy game
involving computer intrusion that government agents saw as "a handbook for
computer crime." The raid, Jackson claimed, nearly ruined his business.

Now a group of computer pioneers has championed Jackon's case as an example
of overzealous law-enforcement officials trampling an individual's rights
in the pursuit of computer criminals.

Mitchell Kapor, who founded the software giant Lotus Development Corp., has
teamed with Apple Computer Inc. co-founder Steven Wozniak and an anonymous
Silicon Valley entrepreneur to fund the Electronic Frontier Foundation,
dedicated to protecting a kind of "keyboard freedom."

The group is seeking 1st Amendment protections for electronic communication
such as computer bulletin boards and newsletters, and wants to halt
intrusive law-enforcement techniques.

"Speech is speech. It doesn't really matter whether it's formulated on
paper or in bits nd bytes," said John Perry Barlow, a writer who helped put
together the foundation.

The group, which was formaly announced Tuesday, has focused debate on the
difficult balance between securing computer systems from intruders, known
as "hackers," and protecting rights to get information and communicate
through electronic media.

But Kapor denied that was simply a "hackers' defense fund." "We don't see
our mission as defending people who illegally enter the computer systems,"
he said.

He and others involved with the group argued that the government has gone
too far, partly because ignorance about rapidly advancing computer
technology has generated widespread anxiety.

They cited the case of Craig Neidorf, a University of Missouri student
indicted on federal charges of wire fraud and interstate transportation of
stolen property. Neidorf published in his electronic magazine, Phrack, a
telephone company document about 911 emergency phone services that someone
else allegedly stole from the BellSouth computer system.

New York Lawyer Terry Gross, who represents Neidorf, called the prosecution
"an unprecedented threat to the free press." And Kapor argued that computer
news networks should have the same protections as print or broadcast media.

But Secret Service Special Agent Rich Adams said that legitimate computer
bulletin board users were not at risk. The agency, he said, is cracking
down on hackers who "are maliciously trying to get into" hospital records
and 911 systems or stealing credit card information and telephone access
codes "for personal gain."

Earlier this year, a 2-year anti-hacker investigation dubbed Operation
Sundevil led to the seizure of more than 40 computers and 23,000 disks in
13 cities.

Adams said that Jackson, who was not arrested in the raid on his business,
got caught in the Sundevil net because one of his employees was accused of
a computer crime.

On Monday three men belonging to a hackers group known as the Legion of
Doom pleaded guilty to charges of conspiring to defraud BellSouth, which
oversees telephone service in nine Southern States.

                            ----END ARTICLE----

********************************************************************

------------------------------

                           **END OF CuD #1.23**
********************************************************************