home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
UNDERGRD
/
VOL_1
/
CUD115.TXT
< prev
next >
Wrap
Text File
|
1994-11-01
|
27KB
|
673 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.15 (June 16, 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer
REPLY TO: TK0JUT2@NIU.bitnet
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
--------------------------------------------------------------------
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
--------------------------------------------------------------------
*** SPECIAL ISSUE: June Indictment of Craig Neidorf ***
--------------------------------------------------------------------
The new indictment drops some charges and introduces others. The logic
required to connect the acts to the charges requires considerable
prosecutorial intellectual aerobics. We invite comments from all
perspectives. We again encourage law enforcement agents or sympathizers to
join the dialogue, because we believe that productive discussion is in the
interests of all in the computer world.
Moderators Note: This is a verbatim copy of the indictment, transcribed
from a third generation Fax/Photcopy of the original. As of this writing we
have been unable to obtain a copy from the US Government. While in the
past we were able to have materials mailed to us, upon inquiry this time we
were told by the that a copy would have to be picked up in person at the
Federal Building in downtown Chicago.
Special thanks go out to the CuD reader who supplied us with this copy,
saving us the trip downtown.
=====================================================================
UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF ILLINOIS
EASTERN DIVISION
UNITED STATES OF AMERICA )
)
v. ) No. 90 CR 70
) Violations : Title 18, United
ROBERT J. RIGGS, also known ) States Code, Sections
as Robert Johnson, also ) 1343 and 2314
known as Prophet, and )
CRAIG NEIDORF, also known )
as Knight Lightning )
_Count One_
The SPECIAL APRIL 1990 GRAND JURY charges:
_Introduction_
1. At all times relevant herein, Enhanced 911 (E911) was the
national computerized telephone service program for handling
emergency calls to the police, fire, ambulance and emergency
services in most municipalities in the United States. Dialing 911
provided the public immediate access to a municipality's Public
Safety Answering Point (PSAP) through the use of computerized call
routine. The E911 system also automatically provided the recipient
of an emergency call at the PSAP with the telephone number and
location identification of the emergency caller.
2. At all times relevant herein, the Bell South Telephone
Company and its subsidiaries (Bell South) provided telephone
services in the nine state area including Alabama, Mississippi,
Georgia, Tennessee, Kentucky, Louisiana, North Carolina, South
Carolina and Florida.
[end of page one]
_DEFINITION OF TERMS_
3. _The E911 Test File_ - At all times relevant herein, the
E911 system of Bell South was described in the computerized text
file known as the Bell South Standard Practice 660-225-104SV
Control Office Administration of Enhanced 911 Services for Special
and Major Account Centers, dated March 1988 (E911 text file). The
E911 text file was a highly proprietary and closely held
computerized text file belonging to the Bell South Telephone
Company and stored on the company's AIMS-X computer in Atlanta,
Georgia. The E911 text file described the computerized control,
maintenance and service of the E911 system and carried warning
notices that it was not to be disclosed outside Bell South or any
of its subsidiaries except under written agreement.
4. _Text File_ - As used here, a "file" is a collection of
related data records treated as a unit by a computer and stored in
a computer's memory on a disk or other permanent storage device.
A "text file" is a collection of stored data, which, when recovered
from a disk or other storage device, presents typed English
characters displayed on a computer monitor, a printer or in any
other display medium compatible with the computer storing the data.
5. _Computer Hackers_ - As used here, computer hackers are
individuals involved with the unauthorized access of computer
systems by various means. Computer hackers commonly identify
themselves by aliases or "hacker handles" when communicating with
other hackers.
[page] 2
6. _Legion of Doom_ - As used here the Legion of Doom (LOD)
was a closely knit group of computer hackers involved in:
a. Disrupting telecommunications by entering
computerized telephone switches and changing the
routing on the circuits of the computerized
switches.
b. Stealing proprietary computerized information from
companies and individuals.
c. Stealing and modifying credit information on individuals
maintained in credit bureau computers.
d. Fraudulently obtaining money and property from
companies by altering the computerized information
used by the companies.
e. Sharing information with respect to their methods
of attacking computers with other computer hackers
in an effort to avoid law enforcement agencies and
telecommunication experts from focusing on them, alone.
7. _Bulletin Board System_ - At all times relevant herein, a
bulletin board system (BBS) was a computer, or portion thereof,
operated as a medium of communication between computer users at
different locations. Users accessed or got on the BBS through
telephone line link ups from the user's computer to the BBS
computer, which could be in the same building or around the world.
BBS's could be used to exchange messages (electronic mail) or store
[page] 3
information. BBS's were public commercial services or privately
operated.
8. _JOLNET BBS_ - At all times relevant herein, a public access
computer bulletin board system was located in Lockport, Illinois,
which provided computer storage space and electronic mail service
to its users. The Lockport BBS was called "Jolnet". The Jolnet
BBS was also used by computer hackers as a location for
exchanging and developing software tools for computer intrusion,
and for receiving and distributing hacker tutorials and other
computer access information.
9. _E-Mail_ - At all time relevant herein, electronic mail
(e-mail) was a computerized method for sending communications and
computer files between computers on various computer networks.
Persons who sent or received e-mail were identified by an e-mail
address, similar to a postal address. Although a person may have
more than one e-mail address, each e-mail address identified a person
uniquely. The message header of an e-mail message identified both
the sender and recipient of the e-mail message and the date the
message was sent.
_DEFENDANTS_
10. At all times relevant herein ROBERT J. RIGGS, defendant
herein, was a member of the LOD.
11. At all time relevant herein, CRAIG NEIDORF, defendant herein,
was a publisher and editor of a computer hacker newsletter known