home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
UNDERGRD
/
VOL_3
/
CUD302.TXT
< prev
next >
Wrap
Text File
|
1994-11-01
|
40KB
|
881 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 3, Issue #3.02 (Janury 16, 1991) **
** SPECIAL ISSUE: SECRET SERVICE STING BOARD AND INFORMANT **
****************************************************************************
MODERATORS: Jim Thomas (this issues)
(Gordon Meyer on temporary re-location hiatus)
USENET readers can currently receive CuD as alt.society.cu-digest.
Anonymous ftp sites: (1) ftp.cs.widener.edu (2) cudarch@chsun1.uchicago.edu
E-mail server: archive-server@chsun1.uchicago.edu.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. Some authors, however, do copyright their material, and those
authors should be contacted for reprint permission.
It is assumed that non-personal mail to the moderators may be reprinted
unless otherwise specified. Readers are encouraged to submit reasoned
articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
In Liam O'Flaherty's 1925 novel "The Informer," Gypo Nolan betrays a friend
to the police for 20 pounds. Few of the characters are particularly noble
or sympathetic, but O'Flaherty manages to show the complexity of human
frailty, moral quandry, brutality and compassion, as Gypo ultimately dies a
pathetic death seeking redemption for his betrayal.
Only with sadness do we present this first of several special issues on
federally created and rewarded betrayal, deceit, and informants in the CU.
We draw here from several public documents, including the seizure warrant
served on RIPCO BBS. We also use phone logs that we and others have
collected, copies of telephone bills and logs that corroborate certain
numbers, eye witness accounts, interviews, and other information that
establishes beyond doubt that the U.S. Secret Service, in cooperation with
the Arizona State's Attorney's Office, used a PAID INFORMANT to establish a
sting board and to capture message logs from a variety of BBSs and turn
them over to state and federal agents.
The primary hard evidence for establishing both the existence and the
identity of the informant was obtained by Glen Roberts, the publisher of
FULL DISCLOSURE, an interesting hard-copy magazine, and Bill Vajk, a
freelance writer and researcher who is active on the nets.
The full text should be on the CuD archive/ftp sites in a few
weeks.
As those who have been following the Dr. RIPCO saga recall, the warrant
authorizing the search and seizure of his equipment was sealed, and the
best efforts of attorneys and others failed to obtain a copy by requesting
it through official channels. Delays, denials, confusion, and apparent
misinformation seemed to stymie all formal requests. So, Bill and Glen took
the case number (90-M-187), trucked on down to the federal court on S.
Dearborn in Chicago, and went to work. They requested several case files
adjacent to the desired one (90-M-186, 90-M-188, etc) on the assumption
that the precise one they sought was likely to be among them. It was. So,
they plunked their coins into the zerox machine, duplicated the documents,
and shared them with the world.
For those who have not yet seen it, FULL DISCLOSURE is a newspaper that
covers topics that are not regularly covered in detail in the general
media. A significant focus is on privacy, electronic surveillance, and
related topics. Articles include coverage of the National Technical
Investigators Association annual conference, the latest in video
surveillance equipment, the JBR tape recorder and much more.
A sample issue is available free, or subscriptions are $18 for 12 issues.
FULL DISCLOSURE, Box 903-C, Libertyville, Illinois 60048.
In coming issues, FULL DISCLOSURE will include stories on the government's
paranoia in the RIPCO case, as reflect in the seizure warrant (available
ftp in about 7-10 days). CuD will focus primarily on the ethical,
ideological, and other implications of creating a paid informant class for
crimes that, while unacceptable, are arguably far "cleaner" than officially
purchased deception.
***************************************************************
** TRACING THE STINGBOARD: THE DICTATOR AND THE DARK SIDE **
************************************************
In piecing the public information available on the Secret Service documents
together with other sources, the Secret Service STING BBS, if the number
they provide is correct, accessed THE DARK SIDE in Phoenix, Arizona. A
self-proclaimed "hacker" known as THE DICTATOR identified himself publicly
as the sysop of the Dark Side. The Dictator introduced himself to others as
{name deleted} or as "{deleted}," and responded to "{deleted}" in various
forms of Electronic mail. The search affidavit signed by Special Agent G.
Kirt Lawson of the Secret Service (header indicating Maricopa County)
acknowledges several facts:
1. The U.S. Secret Service, in response to complaints of telephone
fraud, initiated an investigation into access abuses. The investigation
described in this document specified the rationale for searching/seizing
RIPCO BBS. The raid occured on May 8, 1990 in concert with other raids
across the country. The Secret Service announced to the media through
press conferences and releases that it was OPERATION SUN DEVIL.
2. The Secret Service, working out of Phoenix, established an undercover
BBS in Sept., 1988. The sysop was a "VOLUNTEER PAID CONFIDENTIAL
INFORMANT."
3. The informant was providing information *BOTH* to the Secret Service and
the Arizona Attorney General's office at least in 1989 and 1990, and the
Secret Service participated in STATE searchs.
4. The code number and address of the informant is provided, and he is
linked directly to the number of the BBS identified in the document as the
undercover sting board.
5. The Informant provided information taken from logs, conversations, and
other sources to the Secret Service.
The following sections of the affidavit detail this more fully: The CuD
crew did not type in this version of the documents, and there may be
typographical or other minor errors. We reproduce it here as we received
it.
+++++++++++++BEGIN SECTIONS OF AFFIDAVIT++++++++++++++++++++
BACKGROUND OF THE INVESTIGATION
14. Over the past several years, the U.S. Secret Service has received
and increasing number of complaints from long distance carriers, credit
card companies, credit reporting bureaus, and other victims of crimes
committed by computer hackers, phone phreaks, and computer bulletin board
users and operators (see Definitions section), which have resulted in
substantial financial losses and business disruption to the victims.
Because the persons committing these crimes use aliases or "handles", mail
drops under false names, and other means to disguise themselves, they have
been extremely difficult to catch. They also conspire with many others to
exchange information such as stolen long distance carrier authorization
codes, credit card numbers, and technical information relating to the
unauthorized invasion of computer systems and voice mail messaging
computers, often across state or national borders, making the
investigation of a typical conspiracy extremely complex. Many of these
persons are juveniles or young adults, associate electronically only with
others they trust or who have "proven" themselves by committing crimes in
order to g