home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
phrk4
/
phrack40.13
< prev
next >
Wrap
Text File
|
1992-10-03
|
50KB
|
853 lines
==Phrack Inc.==
Volume Four, Issue Forty, File 13 of 14
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN PWN
PWN Phrack World News PWN
PWN PWN
PWN Issue 40 / Part 2 of 3 PWN
PWN PWN
PWN Compiled by Datastream Cowboy PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
MOD Indicted July 8, 1992
~~~~~~~~~~~~
Taken from U.S. Newswire
The following is the press release issued by the United States Attorney's
Office in the Southern District of New York.
Group of "Computer Hackers" Indicted
First Use of Wiretaps in Such a Case
NEW YORK -- A group of five "computer hackers" has been indicted on charges of
computer tampering, computer fraud, wire fraud, illegal wiretapping, and
conspiracy, by a federal grand jury in Manhattan, resulting from the first
investigative use of court-authorized wiretaps to obtain conversations and data
transmissions of computer hackers.
A computer hacker is someone who uses a computer or a telephone to obtain
unauthorized access to other computers.
The indictment, which was filed today, alleges that Julio Fernandez, a/k/a
"Outlaw," John Lee, a/k/a "Corrupt," Mark Abene, a/k/a "Phiber Optik," Elias
Ladopoulos, a/k/a "Acid Phreak," and Paul Stira, a/k/a "Scorpion," infiltrated
a wide variety of computer systems, including systems operated by telephone
companies, credit reporting services, and educational institutions.
According to Otto G. Obermaier, United States Attorney for the Southern
District of New York, James E. Heavey, special agent in charge, New York Field
Division, United States Secret Service, William Y. Doran, special agent in
charge, Criminal Division, New York Field Division, Federal Bureau of
Investigation, and Scott Charney, chief of the Computer Crime Unit of the
Department of Justice, the indictment charges that the defendants were part of
a closely knit group of computer hackers self-styled "MOD," an acronym used
variously for "Masters of Disaster" and "Masters of Deception" among other
things.
The indictment alleges that the defendants broke into computers "to enhance
their image and prestige among other computer hackers; to harass and intimidate
rival hackers and other people they did not like; to obtain telephone, credit,
information and other services without paying for them; and to obtain
passwords, account numbers and other things of value which they could sell to
others."
The defendants are also alleged to have used unauthorized passwords and billing
codes to make long distance telephone calls and to be able to communicate with
other computers for free.
Some of the computers that the defendants allegedly broke into were telephone
switching computers operated by Southwestern Bell, New York Telephone, Pacific
Bell, U.S. West and Martin Marietta Electronics Information and Missile Group.
According to the indictment, such switching computers each control telephone
service for tens of thousands of telephone lines.
In some instances, the defendants allegedly tampered with the computers by
adding and altering calling features. In some cases, the defendants allegedly
call forwarded local numbers to long distance numbers and thereby obtained long
distance services for the price of a local call. Southwestern Bell is alleged
to have incurred losses of approximately $370,000 in 1991 as a result of
computer tampering by defendants Fernandez, Lee, and Abene.
The indictment also alleges that the defendants gained access to computers
operated by BT North America, a company that operates the Tymnet data transfer
network. The defendants were allegedly able to use their access to Tymnet
computers to intercept data communications while being transmitted through the
network, including computer passwords of Tymnet employees. On one occasion,
Fernandez and Lee allegedly intercepted data communications on a network
operated by the Bank of America.
The charges also allege that the defendants gained access to credit and
information services including TRW, Trans Union and Information America. The
defendants allegedly were able to obtain personal information on people
including credit reports, telephone numbers, addresses, neighbor listings and
social security numbers by virtue of their access to these services. On one
occasion Lee and another member of the group are alleged to have discussed
obtaining information from another hacker that would allow them to alter credit
reports on TRW. As quoted in the indictment, Lee said that the information he
wanted would permit them "to destroy people's lives... or make them look like
saints."
The indictment further charges that in November 1991, Fernandez and Lee sold
information to Morton Rosenfeld concerning how to access credit services. The
indictment further alleges that Fernandez later provided Rosenfeld's associates
with a TRW account number and password that Rosenfeld and his associates used
to obtain approximately 176 TRW credit reports on various individuals. (In a
separate but related court action, Rosenfeld pleaded guilty to conspiracy to
use and traffic in account numbers of TRW. See below).
According to Stephen Fishbein, the assistant United States attorney in charge
of the prosecution, the indictment also alleges that members of MOD wiped out
almost all of the information contained within the Learning Link computer
operated by the Educational Broadcasting Corp. (WNET Channel 13) in New York
City. The Learning Link computer provided educational and instructional
information to hundreds of schools and teachers in New York, New Jersey and
Connecticut. Specifically, the indictment charges that on November 28, 1989,
the information on the Learning Link was destroyed and a message was left on
the computer that said: "Happy Thanksgiving you turkeys, from all of us at MOD"
and which was signed with the aliases "Acid Phreak," "Phiber Optik," and
"Scorpion." During an NBC News broadcast on November 14, 1990, two computer
hackers identified only by the aliases "Acid Phreak" and "Phiber Optik" took
responsibility for sending the "Happy Thanksgiving" message.
Obermaier stated that the charges filed today resulted from a joint
investigation by the United States Secret Service and the Federal Bureau of
Investigation. "This is the first federal investigation ever to use court-
authorized wiretaps to obtain conversations and data transmissions of computer
hackers," said Obermaier. He praised both the Secret Service and the FBI for
their extensive efforts in this case. Obermaier also thanked the Department of
Justice Computer Crime Unit for their important assistance in the
investigation. Additionally, Obermaier thanked the companies and institutions
whose computer systems were affected by the defendants' activities, all of whom
cooperated fully in the investigation.
Fernandez, age 18, resides at 3448 Steenwick Avenue, Bronx, New York. Lee
(also known as John Farrington), age 21, resides at 64A Kosciusco Street,
Brooklyn, New York. Abene, age 20, resides at 94-42 Alstyne Avenue, Queens,
New York. Elias Ladopoulos, age 22, resides at 85-21 159th Street, Queens, New
York. Paul Stira, age 22, resides at 114-90 227th Street, Queens, New York.
The defendants' arraignment has been scheduled for July 16, at 10 AM in
Manhattan federal court.
The charges contained in the indictment are accusations only and the defendants
are presumed innocent unless and until proven guilty. Fishbein stated that if
convicted, each of the defendants may be sentenced to a maximum of five years
imprisonment on the conspiracy count. Each of the additional counts also
carries a maximum of five years imprisonment, except for the count charging
Fernandez with possession of access devices, which carries a maximum of ten
years imprisonment. Additionally, each of the counts carries a maximum fine of
the greater of $250,000, or twice the gross gain or loss incurred.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
In separate but related court actions, it was announced that Rosenfeld and
Alfredo De La Fe [aka Renegade Hacker] have each pleaded guilty in Manhattan
Federal District Court to conspiracy to use and to traffic in unauthorized
access devices in connection with activities that also involved members of MOD.
Rosenfeld pled guilty on June 24 before Shirley Wohl Kram, United States
District Judge. At his guilty plea, Rosenfeld admitted that he purchased
account numbers and passwords for TRW and other credit reporting services from
computer hackers and then used the information to obtain credit reports, credit
card numbers, social security numbers and other personal information which he
sold to private investigators. Rosenfeld added in his guilty plea that on or
about November 25, 1991, he purchased information from persons named "Julio"
and "John" concerning how to obtain unauthorized access to credit services.
Rosenfeld stated that he and his associates later obtained additional
information from "Julio" which they used to pull numerous credit reports.
According to the information to which Rosenfeld pleaded guilty, he had
approximately 176 TRW credit reports at his residence on December 6, 1991.
De La Fe pled guilty on June 19 before Kenneth Conboy, United States District
Judge. At his guilty plea, De La Fe stated that he used and sold telephone
numbers and codes for Private Branch Exchanges ("PBXs"). According to the
information to which De La Fe pleaded guilty, a PBX is a privately operated
computerized telephone system that routes calls, handles billing, and in some
cases permits persons calling into the PBX to obtain outdial services by
entering a code. De La Fe admitted that he sold PBX numbers belonging to Bugle
Boy Industries and others to a co-conspirator who used the numbers in a call
sell operation, in which the co-conspirator charged others to make long
distance telephone calls using the PBX numbers. De La Fe further admitted that
he and his associates used the PBX numbers to obtain free long distance
services for themselves. De La Fe said that one of the people with whom he
frequently made free long distance conference calls was a person named John
Farrington, who he also knew as "Corrupt."
Rosenfeld, age 21, resides at 2161 Bedford Avenue, Brooklyn, N.Y. Alfredo De La
Fe, age 18, resides at 17 West 90th Street, N.Y. Rosenfeld and De La Fe each
face maximum sentences of five years, imprisonment and maximum fines of the
greater of $250,000, or twice the gross gain or loss incurred. Both defendants
have been released pending sentence on $20,000 appearance bonds. Rosenfeld's
sentencing is scheduled for September 9, before Shirley Wohl Kram. De La Fe's
sentencing is scheduled for August 31, before Conboy.
-----
Contacts:
Federico E. Virella Jr., 212-791-1955, U.S. Attorney's Office, S. N.Y.
Stephen Fishbein, 212-791-1978, U.S. Attorney's Office, S. N.Y.
Betty Conkling, 212-466-4400, U.S. Secret Service
Joseph Valiquette Jr., 212-335-2715, Federal Bureau of Investigation
Editor's Note: The full 23 page indictment can be found in Computer
Underground Digest (CUD), issue 4.31 (available at ftp.eff.org
/pub/cud/cud).
_______________________________________________________________________________
EFF Issues Statement On New York Computer Crime Indictments July 9, 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Cambridge, MA -- The Electronic Frontier Foundation (EFF) issued a statement
concerning the indictment of MOD for alleged computer-related crimes.
This statement said, in part, that EFF's "staff counsel in Cambridge, Mike
Godwin is carefully reviewing the indictment."
EFF co-founder and president Mitchell Kapor said "EFF's position on
unauthorized access to computer systems is, and has always been, that it is
wrong. Nevertheless, we have on previous occasions discovered that allegations
contained in Federal indictments can also be wrong, and that civil liberties
can be easily infringed in the information age. Because of this, we will be
examining this case closely to establish the facts."
When asked how long the complete trial process might take, assistant U.S.
attorney Fishbein said "I really couldn't make an accurate estimate. The
length of time period before trial is generally more a function of the
defense's actions than the prosecution's. It could take anywhere from six
months to a year.
_______________________________________________________________________________
Feds Tap Into Major Hacker Ring July 13, 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Mary E. Thyfault (InformationWeek)(Page 15)
Law enforcement officials are taking the gloves off-and plugging their modems
in-in the battle against computer crime.
In one of the largest such cases ever, a federal grand jury in Manhattan
indicted five computer "hackers" -- part of a group that calls itself MOD, for
Masters of Deception -- on charges of computer tampering, computer fraud, wire
fraud, illegal wiretapping, and conspiracy.
Some of the hackers are accused of stealing phone service and selling
information on how to obtain credit reports. The victims (a dozen were named
in the indictments, but numerous others are likely to have been hit as well)
include three Baby Bells, numerous credit bureaus, and BankAmerica Corp.
For the first time, investigators used court-authorized wiretaps to monitor
data transmissions over phone lines. The wiretapping comes as the FBI is
unsuccessfully lobbying Congress to mandate that telecom equipment and service
companies build into new technology easier ways for securities agencies to tap
into computer systems.
Ironically, the success of this wiretap, some say, may undermine the FBI's
argument. "They did this without the equipment they claim they need," says
Craig Neidorf, founder of hacker newsletter Phrack.
If convicted, the alleged hackers-all of whom are under 22 years old-could face
55 years each and a fine of $250,000, or twice the gross gain or loss incurred.
One charged with possessing an access device could face an additional five
years.
The vulnerability of the victims' networks should be surprising, but experts
say corporations continue to pay scant attention to security issues. For
instance, despite the fact that the credit bureaus are frequent targets of
hackers and claim to have made their networks more secure, in this case, most
of the victims didn't even know they were being hit, according to the FBI.
Two of the victims, value-added network service provider BT Tymnet and telco
Southwestern Bell, both take credit for helping nab the hacker ring. "We
played an instrumental role in first recognizing that they were there," says
John Guinasso, director of global network security for Tymnet parent BT North
America. "If you mess with our network and we catch you -- which we always do
-- you will go down."
_______________________________________________________________________________
Second Thoughts On New York Computer Crime Indictments July 13, 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By John F. McMullen (Newsbytes)
NEW YORK -- On Wednesday, July 9th, I sat at a press briefing in New York
City's Federal Court Building during which law enforcement officials presented
details relating to the indictment of 5 young computer "hackers". In
describing the alleged transgressions of the indicted, United States Assistant
Attorney Stephen Fishbein wove a tale of a conspiracy in which members of an
evil sounding group called the "Masters of Destruction" (MOD) attempted to
wreck havoc with the telecommunications system of the country.
The accused were charged with infiltrating computer systems belonging to
telephone companies, credit bureaus, colleges and defense contractors --
Southwestern Bell, BT North America, New York Telephone, ITT, Information
America, TRW, Trans Union, Pacific Bell, the University of Washington, New York
University, U.S. West, Learning Link, Tymnet and Martin Marietta Electronics
Information and Missile Group. They were charged with causing injury to the
telephone systems, charging long distance calls to the universities, copying
private credit information and selling it to third parties -- a long list of
heinous activities.
The immediate reaction to the indictments were predictably knee-jerk. Those
who support any so-called "hacker"-activities mocked the government and the
charges that were presented, forgetting, it seems to me, that these charges are
serious -- one of the accused could face up to 40 years in prison and $2
million in fines; another -- 35 years in prison and $1.5 million in fines. In
view of that possibility, it further seems to me that it is a wasteful
diversion of effort to get all excited that the government insists on misusing
the word "hacker" (The indictment defines computer hacker as "someone who uses
a computer or a telephone to obtain unauthorized access to other computers.")
or that the government used wiretapping evidence to obtain the indictment (I
think that, for at least the time being that the wiretapping was carried out
under a valid court order; if it were not, the defendants' attorneys will have
a course of action).
On the other hand, those who traditionally take the government and corporate
line were publicly grateful that this threat to our communications life had
been removed -- they do not in my judgement properly consider that some of
these charges may have been ill-conceived and a result of political
considerations.
Both groups, I think, oversimplify and do not give proper consideration to the
wide spectrum of issues raised by the indictment document. The issues range
from a simple black-and-white case of fraudulently obtaining free telephone
time to the much broader question of the appropriate interaction of technology
and law enforcement.
The most clear cut cases are the charges such as the ones which allege that two
of the indicted, Julio Fernandez a/k/a "Outlaw" and John Lee a/k/a "Corrupt"
fraudulently used the computers of New York University to avoid paying long
distance charges for calls to computer systems in El Paso, Texas and Seattle,
Washington. The individuals named either did or did not commit the acts
alleged and, if it is proven that they did, they should receive the appropriate
penalty (it may be argued that the 5 year, $250,000 fine maximum for each of
the counts in this area is excessive, but that is a sentencing issue not an
indictment issue).
Other charges of this black-and-white are those that allege that Fernandez
and/or Lee intercepted electronic communications over networks belonging to
Tymnet and the Bank of America. Similarly, the charge that Fernandez, on
December 4, 1991 possessed hundreds of user id's and passwords of Southwestern
Bell, BT North America and TRW fits in the category of "either he did it or he
didn't."
A more troubling count is the charge that the indicted 5 were all part of a
conspiracy to "gain access to and control of computer systems in order to
enhance their image and prestige among other computer hackers; to harass
and intimidate rival hackers and people they did not like; to obtain telephone,
credit, information, and other services without paying for them; and to obtain
passwords, account numbers and other things of value which they could sell to
others."
To support this allegation, the indictment lists 26, lettered A through Z,
"Overt Acts" to support the conspiracy. While this section of the indictment
lists numerous telephone calls between some of the individuals, it mentions
the name Paul Stira a/k/a "Scorpion" only twice with both allegations dated
"on or about" January 24, 1990, a full 16 months before the next chronological
incident. Additionally, Stira is never mentioned as joining in any of the
wiretapped conversation -- in fact, he is never mentioned again! I find it
hard to believe that he could be considered, from these charges, to have
engaged in a criminal conspiracy with any of the other defendants.
Additionally, some of the allegations made under the conspiracy count seem
disproportionate to some of the others. Mark Abene a/k/a "Phiber Optik" is of
possessing proprietary technical manuals belonging to BT North America while it
is charged that Lee and Fernandez, in exchange for several hundred dollars,
provided both information on how to illegally access credit reporting bureaus
and an actual TRW account and password to a person, Morton Rosenfeld, who later
illegally accessed TRW, obtained credit reports on 176 individuals and sold the
reports to private detective (Rosenfeld, indicted separately, pled guilty to
obtaining and selling the credit reports and named "Julio" and "John" as those
who provided him with the information). I did not see anywhere in the charges
any indication that Abene, Stira or Elias Ladopoulos conspired with or likewise
encouraged Lee or Fernandez to sell information involving the credit bureaus to
a third party
Another troubling point is the allegation that Fernandez, Lee, Abene and
"others whom they aided and abetted" performed various computer activities
"that caused losses to Southwestern Bell of approximately $370,000." The
$370,000 figure, according to Assistant United States Attorney Stephen
Fishbein, was developed by Southwestern Bell and is based on "expenses to
locate and replace computer programs and other information that had been
modified or otherwise corrupted, expenses to determine the source of the
unauthorized intrusions, and expenses for new computers and security devices
that were necessary to prevent continued unauthorized access by the defendants
and others whom they aided and abetted."
While there is precedent in assigning damages for such things as "expenses
for new computers and security devices that were necessary to prevent continued
unauthorized access by the defendants and others whom they aided and abetted."
(the Riggs, Darden & Grant case in Atlanta found that the defendants were
liable for such expenses), many feel that such action is totally wrong. If a
person is found uninvited in someone's house, they are appropriately charged
with unlawful entry, trespassing, burglary -- whatever the statute is for the
transgression; he or she is, however, not charged with the cost of the
installation of an alarm system or enhanced locks to insure that no other
person unlawfully enters the house.
When I discussed this point with a New York MIS manager, prone to take a strong
anti-intruder position, he said that an outbreak of new crimes often results in
the use of new technological devices such as the nationwide installation of
metal detectors in airports in the 1970's. While he meant this as a
justification for liability, the analogy seems rather to support the contrary
position. Air line hijackers were prosecuted for all sorts of major crimes;
they were, however, never made to pay for the installation of the metal
detectors or absorb the salary of the additional air marshalls hired to combat
hijacking.
I think the airline analogy also brings out the point that one may both support
justifiable penalties for proven crimes and oppose unreasonable ones -- too
often, when discussing these issues, observers choose one valid position to the
unnecessary exclusion of another valid one. There is nothing contradictory, in
my view, to holding both that credit agencies must be required to provide the
highest possible level of security for data they have collected AND that
persons invading the credit data bases, no matter how secure they are, be held
liable for their intrusions. We are long past accepting the rationale that the
intruders "are showing how insecure these repositories of our information are."
We all know that the lack of security is scandalous; this fact, however, does
not excuse criminal behavior (and it should seem evident that the selling of
electronic burglar tools so that someone may copy and sell credit reports is
not a public service).
The final point that requires serious scrutiny is the use of the indictment as
a tool in the on-going political debate over the FBI Digital Telephony
proposal. Announcing the indictments, Otto G. Obermaier, United States
Attorney for the Southern District of New York, said that this investigation
was "the first investigative use of court-authorized wiretaps to obtain
conversations and data transmissions of computer hackers." He said that this
procedure was essential to the investigation and that "It demonstrates, I
think, the federal government's ability to deal with criminal conduct as it
moves into new technological areas." He added that the interception of data
was possible only because the material was in analog form and added "Most of
the new technology is in digital form and there is a pending statute in
Congress which seeks the support of telecommunications companies to allow the
federal government, under court authorization, to intercept digital
transmission. Many of you may have read the newspaper about the laser
transmission which go through fiber optics as a method of the coming
telecommunications method. The federal government needs the help of Congress
and, indeed, the telecommunications companies to able to intercept digital
communications."
The FBI proposal has been strongly attacked by the American Civil Liberties
Union (ACLU), the Electronic Frontier Foundation (EFF) and Computer
Professionals for Social Responsibility (CPSR) as an attempt to
institutionalize, for the first time, criminal investigations as a
responsibility of the communications companies; a responsibility that they feel
belongs solely to law-enforcement. Critics further claim that the proposal
will impede the development of technology and cause developers to have to
"dumb-down" their technologies to include the requested interception
facilities. The FBI, on the other hand, maintains that the request is simply
an attempt to maintain its present capabilities in the face of advancing
technology.
Whatever the merits of the FBI position, it seems that the indictments either
would not have been made at this time or, at a minimum, would not have been
done with such fanfare if it were not for the desire to attempt to drum up
support for the pending legislation. The press conference was the biggest
thing of this type since the May 1990 "Operation Sun Devil" press conference in
Phoenix, Arizona and, while that conference, wowed us with charges of "hackers"
endangering lives by disrupting hospital procedures and being engaged in a
nationwide, 13 state conspiracy, this one told us about a bunch of New York
kids supposedly engaged in petty theft, using university computers without
authorization and performing a number of other acts referred to by Obermaier as
"anti-social behavior" -- not quite as heady stuff!
It is not to belittle these charges -- they are quite serious -- to question
the fanfare. The conference was attended by a variety of high level Justice
Department, FBI and Secret Service personnel and veteran New York City crime
reporters tell me that the amount of alleged damages in this case would
normally not call for such a production -- New York Daily News reporter Alex
Michelini publicly told Obermaier "What you've outlined, basically, except for
the sales of credit information, this sounds like a big prank, most of it"
(Obermaier's response -- "Well, I suppose you can characterize that as a prank,
but it's really a federal crime allowing people without authorization to
rummage through the data of other people to which they do not have access and,
as I point out to you again, the burglar cannot be your safety expert. He may
be inside and laugh at you when you come home and say that your lock is not
particularly good but I think you, if you were affected by that contact, would
be somewhat miffed"). One hopes that it is only the fanfare surrounding the
indictments that is tied in with the FBI initiative and not the indictments
themselves.
As an aside, two law enforcement people that I have spoken to have said that
while the statement that the case is "the first investigative use of court-
authorized wiretaps to obtain conversations and data transmissions of computer
hackers," while probably true, seems to give the impression that the case is
the first one in which data transmission was intercepted. According to these
sources, that is far from the case -- there have been many instances of
inception of data and fax information by law enforcement officials in recent
years.
I know each of the accused in varying degrees. The one that I know the best,
Phiber Optik, has participated in panels with myself and law enforcement
officials discussing issues relating to so-called "hacker" crime. He has also
appeared on various radio and television shows discussing the same issues. His
high profile activities have made him an annoyance to some in law enforcement.
One hopes that this annoyance played no part in the indictment.
I have found Phiber's presence extremely valuable in these discussions both for
the content and for the fact that his very presence attracts an audience that
might never otherwise get to hear the voices of Donald Delaney, Mike Godwin,
Dorothy Denning and others addressing these issues from quite different vantage
points. While he has, in these appearances, said that he has "taken chances to
learn things", he has always denied that he has engaged in vandalous behavior
and criticized those who do. He has also called those who engage in "carding"
and the like as criminals (These statements have been made not only in the
panel discussion, but also on the occasions that he has guest lectured to my
class in "Connectivity" at the New School For Social Research in New York City.
In those classes, he has discussed the history of telephone communications in a
way that has held a class of professionals enthralled by over two hours.
While my impressions of Phiber or any of the others are certainly not a
guarantee of innocence on these charges, they should be taken as my personal
statement that we are not dealing with a ring of hardened criminals that one
would fear on a dark night.
In summary, knee-jerk reactions should be out and thoughtful analysis in! We
should be insisting on appropriate punishment for lawbreakers -- this means
neither winking at "exploration" nor allowing inordinate punishment. We should
be insisting that companies that have collected data about us properly protect
-- and are liable for penalties when they do not. We should not be deflected
from this analysis by support or opposition to the FBI proposal before Congress
-- that requires separate analysis and has nothing to do with the guilt or
innocence of these young men or the appropriate punishment should any guilt be
established.
_______________________________________________________________________________
New York Hackers Plead Not Guilty July 17, 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
New York City -- At an arraignment in New York Federal Court on Thursday, July
16th, the five New York "hackers," recently indicted on charges relating to
alleged computer intrusion, all entered pleas of not guilty and were released
after each signed a personal recognizance (PRB) bond of $15,000 to guarantee
continued appearances in court.
As part of the arraignment process, United States District Judge Richard Owen
was assigned as the case's presiding judge and a pre-trial meeting between the
judge and the parties involved.
Charles Ross, attorney for John Lee, told Newsbytes "John Lee entered a not
guilty plea and we intend to energetically and aggressively defend against the
charges made against him."
Ross also explained the procedures that will be in effect in the case, saying
"We will meet with the judge and he will set a schedule for discovery and the
filing of motions. The defense will have to review the evidence that the
government has amassed before it can file intelligent motions and the first
meeting is simply a scheduling one."
Majorie Peerce, attorney for Stira, told Newsbytes "Mr. Stira has pleaded not
guilty and will continue to plead not guilty. I am sorry to see the government
indict a 22 year old college student for acts that he allegedly committed as a
19 year old."
The terms of the PRB signed by the accused require them to remain within the
continental United States. In requesting the bond arrangement, Assistant
United States Attorney Stephen Fishbein referred to the allegations as serious
and requested the $15,000 bond with the stipulation that the accused have their
bonds co-signed by parents. Abene, Fernandez and Lee, through their attorneys,
agreed to the bond as stipulated while the attorneys for Ladopoulos and Stira
requested no bail or bond for their clients, citing the fact that their clients
have been available, when requested by authorities, for over a year. After
consideration by the judge, the same $15,000 bond was set for Ladopoulos and
Stira but no co-signature was required.
_______________________________________________________________________________
Young Working-Class Hackers Accused of High-Tech Crime July 23, 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Mary B.W. Tabor with Anthony Ramirez (The New York Times)(Page B1, B7)
Computer Savvy, With an Attitude
Late into the night, in working-class neighborhoods around New York City, young
men with code names like Acid Phreak and Outlaw sat hunched before their
glowing computer screens, exchanging electronic keys to complex data-processing
systems. They called themselves the Masters of Deception. Their mission: to
prove their prowess in the shadowy computer underworld.
Compulsive and competitive, they played out a cybernetic version of "West Side
Story," trading boasts, tapping into telephone systems, even pulling up
confidential credit reports to prove their derring-do and taunt other hackers.
Their frequent target was the Legion of Doom, a hacker group named after a
gang of comic-book villains. The rivalry seemed to take on class and ethnic
overtones, too, as the diverse New York group defied the traditional image of
the young suburban computer whiz.
But Federal prosecutors say the members of MOD, as the group called itself,
went far beyond harmless pranks.
Facing Federal Charges
On July 16, five young men identified by prosecutors as MOD members pleaded not
guilty to Federal charges including breaking into some of the nation's most
powerful computers and stealing confidential data like credit reports, some of
which were later sold to private investigators. Prosecutors call it one of the
most extensive thefts of computer information ever reported.
The indictment says the men entered the computer systems of Southwestern Bell,
TRW Information Services and others "to enhance their image and prestige among
other computer hackers; to harass and intimidate rival hackers and other people
they did not like; to obtain telephone, credit, information and other services
without paying for them; and to obtain passwords, account numbers and other
things of value which they could sell to others."
With modems that link their terminals to other computers over ordinary
telephone lines, young hackers have been making mischief for years. But as the
nation relies more and more on vast networks of powerful computers and as
personal computers become faster and cheaper, the potential for trouble has
soared. For example, Robert Tappan Morris, a Cornell student, unleashed a
program in 1988 that jammed several thousand computers across the country.
A Polyglot Group
But the world of computer hackers has been changing. Unlike the typical
hackers of old -- well-to-do suburban youths whose parents could afford costly
equipment -- the Masters of Deception are a polyglot representation of blue-
collar New York: black, Hispanic, Greek, Lithuanian and Italian. They work
their mischief often using the least expensive computers.
One of the young men, 21-year-old John Lee, who goes by the name Corrupt, has
dreadlocks chopped back into stubby "twists," and lives with his mother in a
dilapidated walk-up in Bedford-Stuyvesant, Brooklyn. He bounced around
programs for gifted students before dropping out of school in the 11th grade.
Scorpion -- 22-year-old Paul Stira of Queens -- was his class valedictorian at
Thomas A. Edison High School in Queens. Outlaw -- Julio Fernandez, 18, of the
Bronx -- first studied computers in grade school.
They met not on street corners, but via computer bulletin boards used to swap
messages and programs.
With nothing to identify them on the boards except their nicknames and uncanny
abilities, the young men found the computer the great democratic leveler.
Questions of Profit
There may be another difference in the new wave of hackers. While the
traditional hacker ethic forbids cruising computer systems for profit, some new
hackers are less idealistic. "People who say that," said one former hacker, a
friend of the MOD who insisted on anonymity, "must have rich parents. When you
get something of value, you've got to make money."
Mr. Lee, Mr. Fernandez, Mr. Stira and two others described as MOD members --
20-year-old Mark Abene (Phiber Optik), and 22-year-old Elias Ladopoulos (Acid
Phreak), both of Queens -- were charged with crimes including computer
tampering, computer and wire fraud, illegal wiretapping and conspiracy. They
face huge fines and up to five years in prison on each of 11 counts.
The youths, on advice of their lawyers, declined to be interviewed.
Prosecutors say they do not know just how and when youthful pranks turned to
serious crime. Other hackers said the trouble began, perhaps innocently
enough, as a computer war with ethnic and class overtones.
The Masters of Deception were born in a conflict with the Legion of Doom, which
had been formed by 1984 and ultimately included among its ranks three Texans,
one of whom, Kenyon Shulman, is the son of a Houston socialite, Carolyn Farb.
Banished From the Legion
Mr. Abene had been voted into the Legion at one point. But when he began to
annoy others in the group with his New York braggadocio and refusal to share
information, he was banished, Legion members said.
Meanwhile, a hacker using a computer party line based in Texas had insulted Mr.
Lee, who is black, with a racial epithet.
By 1989, both New Yorkers had turned to a new group, MOD, founded by Mr.
Ladopoulos. They vowed to replace their Legion rivals as the "new elite."
"It's like every other 18- or 19-year-old who walks around knowing he can do
something better than anyone else can," said Michael Godwin, who knows several
of the accused and is a lawyer for the Electronic Frontier Foundation of
Cambridge, Massachusetts, which provides legal aid for hackers. "They are
offensively arrogant."
Hacker groups tend to rise and fall within six months or so as members leave
for college, meet girls or, as one former hacker put it, "get a life." But the
MOD continued to gather new members from monthly meetings in the atrium of the
Citicorp Building in Manhattan and a computer bulletin board called Kaos.
According to a history the group kept on the computer network, they enjoyed
"mischievous pranks," often aimed at their Texas rivals, and the two groups
began sparring.
Texas-New York Sparring
But in June 1990, the three Texas-based Legion members, including Mr. Shulman,
Chris Goggans and Scott Chasin, formed Comsec Data Security, a business
intended to help companies prevent break-ins by other hackers.
Worried that the Texans were acting as police informers, the MOD members
accused their rivals of defaming them on the network bulletin boards. Several
members, including Mr. Abene, had become targets of raids by the Secret
Service, and MOD members believed the Texans were responsible, a contention the
Texans respond to with "no comment."
But the sparring took on racial overtones as well. When Mr. Lee wrote a
history of the MOD and left it in the network, Mr. Goggans rewrote it in a jive
parody.
The text that read, "In the early part of 1987, there were numerous amounts of
busts in the U.S. and in New York in particular" became "In de early time part
uh 1987, dere wuz numerous amounts uh busts in de U.S. and in New Yo'k in
particular."
Mr. Goggans said that it was not meant as a racist attack on Mr. Lee. "It was
just a good way to get under his skin," he said.
Exposing Identities
MOD's activities, according to the indictment and other hackers, began to
proliferate.
Unlike most of the "old generation" of hackers who liked to joyride through the
systems, the New Yorkers began using the file information to harass and
intimidate others, according to prosecutors. Everything from home addresses to
credit card numbers to places of employment to hackers' real names -- perhaps
the biggest taboo of all -- hit the network.
In the indictment, Mr. Lee and Mr. Fernandez are accused of having a
conversation last fall in which they talked about getting information on how to
alter TRW credit reports to "destroy people's lives or make them look like
saints."
The prosecutors say the youths also went after information they could sell,
though the indictment is not specific about what, if anything, was sold. The
only such information comes from another case earlier this month in which two
other New York City hackers, Morton Rosenfeld, 21, of Brooklyn, and Alfredo de
la Fe, 18, of Manhattan, pleaded guilty to a conspiracy to use passwords and
other access devices obtained from MOD. They said they had paid "several
hundred dollars" to the computer group for passwords to obtain credit reports
and then resold the information for "several thousand dollars" to private
investigators.
News Media Attention
Competition for attention from the news media also heated up. The former
Legion members in Comsec had become media darlings, with articles about them
appearing in Time and Newsweek. Mr. Abene and Mr. Ladopoulos also appeared on
television or in magazines, proclaiming their right to probe computer systems,
as long as they did no damage.
In one highly publicized incident, during a 1989 forum on computers and privacy
sponsored by Harper's magazine, John Perry Barlow, a freelance journalist and
lyricist for the Grateful Dead, went head to head with Mr. Abene, or Phiber
Optik. Mr. Barlow called the young hacker a "punk."
According to an article by Mr. Barlow -- an account that Mr. Abene will not
confirm or deny -- Mr. Abene then retaliated by "downloading" Mr. Barlow's
credit history, displaying it on the computer screens of Mr. Barlow and other
network users.
Skirmishes Subside
"I've been in redneck bars wearing shoulder-length curls, police custody while
on acid, and Harlem after midnight, but no one has ever put the spook in me
quite as Phiber Optik did at that moment," Mr. Barlow wrote. "To a middle-
class American, one's credit rating has become nearly identical to his
freedom."
In recent months, hackers say, the war has calmed down. Comsec went out of
business, and several Masters of Deception were left without computers after
the Secret Service raids.
Mr. Abene pleaded guilty last year to misdemeanor charges resulting from the
raids. On the night before his arrest this month, he gave a guest lecture on
computers at the New School for Social Research.
Mr. Lee says he works part time as a stand-up comic and is enrolled at Brooklyn
College studying film production.
Mr. Stira is three credits shy of a degree in computer science at Polytechnic
University in Brooklyn. Mr. Fernandez hopes to enroll this fall in the
Technical Computer Institute in Manhattan. Mr. Ladopoulos is studying at
Queens Community College.
No trial date has been set.
But the battles are apparently not over yet. A couple of days after the
charges were handed up, one Legion member said, he received a message on his
computer from Mr. Abene. It was sarcastic as usual, he said, and it closed,
"Kissy, kissy."
[Editor's Note: Article included photographs of Phiber Optik, Scorpion,
Corrupt, and Outlaw.]
_______________________________________________________________________________
Frustrated Hackers May Have Helped Feds In MOD Sting July 20, 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By James Daly (ComputerWorld)(Page 6)
NEW YORK -- Are hackers beginning to police themselves? The five men recently
charged with cracking into scores of complex computer systems during the last
two years may have been fingered by other hackers who had grown weary of the
group's penchant for destruction and vindictiveness, members of the hacker
community said.
The arrest of the defendants, whom federal law enforcement officials claimed
were members of a confederation variously called the "Masters of Deception" and
the "Masters of Disaster" (MOD), was cause for celebration in some quarters
where the group is known as a spiteful fringe element.
"Some of these guys were a big pain," said one source who requested anonymity
for fear that unindicted MOD members would plot revenge. "They used their
skills to harass others, which is not what hacking is all about. MOD came with
a 'you will respect us' attitude, and no one liked it."
Said another: "In the past few months, there has been a lot of muttering on the
[bulletin] boards about these guys."
In one episode, MOD members reportedly arranged for the modem of a computer at
the University of Louisville in Kentucky to continually dial the home number of
a hacker bulletin board member who refused to grant them greater access
privileges. A similar threat was heard in Maryland.
In the indictment, the defendants are accused of carrying on a conversation in
early November 1991 in which they sought instructions on how to add and remove
credit delinquency reports "to destroy people's lives . . . or make them look
like a saint." Unlike many other hacker organizations, the members of MOD
agreed to share important computer information only among themselves and not
with other hackers.
Officials Mum
Who exactly helped the FBI, Secret Service and U.S. Attorney General's Office
prepare a case against the group is still anyone's guess. Assistant U.S.
Attorney Stephen Fishbein is not saying. He confirmed that the investigation
into the MOD began in 1990, but he would not elaborate on how or why it was
launched or who participated. FBI and Secret Service officials were equally
mute.
Some observers said that if the charges are true, the men were not true
"hackers" at all.
"Hacking is something done in the spirit of creative playfulness, and people
who break into computer security systems aren't hackers -- they're criminals,"
said Richard Stallman, president of the Cambridge, Massachusetts-based Free
Software Foundation, a public charity that develops free software. The
foundation had several files on one computer deleted by a hacker who some
claimed belonged to the MOD.
The MOD hackers are charged with breaking into computer systems at several
regional telephone companies, Fortune 500 firms including Martin Marietta
Corp., universities and credit-reporting concerns such as TRW, Inc., which
reportedly had 176 consumer credit reports stolen and sold to private
investigators. The 11-count indictment accuses the defendants of computer
fraud, computer tampering, wire fraud, illegal wiretapping and conspiracy.
But some hackers said the charges are like trying to killing ants with a
sledgehammer. "These guys may have acted idiotically, but this was a stupid
way to get back at them," said Emmanuel Goldstein, editor of 2600, a quarterly
magazine for the hacker community based in Middle Island, New York.
Longtime hackers said the MOD wanted to move into the vacuum left when the
Legion of Doom began to disintegrate in late 1989 and early 1990 after a series
of arrests in Atlanta and Texas. Federal law enforcement officials have
described the Legion of Doom as a group of about 15 computer enthusiasts whose
members re-routed calls, stole and altered data and disrupted telephone
services.
_______________________________________________________________________________
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+