home *** CD-ROM | disk | FTP | other *** search
-
- Date: Tue, 09 Jul 91 21:28:26 CDT
- From: "Craig Neidorf" <C483307@UMCVMB.BITNET>
- Subject: File 3-- The TERMINUS of Len Rose
-
- The TERMINUS of LEN ROSE
-
- by Craig Neidorf
- (kl@stormking.com)
-
- (Adapted from 2600 Magazine, Spring 1990)
-
- As most readers of 2600 Magazine and Computer Underground Digest
- should know, I am Knight Lightning, and I used to be the editor and
- publisher of Phrack, a magazine similar to 2600, but not available in
- a hardcopy format. In my capacity as editor and publisher I often
- received text files and other articles submitted for publication.
- Actually, this is how the majority of the material found in Phrack was
- acquired. Outside of articles written by Taran King or myself, there
- was no staff, merely a loose, unorganized group of free-lancers who
- sent us material from time-to-time.
-
- One such free-lance writer was Len Rose, known to some as
- Terminus. To the best of my knowledge at the time, Len was a Unix
- consultant who ran his own system on UUCP called Netsys. Netsys was a
- major electronic mail station for messages passing through UUCP.
- Terminus was no stranger to Phrack. Taran King had interviewed him
- for Phrack Pro-Phile 10, found in Phrack's fourteenth issue.
- Prior to the end of 1988, I had very little contact with Terminus
- and we were reintroduced when he contacted me through the Internet.
- He was very excited that Phrack still existed over the course of the
- years and he wanted to send us an article. However, Len was a
- professional Unix consultant, holding contracts with major
- corporations and organizations across the country and quite reasonably
- (given the corporate mentality) he assumed that these companies would
- not understand his involvement with Phrack. Nevertheless, he did send
- Phrack an article back in 1988. It was a computer program actually
- that was called "Yet Another File on Hacking Unix" and the name on the
- file was >Unknown User<, adopted from the anonymous posting feature of
- the once famous Metal Shop Private bulletin board.
- The file itself was a password cracking program. Such programs
- were then and are still today publicly available intentionally so that
- system managers can run them against their own password files in order
-
- "An example is the password cracker in COPS, a package
- that checks a Unix system for different types of
- vulnerabilities. The complete package can be obtained
- by anonymous FTP from ftp.uu.net. Like the password
- cracker published in Phrack, the COPS cracker checks
- whether any of the words in an on-line dictionary
- correspond to a password in the password file."
- (Dorothy Denning, Communications of the ACM,
- March 1991, p. 28)
-
- Perhaps if more people used them, we would not have incidents
- like the Robert Morris Worm, Cliff Stoll's KGB agents, or the
- recent crisis involving system intruders from the Netherlands.
-
- Time passed and eventually we come to January 1990. At some
- point during the first week or two of the new year, I briefly logged
- on to my account on the VM mainframe on the University of
- Missouri-Columbia and saw that I had received electronic mail from Len
- Rose. There was a brief letter followed by some sort of program.
- >From the text I saw that the program was Unix-based, an operating
- system I was virtually unfamiliar with at the time. I did not
- understand the significance of the file or why Len had sent it to me,
- however, since I was logged in remotely from St. Louis, I decided to
- let it sit until I arrived back at school a few days later. In the
- meantime I had noticed some copyright markings on the file and sent a
- letter to a friend at Bellcore Security asking about the legalities in
- having or publishing such material. As it turns out this file was
- never published in Phrack.
-
- Although Taran King and I had already decided not to publish this
- file, other events made sure that our decision was mandatory. Upon
- returning to University of Missouri-Columbia (for the new semester) on
- January 12, 1990, we discovered that all access to our accounts on the
- mainframe of the University of Missouri had been revoked without
- explanation. On January 18, 1990 I was visited by the U.S. Secret
- Service for reasons unrelated to the Unix program Len Rose had sent.
- That same day under obligation from a subpoena issued by a Federal
- District Court judge, the University turned over all files from my
- mainframe account to the U.S. Secret Service including the Unix file.
- Included below is the text portion of that file:
-
- "Here is a specialized login for System V 3.2 sites.
- I presume that any competent person can get it working
- on other levels of System V. It took me about 10
- minutes to make the changes and longer to write the
- README file and this bit of mail."
-
- "It comes from original AT&T SVR3.2 sources, so it's
- definitely now something you wish to get caught with.
- As people will probably tell you, it was originally
- part of the port to an AT&T 3B2 system. Just so that
- I can head off any complaints, tell them I also
- compiled it with a minimal change on a 386 running AT&T
- Unix System V 3.2 (they'll have to fiddle with some
- defines, quite simple to do). Any changes I made are
- bracketed with comments, so if they run into something
- terrible tell them to blame AT&T and not me."
-
- "I will get my hands on some Berkeley 4.3 code and do
- the same thing if you like (it's easy of course)."
-
- In the text of the program it also reads:
-
- "WARNING: This is AT&T proprietary source code. Do
- NOT get caught with it."
-
- and;
-
- " Copyright (c) 1984 AT&T
- All Rights Reserved
-
- * THIS IS UNPUBLISHED PROPRIETARY SOURCE CODE OF AT&T *
- * The copyright notice above does not evidence any *
- * actual or intended publication of such source code. *"
-
- As it turned out the program that Len Rose had sent was
- modified to be a Trojan horse program that could capture accounts
- and passwords, saving them into a file that could later be
- retrieved. However, knowing how to write a Trojan horse login
- program is no secret. For example;
-
- "such programs have been published in The Cuckoo's Egg
- by Clifford Stoll and an article by Grampp and Morris.
- Also in his ACM turing lecture, Ken Thompson, one of
- the Bell Labs coauthors of Unix, explained how to
- create a powerful Trojan horse that would allow its
- author to log onto any account with either the password
- assigned to the account or a password chosen by the
- author."(Dorothy Denning, Communications of the ACM,
- March 1991, p. 29-30)
-
- Between the Unix 3.2 source code, the Unix password cracking
- file, and the added fact that Terminus was a subscriber to
- Phrack, Len Rose was raided by the United States Secret Service
- (including SSA Tim Foley who was the case agent in U.S. v.
- Neidorf) at his Middletown, Maryland home on February 1, 1990.
- The actual search on his home was another atrocity in and of
- itself.
-
- "For five hours, the agents -- along with two Bellcore
- employees -- confined <Len> Rose to his bedroom for
- questioning and the computer consultant's wide, Sun,
- in another room while they searched the house.
-
- The agents seized enough computers, documents, and
- personal effects -- including Army medals, Sun Rose's
- personal phone book, and sets of keys to their house
- -- to fill a 14-page list in a pending court case."
- (No Kid Gloves For The Accused, Unix Today!,
- June 11, 1990, page 1)
-
- It was also reported that the agents did serious damage to
- the physical house itself. Len was left without the computers
- that belonged to him and that he desperately needed to support
- himself and his family financially. Essentially Len went into
- bankruptcy and furthermore now he was blacklisted by AT&T.
-
- This culminated in a May 15, 1990 indictment of Len Rose at
- age 31. There were five counts charging Len with violations of
- the 1986 Computer Fraud and Abuse Act and Wire Fraud. The total
- maximum penalty he faced was 32 years in prison and fines of
- $950,000. Furthermore, the U.S. Attorney's office in Baltimore
- insisted that Len was a member of the Legion of Doom, a claim
- that Len and known LOD members have consistently denied. It did
- finally become clear that Terminus was not a member.
-
- This was just the beginning of another long saga of bad luck
- for Len Rose. He had no real lawyer, he had no money, and he had
- no job. Furthermore, Len suffered a broken leg after rescuing
- his son during a camping trip.
-
- Eventually Len found work with a company in Naperville,
- Illinois (DuPage County <Chicago suburbs>) with a Unix consulting
- firm called InterActive and he had a new lawyer named Jane Macht.
- The future began to look a little brighter temporarily. The
- problem was that within a week InterActive was making claims that Len
- had copied Unix source code from them. Illinois State Police and SSA
- Tim Foley (what is HE doing here!?) came to Len's new home and took
- him away. In addition to the five count indictment in Baltimore, now
- Len was facing criminal charges from the State of Illinois. It was at
- this point, attorney Sheldon T. Zenner, who had successfully defended
- me took on the responsibility of defending Len against the state
- charges.
-
- Len's spin of bad luck was not over yet. Assistant U.S. Attorney
- William Cook in Chicago wanted a piece of the action, in part perhaps
- to redeem himself from his highly publicized defeat in U.S. v.
- Neidorf. A third possible indictment for Len seemed inevitable. In
- fact, there were statements made that I personally was to have been
- subpoenaed to testify before the grand jury about Len, but this never
- took place.
-
- As time passed and court dates kept being delayed, Len was barely
- surviving; running out of money and options. His wife wanted to leave
- him and take away his children, he could not find work, he was looking
- at two serious indictments for sure, and a possible third, and he just
- could not take it any longer.
-
- Len's legal arguments were strong in many respects and it is
- widely believed that if he had fought the charges that he may very
- well have been able to prove his innocence. Unfortunately, the pile
- up of multiple indictments, in a legal system that defines justice in
- terms of how much money you can afford to spend defending yourself,
- took its toll. The U.S. Attorney in Baltimore did not want to try the
- case and they offered Len a deal, part of which was that Assistant
- U.S. Attorney Cook got something as well. Len would agree to plead
- guilty to two wire fraud charges, one in Baltimore, one in Chicago.
- The U.S. Attorney's office would offer a recommendation of a prison
- sentence of 10 months, the State of Illinois would drop it's charges,
- and Len would eventually get his computer equipment back.
-
- In the weeks prior to accepting this decision I often spoke with
- Len, pleading with him to fight based on the principles and importance
- of the issues, no matter what the costs. However, I was blinded by
- idealism while Len still had to face the reality.
-
- Len Rose was sentenced in June and began serving his time on July
- 10, 1990. He got his computer equipment back, but only under the
- agreement that he sell all of it.
-
- United States v. Rose was not a case about illegal intrusion into
- other people's computers. Despite this the Secret Service and AT&T
- called his case a prime example of a hacker conspiracy. In reality it
- was only an example of blind justice and corporate power. Like many
- criminal cases of this type, it is all a question of how much justice
- can a defendant afford -- How much of this type of *injustice* can the
- American public afford?
-
- -- -- -- -- --
-
- A Few Words About Law Enforcement and the Len Rose case...
-
- As a person who has been involved with the legal process
- repeatedly over the last couple of years I have learned and
- discovered some of the realities behind the rumors and the myths.
- In the Spring 1991 issue 2600, I authored an article titled "The
- Terminus of Len Rose" and unfortunately the meaning behind the
- article was lost on some of the readers whom I admire greatly.
-
- Through my unique experiences at meetings like the 13th
- Annual National Computer Security Conference in Washington D.C. and
- the first conference on Computers, Freedom, & Privacy in San
- Francisco, I have come into contact and had discussions with both the
- people who help create the laws as well as those who actively enforce
- them. I have learned a lot about what actually takes place behind the
- scenes and why. More than anything else, I discovered that my views
- on several issues were not so very far from theirs and they taught me
- why certain realities were so. What they said made sense and I
- realized that I was indeed wrong about some issues and situations. I
- was even more wrong in my expectations of the individuals themselves.
- These people are decent folks just like you and me. Despite the
- highly publicized incidents of the past couple of years, the vast
- majority of these people are not out there trying to destroy someone's
- life just to make a name for themselves or to put a notch on their
- desk. They believe in their work like a sacred religious mission. At
- the same time they have families, hobbies, like to go to the movies,
- play video games, take vacations during the holidays, and everything
- else.
-
- In the article about Len Rose, I did not intend to imply that the
- prosecution or the prosecutors were malicious (although the frantic
- raid on Len's house may have been a bit out of order), but rather that
- the legal process itself can be a difficult road for a non-wealthy
- defendant to travel, especially when faced with many indictments at
- once. Len Rose was never charged with actually breaking into a
- computer, but he was called a hacker (under the negative definition)
- just the same. That is not fair. I believe that the prosecutors
- acted in the way they thought best and were not out to deny Rose of
- his constitutional rights, but the issues of law and computers that
- clashed here make things confusing for everyone including myself.
-
- The fact of the matter is that the system does have flaws in it
- which arise and are corrected over time. These flaws arose in my own
- case and cost me dearly until the system caught its flaw and corrected
- itself. I am not here to tell you that Len Rose was a saint or that
- he did not do anything wrong. Indeed in the past month I have heard
- complaints from several people about bad business deals with Len and
- mishaps concerning stolen computer equipment. I don't know all of the
- details behind those allegations and considering where Len is today,
- those questions are moot. I must admit that Len's transportation of
- Unix source code strikes me as a form of copyright infringement or
- perhaps software piracy, but Rose did not even make an attempt to
- profit financially from this venture. The value of what he actually
- transported and his guilt or innocence of these statutes was never put
- to the test because the prosecution did not seek to use these more
- appropriate statutes concerning piracy or copyright infringement. I
- still wonder why.
-
- While I believe that the prosecutors involved with his case are
- honest, hardworking, and highly motivated people, it strikes me as
- being overly harsh to see a very bright, non-violent offender who did
- not even commit a crime for money go to prison when his formidable
- talents could have been put to good use elsewhere.
-
- In conclusion I think there may be a rare bad apple mucking up
- the legal process from time to time, but it is my firm belief that the
- prosecutors and law enforcement officials in our system overall are
- dedicated to doing the right thing and going after offenders that they
- truly believe to be committing real crimes. Up to this point I've
- only been able to watch and learn about their work from an outsider's
- viewpoint, but one day I may be interested in participating from their
- perspective. As a group in general, the law enforcement community has
- earned my respect and appreciation.
-
- ------------------------------
-