home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Apr 10, 1994 Volume 6 : Issue 31
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe (He's Baaaack)
- Acting Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Suspercollater: Shrdlu Nooseman
-
- CONTENTS, #6.31 (Apr 10, 1994)
- FIle 1--MIT Student Indicted for Internet "Piracy" (MIT account)
- FIle 2--MIT Student Indicted for Internet "Piracy" (AP account)
- FIle 3--Text of Indictment of MIT Sysop
- FIle 4--LaMacchia (MIT Student) Defense Atty Press Release
- FIle 5--DO NOT confuse MIT board with legit CYNOSURE BBS in MD
- FIle 6--FBI Erroneously Detains 2 "Suspects" at CFP '94
- FIle 7--Phil Zimmeran Requests Info on PGP Uses
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- nic.funet.fi
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Fri, 9 Apr 1994 18:21:31 PDT
- From: Moderators <cudigest@mindvox.phantom.com>
- Subject: File 1--MIT Student Indicted for Internet "Piracy" (MIT account)
-
- ((MODERATORS' NOTE: Thanks to a Well poster who made the following
- news item from the April 8 issue of the MIT student newspaper (THE
- TECH)).
-
- Student Indicted on Piracy Charges
-
- ((Documents relating to this story are available on our news
- bulletin board.))
- By Josh Hartmann Contributing Editor
-
- Student Indicted on Piracy Charges
-
- A federal grand jury charged an MIT student yesterday on a felony
- charge for allegedly allowing the piracy of over $1 million in
- business and entertainment software using Athena workstations.
-
- David M. LaMacchia '95 was indicted on one count of conspiring to
- commit wire fraud, according to a statement from the U.S. Attorney's
- office in Boston. LaMacchia allegedly allowed the duplication of
- hundreds of copyrighted software packages between Nov. 21, 1993, and
- Jan. 5, 1994, using workstations on the Athena Computing Environment.
-
- "We became aware sometime in December that a computer was being used
- to distribute software," said Kenneth D. Campbell, director of the
- news office. "That information was turned over to Campus Police and
- the FBI. MIT personnel cooperated with the FBI in the investigation."
-
- The incident was discovered when an Athena-user in the Student Center
- cluster noticed that an unattended workstation next to him was
- behaving abnormally, making frequent disk accesses, according to James
- D. Bruce ScD '60, vice president for Information Systems.
-
- The user apparently reported the abnormal behavior to members of the
- Student Information Processing Board, who then proceeded to
- investigate the matter, according to a source familiar with the
- investigation. The SIPB members saw the status of the workstation and
- reported the incident to the Information Systems staff, the source
- said.
-
- SIPB itself was not part of the investigation, according to Jessie
- Stickgold-Sarah '96, the SIPB chairman.
-
- Attorneys for LaMacchia issued a swift denial of the charges late
- yesterday, saying LaMacchia was merely the provider of a service which
- others used to place and remove files. The statement called the
- indictment a test case to "decide whether current criminal law would
- penalize a [systems operator] who neither controls what is placed on
- the system nor profits one cent from any copyrighted software that
- others upload to and download from the system that he and others
- create and operate."
-
- Many of the people who accessed the pirated files over the Internet
- concealed their location by using an anonymous service in Finland,
- Bruce said.
-
- The Associated Press reported yesterday that LaMacchia advertised the
- server strictly by word-of-mouth to avoid detection. The AP quoted the
- indictment as saying that as many as 180 users accessed the server in
- one 16-hour period.
-
- DISCIPLINARY PROCESS UNDERWAY
-
- Within MIT, "there was a disciplinary action filed against [LaMacchia]
- sometime in January," Bruce said. These proceedings have been halted,
- he added.
-
- Another anonymous source said that the Office of the Dean for
- Undergraduate Education and Student Affairs had received a complaint
- in January, but had not decided whether the disciplinary action would
- be forwarded to the Committee on Discipline, handled by the Dean's
- Office, or dismissed outright.
-
- Dean for Undergraduate Education and Student Affairs Arthur C. Smith
- said last night that Institute disciplinary procedures are usually
- suspended when a student is charged with such a crime. However, Smith
- would not comment on the status of any disciplinary case underway. If
- LaMacchia were convicted, he would still be subject to the normal
- disciplinary measures within the Institute, Smith said.
-
- LOSSES OVER $1 MILLION
-
- Losses from the illegal software duplication are expected to surpass
- $1 million, according to the statement from the U.S. Attorney's
- office.
-
- "The pirating of business and entertainment software through
- clandestine computer bulletin boards is tremendously costly to
- software companies, and by extension to their employees and to the
- economy," said U.S. Attorney Donald K. Stern. "We need to respond to
- the culture that no one is hurt by these thefts and that there is
- nothing wrong with pirating software."
-
- A list obtained by The Tech revealed that MS-DOS games dominated the
- server. Among the business software, however, were Aldus Pagemaker 5.0
- for Windows, Microsoft Word for Windows 6.0, a beta (pre-release) copy
- of a forthcoming operating system by Microsoft code-named Chicago,
- WordPerfect 6.0 for both DOS and Windows, a beta copy of Microsoft
- 5.0, and Aldus PhotoStyler 2.0.
-
- If found guilty LaMacchia could conceivably be the subject of a civil
- suit by the software vendors, Bruce said. "It would be entirely
- possible for a vendor to make a case that it suffered monetary
- damages," he said. "I would think there is some reason [LaMacchia]
- could be sued."
-
- Bruce said he thought the Institute's liability would be limited
- because of Athena rules prohibiting duplication of copyrighted
- software.
-
- LaMacchia did not return telephone calls last night.
-
- Copyright 1994 by The Tech. All rights reserved. This story was
- published on Friday, April 8, 1994. Volume 114, Number 19 The story
- began on page 1 and jumped to page 13. This article may be freely
- distributed electronically, provided it is distributed in its entirety
- and includes this notice, but may not be reprinted without the express
- written permission of The Tech. Write to archive@the-tech.mit.edu for
- additional details.
-
- ------------------------------
-
- Date: Fri, 9 Apr 1994 18:21:31 PDT
- From: Anonymous <cudigest@mindvox.phantom.com>
- Subject: File 2--MIT Student Indicted for Internet "Piracy" (AP account)
-
- ((You might be interested the following AP item. Following an
- investigation by the FBI, David LaMacchia, an MIT student, was
- indicted April 7, 1994)).
-
- MIT Student indicted for "Internet Piracy"
- >From the Associated Press
-
- BOSTON--A federal grand jury indicted an MIT student Thursday on
- charges he ran a computer bulletin board that allowed people to copy
- more than $1 million worth of copyrighted software for free.
-
- David LaMacchia, 10, a junior at the Massachusetts Institute of
- Technology, was indicted on one felony count of conspiring to commit
- wire fraud, said U.S. Atty. Donald Stern.
-
- LaMacchia, of Rockville, Md., used the computer aliases "John gaunt"
- and "Grimjack," to operate the bulletin board at MIT from Nov. 21 to
- Dec. 21, 1993, and from Jan. 3 to Jan. 5, the indictment said.
-
- The bulletin board, named Cynosure, allowed people on MIT's computer
- network to copy business and entertainment software, the indictment
- said.
-
- Since MIT's system is part of the Internet, a super-network using
- telephone lines to link educational, military, and commercial computer
- networks around the world, Internet users also were able to illegally
- copy the software, Stern said.
-
- As many as 180 people used the illegal software library over one
- 16-hour period, downloading hundreds of copyrighted commercial
- programs, the indictment said.
-
- ------------------------------
-
- Date: Fri, 8 Apr 1994 04:09:47 GMT
- From: jgull@world.std.com (jason n gull)
- Subject: File 3--Text of Indictment of MIT Sysop
-
- I thought this might be of interest to many. A federal grand jury in
- Boston returned an indictment this afternoon, charging a 20-year-old
- MIT student and sysop with conspiracy. The indictment alleges the
- student, David Lamacchia, created and maintained a BBS/FSP site on the
- internet, on which pirated software was exchanged.
-
- ======================================================
-
-
- UNITED STATES DISTRICT COURT
- DISTRICT OF MASSACHUSETTS
-
-
- UNITED STATES OF AMERICA | CRIMINAL NO. 94-10092RGS
- | VIOLATION:
- | 18 U.S.C. Sect. 371 - Conspiracy
- US v. DAVID LAMACCHIA
-
-
- _INDICTMENT_
-
- _COUNT ONE_: 18 U.S.C. S 371 - Conspiracy
-
- The Grand Jury charges that:
- 1. From on or about November 21, 1993, to on or about
- January 5, 1994, at Cambridge, in the District of Massachusetts,
- and elsewhere, DAVID LAMACCHIA defendant herein, did knowingly
- and intentionally combine, conspire, confederate, and agree with
- other persons unknown to the Grand Jury, to commit offenses against
- the United States, that is, to devise and execute a scheme and artifice
- to defraud, and, for the purpose of. executing and attempting to
- execute such scheme, to transmit and cause to be transmitted in
- interstate commerce, by wire communication, writings, signs, signals,
- pictures, and sounds for the purpose of executing such scheme and
- artifice, in violation of Title 18, United States Code, section 1343.
-
- _PERSONS AND ENTITIES_
-
- 2. At all times material to this Indictment, the
- Massachusetts Institute of Technology (MIT) was an educational
- institution located on Memorial Drive, in Cambridge, Massachusetts.
-
- 3. At all times material to this Indictment, defendant
- DAVID LAMACCHIA was a student enrolled in and resident at MIT.
-
- 4. At all times material to this Indictment, MIT had a
- connection to the Internet, an international collection of
- electronic networks linking educational, military, and commercial
- computers around the world.
-
- _CONSPIRACY AND SCHEME TO DEFRAUD_
-
- 5. It was part of the scheme and conspiracy that defendant
- DAVID LAMACCHIA, using the computer aliases "JOHN GAUNT" and
- "GRIMJACK," set up, participated in setting up, and, from on or
- about November 21, 1993, to on or about December 21, 1993, and
- from on or about January 3, 1994 to on or about January 5, 1994,
- operated and participated in the operation of a computer bulletin
- board system named "CYNOSURE" to permit and facilitate, on an
- international scale, the illegal copying and distribution of
- copyrighted software, without payment of software licensing fees
- or the software purchase price to the manufacturers and vendors of
- the copyrighted software
-
- 6. It was further part of the conspiracy and scheme to
- defraud that defendant DAVID LAMACCHIA operated, and
- participated
- in the operation of, "CYNOSURE" on two computer work stations
- owned and operated by MIT, located at Cambridge in the District of
- Massachusetts. The two work stations were designated "CYNOSURE I"
- and "CYNOSURE II." In addition, a third MIT computer was utilized
- for back-up files and other purposes associated with running
- CYNOSURE.
-
- 7. A computer bulletin board system ("BBS") consists
- essentially of a personal computer on which is installed a
- computer program which permits persons all over the world, using
- their own computers and telephone lines, to obtain access to the
- BBS computer. Persons thereby obtaining access to the computer
- BBS may post files and messages to the board ("upload"), and may
- read and copy files and messages ("download") to their own
- computer. The messages that may be uploaded or downloaded can
- consist of virtually any type of data or information, including
- other software programs. The CYNOSURE BBS was accessible
- worldwide via the Internet.
-
- 8. In using the MIT work stations for the purpose of
- running a computer BBS to pirate and distribute copyrighted
- software, LAMACCHIA exceeded his authority, as an MIT student, to
- access and use the MIT computer system and its connection to the
- Internet.
-
- 9. It was further part of the conspiracy and scheme to
- defraud that the defendant, using the computer aliases "JOHN
- GAUNT" and "GRIMJACK," communicated to other persons the
- Internet
- address (or "site") for the CYNOSURE BBS to permit them to send,
- by means of interstate and foreign wire communication, files and
- messages to the BBS and to avail themselves of the opportunity to
- copy and cause to be transmitted by means of interstate and
- foreign wire communication, computer files stored on the BBS. The
- users of the CYNOSURE BBS often hid their identities by using an
- Internet address located in Finland which afforded an anonymous
- forwarding service.
-
- 10. It was further part of the conspiracy and scheme for
- users to "upload" computer files into the CYNOSURE BBS in order to
- create a library of software that could be accessible to other
- users who, without paying a purchase price or licensing fee, could
- unlawfully download copyrighted software to their own computer
- systems. Files downloaded to an anonymous Finnish Internet
- address service would then be surreptitiously forwarded to the
- user's own computer system.
-
- 11. It was further part of the conspiracy and scheme to
- defraud to circulate the CYNOSURE BBS address to a trusted network
- of computer users in order to protect the BBS from detection, and
- to communicate with BBS users by posting "README" files on the
- BBS. In these communications, which users would access through
- interstate telephone communication between their computers and
- the
- MIT server upon which the CYNOSURE BBS was resident, the
- defendant: advised users to check the CYNOSURE I index before
- uploading files so as not to duplicate existing files; requested
- particular copyrighted software; and cautioned against
- over-publication of the Internet site address for the bulletin
- board in order to reduce the risk of detection by the "net.cops,"
- i.e., systems administrators and network security personnel.
-
- 12. In fact, however, as defendant knew, the site address
- for the CYNOSURE BBS was disseminated widely and indiscriminately
- over public electronic networks, and as defendant knew or
- reasonably could have foreseen, traffic into and out of the
- CYNOSURE BBS for the purpose of unlawfully copying copyrighted
- software quickly became enormous. For example, approximately
- 180 computers
- contacted the BBS over a single 16-hour period of time it was in
- operation,
- downloading hundreds of computer software files containing
- copyrighted
- commercial programs during that same period.
-
- 13. As a result of the conspiracy and scheme to defraud, losses
- from the
- illegal distribution of the pirated software are estimated to exceed
- one
- million dollars during the period the CYNOSURE BBS was in operation.
-
- 14. On or about November 24, 1993, at Cambridge, in the District of
- Massachusetts, defendant DAVID LAMACCHIA created a "README"
- file on the CYNOSURE BBS which stated,
-
- Welcome to the Cynosure FSP site.
-
- The site currently has about 150 megs of space, so go ahead
- and upload. Let's get this site going!
-
- New files should be uploaded in a new directory under
- /dos/files.
-
- -- GrimJack, your sysop.
-
- 15. On or about December 4, 1993, at Cambridge, in
- the District of Massachusetts, defendant DAVID LAMACCHIA
- created, and participated in creating, a "README" file on the
- CYNOSURE BBS which stated,
-
- Welcome to the Cynosure I FSP site.
-
- This site has a total of 193 megs of space.
-
- This is a download-only site. If you want to upload (please
- do!) on Cynosure II at 18.187.0.75 port 2433.
-
- -- gJ (a.k.a. Gaunt,
- Mongoose
- Maintainers
-
- "FSP" refers to "file service protocol." It is used to facilitate a large
- volume of file activity without causing the system to "crash."
-
- 16. On or about December 9, 1993, at Cambridge, in the
- District of Massachusetts, defendant DAVID LAMACCHIA created
- a "README" file on the CYNOSURE BBS which stated: "Use this
- directory for sending private pgp-encoded
- messages to other users. -- John Gaunt"
-
- 17. On or about December 14, 1993, at Cambridge, in the District of
- Massachusetts, defendant DAVID LAMACCHIA created a file on the
- CYNOSURE BBS called "reqs.from.gaunt" which stated:
-
- If anyone has this stuff, I'd appreciate it.
- Sim City 2000
- Excel 5.0 (Windoze)
- WordPerfect 6.0 (Windoze)
- And if you run a site, drop me a line in the to_sysop
- directory. I'm also interested in cool sites people
- use, trading other info, etc. Thanks . . .
-
- -- John Gaunt, sysop.
-
- 18. On or about December 21, 1993, at Cambridge, in the
- District of Massachusetts, defendant DAVID LAMACCHIA created a
- "README" file on the CYNOSURE BBS which stated,
-
- Cynosure II is currently acting as the upload site, and we're
- periodically moving stuff to Cynosure I and deleting old stuff
- there.
-
- Before you upload, make sure you're not putting something
- up that's already on Cynosure I. Check there at 18.187.0.76
- port 2433 to make sure, or look at the Cynosure I index for a
- possibly-out-of-date
- version.
-
- ***URGENT***
-
- This is the second time I've caught some luser
- publicizing the site address on #fsp over IRC. And
- since I don't use it that much, I don't even want to
- think about how much of this goes on. Think you guys: this
- is what leads to a site getting purged, especially when you go
- around spitting out site address to whomever (especially since
- I was warned that two of those
- online at the time might have been net.cops). If you're tempted
- to give out the site: DON'T DO IT.
- If this keeps happening that two things will happen (1) this
- site will close and (2) its new incarnation will be private. So
- think about it, ok?
-
- ***Flame off
-
- Writing is back on for the meantime. It will probably go
- off sometime tonight, since I'll be out of town. I "may" put
- it back on while I'm gone . . . I'll see how things work out.
-
- -- John Gaunt
- Mongoose
- Maintainers.
-
- "IRC" refers to the Internet Relay Chat, which functions like an
- electronic CB radio over the Internet, permitting numerous users to
- "listen in"
- to a "channel" simultaneously.
-
- 19. On or about January 4, 1994, at Cambridge, in the
- District of Massachusetts, defendant DAVID LAMACCHIA and
- others whom he aided and abetted rebooted the CYNOSURE BBS,
- i.e., reloaded the bulletin board software, to permit access over the
- Internet.
-
- 20. On or about January 4, 1994, at Cambridge, in the District of
- Massachusetts, defendant DAVID LAMACCHIA created and
- participated in creating
- a file on the CYNOSURE BBS, stating:
-
- Welcome to Cynosure I.
-
- Cynosure II is currently down. Cynosure I is temporarily up.
-
- CYNOSURE IS MOVING!!! Read on. . . .
-
- Well, if you've waited this long we thank you for being a
- dedicated user throughout our hiatus. While we were gone
- the site was wiped clean. Everything on this machine and all
- our off-line backups was lost.
-
- This is disappointing. While it may not be the result
- of being found by the net.cops, I still believe the site
- was too public. Lusers were distributing the address
- freely over IRC and to people they didn't trust.
- Usually, the result of this for a site is for that site to
- move and go private, so it doesn't happen again. I'm
- going to try something else.
-
- Cynosure is one of the last public sites, so I'm going
- to keep it that way: if we're forced to go down again
- because of lamers, I will probably have to go private.
- So, hopefully, with controlled distribution of the
- new address, this won't happen.
-
- The move will happen soon. Distribution of the new
- address will be limited at first, unlike last time.
- Mongoose and I are currently hacking
- a new loction that will (1) be more secure and (2) handle
- a lot of the problems the site currently has (if you don't
- know about it, don't worry).
-
- Anyway, thanks again for sticking with us. Again, I'm
- only leaving Cynosure I up while we move. It's better than
- nothing.
-
- See you all on the net.
-
- -- John Gaunt
- Mongoose
-
- Maintainers
-
- All in violation of Title 18, United States Code, Section 371.
-
-
-
-
-
- A TRUE BILL
-
- _xxxxxsignedxxxxx_
- Foreman of the Grand Jury
-
-
- Jeanne Kempthorne [signed]
- Assistant United States Attorney
-
-
- DISTRICT OF MASSACHUSETTS; April 7, 1994, at 4:01 p.m.
- Returned into the District Court by the Grand Jurors and filed.
-
- _xxxxxsignedxxxxx_
- Deputy Clerk
-
- ------------------------------
-
- Date: Sat, 10 Apr 1994 23:51:32 PDT
- From: Moderators <cudigest@mindvox.phantom.com>
- Subject: File 4--LaMacchia (MIT Student) Defense Atty Press Release
-
- ((MODERATORS' NOTE: We had not received permission to publish the
- following press release from LaMacchia's attorneys from the poster on
- a public access system by CuD press time. Because it's a public
- document, and because of its importance, we assume that permission
- would be granted pro forma)).
-
- _Response of Defense Counsel to the_
- _United States Attorney's Indictment of David LaMacchia_
-
- Sadly, the United States Attorney for Massachusetts, Donald K.
- Stern, has chosen in this case to attempt to exert control over the
- use of the Internet and computer communication by an inappropriate
- use of *criminal* law. It is almost always inappropriate to use
- criminal prosecution, as opposed to legislative deliberation, to mold
- the law in new and gray areas, as this area most certainly is. It
- requires a stretching and bending of existing criminal statutes never
- meant to be employed as the U.S. Attorney seeks to employ them, which
- is precisely why, rather than prosecuting an individual, he or the
- Department of Justice should be asking Congress to determine, clearly
- and unequivocally, what conduct is criminal and what conduct is not.
-
- An indictment is particularly inappropriate in this case. In
- indicting David LaMacchia, a 20-year-old junior at M.I.T., the U. S.
- Attorney and his staff are trying to brand as a computer systems
- operator (a so-called "SYSOP" in computer jargon) as a criminal, for
- what *other* people place on, and take off of, a computer system that
- the SYSOP creates and maintains but does not control. It is not at
- all clear that a SYSOP who neither controls what is placed on the
- system nor profits one cent from any copyrighted software that others
- upload to and download from the system (that he and others create and
- operate) has committed *any* crime. In short, this case raises the
- hotly disputed question of whether the operator of a "common carrier"
- may be held criminally responsible for the manner in which others use
- his communications system. Obviously, the people who run the
- telephone company and who publish newspapers should be watching this
- case carefully, lest they find themselves criminally responsible for
- misuses of their communications media and systems.
-
- The United States Attorney is quoted in _The Boston Globe_ of
- April 8, 1994, as saying that the role played by young LaMacchia in
- this case demonstrates an "intent to illegally distribute" software
- placed on and taken off the system by others, and that this "takes
- this far beyond the bounds of the First Amendment." On the other
- hand, Harvard Law School Prof. Laurence H. Tribe, widely acknowledged
- to be the foremost constitutional scholar of our time, is quoted in
- the same edition of the _Globe_ as describing this prosecution as an
- "excessive" use of "the criminal justice system to police the outer
- boundaries of property in these gray areas, where it can't be alleged
- that someone is deliberately profiting." We believe that the outcome
- of this case will vindicate the view of Prof. Tribe rather than the
- less educated view of U.S. Attorney Stern and his assistants.
-
- If the government wishes to outlaw the activities in which David
- LaMacchia is alleged to have engaged, it should ask Congress to pass
- a statute clearly making such conduct criminal. We frankly believe
- that the Department of Justice would have trouble convincing Congress
- to do so, because of the troubling statutory, constitutional, and
- policy problems involved. So, instead, the U. S. Attorney will use
- this to case as a vehicle to try to convince the federal courts to
- make David LaMacchia into a felon by stretching and mangling the
- meaning of certain existing criminal laws.
-
- David LaMacchia's conduct was not in violation of the criminal
- law, and we are confident that the courts will agree with us. It is
- unfortunate that this young man -- among the best and the brightest
- that our society produces -- will have to suffer while this process
- goes forward. Given the explosion of violent crime and other
- criminal pathologies in our society, one would think that the U. S.
- Attorney's staff of lawyers and FBI agents would have better things
- to do with their time and the taxpayers' money than to imitate
- guppies, the fish that devour their own young.
-
- We and our client hope to have much more to say about this case and
- its implications at that point in time when we are able to say more.
- Meanwhile, we ask that David LaMacchia be accorded the presumption of
- innocence to which our Constitution and laws entitle him. We ask
- that all citizens concerned with liberty and fair play follow this
- case closely and then, at the end, ask some hard questions about the
- motives and judgment of the prosecutors who have brought this
- prosecution.
- * * * * *
- Harvey A. Silverglate
- Silverglate & Good
- 89 Broad Street, 14th flr
- Boston, MA 02110-3511
- Tel (617) 542-6663
- Fax (617) 451-6971
- Internet:has@world.std.com
-
-
- David Duncan
- Zalkind, Rodriguez, Lunt &
- Duncan
- 65A Atlantic Avenue
- Boston, MA 02110
- Tel (617) 742-6020
- Fax (617) 742-3269
-
- Counsel for David LaMacchia
-
- Dated: April 8, 1994
-
- ------------------------------
-
- Date: 10 Apr 1994 20:05:23 GMT
- From: dig@clark.net (Douglas I. Granzow)
- Subject: File 5--DO NOT confuse MIT board with legit CYNOSURE BBS in MD
-
- On Thursday, April 7, 1994, David LaMacchia, 20, of Rockville,
- MD, was indicted on wire fraud charges for the operation of an FSP
- site at MIT, which distributed commercial software. The site was
- called "Cynosure".
-
- I'm posting this because I run a BBS called Cynosure Online,
- and I want to immediately clear up any confusion over his systems and
- my system. Cynosure Online is not connected with Cynosure I/II in any
- way.
-
- Cynosure Online has been in operation since January 28, 1987,
- and has never allowed software piracy. The BBS started using
- "Cynosure" in its name around September of 1992. Previously, it was
- called "The II Sysops BBS", and was the offical BBS for a bi-monthly
- newsletter (called "II Sysops") for operators of Apple II based
- bulletin board systems. The name Cynosure was selected for its
- uniqueness. The BBS has moved from the Apple II based ProLine
- software to a multi-line version of Wildcat, running on a 486
- computer. The BBS has offered its users Internet email and Usenet
- news since it began using the ProLine software in 1991.
-
- Anyone with any questions concerning Cynosure Online should
- contact me at dig@cynosure.clark.net.
-
- Douglas Granzow, sysop of Cynosure Online (410-781-6271), Eldersburg, MD
- dig@cynosure.clark.net
-
- ------------------------------
-
- Date: 31 Mar 94 07:39:22 CST
- From: sean@sdg.dra.com
- Subject: File 6--FBI Erroneously Detains 2 "Suspects" at CFP '94
-
- ((MODERATORS' NOTE: The FBI detained two participants of the CFP '94
- conference in March. The following is a summary by an attendee, Sean
- Harp. In the second incident, described below, the FBI was looking
- for an "Agent Steal," the handle of a suspected felon. They in fact
- did apprehend "Agent Steele," but the wrong one--Robert Steele, the
- target and a conference attendee, could draw from his CIA background
- to claim the sobriquet. He indicates that the FBI was looking for a
- youngish male with a wooden leg. When a naked middle-aged man answered
- the FBI's knock on the hotel door first claiming "room service," and
- then "FBI," it took, he said, about 60 seconds to clarify the error.
- Our account of the "Agent Steal" incident differs a bit from the
- account presented below, but the essentials--an FBI goof and
- obvious attendance and perhaps monitoring of the conference seem
- clear)).
-
- Within a 24 hour period at the Computers, Freedom and Privacy '94 conference
- the FBI "detained" (arrested) two people the FBI thought were fugitives. In
- both cases they turned out to be the wrong person, and released.
-
- First case.
-
- At the conference banquet on Thursday evening Jim Settle, a FBI agent, and
- a young person happened to be seated at the same table. The person's real
- name (on his conference badge) happened to be an alias that had been
- used by Kevin Mitnick in the past. The name seemed familar to Jim
- Settle, who ran an National Crime Information Center (NCIC) check, and
- came up with the arrest warrant for Kevin Mitnick. There was also,
- apparently, a poor quality picture and physical description that could
- be claimed matched the person at the conference. "Multiple" FBI agents
- confirmed that the description matched the person at the conference.
-
- The FBI obtained a subpena for the hotel records. At 6am, the FBI entered
- the hotel room where the person was staying with several friends (who informed
- the agents the person was not Kevin Mitnick) and took the person to the
- Chicago FBI field office. He was fingerprinted, and the prints were FAXed
- to Washington, D.C. for comparison. It turns out there isn't a qualified
- fingerprint analyst at the local Chicago FBI office. About 30 minutes
- later, the report comes back that the fingerprints don't match. The FBI
- apologized to the person, and returned him to the hotel. At lunch on
- Friday, the chair of CFP'94 mentions the mistaken identity "arrest." On
- Saturday, New York Times reporter Peter Lewis mentioned mistaken arrest
- in his story on the CFP'94 conference on the front page of the NYT business
- section.
-
- Jim Settle mentioned, since this person's physical description and real
- name matches an alias used by Kevin Mitnick, this could happen to that
- person again if he is ever stopped by the police (traffic ticket, whatever)
- and they run an NCIC check. He suggested that the person contact him at the
- FBI - National Computer Crime Section (Jim's phone is in the conference
- attendee list) and he'll tell the person how to quickly verify to the police
- he isn't Kevin Mitnick.
-
- Second case
-
- A 5 foot 6 inch tall brown/black long hair person was mistaken for
- a 6 foot 5 inch tall blond hair fugitive called "Agent Steal." Once
- again, "multiple" agents made the identification. I don't remember
- anyone mentioning when the FBI first suspected this person was Agent
- Steal. In this case the FBI didn't know what room the person was
- staying in, so the agents waited for over two hours on a couch by the
- elevators in the hotel. This person was stopped when he got off the
- elevator, told a story about looking like a suspect in the World Trade
- Center bombing, and asked to show the FBI agents his leg. As I heard
- the explanation, Agent Steal has a steel or artificial leg. Since
- this person didn't have an steel or artificial leg, he was released.
- The person who was stopped estimated he was detained about 15 minutes.
-
- ------------------------------
-
- Date: Sat, 9 Apr 1994 21:18:54 CDT
- From: Alan Westrope <awestrop@nyx.cs.du.edu>
- Subject: File 7--Phil Zimmeran Requests Info on PGP Uses
-
- ((MODERATORS' NOTE: The following has circulated during the past few
- weeks over the Nets. We lost the original source(s) who sent it over,
- so thanks to all of ya who did. The author is Alan Westrope (see
- address below). Although he wasn't the one who posted this to us, we
- put his address in the "From:" line to facilitate responses)).
-
- To all PGP users:
-
- We've all heard arguments raised by the law enforcement and
- intelligence communities that PGP and other encryption technology can
- be used by criminals to hide their activities. This line of
- reasoning is being used to justify Government key escrow systems like
- Clipper, and to clamp down on encryption technology like PGP. It
- would be helpful to come up with real-world examples of how PGP has
- been used for good constructive purposes. Journalists sometimes ask
- me for examples of positive uses for PGP. But most of my fan mail
- from PGP users do not tell me what they are using it for.
-
- If you have any stories about how PGP is used for good purposes, I'd
- like to see them. Not just disaffected paranoid libertarians
- embracing it for the theoretical benefits for a free society. We
- need to be able to cite examples of real people using PGP for good
- ends. Human rights activists using it are a great example. But it
- doesn't have to be in the Nobel-Prize winning catagory of human
- endeavor (although that would be nice). It could just be any
- positive upbeat application that normal people can relate to in a
- positive way, so I can tell reporters about it. I'd like to hear
- (actually, see some email) from real people who are actually using
- PGP for good things.
-
- It could be for helping others, like protecting HIV patient records,
- or keeping psychological counseling records. Or conducting good
- wholesome business that must remain confidential. Or lawyers using
- it to maintain confidential records and communications with their
- clients. Or, it could be for your own personal life, but for
- wholesome upbeat uses, like sending love letters (you don't have to
- supply any actual love letters), or keeping your diary.
-
- For those that don't know what PGP is: Pretty Good Privacy (PGP) is
- a free software program that encrypts email using public key
- cryptography, allowing you to communicate securely with people you've
- never met, without the prior exchange of keys over secure channels.
- PGP has become the worldwide de facto standard for email encryption.
- It's available on many Internet FTP sites and BBS systems.
-
- Please send me some email (to prz@acm.org), with the subject line
- "Positive uses for PGP", so that I can quickly sort it out from the
- rest of my email. If it's a really good story, I may want to use it,
- so let me know if I can and if I can give reporters the information.
- You might not get a reply-- it depends on how much mail I get or how
- busy I am when you send it.
-
- There is no prize for the best story, but for what it's worth, I'll
- sign the public key of the person who submits the best story by
- Monday, April 11th. But keep sending stories after that date if
- you've got them.
-
- This notice can be copied and reposted on any newsgroup or mailing
- list that is likely to be familiar with PGP.
-
- Philip Zimmermann
- prz@acm.org
- ===================================================================
-
- As I recall, the in-person validators sometimes use PGP to authenticate
- their messages to Andrew, and there's a text file somewhere on Nyx
- containing instructions for this procedure. If I'm correct, could
- some kind soul tell me the name of this file so I can pass the info
- along to Phil?
-
- Alternatively, if someone familiar with the process wants to send email
- to Phil, go for it! (Please post a reply here if you do this, so he
- doesn't get duplicate messages about it. Some luser posted an April
- Fool's message about him being arrested, resulting in a torrent of phone
- calls and email, which he's probably still plowing through...)
-
- Thanks,
-
- Alan Westrope <awestrop@nyx.cs.du.edu>
- <adwestro@ouray.denver.colorado.edu>
-
- ------------------------------
-
- End of Computer Underground Digest #6.31
- ************************************
-
-
-