home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Feb 22, 1995 Volume 7 : Issue 15
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Ediotr: Ettie-Ann Shrdlu
-
- CONTENTS, #7.15 (Wed, Feb 22, 1995)
-
- File 1--Affidavit of FBI agent against Baker
- File 2--soc.culture.usa, et al.-Re: Censorship at U of Michigan (fwd)
- File 3--Baker chronology
- File 4--Text of 18 USC 41 Sect. 875c (of Baker Indictment)
- File 5--HACK - WELL/Mitnick FAQ (fwd)
- File 6--Re: Banished CPU BBS - commentary
- File 7--Cu Digest Header Info (unchanged since 18 Feb, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ----------------------------------------------------------------------
-
- Date: Tue, 14 Feb 1995 23:59:18 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 1--Affidavit of FBI agent against Baker
-
- ((MODERATORS' NOTE: The Jake Baker case raises sticky issues of
- First Amendment protections, creative applications of old laws to
- new scenarios, and maintaining decency in cyberspace.
- The underlying issues extend beyond obscenity and free speech,
- and a future issue will attempt to address the complexity of
- what's at stake. The following posts provide the background for
- the case)).
-
- ==============================================
-
- United States Attorney
- Easten District of Michigan
-
-
- 211 W. Fort Street
- Suite 2300
- Detroit, MI 48221-3211
-
-
- February 9, l995
-
- CONTACT: (313) 226-9509
-
-
-
-
- United states Attorney Saul A. Green announced that Jake A.
- Baker, Alan known aa Abraham Jacob Alkhabaz, an undergraduate
- student at the University of Michigan in Ann Arbor, was charged
- today in a federal criminal complaint With transmitting a threat
- to injure "Jane Doe, a student at the University of Michigan.
- Baker was arrested on the complaint in Ann Arbor at approximately
- 1:00 p.m. and subsequently transported to the federal courthouse
- in Detroit for an initial appearance.
-
- Mr. Green stated that the criminal charge is based upon a
- series of transmissions Mr. Baker made on the Internet computer
- network. on approximately January 19, 1995, the University of
- Michigan Department of Public Sarety became aware that Baker had
- transmitted communications on the Internet describing violent sex
- acts against women, and that at least one transmission identified
- Jane Doe as the specific victim of sexual torture and murder. A
- series of subsequent transmissions between Baker and others on
- the Internet system discussed plans for the abduction, torture,
- and murder of women.
-
- Mr. Green explained that Mr. Baker's transmissions on the
- Internet gave rise to a charge under 18 U.S.C. s 875(c), which
- criminalizes the transmission in interstate or foreign commerce
- of a communication "containing any threat to kidnap any person or
- any threat to injure the person of another." Mr. Green further
- emphasized that the criminal complaint against Baker is merely a
- charging document, and that Baker is presumed innocent of the
- charge. The investigation, which is being handled by the Federal
- Bureau of Investigation, is still in progress,
-
-
-
-
- AFFIDAVIT
-
-
- Greg Stejskal, being first duly sworn, states:
-
-
- 1. I am a Special Agent with the Federal Bureau of
- Investigation, and have been so employed for the past 19 years.
- be following is known to me to be true through personal interviews
- and investigation.
-
-
- 2 . Abraham Jacob Alkhabaz, also known as Jake Baker , is an
- undergraduate student at the University of Michigan (UM) in Ann
- Arbor, Michigan. Baker has access to computers and has been
- assigned a unique name (password/identifier) by the university.
- Baker has, via his computer, access to a computer network commonly
- referred to as "Internet." Internet is a world-wide information
- network used in interstate and foreign commerce. Accordingly,
- Material transmitted into Internet is communicated and distributed
- in interstate and foreign commerce.
-
-
- 3. On or about January 19, 1995, University of Michigan
- Department of Public Safety (UMDPS) becamee aware of certain
- activities of Jake Baker, i.e., the transmission into Internet of
- "stories" graphically depicting violent acts against women.
- Further, UMDPS learned that at least one of these transmissions
- named a female student at US as the specific target/victim. The
- name of the female student is known to me, but will be identified
- in this affidavit only as "Jane Doe."
-
-
- 4. On January 20, 1995, Baker was contacted by UMDPS officers
- regarding the Internet transmissions. After being advised of and
- waiving his Miranda rights, Baker admitted writing and "posting"
- (transmitting) several depictions into the Internet computer
- network. these transmissions were placed in a "compartment" of the
- system labelled "alt. sex stories (a.s.s.)"
-
-
- 5. The transmissions distributed by Baker through Internet
- described Baker's desire to commit acts of abduction, bondage,
- torture, mutilation, sodomy, rape and murder of young women. The
- depictions of these criminal acts are extremely graphic and
- detailed.
-
-
- 6. In a preface to one of the transmissions, with an
- unidentified victim, Baker writes, "Torture is foreplay, rape is
- romance, snuff is climax."
-
-
- 7. one of the depictions transmitted by Baker into Internet
- Involved UM Co-eds Jane Doe, who Baker identified by her true name,
- Using her last name as the title of the "story." In a portion of
- Baker's expressed desire to injure Jane Doe, Baker states:
-
-
- Then, Jerry and I tie her by her long brown
- hair to the ceiling fan, so that she's
- dangling in mid-air. Her feet don't touch the
- ground, She kicks trying to hit me, Jerry or
- the gorund (sic). The sight of her wiggling
- an mid-air, hands rudely taped behind her
- back, turns me on. Jerry takes a big spiky
- hair-brush and start beating her small breasts
- with it, coloring them with nice red marks.
- She screams and struggles harder. I've
- separated her legs with a spreader-bar; now I
- stretch out her pussy lips and super-glue them
- wide open. Then I take a heavy clamp, and
- tighten it coer her alit. once it's tight
- enough, I let go.
-
- Thus transmission and other similar transmissions may have been
- posted previously, but were posted or reposted on or about January
- 1, 1995.
-
-
- 8. Baker knew Jane Doe as a class-mate from a Japanese class
- at UM in the Fall of 1994. Jane Doe is aware of Baker's
- transmission concerning her and ir frightened and intimidated by
- it.
-
- 9. In late January l995, Baker signed various consent forms
- giving permission to the UMDPS to search and/or access his room,
- personal papers and computer files. This included the use of
- Baker's unique password, which provided access to Baker's
- electronic mail (e-mail). The hearth of the assail produced
- numerous messages between Baker and an individual identifying
- himself as Arthur Gronda supposedly residineding in Ontario, Canada.
- In these messages sent and received via Internet, Baker and Gronda
- discuss means of torture and acts of actual serial killers that had
- been reported in the media. Further, Baker and Gronda discuss
- actually getting together to commit the acts Baker had previously
- depicted and transmitted. The following is an excerpt from a
- message sent by Baker to Gonda on or about December 9, l994:
-
- I just picked up Bllod (sic) Lust and have
- started to read it. I'll look for "Final
- Truth" tomorrow (payday). One of the things
- I've started doing is going back and re-
- reading earlier messages of yours. Each time
- I do, they turn me on more and more. I can't
- wait to see you in person. I've been trying
- to think of secluded spots, but my area
- knowledge of Ann Arbor is mostly limited to
- the campus. I don't want any blood in my
- room, though I have come upon an excellent
- method to abduct a bitch ---
-
- As I said before, my toom is right across from
- the girl's bathroom. Wiat (sic) until late at
- night, grab her when she goes to unlock the
- door. Knock her unconscious and put her into
- one of those portable lockers (forgot the word
- for it), or even a duffle bag. Then hurry her
- out to the car and take her away . . . what do
- you think?
-
- On or about December 10, 1994, the following response was sent via
- lnternet to Baker by Gonda:
-
- Hi Jake. I have been out tonight and I can
- tell you that I am thinking more and more
- about "doing" a girl. I can picture it so
- well . . . and I can think of no better use
- for their flesh. I HAVE to make a bitch
- suffer!
-
-
- 10. Based on the aforementioned facts, there is probable
- cause to believe that Abraham Jacob Alkhabaz, also known as Jake
- Baker, knowingly transmitted a threat to injure the person of
- another in interstate and foreign commerce in violation of Title
- 18, United States Code, Section 875(c).
-
-
-
- __________________________
- Greg Stetskal, Special Agent
- Federal Bureau of Investigation
-
-
- Subscribed and sworn to before
- me this 9th day of February, l995.
-
- _____________________________________
- Hon. Thomas A. Carlson
- United States Magistrate Judge
-
-
- - - -
- ANDREW S. BRENNER, Esq
-
- abrenner@interaccess.com
- 634.8492@mcimail.com
- http://www.interaccess.com/users/abrenner
- finger abrenner@interaccess.com for PGP public key
-
- ------------------------------
-
- Date: Sat, 18 Feb 1995 21:44:04 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 2--soc.culture.usa, et al.-Re: Censorship at U of Michigan (fwd)
-
- ----- Forwarded message ------
- From: pjswan@engin.umich.edu (Peter Swanson)
- Subject-- Re: Censorship at U of Michigan
- Date: 16 Feb 1995 05:29:11 GMT
-
- MORE INFORMATION ON THE JAKE BAKER CASE
-
- I have several days worth of newspapers here; I will try to briefly
- summarize the new information contained in the accounts
-
- [DPS == Department of Public Safety (University Police)]
- [SSRR == Statement of Student Rights and Responsibilities]
-
- Sequence of Events (Jonathan Berndt/Michigan Daily)
- December and January: Baker transmits e-mail messages to a man
- in Ontario describing the kidnapping, rape, and murder of a woman.
- 1/9/95 The story in question posted to alt.sex.stories
- 1/19/95 A 16 year old girl in Moscow reads the story, then tells
- her father, who tells a Michigan alumnus, who notifies the University.
- 1/20/95 DPS officers contact Baker. Baker waives his Miranda rights
- and admits to writing and posting the stories. DPS officers search
- Baker's room and account with permission, finding an unpublished story
- and the e-mail conversations.
- 2/2/95 University President Duderstadt suspends Baker.
- 2/9/95 FBI arrests Baker on basis of stories and e-mail. Bail is denied.
- 2/10/95 After a detention hearing, Baker is again denied bail. A defense
- appeal for bail bond is denied. Pre-trial motions scheduled for 2/17/95.
-
- The Media free-for-all (Patience Atkin/Michigan Daily)
- Detroit Free Press: "Debate between free speech and whether it's a
- threat for the woman's safety." --Maryanne George
- WDIV-4 TV Detroit: "It also goes to the issue of what constitutes
- free speech and what constitutes unreasonable threats." --Paul Manzella
- "People who make threats in society are always a concern to people
- who don't make threats." --Manzella
- Spin: "fantasy" --Detroit Free Press
- "sexually violent fiction" --New York Times
- "cyber-threats" --USA Today
-
- Baker judged 'too dangerous' to be released (Josh White/Michigan Daily)
- ...Baker's attorney, Douglas Mullkoff, said the detention of his
- client is unwarranted.
- "The court is presuming that he is guilty," Mullkoff said. "I
- respectfully disagree with every word the judge said. Mr. Baker
- was writing fiction in a fiction area of the Internet."
- During Baker's appeal hearing Friday afternoon, Mullkoff drew a
- similar picture. "We have a fantasy writer's workshop going on
- here," he said. "That is the Internet."
- ...U.S. Attorney Ken Chadwell entered six documents into evidence
- as part of the case against Baker. Three of the documents were
- stories that Baker had posted on the Internet, two were batches
- of e-mail messages to and from Gonda, and one, a previously
- unreleased document, was an incomplete story that DPS officers
- discovered in Baker's East Quad dorm room.
- FBI Special Agent Greg Stejskal, the only witness to testify
- at the Friday hearings, said the incomplete story named the same
- female University student and posed a further threat to her safety.
- "The story involves Mr. Baker abducting the female student and
- taking her to a secluded place off of Route 23 in Ann Arbor.,"
- Stejskal said. "He tells her to disrobe, to take a toolbox
- from his car and then uses the tools to torture her."
- Baker, in his unfinished story, describes the abduction in detail.
- "I plan it well," Baker wrote. "It will be my first kidnapping;
- my first real rape of a pretty young girl. My first experimentation
- with all the devices of pain I had thought up before. I obsessed
- about my target more than any other girl on campus."
- Baker's mother, Vilma Baker, said she was shocked after watching
- her son handcuffed and taken out of the courtroom by U.S. Marshals.
- "The judge must have woken up this morning and thought he
- was a psychiatrist," said Mrs. Baker, a creative writing teacher
- in Ohio. "While his writing is alarming and I don't particularly
- like my son's genre; then again I don't like Stephen King or
- sitcoms. It was just fantasy."
- But Chadwell said Baker's stories went beyond being creative.
- ..."There is a natural progression in these cases," Chadwell
- said. "He was actually talking about taking action in things he
- could do to women. He writes in a message to Gonda that 'just
- thinking about it anymore doesn't do the trick. I need to DO IT.'"
- ...The letters themselves sent mixed messages. "Sometimes, I'll
- see a pretty one out in the quad and think 'Go on Jake, it'd be
- easy.' But the fear of getting caught always stays my hand,"
- Baker wrote to Gonda on Dec. 9.
- "Sorry, can't come up with an ending to that Asian story yet.
- I will soon though, hang in there."
-
- Prosecutors push Baker indictment (Josh White/Michigan Daily) (summary)
- U.S. Attorney Ken Chadwell is pushing for an early indictment
- of Baker. A probable cause hearing is scheduled for Friday.
- Defense attorney Douglas Mullkoff is appealing the no-bond
- ruling in the 6th U.S. circuit court in Cincinatti. He expects
- the appeal (for bail) to be approved, but the next step may be
- the U.S. Supreme Court.
- The Ontario Provincial Police deny having been notified of the
- case and are not, in fact, looking for Arthur Gonda.
-
- 'U' had Baker e-mail before suspension, officials confirm
- (Cathy Boguslaski, Ronnie Glassberg/Michigan Daily)(summary)
- The President suspended Baker with the knowledge of Baker's
- e-mail. Before suspending him, Assistant General Counsel
- Daniel Sharphorn and Director of Housing Public Affairs
- Alan Levy asked Baker to withdraw from the University.
- Vince Keenan, chair of the Michigan Student Assembly
- Students' Rights Commission, said that Baker would be
- difficult to charge under the SSRR, and that he suspected
- that the President summarily suspended him because he
- knew that the SSRR charges wouldn't stick.
-
- Woman named in stories declines to make comment (Josh White/Michigan Daily)
- After repeated press contacts, Jane Doe has requested that the
- press stop pestering her.
-
- ACLU: Baker's free speech rights violated (Josh White/Michigan Daily)
- ..."This case definitely has First Amendment ramifications," said
- Howard Simon, executive director of the Michigan ACLU. "His
- stories may have been disgusting and vile, but I have seen nothing
- that would appear to be a threat to any person.
- "If Mr. Baker had sent a letter to the woman he named in his
- story, or had he slipped something under her door or e-mailed
- her a threatening message, the there may have been something, but
- it would be a civil suit brought by the woman.
- "The germane issue is: Is the FBI going to dictate what
- the First Amendment is going to look like in cyberspace? Will
- people be prosecuted for putting pornography and disgusting
- stories on the Internet in places set aside for them? It is
- not the FBI's place to be writing the First Amendment over again."...
-
-
- An editorial letter in the Daily reports that Baker put a disclaimer
- and warning about the content of his story at the top of his post.
-
- Several news sources, including the Daily, Free Press, and local
- TV stations, have done background checks on Baker, but nothing
- ominous has surfaced and the accounts seem to be hearsay anyway.
- High school friends, etc., told a great deal of personal information
- about Mr. Baker, but nothing I would consider worth the trouble
- of retyping.
-
-
-
- I will be disconnected from the net for about a week, so I will be
- unable to report the status of the Friday probable cause hearing,
- the bail appeal to the circuit court, or the results of the grand
- jury investigation. Again, others are welcome to follow up on these
- stories.
-
- If someone has the story in question, I am interested in obtaining
- it and making it available on a WWW site. I would prefer that all
- references to the woman's name be changed to Jane Doe, so that no one
- comes asking me for her name. I would certainly do it myself before
- making it publicly available.
-
- ------------------------------
-
- Date: Wed, 15 Feb 1995 00:08:08 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 3--Baker chronology
-
- This is a document from Mike Dyer's Netzine web page --
- http://www.ionet.net/~mdyer/netwatch.html. There are several other
- interesting, indepth articles on the legal and ethical aspects of
- cyberspace. Recommended hotlist addition.
-
- This is the best summary I've seen to date. The web page also lists
- several other supporting documents.
-
- thanks, | "The most exciting breakthroughs of the 21st century
- | will not occur because of technology but because
- David Smith | of an expanding concept of what it means to be human."
- bladex@bga.com | -- John Naisbitt / Patricia Aburdene
-
- ---------- Forwarded message ----------
-
- LAST UPDATED 2/14/95
-
- _________________________________________________________________
-
- Only Make Believe
-
-
-
- Jake Baker (pictured) has the attention of a great many people. The 20
- year old University of Michigan student has caused an firestorm of
- controversy over a fictional story he published in a Usenet newsgroup
- that now has polarized two camps. On the one side are the advocates of
- virtually unlimited 1st Amendment Free Speech rights, and on the
- other, a host of womens groups and others concerned that the founding
- fathers never intended their handiwork to go this far. Piecing
- together bits and pieces from various news and information, here is
- the latest I have been able to unravel:
-
-
- _________________________________________________________________
-
- BACKGROUND
-
-
-
- Baker, 20, a Linguistics Major of Boardman, Ohio, who last year
- changed his name from Abraham Jacob Alkhabaz, posted three "stories"
- in the Newsgroup Alt.Sex.Stories. In one of the fictional stories,
- Baker, who used his real name and that of a girl who had been a
- classmate in a Japanese language class last fall, described a scenario
- where he and another man broke into the girl's apartment, beat,
- tortured and sodomized the girl, and then lit a match as he said
- goodbye to the girl, presumably to burn the apartment where the girl
- was bound and gagged.
-
- Although such stories are not uncommon in the newsgroup, apparently
- the use of real names of both the author and others involved is rare.
- Baker claims that the motivation for the story was underlying stress
- having to do with a student loan. He says he chose that particular
- girl because "she was an attractive young woman, and I needed a name
- for the story I was writing". He stated that he knew the girl, but he
- never spoke to her.
-
- It is not known if Baker used his University password to get the
- access to post the story. The school requires students to sign a
- statement, before using campus computers, which says, among other
- things, "E-mail should not interfere unreasonably with one's
- education, or work at the University, nor should they harass or
- threaten an individual or group."
-
-
- _________________________________________________________________
-
- January 9
-
- --A University of Michigan alumnus, living in Moscow, saw the post and
- alerted University officials.
-
- February 2
-
- --Baker was escorted from the campus on February 2, and suspended.
-
- February 3
-
- --Baker and his attorney meet with school officials to ask that Baker
- be allowed to resume classes and his duties as a projectionist on the
- north campus.
-
- February 9
-
- --A hearing is held on the UM campus. At approximately 1:00 p.m.,
- prior to the scheduled hearing, Baker is arrested by federal
- authorities at the office of his attorney. Baker is taken before a
- magistrate, charged with Interstate Transmission of a Threat, in
- violation of 18 U.S.C. sec. 875, which carries a maximum prison term
- of five years. He is also accused of sending and receiving e-mail
- correspondence with an unnamed Canadian man, in which both describe
- their desire to kidnap and torture women. Baker is jailed overnight
- without bail, even though the prosecutor recommends bond be set.
-
- February 9
-
- --Baker's mother and an Ann Arbor psychiatrist appear at the hearing
- on the UM campus. The psychiatrist and Baker's mother both testify
- that Jake is not a threat to anyone on campus. The psychiatrist
- characterizes the writings as "thoughts", with no plan of action. The
- psychiatrist also states that Baker is not delusional. Baker's
- attorney states that Baker has no criminal record.
-
- February 10
-
- --U.S. Magistrate Thomas Carolson orders Baker held without bail, in
- spite of the prosecutor's request that bond be set at $100,000.
- Magistrate Judge Carolson stated that the posts were "more than just a
- story" and quoted the messages to the unnamed Ontario man as stating
- "Just thinking about it any more doesn't do the trick. I need to do
- it." The magistrate further noted that the correspondence involved
- where and how to carry out such an assault. A court affidavit of an
- FBI agent states that the messages between Baker and the Canadian man
- "described Baker's desire to commit acts of abduction, bondage,
- torture, mutilation, sodomy rape and murder of young women. Baker's
- mother, a high school English teacher, said after the UM campus
- hearing that her son chose the name from 200 names in a class, and
- picked the one he did simply because the woman's last name "is a
- sexual pun." Baker's defense attorney announces that he will appeal
- the denial of bail.
-
- February 10
-
- --A U.S. District Judge, having read the e-mail correspondence between
- Baker and the Canadian man, upheld the ruling of the Magistrate Judge
- to hold Baker for trial without bail. Saying "I wouldn't want my
- daughter to be on the streets of Ann Arbor or Ohio with him in the
- condition I believe he is in at this time", Judge Bernard Friedman
- said that he was convinced that the female subject of Baker's story,
- whose identity Judge Friedman ordered kept secret, could not be
- protected from Baker unless he was jailed. At the hearing, Baker's
- attorney presented findings of a psychiatrist and psychologist, both
- of whom had spoken with Baker, who stated that Baker is not dangerous
- or mentally ill. The attorney also pointed out that Baker had
- cooperated with authorities, giving them his e-mail password as they
- searched for evidence.
-
-
- _________________________________________________________________
-
- *Sidenote:*
-
- Last April, another UM student used a classmate's logon to post
- statements from an Organization for the Execution of Minorities, which
- threatened blacks, and criticized Latinos, Jews and gays.
-
- ------------------------------
-
- Date: Wed, 15 Feb 1995 00:09:13 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 4--Text of 18 USC 41 Sect. 875c (of Baker Indictment)
-
- UNITED STATES CODE ANNOTATED
- TITLE 18. CRIMES AND CRIMINAL PROCEDURE
- PART I--CRIMES
- CHAPTER 41--EXTORTION AND THREATS
-
- s 875. Interstate communications
-
- (a) Whoever transmits in interstate or foreign commerce any
- communication containing any demand or request for a ransom or
- reward for the release of an kidnapped person, shall be fined
- under this title or imprisoned not more than twenty years, or
- both.
-
- (b) Whoever, with intent to extort from any person, firm,
- association, or corporation, any money or other thing of value,
- transmits in interstate or foreign commerce any communication
- containing any threat to kidnap any person or any threat to
- injure the person of another, shall be fined under this titl or
- imprisoned not more than twenty years, or both.
-
- (c) Whoever transmits in interstate or foreign commerce any
- communication containing any threat to kidnap any person or any
- threat to injure the person of another, shall be fined under
- this title or imprisoned not more than five years, or both.
-
- (d) Whoever, with intent to extort from any person, firm,
- association, or corporation, any money or other thing of value,
- transmits in interstate or foreign commerce any communication
- containing any threat to injure the proper or reputation of the
- addressee or of another or the reputation of a deceased person
- or any threat to accuse the addressee or any other person of a
- crime, shall be fined under this title or imprisoned not more
- than two years, or both.
-
- ------------------------------
-
- Date: Sat, 18 Feb 1995 21:28:20 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 5--HACK - WELL/Mitnick FAQ (fwd)
-
- ---------- Forwarded message ----------
-
- [mod's note: Kevin Mitnick's arrest was connected with the
- investigation of intrusions on the WELL, a conferencing system in
- Sausalito, California. The WELL has issued a press statement in the
- form of a FAQ]:
-
- The WELL : FAQ (Frequently Asked Questions) Sheet for Press
-
-
- Q. When did The WELL first become aware of the unauthorized activity
- on its system?
-
- A. Friday, January 27th.
-
- Q. How did you discover it?
-
- A. A routine system check.
-
- Q. What actions did the WELL take to help track the suspect?
-
- A. Our technical staff began monitoring and analyzing the situation
- over that weekend. By Monday, we had contacted Computer Emergency
- Response Team (CERT), The FBI, Sun's Security Team, Tsutomo Shimomura
- of San Diego Supercomputer Center, the Board of Directors of The
- WELL, representatives of The WELL community and EFF to discuss our
- appropriate response. We also contacted other Internet service sites
- who we believed were compromised. Our main objective was to
- understand risks, options, and factors affecting our system security
- and Net-wide responsibilities.
-
- After discussing the situation with the above groups, and carefully
- considering our options and responsibilities, we made the decision to
- contact the U.S. Attorney's Office and to cooperate with Tsutomo
- Shimomura in apprehending the intruder. We did this in an effort to
- foster greater security on the global net.
-
- We initiated round-the-clock staffing to monitor the illegal
- activity. WELL technical staff were joined by Mr. Shimomura and his
- associates to help trace the suspect using sophisticated monitoring
- software that he supplied.
-
- At no time was the FBI onsite at The WELL or involved in monitoring
- at our site.
-
-
- Q. What was the chronology of events at The WELL the day leading up
- to the arrest of Kevin Mitnick?
-
- A.
-
- Tuesday, February 14, 2:30 pm PST
-
- WELL technical staff, which had been monitoring the activity for
- nearly 18 days, notices that the cracker has erased information on
- one transaction file on The WELL. The transaction file (there are
- dozens of accounting files on The WELL) contained user log-on data,
- and was a file which is stored elsewhere and backed up regularly.
-
- WELL decides to bring the system down so we can re-build the damaged
- file and do further investigation. WELL staff shuts down WELL
- computers.
-
- Tuesday, February 14, 3:00 pm PST
-
- Technical staff positively determines that it is only one accounting
- file that has been affected. Approximately three hours after the
- incident the damaged file is rebuilt.
-
- Tuesday, February 14, 5:00 pm PST
-
- Shimomura and assistants are contacted, and confirm with The WELL
- technology team that the cracker appeared to have made a typing error
- when he zeroed the one accounting file. Shimomura reports that they
- are hours from catching the suspect.
-
- Tuesday, February 14, 8:30 pm PST
-
- WELL puts system back up. Monitoring continues in full gear.
-
- Tuesday, February 14, 10:30 pm PST
-
- Kevin Mitnick is arrested in Raleigh, North Carolina.
-
- Q. What other sites were affected?
-
- A. In the interest of their privacy, we will not say. We believe
- that at least a dozen sites were compromised.
-
- Q. What are The WELL's normal security procedures?
-
- A. The WELL follows normal UNIX and Internet system security
- procedures including, but not limited to, implementing changes as
- recommended by CERT advisories, security patches as available from
- vendors (e.g. SUN, Cisco), regular use of system security diagnostic
- software, including "crack" and other appropriate security related
- measures. We feel it is inappropriate to enumerate all our security
- measures in a public forum.
-
- Q. Did the cracker get WELL members' credit card information or
- personal files?
-
- A. To the extent that we are able to determine, no credit card
- information was accessed by the intruder.
-
- We monitored nearly every keystroke of the cracker. A total of 11
- accounts were compromised by the intruder, and we have contacted all
- of the account holders. In general, the cracker was not interested
- in information on The WELL itself, but used the WELL for storing
- files from other sites.
-
- Q. Wouldn't have changing all members' passwords have secured the
- system?
-
- A. Fundamentally, it wouldn't have made any difference. The tools
- used by this cracker would not have been defeated by changing
- individual passwords. Additionally, we have no information that
- would lead us to believe that member's passwords had been cracked or
- distributed.
-
- Q. What exactly were you monitoring and who was doing this?
-
- A. We were tracking network transactions, e.g.. ftp, smtp, telnet
- etc. to and from systems known and/or suspected by us to have been
- compromised. We added additional sites as we learned about this.
-
- Those monitoring our system included The WELL tech staff as well as
- Andrew Gross, a consultant from Shimomura's office.
-
- Q. What are you doing to strengthen the security of The WELL?
-
- A. We've purchased a new main server, a Sparc 1000e. We're
- re-installing application software from binaries, implementing
- one-time (DES) password protection for critical including root
- passwords, and requiring every user on the system to select a new
- password (adhering to standards that make password cracking more
- difficult). We are continuing close liaison with Sun specialists
- and other system security specialists and advisors to examine
- techniques used by the cracker to gain system access and addressing
- these system weaknesses.
-
- The WELL plans to install the new Sparc 1000e on Monday, February
- 20th.
-
- ------------------------------
-
- Date: Mon, 13 Feb 95 07:36:16 EST
- From: Frank Tirado <SYSADMIN@ERS.BITNET>
- Subject: File 6--Re: Banished CPU BBS - commentary
-
- CuD is to be commended for presenting articles from all sources,
- regardless of how much we may disagree with them. A case in point is
- the article by Dan Gannon, forwarded by David Smith.
-
- Freedom of speech is a right of all individuals, even the hate
- mongers, the apologists and the revisionists. To curtail their right
- to speak out is to risk having our own freedoms curtailed. Contrarian
- views are necessary since they provide a yardstick against which we
- measure the rightness of our own beliefs. In fact, contrarian views
- have often been proved correct; for example Columbus proved the world
- was not flat, the Wright brothers proved that heavier than air flight
- was possible.
-
- Having said that, however, I must add that my heart bleeds for Mr.
- Gannon and the Banished CPU. I believe that he and others of his kind
- should be allowed to express their opinions in an open forum if only
- so that those opinions can refuted by the historical record. Frankly,
- no amount of revisionism can change the facts: Nazi atrocities
- happened and Jews were the main victims of Nazi pogroms.
-
- It is no favor to allow Nazi revisionists the full benefit of freedom
- of speech. If their actions are overt, they can be watched. If they
- express their beliefs in an open forum, they can be refuted.
- Ultimately, they will reveal their true nature: bigots and hate
- mongers.
-
- Finally, Nazi revisionists serve a very useful function: they keep
- present the horrors of the Holocaust and remind us that, if we are not
- vigilant, it could easily happen again. To us.
-
- ------------------------------
-
- Date: Thu, 23 Oct 1994 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7--Cu Digest Header Info (unchanged since 18 Feb, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: Bits against the Empire BBS: +39-461-980493
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.15
- ************************************
-
-
-