home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Tue Dec 31, 1996 Volume 8 : Issue 93
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.93 (Tue, Dec 31, 1996)
-
- File 1--Unamailer Attacks on Christmas Day
- File 2--Gray Areas hit by Mailbomb at Compuserve
- File 3--The xchaotic story (Re Xmas Mailbombings) (fwd)
- File 4--Kevin Mitnick placed in solitary
- File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Fri, 27 Dec 1996 23:04:35 -0500 (EST)
- From: ptownson@MASSIS.LCS.MIT.EDU(TELECOM Digest Editor)
- Subject: File 1--Unamailer Attacks on Christmas Day
-
- Date--Fri, 27 Dec 1996 05:59:05 PST
- From--Eric_Florack@xn.xerox.com (Florack,Eric)
- Subject---Unamailer Strikes on Christmas
-
- Some interesting notes about mail-site security in this news dispatch.
- An interesting read, but perhaps a warning, as well. Passed onto all
- of you without further comment:
-
- /E
-
- -=-=-=-=-=-=-=-=-=-=-==-=
-
- CyberWire Dispatch / Copyright (c)1996/ December 26, 1996 /
-
- Jacking in from the "Spam in the Stocking" Port:
- Unamailer Delivers Christmas Grief
-
- by Lewis Z. Koch
- Special to CyberWire Dispatch
-
- "johnny xchaotic," also known as the "Unamailer," is back, and
- twenty-one individuals -- many of whom are deeply involved in the
- Internet ---journalists, the heads of computer companies such as
- Mircrosoft, politicians, and religious figures -- received a "denial
- of service" Christmas present they wished they didn't have.
-
- johnny, and possible friends of johnny, effectively halted these
- individuals' ability to send and receive E-mail, a denial of service
- attack which may take days to restore.
-
- Among those hit were prominent journalists including magazine
- columnist Joel Snyder, because, in xchaotic's words,"your last article
- in 'Internet World' places all the blame of my actions on an innocent
- person." Also hit was the magazine's editor Michael Neubarth because
- of his failure to "apologize" for what were termed journalistic
- errors.''
-
- Political figures, such as former Presidential candidate Pat Buchanan
- and U.S. Senate wannabe David Duke, also were targets. Religious
- figures such as Pat Robertson and Billy Graham were subject to e-mail
- bombings, as were members of the Church of Scientology and members of
- the KKK.
-
- Microsoft's Bill Gates, several people from the cable channel MTV also
- were among those apparently attacked. Others hit include Carolyn
- Meinel who operates a "Happy Hacker" mailing list, the Klu Klux Klan,
- MTV and the Nazi party.
-
- All told, 21 individuals were hit, some, like Gates for the second
- time. This is the second time in six months that the work of one or
- more individuals has exploited relatively simple vulnerabilities in
- Internet e-mail lists.
-
- The first attack, in August, targeted more than 40 individuals,
- including Bill Clinton and Newt Gingrich and brought a torrent of
- complaints from the people who found their names sent as subscribers
- to some 3,000 E- mail lists. By comparison to the Christmas attack,
- even that relatively modest attack sent enough e-mail to the targeted
- recipients that it effectively halted their computers' ability to
- process the messages.
-
- This attack is estimated to involve 10,139 listservs groups, 3 times
- greater than the one that took place in the summer, also at xchaotic's
- instigation. If each mailing list in this attack sent the targeted
- individuals just a modest 10 letters to the subscribers' computer
- those individuals would receive more than 100,000 messages. If each
- listing system sent 100 messages -- and many do -- then the total
- messages could tally 1,000,000.
-
- Once again, johnny xchaotic has offered an "open letter," given to
- this reporter before it was scheduled to be posted throughout the
- Internet, as a way to explain the reasons behind the attack. He also
- taunted the FBI, telling the agency not to "waste tax dollars trying
- to track me" because "there are a lot more dangerous people out there
- you should be concentrating on." (The complete letter will be
- released shortly to the Net by johnny.)
-
- The open letter, and the information outlining the e-mail blast, were
- give to this reporter as the "attack" was concluding. The attack began
- the evening of December 24 just before midnight and took four hours,
- eight minutes and twenty-nine seconds.
-
- "They [listserv-based mailing lists] could stop this kind of attack
- tomorrow," one source close to johnny said, "if they only took the
- simplest of precautions --like authentication." Authentication is a
- means by which the listing system, instead of agreeing to the
- ''subscription'' and then automatically forwarding tens or hundreds of
- letters to the subscriber, would first ask if the person really wanted
- to subscribe. This ''verification'' could come as an electronic mail
- message to the subscriber asking for confirmation.
-
- If this process had been in place, someone subject to an E-mail denial
- of service attack would only receive one letter from each list-- that
- one being the authentication confirmation query -- do you really want
- this E-mail -- before sending on 10 or 100 messages.
-
- "They're either too lazy or too dumb to do that -- so they have to pay
- a price," this source said, indicating that the attacks would continue
- until the administrators "get it right," indicating that johnny and
- his friends want to pressure administrators into authentication.
-
- In these kinds of instances, individuals who have been hit wind up
- quickly canceling their e-mail accounts, thus passing the
- responsibility for canceling the "subscription" back to the list
- administrator. Many suspect the authentication-confirmation process is
- viewed by listserv systems administrators as an inconvenience and
- confusing to the subscriber and so, they just avoid it.
-
- The attack, however, may be a violation of federal law, punishable by
- up to five years in prison, or $250,000.00 in fines or both. While
- there are techniques for tracing this kind of attack when there is
- advance warning, knowledgeable sources say that this kind of attack is
- very difficult to trace once the attack has occurred.
-
- johnny xchaotic has been labeled a 'Net terrorist,' which, according
- to some, debases the meaning of the word "terrorism." No one knows
- who johnny is. He was misidentified earlier by Internet Underground
- magazine as a well known hacker who calls himself "se7en." This
- identification proved false.
-
- One person close to "johnny xchaotic" said the FBI and Secret Service
- had been contacted about the illegality of this kind of hack but said
- they had no interest in this kind of "Net" attack. "We have bigger fish
- to fry," was the response from law enforcement officials, according to
- this person. This attitude was confirmed by a former federal prosecutor
- who said the few federal investigators who understood computers and the
- Internet were stretched thin in their attempts to apprehend serious
- cyber-criminals, or to pursue high profile but relatively unimportant
- cases against hackers such as Kevin Mitnick. There has been a tendency
- on the part of law enforcement and the media to grossly overestimate the
- monetary damage caused by hackers.
-
- "johnny" and those close to him made it clear that there would be a
- continuation of these kinds of email "denial of service" attacks.
-
- These same sources say those few Federal investigators with the Secret
- Service and the FBI who are computer literate and savvy about hacking
- are stretched thin in attempts to solve serious multimillion dollar
- computer crimes, the vast majority of which are committed by insiders
- against the companies they work for.
-
- It is far easier, these sources say, to track down, arrest and jail
- 16-year-old hackers who brag about their exploits to friends and fellow
- hackers than to track down a true professional computer cracker on
- assignment from one company to search and steal the files of a
- competitor company. While it may take up to three years to investigate
- and prosecute one important computer thievery case, teenage hackers can
- be arrested every few months, thus improving the "stats" by which the
- FBI and other agencies make their mark and their budgets.
-
- This repeated E-mail denial of service attack will be sure to reignite
- the debate about the "moral" issues surrounding hackers and hacking.
- What may be ignored -- again --is the failure to rectify the problem
- after the first attack back in August. Immediately following the first
- E-mail bombing attack, the Computer Emergency Response Team (CERT) was
- quick to tell the media that while they had no "solution," they had
- "hopes" they would be able to "limit the impact" of these kinds of
- attacks. Today's three-fold attack showed that a six month period of
- study "hoping to limit the impact" has been futile.
-
- Vital communications do not appear to have been slowed down. The attack
- is a major "inconvenience" to be sure. Others argue that "complacency"
- is the only true victim of this attack.
-
- The temporary inconvenience caused by a few days loss of E-mail
- privileges might seem to pale in significance with those who were killed
- and maimed by the terrorists' bombing of the Federal Building, in
- Oklahoma City, or at the World Trade Center in New York, or in Atlanta
- at the 96 Olympics, or those who opened packages from the Unibomber and
- were killed.
-
- Prominent government officials like U.S. Deputy Attorney General Jamie
- Gorelick have called for the development of the equivalent of a
- "Manhattan project" to stop hackers, though the specifics of what kind
- of "bomb" Gorelick would develop and on whom she would drop "the bomb"
- are vague.
-
- Unsafe at Any Modem Speed
-
- On December 16, a computer attack against WebCom knocked out more than
- 3,000 Web sites for 40 hours, curtailing Website shopping. The attack
- --a "SYN-flood" -- sent as many as 200 messages a second against the
- WebCom host computer. This was the same kind of attack that brought down
- the popular New York Internet provider Panix for more than a week in
- September.
-
- While Seattle computer security consultant Joel McNamara is sympathetic
- toward WebCom's users problems, he allows less leeway to the company.
- "The SYN-flood denial of service attack has been known for months, and
- there are a variety of solutions for addressing it," McNamara said, "I'd
- be curious as to what, if any, security measures WebCom, a large
- provider, had in place to deal with a well-known SYN-flood attack. If I
- couldn't conduct business for 40 hours, I'd have some serious questions
- to ask."
-
- McNamara believes a great deal of the responsibility for the success of
- these kinds of known attacks rests on the shoulders of managers and
- systems administrators who do not fully "understand the implications of
- poor security practices. While the industry hasn't seen this happen
- yet, it's just a matter of time before a customer files a lawsuit
- against a service provider because of damages caused by ineffective
- security," he predicts.
-
- FBI agents have been undergoing some education in computer related
- crimes, but sources say the educated ones are few in number and burdened
- by too many cases. On the other hand, the FBI has singled out small but
- prominent hackers for arrest and prosecution, hoping the jailing of
- these individuals who are well-known to the Net would be a deterrent to
- other younger people considering hacking. The recent adolescent-like
- hacking of the Department of Justice Web site seems to indicate that
- hackers aren't all that deterred.
-
- There are other indications that Web page hacks are going to become more
- political, and perhaps even more dangerous than in the past. The recent
- hack of the Kriegsman Furs company Web page by animal rights activists
- indicates one new, sophisticated path. In this attack, the hackers left
- a manifesto, as well as links to animals rights sites throughout the
- Web. How easy was it to do? "Security for the site was extremely weak,"
- says McNamara, "The commonly known PHF exploit was likely used to
- retrieve a system file, which contained a series of easy to crack
- passwords." Presto, chango. Pro-fur into anti-fur.
-
- "It's too easy to pass the blame off on hackers," McNamara says. Like
- the keys in the car or in the front door, "maintaining an insecure site
- is just an invitation to problems." Those who were responsible for
- today's denial of service attack were careful to repeatedly point out to
- this reporter how "unsophisticated" their attack was and how easily it
- could have been avoided if the list managers had only taken minimal
- precautions. "It's kind of like buying new locks and getting an alarm
- system after everything in the house is stolen. Sure it will probably
- prevent it from happening again, but if you took the precautions in the
- first place, the damn thing wouldn't have occurred," he concludes.
-
- --------------------
-
- Lew Koch can be reached at: lzkoch@mcs.net
-
- ------------------------------
-
- Date: Tue, 31 Dec 1996 10:27:11 -0600 (CST)
- From: Gray Areas <greyarea@gti.gti.net>
- Subject: File 2--Gray Areas hit by Mailbomb at Compuserve
-
- ((MODERATORS' NOTE: Netta Gilboa, publisher of Gray Areas
- Magazine, reports Compuserve's response to her queries about the
- Christmas mailbombing))
-
- gray areas got hit at out cserve acct over xmas.
- cserve has chosen to deny this has ever happened there before
- even though i know of at least 4 users there (including ross perot
- and rush limbaugh who were definitely hit in the past).
- cserve has refused to check the sendmail headers, to fix the
- problem, to credit us for the time spent unsubscribing (cserve
- charges by the minute to be online writing or reading mail), etc.
- we don't even know the full extent of the newsgroups we got subscribed
- to because cserve only stores 102 pieces of mail at a time :)
- we feel cserve was grossly negligent by not having anyone with access to
- the mail servers available on xmas (traditionally one of the biggest
- hacking days of the year) and by having the entire corporate billing
- dept. and corporate headquarters closed on xmas. by contrast, smaller
- isp's like mindspring notified all of their users that their full
- staff would be working on xmas because of possible problems like this
- one.
-
- we wish to publicize compuserve's abysmal response, the fact that
- they lied knowing i was tape recording the calls regarding previous
- incidents, and we are curious as to whether anyone else got hit at
- the same time as generally that is the case with reporters... we may
- be contacted at grayarea@gti.gti.net or grayarea@well.com for
- however long those addresses hold out ;)
-
- ------------------------------
-
- Date: Sun, 29 Dec 1996 14:10:14 -0800 (PST)
- From: Declan McCullagh <declan@eff.org>
- Subject: File 3--The xchaotic story (Re Xmas Mailbombings) (fwd)
-
- ((MODERATORS' NOTE: From the fight-censorship discussion group,
- one of the best on the net, comes the following forwarded
- commentary, allegedly written by the Xmas mailbomber))
-
- =================
-
- [A followup to the Christmas Day email bombings. --Declan]
-
- ---------- Forwarded message ----------
-
- today's act of "cyber-terrorism" is brought to you by the
- letters 'A', 'D', and the number '1'. and the person who
- brought it to you? you know who you are. <p>
-
- before i continue, lets have a quick look at a few interesting
- comments from past articles as well as some notable quotes
- from various fans. <p>
-
- "What's striking to me is how cowardly they are; anonymous,
- I mean, if you have something to say, say it." <p>
- - John Markoff <p>
-
- [signing a letter isn't quite anonymous John.] <p>
-
-
- "We're on Defcon 4 alert here, We expect an attack, possibly
- over the weekend. We said a lot of things in our special report
- the unamailer will not like. We called him names." <p>
- - Stephen Baldwin <p>
-
- [if i don't stop, will you call me more names?
- trying to insult me through name calling is quite
- childish of you. amusing, but childish.] <p>
-
-
- "Clearly the guy's a nutcase, This guy should get a life instead
- of running around annoying people.",p>
- - Helena Kobrin <p>
-
- [well, it looks like you and I have something in
- common. difference? you run around harassing people for
- a living.] <p>
-
-
- "I hope they hang this guy by some vital personal part, I don't
- know what he's trying to prove. He seems to be a smart guy with
- too much time on his hands." <p>
- - John Markoff <p>
-
- [thanks for the compliment, i think.] <p>
-
-
- "I hope they fry the little fuck. Can I say 'fuck?'" <p>
- - Michelle Slatalla <p>
-
- [cry for me you insipid bitch.] <p>
-
-
- from the Netly News: He also calls himself, "Final Result." Desperate <p>
- for publicity from the same people he ridicules,
- FR posted a manifesto of sorts to.... <p>
-
- [can we not read the last paragraph of the first letter i
- posted? that was a random hacked account. we had nothing to
- do with the name on it.] <p>
-
-
- from every source: "johnny xchaotic" <p>
-
- [brackets indicate a group affiliation, not a last name.] <p>
-
-
- from josh at Netly: We wrestled long and hard over the journalistic
- ethics of printing your "Manifesto." In the end,
- we decided we had to do it, if only to get more
- hits. Surely a man with your keen instincts for
- the media spotlight can understand that, eh,
- SpamBoy? <p>
-
- Give it up, Unamailer. Come in from the cold. We're
- waiting for your call. <p>
-
- [i would guess this qualifies as the "names" Stephen talked
- about. if so, that was really pathetic.] <p>
-
-
- and finally, after soliciting my article for Netly, Noah
- decides to let Philip Elmer-Dewitt take a few cheap shots at
- my article, without giving me a chance to reply. if memory
- serves, he apologized on the phone for that, but either way
- it was a cheap move. so, my reply to PED: <p>
-
- >going to need quite a bit of work. I find the "writing
- >style," as the author calls it, generally flabby and <p>
-
- come on PED, you should at least be able to admit that it is a little
- different than the lock and stock method you and the others use. let me
- tell you what kind of excitement YOUR writing brings out. <cough> <p>
-
- >undisciplined. Why "certain well known public figures"?
- >If they're public figures, they're well known by <p>
-
- duh. how much do you know about the head of the NSA? he is a textbook
- definition of 'public figure', yet you probably don't even know his name.
- <p>
-
- >definition, no? If he mailbombed the President, why not
- >say so? Also, note the overuse of the first person
-
- if you stole a car, would you tell the whole world? no. <p>
-
- >singular. Why all these "i"s? We are not e.e. cummings. <p>
-
- i speak for more than myself. <p>
-
- >me. More important: I remain unconvinced by his central
- >argument. How can this possibly be the "first time in
- >history" that the average joe has the technical means to
- >take revenge? Has the author never heard of
- >saboteurs? The Luddites? Political assassins? Peasants
-
- ?have legitimate grievances; how far can a people's <p>
-
- gee. are you trying to provoke me with this unfounded stupidity?
- remember, we talked on the phone. i know you are not as inept as you
- sound right now. since when have the luddites been grouped as a
- 'technical revenge'? yes, that does sound stupid now that you think about
- it, huh? how many assassins have hit their mark AND gotten away to tell
- about it? a very low percentage. saboteurs is your best argument, but
- coupled with the rest is pathetic. look at the above again and think
- about it. the 'average joe' has the means to enact revenge, without
- getting caught, and doing equal or greater damaage. it just hasn't been
- that way until now.<p>
-
- >revolt against a bad ISP? Finally, can we do something <p>
-
- incomplete sentence PED. and you insult MY writing? <p>
-
- >about the byline? Johnny [xchaotic] seems so early
- >eighties. Hasn't this guy read anything since Neuromancer? <p>
-
- if you recall, i was correcting your outdated terms in your magazine.
- once again, another cheezy attempt to provoke me or something. i can say
- one thing about the early eighties comment though.. at least i was on the
- net then. how about you? <p>
-
- >On second thought, maybe we should just tell him his
- >story was spaced out by breaking news and thank him for
- >thinking of us. <p>
-
- how unappreciative. i called you on my dime, and called back when you
- asked. i did the same for Steve at IU, Noah at the Netly News, as well as
- other journalists. i even wrote the article requested of me regarding all
- this. instead of insulting your computer literacy, i chose to shed some
- light on a popular subject and show another viewpoint. i'm afraid that is
- something that has long since escaped you and other journalists. <p>
-
-
- so, that leaves me with today's letter (not manifesto). i
- would like to first give thanks to a few journalist types
- (believe it or not). <p>
-
- Steve Knopper. Steve has shown more than his share of
- proffesional courtesy in the past. he also has shown
- that he is more than fair when writing articles by
- getting both sides of the story as well as remaining
- objective. <p>
-
- Noah Robischon. despite a few minor annoyances, you too
- have extended some professional courtesy after a few
- poorly worded articles at the beginning. if you could
- put a leash on josh, i think you would be more
- successful. <p>
-
- Lewis Koch. thank you for going out of your way to get
- both sides of the story. <p>
-
-
- the state of the net hasn't improved of course. however, i can
- say the quality of journalism has gone up one small step since
- my last letter to the internet community. i have noticed more
- articles being written that are technically accurate, quote better
- sources, or withold the typical bias found in most articles. <p>
-
- that alone tells me something is going right. wether or not i
- had something to do with it doesn't really matter. as long as
- better journalism continues, the more i lay off. of course,
- there are plenty of other people who deserve some special
- attention so my jihad continues. <p>
-
- in the mean time, let me give thanks and/or greets to the
- following people. <p>
-
- P0E: hey babe! this act of terrorism is for you!
- keep up the great music, and feel free to
- write a song about me. :) <p>
-
- FBI: don't waste my tax dollars trying to track me.
- there are a lot more dangerous people out
- there you should be concentrating on. <p>
-
-
- on a separate tangent..<p>
-
- seems that since the late 50s, the government has been doing
- its best to keep young citizens from exploring their full
- potential. rather than look at what they do and use it as
- a template for fixing problems, they would rather put all of
- their energy into jailing those that explore. it started
- with "beatniks", moved to "radicals", and has landed on
- "hackers" <p>.
-
- people like me point out problems in the system. wether it is
- the social system or computer system, it ends up with the same
- result. instead of responsible parties fixing the problem,
- they are much too intent upon trying to place blame on the
- people that found the problem. don't make excuses, fix
- the problem. <p>
-
- one last thing before we move on. so many articles today say
- something along the lines of "the average person is vulnerable
- to these evil terrorists". wrong isn't quite the word for
- it. yes, everyone can be a victim, but why? don't even
- presume you are important enough to occupy my time or anyone
- elses for that matter. as usual, there are always bigger and
- better fish to fry out there, why stop on the first step of the
- ladder? <p>
-
-
- on to the bombs... <p>
-
- 76042.3624@compuserve.com Netta Gilboa
- what does it take to make you realize you are not part
- of the scene, and that we don't want you in it? all you
- do is cry about the injustices committed against you,
- but you won't take the hint and go away. <p>
-
-
- askbill@microsoft.com bill gates <p>
- you still suck.<p>
-
-
- bb748@FreeNet.Carleton.CA neo-nazi recruiter <p>
- misfitx@gnn.com <p>
- micetrap@cyberenet.net <p>
- the net is not a place to recruit more neo-nazi chimps. <p>
-
-
- cmeinel@swcp.com carolyn meinel <p>
- your happy hacker mail list is demented. you are trying
- to get those people busted, aren't you? you give them
- enough rope for them to hang themselves with, and then
- try to preach about not using the information. give up. <p>
-
-
- crunch@well.com john draper <p>
- shouldn't have tried to narc me to the feds. and you
- definitely shouldn't have bragged about doing so. <p>
-
-
- feedback@mtv.com mtv <p>
- loveline3@aol.com <p>
- minutes120@aol.com <p>
- mtvnews@aol.com <p>
- yomail96@aol.com <p>
- you still censor your videos. when will you realize the
- hypocrisy of your actions? you talk about freedom of
- speech, but don't practice it. <p>
-
-
- grossa@sdsc.edu helped track mitnick <p>
- mis@seiden.com <p>
- each of you helped track down kevin mitnick. in the
- process, you helped another felon gain public acceptance
- creating a double standard. you should have been going
- after the real crook: tsutomu <p>
-
-
- hud@netcom.com Co$ Supporter or Member <p>
- jaarobin@aol.com <p>
- koreenb@jovanet.com <p>
- vjohnson@psyber.com <p>
- the cult of scientology needs to be shut down. it is a
- criminal organization and should be treated as such. <p>
-
-
- jms@opus1.com joel snyder <p>
- your last article in 'internet world' places all the
- blame of my actions on an innocent person. needless
- to say, you were wrong. quality journalism is what
- you should strive for. <p>
-
-
- neubart@iw.com editor of joel's article <p>
- unremorseful bastard. you put someone else through a
- lot of shit over my actions, and didn't have the balls
- to apologize for it? <p>
-
-
- kkk@members.iglou.com kkk <p>
- have a warm feeling knowing a nice white boy did this
- to you. <p>
-
-
- root@duke.org david duke <p>
- politics are fucked up already. no need to drag even
- more fucked up individuals into the fray. <p>
-
-
- toddpeak@usa.net todd stauffer <p>
- don't write about the internet until you actually know
- what it is. you are way too sheltered to make such
- naive statements about the net. <p>
-
-
- root@cbn.org pat robertson <p>
- abradshaw@graham-assn.org billy graham <p>
- "doing my part to piss off the religious right" <p>
-
-
- root@buchanan.org pat buchanan <p>
- what part of "seperation between church and state" is
- so hard to understand? changing the names of the days
- is just about the most fanatical thing i have heard in
- my life. <p>
-
-
- once again, the internet can not be controlled by a single
- body. the religious fanatics fall into that category. as
- long as you try to control the net, people will slip
- through your fingers. the tighter your control, the more that
- slip through. i am one of many.. <p>
-
-
- angry johnny<p>
-
- ------------------------------
-
- Date: Sat, 28 Dec 1996 18:14:57 -0800
- From: Rich Burroughs <richieb@teleport.com>
- Subject: File 4--Kevin Mitnick placed in solitary
-
- Source - fight-censorship@vorlon.mit.edu
-
- More on Kevin Mitnick.
-
- http://cause-for-alarm.com/flash/mitnick.html
-
- >>>>>>>>>
-
- [updated Saturday, 28-Dec-96 17:48:32 PST]
-
- Kevin Mitnick was placed in solitary confinement
- yesterday for possessing reading materials related to
- hacking. Mitnick, whose hacking exploits and capture
- generated a media frenzy, is currently being held in the
- Metropolitan Detention Center in Los Angeles. This is
- not the first time he has been placed in solitary there.
-
- I first learned of Mitnick's move to solitary through
- the following email, sent by Fernanda Serpa:
-
- "URGENT!!!
-
- KEVIN MITNICK WAS PLACED UNDER SOLITARY CONFINEMENT
- TODAY, DECEMBER 27 TH, AT 1.00 PM, ON THE GROUNDS OF
- BEING A SECURITY RISK, DUE TO HIS READING LEGAL BOOKED
- IN THE LIBRARY. IT IS OBVIOUS THAT HE WAS EXERCISING HIS
- RIGHTS. WE ARE AFRAID THAT THE SANE THING THAT HAPPENED
- IN NORTH CAROLINA IS HAPPENING AGAIN WHEN KEVIN WAS
- PLACED IN SOLITARY CONFINEMENT FOR 7 DAYS AND HAD TO
- WAYVE HIS LEGAL RIGHTS IN ORDER TO BE RELEASED. WE KNOW
- THAT THE ONLY WAY FBI IS ABLE TO PRESSURE KEVIN IS
- TROUGH SOLITARY CONFINEMENT. PLEASE, DO SOMETHING AND
- INFORM THE PRESS URGENTLY ABOUT THIS SITUATION. WE ARE
- DOING OUR BEST HERE.
-
- FERNANDA SERPA
- SUPPORT KEVIN CAMPAIGN"
-
- Serpa, who maintains a web site supporting Mitnick,
- further wrote me that "We do not have details about
- yesterday's events concerning Kevin Mitnick..... His
- cell was searched, and his personal belongings were
- seized. MDC does not release any information
- whatsoever.... Due to the case backgrounds, we are
- concerned about Kevin's life and physical integrity."
-
- Since receiving Serpa's email, I have confirmed the
- story with a source who is knowledgeable about the
- details of Mitnick's incarceration.
-
- According to my source, Mitnick's additional punishment
- came after a search of his cell revealed written
- materials related to hacking, including back issues of
- 2600 magazine. The magazines were allegedly sent to
- Mitnick by Emmanuel Goldstein, editor of 2600. Prisoners
- are able to receive written materials if they are sent
- directly from the publisher, and those materials are
- routinely searched.
-
- The reason the authorities gave for Mitnick's isolation?
- He's a "security risk."
-
- This latest twist in Mitnick's case begs several
- questions: Why is Mitnick being punished for possessing
- materials that he received through legitimate prison
- channels? How can he possibly be a "security risk" when
- he has no access to computers, and can't even use a
- phone for anything but collect, operator-assisted calls?
- Why place a prisoner in solitary confinement for their
- choice of reading materials? And how much did Markoff
- and Shimomura really make off of Mitnick's bust?
-
- Ironically, several recent issues of 2600 covered the
- imprisonment of Ed Cummings (aka Bernie S), a 2600
- writer who was convicted of possessing a red box and
- software capable of cloning cell phones. Cummings, who
- was subjected to inhumane prison conditions, was
- attacked by another inmate after being transferred to a
- maximum security facility for "protective custody." He
- received a fractured jaw and arm in the incident, and
- was released soon after due to a grassroots protest
- campaign. Cummings served about a year and a half in
- jail.
-
- Maybe Mitnick was reading 2600 to catch up on Cummings'
- case, or maybe he was reading about how to do a SYN
- flood, who knows? Either way, he wasn't going to be able
- to do much with the information while behind bars.
-
- I'll try to pass on more news about Mitnick's situation,
- as it becomes available. Check back here for updates.
-
- >>>>>>>>
-
- Serpa's site is at: http://www.netmarket.com.br/mitnick
- Kevin's defense fund is at: http://www.kevinmitnick.com/
-
-
- Rich
-
- --
- Rich Burroughs, rich@cause-for-alarm.com
- Editor and Publisher, cause for alarm
- A web zine about electronic freedoms
- http://cause-for-alarm.com/
-
- ------------------------------
-
- Date: Thu, 15 Dec 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 5--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.93
- ************************************
-
-
-