home *** CD-ROM | disk | FTP | other *** search
- _______________________________________________________________________________
-
- ==Phrack Inc.==
-
- Volume Four, Issue Forty, File 13 of 14
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN PWN
- PWN Phrack World News PWN
- PWN PWN
- PWN Issue 40 / Part 2 of 3 PWN
- PWN PWN
- PWN Compiled by Datastream Cowboy PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- MOD Indicted July 8, 1992
- ~~~~~~~~~~~~
- Taken from U.S. Newswire
-
- The following is the press release issued by the United States Attorney's
- Office in the Southern District of New York.
-
- Group of "Computer Hackers" Indicted
- First Use of Wiretaps in Such a Case
-
- NEW YORK -- A group of five "computer hackers" has been indicted on charges of
- computer tampering, computer fraud, wire fraud, illegal wiretapping, and
- conspiracy, by a federal grand jury in Manhattan, resulting from the first
- investigative use of court-authorized wiretaps to obtain conversations and data
- transmissions of computer hackers.
-
- A computer hacker is someone who uses a computer or a telephone to obtain
- unauthorized access to other computers.
-
- The indictment, which was filed today, alleges that Julio Fernandez, a/k/a
- "Outlaw," John Lee, a/k/a "Corrupt," Mark Abene, a/k/a "Phiber Optik," Elias
- Ladopoulos, a/k/a "Acid Phreak," and Paul Stira, a/k/a "Scorpion," infiltrated
- a wide variety of computer systems, including systems operated by telephone
- companies, credit reporting services, and educational institutions.
-
- According to Otto G. Obermaier, United States Attorney for the Southern
- District of New York, James E. Heavey, special agent in charge, New York Field
- Division, United States Secret Service, William Y. Doran, special agent in
- charge, Criminal Division, New York Field Division, Federal Bureau of
- Investigation, and Scott Charney, chief of the Computer Crime Unit of the
- Department of Justice, the indictment charges that the defendants were part of
- a closely knit group of computer hackers self-styled "MOD," an acronym used
- variously for "Masters of Disaster" and "Masters of Deception" among other
- things.
-
- The indictment alleges that the defendants broke into computers "to enhance
- their image and prestige among other computer hackers; to harass and intimidate
- rival hackers and other people they did not like; to obtain telephone, credit,
- information and other services without paying for them; and to obtain
- passwords, account numbers and other things of value which they could sell to
- others."
-
- The defendants are also alleged to have used unauthorized passwords and billing
- codes to make long distance telephone calls and to be able to communicate with
- other computers for free.
-
- Some of the computers that the defendants allegedly broke into were telephone
- switching computers operated by Southwestern Bell, New York Telephone, Pacific
- Bell, U.S. West and Martin Marietta Electronics Information and Missile Group.
- According to the indictment, such switching computers each control telephone
- service for tens of thousands of telephone lines.
-
- In some instances, the defendants allegedly tampered with the computers by
- adding and altering calling features. In some cases, the defendants allegedly
- call forwarded local numbers to long distance numbers and thereby obtained long
- distance services for the price of a local call. Southwestern Bell is alleged
- to have incurred losses of approximately $370,000 in 1991 as a result of
- computer tampering by defendants Fernandez, Lee, and Abene.
-
- The indictment also alleges that the defendants gained access to computers
- operated by BT North America, a company that operates the Tymnet data transfer
- network. The defendants were allegedly able to use their access to Tymnet
- computers to intercept data communications while being transmitted through the
- network, including computer passwords of Tymnet employees. On one occasion,
- Fernandez and Lee allegedly intercepted data communications on a network
- operated by the Bank of America.
-
- The charges also allege that the defendants gained access to credit and
- information services including TRW, Trans Union and Information America. The
- defendants allegedly were able to obtain personal information on people
- including credit reports, telephone numbers, addresses, neighbor listings and
- social security numbers by virtue of their access to these services. On one
- occasion Lee and another member of the group are alleged to have discussed
- obtaining information from another hacker that would allow them to alter credit
- reports on TRW. As quoted in the indictment, Lee said that the information he
- wanted would permit them "to destroy people's lives... or make them look like
- saints."
-
- The indictment further charges that in November 1991, Fernandez and Lee sold
- information to Morton Rosenfeld concerning how to access credit services. The
- indictment further alleges that Fernandez later provided Rosenfeld's associates
- with a TRW account number and password that Rosenfeld and his associates used
- to obtain approximately 176 TRW credit reports on various individuals. (In a
- separate but related court action, Rosenfeld pleaded guilty to conspiracy to
- use and traffic in account numbers of TRW. See below).
-
- According to Stephen Fishbein, the assistant United States attorney in charge
- of the prosecution, the indictment also alleges that members of MOD wiped out
- almost all of the information contained within the Learning Link computer
- operated by the Educational Broadcasting Corp. (WNET Channel 13) in New York
- City. The Learning Link computer provided educational and instructional
- information to hundreds of schools and teachers in New York, New Jersey and
- Connecticut. Specifically, the indictment charges that on November 28, 1989,
- the information on the Learning Link was destroyed and a message was left on
- the computer that said: "Happy Thanksgiving you turkeys, from all of us at MOD"
- and which was signed with the aliases "Acid Phreak," "Phiber Optik," and
- "Scorpion." During an NBC News broadcast on November 14, 1990, two computer
- hackers identified only by the aliases "Acid Phreak" and "Phiber Optik" took
- responsibility for sending the "Happy Thanksgiving" message.
-
- Obermaier stated that the charges filed today resulted from a joint
- investigation by the United States Secret Service and the Federal Bureau of
- Investigation. "This is the first federal investigation ever to use court-
- authorized wiretaps to obtain conversations and data transmissions of computer
- hackers," said Obermaier. He praised both the Secret Service and the FBI for
- their extensive efforts in this case. Obermaier also thanked the Department of
- Justice Computer Crime Unit for their important assistance in the
- investigation. Additionally, Obermaier thanked the companies and institutions
- whose computer systems were affected by the defendants' activities, all of whom
- cooperated fully in the investigation.
-
- Fernandez, age 18, resides at 3448 Steenwick Avenue, Bronx, New York. Lee
- (also known as John Farrington), age 21, resides at 64A Kosciusco Street,
- Brooklyn, New York. Abene, age 20, resides at 94-42 Alstyne Avenue, Queens,
- New York. Elias Ladopoulos, age 22, resides at 85-21 159th Street, Queens, New
- York. Paul Stira, age 22, resides at 114-90 227th Street, Queens, New York.
- The defendants' arraignment has been scheduled for July 16, at 10 AM in
- Manhattan federal court.
-
- The charges contained in the indictment are accusations only and the defendants
- are presumed innocent unless and until proven guilty. Fishbein stated that if
- convicted, each of the defendants may be sentenced to a maximum of five years
- imprisonment on the conspiracy count. Each of the additional counts also
- carries a maximum of five years imprisonment, except for the count charging
- Fernandez with possession of access devices, which carries a maximum of ten
- years imprisonment. Additionally, each of the counts carries a maximum fine of
- the greater of $250,000, or twice the gross gain or loss incurred.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- In separate but related court actions, it was announced that Rosenfeld and
- Alfredo De La Fe [aka Renegade Hacker] have each pleaded guilty in Manhattan
- Federal District Court to conspiracy to use and to traffic in unauthorized
- access devices in connection with activities that also involved members of MOD.
-
- Rosenfeld pled guilty on June 24 before Shirley Wohl Kram, United States
- District Judge. At his guilty plea, Rosenfeld admitted that he purchased
- account numbers and passwords for TRW and other credit reporting services from
- computer hackers and then used the information to obtain credit reports, credit
- card numbers, social security numbers and other personal information which he
- sold to private investigators. Rosenfeld added in his guilty plea that on or
- about November 25, 1991, he purchased information from persons named "Julio"
- and "John" concerning how to obtain unauthorized access to credit services.
- Rosenfeld stated that he and his associates later obtained additional
- information from "Julio" which they used to pull numerous credit reports.
- According to the information to which Rosenfeld pleaded guilty, he had
- approximately 176 TRW credit reports at his residence on December 6, 1991.
-
- De La Fe pled guilty on June 19 before Kenneth Conboy, United States District
- Judge. At his guilty plea, De La Fe stated that he used and sold telephone
- numbers and codes for Private Branch Exchanges ("PBXs"). According to the
- information to which De La Fe pleaded guilty, a PBX is a privately operated
- computerized telephone system that routes calls, handles billing, and in some
- cases permits persons calling into the PBX to obtain outdial services by
- entering a code. De La Fe admitted that he sold PBX numbers belonging to Bugle
- Boy Industries and others to a co-conspirator who used the numbers in a call
- sell operation, in which the co-conspirator charged others to make long
- distance telephone calls using the PBX numbers. De La Fe further admitted that
- he and his associates used the PBX numbers to obtain free long distance
- services for themselves. De La Fe said that one of the people with whom he
- frequently made free long distance conference calls was a person named John
- Farrington, who he also knew as "Corrupt."
-
- Rosenfeld, age 21, resides at 2161 Bedford Avenue, Brooklyn, N.Y. Alfredo De La
- Fe, age 18, resides at 17 West 90th Street, N.Y. Rosenfeld and De La Fe each
- face maximum sentences of five years, imprisonment and maximum fines of the
- greater of $250,000, or twice the gross gain or loss incurred. Both defendants
- have been released pending sentence on $20,000 appearance bonds. Rosenfeld's
- sentencing is scheduled for September 9, before Shirley Wohl Kram. De La Fe's
- sentencing is scheduled for August 31, before Conboy.
-
- -----
-
- Contacts:
-
- Federico E. Virella Jr., 212-791-1955, U.S. Attorney's Office, S. N.Y.
- Stephen Fishbein, 212-791-1978, U.S. Attorney's Office, S. N.Y.
- Betty Conkling, 212-466-4400, U.S. Secret Service
- Joseph Valiquette Jr., 212-335-2715, Federal Bureau of Investigation
-
- Editor's Note: The full 23 page indictment can be found in Computer
- Underground Digest (CUD), issue 4.31 (available at ftp.eff.org
- /pub/cud/cud).
- _______________________________________________________________________________
-
- EFF Issues Statement On New York Computer Crime Indictments July 9, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Cambridge, MA -- The Electronic Frontier Foundation (EFF) issued a statement
- concerning the indictment of MOD for alleged computer-related crimes.
-
- This statement said, in part, that EFF's "staff counsel in Cambridge, Mike
- Godwin is carefully reviewing the indictment."
-
- EFF co-founder and president Mitchell Kapor said "EFF's position on
- unauthorized access to computer systems is, and has always been, that it is
- wrong. Nevertheless, we have on previous occasions discovered that allegations
- contained in Federal indictments can also be wrong, and that civil liberties
- can be easily infringed in the information age. Because of this, we will be
- examining this case closely to establish the facts."
-
- When asked how long the complete trial process might take, assistant U.S.
- attorney Fishbein said "I really couldn't make an accurate estimate. The
- length of time period before trial is generally more a function of the
- defense's actions than the prosecution's. It could take anywhere from six
- months to a year.
- _______________________________________________________________________________
-
- Feds Tap Into Major Hacker Ring July 13, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Mary E. Thyfault (InformationWeek)(Page 15)
-
- Law enforcement officials are taking the gloves off-and plugging their modems
- in-in the battle against computer crime.
-
- In one of the largest such cases ever, a federal grand jury in Manhattan
- indicted five computer "hackers" -- part of a group that calls itself MOD, for
- Masters of Deception -- on charges of computer tampering, computer fraud, wire
- fraud, illegal wiretapping, and conspiracy.
-
- Some of the hackers are accused of stealing phone service and selling
- information on how to obtain credit reports. The victims (a dozen were named
- in the indictments, but numerous others are likely to have been hit as well)
- include three Baby Bells, numerous credit bureaus, and BankAmerica Corp.
-
- For the first time, investigators used court-authorized wiretaps to monitor
- data transmissions over phone lines. The wiretapping comes as the FBI is
- unsuccessfully lobbying Congress to mandate that telecom equipment and service
- companies build into new technology easier ways for securities agencies to tap
- into computer systems.
-
- Ironically, the success of this wiretap, some say, may undermine the FBI's
- argument. "They did this without the equipment they claim they need," says
- Craig Neidorf, founder of hacker newsletter Phrack.
-
- If convicted, the alleged hackers-all of whom are under 22 years old-could face
- 55 years each and a fine of $250,000, or twice the gross gain or loss incurred.
- One charged with possessing an access device could face an additional five
- years.
-
- The vulnerability of the victims' networks should be surprising, but experts
- say corporations continue to pay scant attention to security issues. For
- instance, despite the fact that the credit bureaus are frequent targets of
- hackers and claim to have made their networks more secure, in this case, most
- of the victims didn't even know they were being hit, according to the FBI.
-
- Two of the victims, value-added network service provider BT Tymnet and telco
- Southwestern Bell, both take credit for helping nab the hacker ring. "We
- played an instrumental role in first recognizing that they were there," says
- John Guinasso, director of global network security for Tymnet parent BT North
- America. "If you mess with our network and we catch you -- which we always do
- -- you will go down."
- _______________________________________________________________________________
-
- Second Thoughts On New York Computer Crime Indictments July 13, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By John F. McMullen (Newsbytes)
-
- NEW YORK -- On Wednesday, July 9th, I sat at a press briefing in New York
- City's Federal Court Building during which law enforcement officials presented
- details relating to the indictment of 5 young computer "hackers". In
- describing the alleged transgressions of the indicted, United States Assistant
- Attorney Stephen Fishbein wove a tale of a conspiracy in which members of an
- evil sounding group called the "Masters of Destruction" (MOD) attempted to
- wreck havoc with the telecommunications system of the country.
-
- The accused were charged with infiltrating computer systems belonging to
- telephone companies, credit bureaus, colleges and defense contractors --
- Southwestern Bell, BT North America, New York Telephone, ITT, Information
- America, TRW, Trans Union, Pacific Bell, the University of Washington, New York
- University, U.S. West, Learning Link, Tymnet and Martin Marietta Electronics
- Information and Missile Group. They were charged with causing injury to the
- telephone systems, charging long distance calls to the universities, copying
- private credit information and selling it to third parties -- a long list of
- heinous activities.
-
- The immediate reaction to the indictments were predictably knee-jerk. Those
- who support any so-called "hacker"-activities mocked the government and the
- charges that were presented, forgetting, it seems to me, that these charges are
- serious -- one of the accused could face up to 40 years in prison and $2
- million in fines; another -- 35 years in prison and $1.5 million in fines. In
- view of that possibility, it further seems to me that it is a wasteful
- diversion of effort to get all excited that the government insists on misusing
- the word "hacker" (The indictment defines computer hacker as "someone who uses
- a computer or a telephone to obtain unauthorized access to other computers.")
- or that the government used wiretapping evidence to obtain the indictment (I
- think that, for at least the time being that the wiretapping was carried out
- under a valid court order; if it were not, the defendants' attorneys will have
- a course of action).
-
- On the other hand, those who traditionally take the government and corporate
- line were publicly grateful that this threat to our communications life had
- been removed -- they do not in my judgement properly consider that some of
- these charges may have been ill-conceived and a result of political
- considerations.
-
- Both groups, I think, oversimplify and do not give proper consideration to the
- wide spectrum of issues raised by the indictment document. The issues range
- from a simple black-and-white case of fraudulently obtaining free telephone
- time to the much broader question of the appropriate interaction of technology
- and law enforcement.
-
- The most clear cut cases are the charges such as the ones which allege that two
- of the indicted, Julio Fernandez a/k/a "Outlaw" and John Lee a/k/a "Corrupt"
- fraudulently used the computers of New York University to avoid paying long
- distance charges for calls to computer systems in El Paso, Texas and Seattle,
- Washington. The individuals named either did or did not commit the acts
- alleged and, if it is proven that they did, they should receive the appropriate
- penalty (it may be argued that the 5 year, $250,000 fine maximum for each of
- the counts in this area is excessive, but that is a sentencing issue not an
- indictment issue).
-
- Other charges of this black-and-white are those that allege that Fernandez
- and/or Lee intercepted electronic communications over networks belonging to
- Tymnet and the Bank of America. Similarly, the charge that Fernandez, on
- December 4, 1991 possessed hundreds of user id's and passwords of Southwestern
- Bell, BT North America and TRW fits in the category of "either he did it or he
- didn't."
-
- A more troubling count is the charge that the indicted 5 were all part of a
- conspiracy to "gain access to and control of computer systems in order to
- enhance their image and prestige among other computer hackers; to harass
- and intimidate rival hackers and people they did not like; to obtain telephone,
- credit, information, and other services without paying for them; and to obtain
- passwords, account numbers and other things of value which they could sell to
- others."
-
- To support this allegation, the indictment lists 26, lettered A through Z,
- "Overt Acts" to support the conspiracy. While this section of the indictment
- lists numerous telephone calls between some of the individuals, it mentions
- the name Paul Stira a/k/a "Scorpion" only twice with both allegations dated
- "on or about" January 24, 1990, a full 16 months before the next chronological
- incident. Additionally, Stira is never mentioned as joining in any of the
- wiretapped conversation -- in fact, he is never mentioned again! I find it
- hard to believe that he could be considered, from these charges, to have
- engaged in a criminal conspiracy with any of the other defendants.
-
- Additionally, some of the allegations made under the conspiracy count seem
- disproportionate to some of the others. Mark Abene a/k/a "Phiber Optik" is of
- possessing proprietary technical manuals belonging to BT North America while it
- is charged that Lee and Fernandez, in exchange for several hundred dollars,
- provided both information on how to illegally access credit reporting bureaus
- and an actual TRW account and password to a person, Morton Rosenfeld, who later
- illegally accessed TRW, obtained credit reports on 176 individuals and sold the
- reports to private detective (Rosenfeld, indicted separately, pled guilty to
- obtaining and selling the credit reports and named "Julio" and "John" as those
- who provided him with the information). I did not see anywhere in the charges
- any indication that Abene, Stira or Elias Ladopoulos conspired with or likewise
- encouraged Lee or Fernandez to sell information involving the credit bureaus to
- a third party
-
- Another troubling point is the allegation that Fernandez, Lee, Abene and
- "others whom they aided and abetted" performed various computer activities
- "that caused losses to Southwestern Bell of approximately $370,000." The
- $370,000 figure, according to Assistant United States Attorney Stephen
- Fishbein, was developed by Southwestern Bell and is based on "expenses to
- locate and replace computer programs and other information that had been
- modified or otherwise corrupted, expenses to determine the source of the
- unauthorized intrusions, and expenses for new computers and security devices
- that were necessary to prevent continued unauthorized access by the defendants
- and others whom they aided and abetted."
-
- While there is precedent in assigning damages for such things as "expenses
- for new computers and security devices that were necessary to prevent continued
- unauthorized access by the defendants and others whom they aided and abetted."
- (the Riggs, Darden & Grant case in Atlanta found that the defendants were
- liable for such expenses), many feel that such action is totally wrong. If a
- person is found uninvited in someone's house, they are appropriately charged
- with unlawful entry, trespassing, burglary -- whatever the statute is for the
- transgression; he or she is, however, not charged with the cost of the
- installation of an alarm system or enhanced locks to insure that no other
- person unlawfully enters the house.
-
- When I discussed this point with a New York MIS manager, prone to take a strong
- anti-intruder position, he said that an outbreak of new crimes often results in
- the use of new technological devices such as the nationwide installation of
- metal detectors in airports in the 1970's. While he meant this as a
- justification for liability, the analogy seems rather to support the contrary
- position. Air line hijackers were prosecuted for all sorts of major crimes;
- they were, however, never made to pay for the installation of the metal
- detectors or absorb the salary of the additional air marshalls hired to combat
- hijacking.
-
- I think the airline analogy also brings out the point that one may both support
- justifiable penalties for proven crimes and oppose unreasonable ones -- too
- often, when discussing these issues, observers choose one valid position to the
- unnecessary exclusion of another valid one. There is nothing contradictory, in
- my view, to holding both that credit agencies must be required to provide the
- highest possible level of security for data they have collected AND that
- persons invading the credit data bases, no matter how secure they are, be held
- liable for their intrusions. We are long past accepting the rationale that the
- intruders "are showing how insecure these repositories of our information are."
- We all know that the lack of security is scandalous; this fact, however, does
- not excuse criminal behavior (and it should seem evident that the selling of
- electronic burglar tools so that someone may copy and sell credit reports is
- not a public service).
-
- The final point that requires serious scrutiny is the use of the indictment as
- a tool in the on-going political debate over the FBI Digital Telephony
- proposal. Announcing the indictments, Otto G. Obermaier, United States
- Attorney for the Southern District of New York, said that this investigation
- was "the first investigative use of court-authorized wiretaps to obtain
- conversations and data transmissions of computer hackers." He said that this
- procedure was essential to the investigation and that "It demonstrates, I
- think, the federal government's ability to deal with criminal conduct as it
- moves into new technological areas." He added that the interception of data
- was possible only because the material was in analog form and added "Most of
- the new technology is in digital form and there is a pending statute in
- Congress which seeks the support of telecommunications companies to allow the
- federal government, under court authorization, to intercept digital
- transmission. Many of you may have read the newspaper about the laser
- transmission which go through fiber optics as a method of the coming
- telecommunications method. The federal government needs the help of Congress
- and, indeed, the telecommunications companies to able to intercept digital
- communications."
-
- The FBI proposal has been strongly attacked by the American Civil Liberties
- Union (ACLU), the Electronic Frontier Foundation (EFF) and Computer
- Professionals for Social Responsibility (CPSR) as an attempt to
- institutionalize, for the first time, criminal investigations as a
- responsibility of the communications companies; a responsibility that they feel
- belongs solely to law-enforcement. Critics further claim that the proposal
- will impede the development of technology and cause developers to have to
- "dumb-down" their technologies to include the requested interception
- facilities. The FBI, on the other hand, maintains that the request is simply
- an attempt to maintain its present capabilities in the face of advancing
- technology.
-
- Whatever the merits of the FBI position, it seems that the indictments either
- would not have been made at this time or, at a minimum, would not have been
- done with such fanfare if it were not for the desire to attempt to drum up
- support for the pending legislation. The press conference was the biggest
- thing of this type since the May 1990 "Operation Sun Devil" press conference in
- Phoenix, Arizona and, while that conference, wowed us with charges of "hackers"
- endangering lives by disrupting hospital procedures and being engaged in a
- nationwide, 13 state conspiracy, this one told us about a bunch of New York
- kids supposedly engaged in petty theft, using university computers without
- authorization and performing a number of other acts referred to by Obermaier as
- "anti-social behavior" -- not quite as heady stuff!
-
- It is not to belittle these charges -- they are quite serious -- to question
- the fanfare. The conference was attended by a variety of high level Justice
- Department, FBI and Secret Service personnel and veteran New York City crime
- reporters tell me that the amount of alleged damages in this case would
- normally not call for such a production -- New York Daily News reporter Alex
- Michelini publicly told Obermaier "What you've outlined, basically, except for
- the sales of credit information, this sounds like a big prank, most of it"
- (Obermaier's response -- "Well, I suppose you can characterize that as a prank,
- but it's really a federal crime allowing people without authorization to
- rummage through the data of other people to which they do not have access and,
- as I point out to you again, the burglar cannot be your safety expert. He may
- be inside and laugh at you when you come home and say that your lock is not
- particularly good but I think you, if you were affected by that contact, would
- be somewhat miffed"). One hopes that it is only the fanfare surrounding the
- indictments that is tied in with the FBI initiative and not the indictments
- themselves.
-
- As an aside, two law enforcement people that I have spoken to have said that
- while the statement that the case is "the first investigative use of court-
- authorized wiretaps to obtain conversations and data transmissions of computer
- hackers," while probably true, seems to give the impression that the case is
- the first one in which data transmission was intercepted. According to these
- sources, that is far from the case -- there have been many instances of
- inception of data and fax information by law enforcement officials in recent
- years.
-
- I know each of the accused in varying degrees. The one that I know the best,
- Phiber Optik, has participated in panels with myself and law enforcement
- officials discussing issues relating to so-called "hacker" crime. He has also
- appeared on various radio and television shows discussing the same issues. His
- high profile activities have made him an annoyance to some in law enforcement.
- One hopes that this annoyance played no part in the indictment.
-
- I have found Phiber's presence extremely valuable in these discussions both for
- the content and for the fact that his very presence attracts an audience that
- might never otherwise get to hear the voices of Donald Delaney, Mike Godwin,
- Dorothy Denning and others addressing these issues from quite different vantage
- points. While he has, in these appearances, said that he has "taken chances to
- learn things", he has always denied that he has engaged in vandalous behavior
- and criticized those who do. He has also called those who engage in "carding"
- and the like as criminals (These statements have been made not only in the
- panel discussion, but also on the occasions that he has guest lectured to my
- class in "Connectivity" at the New School For Social Research in New York City.
- In those classes, he has discussed the history of telephone communications in a
- way that has held a class of professionals enthralled by over two hours.
-
- While my impressions of Phiber or any of the others are certainly not a
- guarantee of innocence on these charges, they should be taken as my personal
- statement that we are not dealing with a ring of hardened criminals that one
- would fear on a dark night.
-
- In summary, knee-jerk reactions should be out and thoughtful analysis in! We
- should be insisting on appropriate punishment for lawbreakers -- this means
- neither winking at "exploration" nor allowing inordinate punishment. We should
- be insisting that companies that have collected data about us properly protect
- -- and are liable for penalties when they do not. We should not be deflected
- from this analysis by support or opposition to the FBI proposal before Congress
- -- that requires separate analysis and has nothing to do with the guilt or
- innocence of these young men or the appropriate punishment should any guilt be
- established.
- _______________________________________________________________________________
-
- New York Hackers Plead Not Guilty July 17, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- New York City -- At an arraignment in New York Federal Court on Thursday, July
- 16th, the five New York "hackers," recently indicted on charges relating to
- alleged computer intrusion, all entered pleas of not guilty and were released
- after each signed a personal recognizance (PRB) bond of $15,000 to guarantee
- continued appearances in court.
-
- As part of the arraignment process, United States District Judge Richard Owen
- was assigned as the case's presiding judge and a pre-trial meeting between the
- judge and the parties involved.
-
- Charles Ross, attorney for John Lee, told Newsbytes "John Lee entered a not
- guilty plea and we intend to energetically and aggressively defend against the
- charges made against him."
-
- Ross also explained the procedures that will be in effect in the case, saying
- "We will meet with the judge and he will set a schedule for discovery and the
- filing of motions. The defense will have to review the evidence that the
- government has amassed before it can file intelligent motions and the first
- meeting is simply a scheduling one."
-
- Majorie Peerce, attorney for Stira, told Newsbytes "Mr. Stira has pleaded not
- guilty and will continue to plead not guilty. I am sorry to see the government
- indict a 22 year old college student for acts that he allegedly committed as a
- 19 year old."
-
- The terms of the PRB signed by the accused require them to remain within the
- continental United States. In requesting the bond arrangement, Assistant
- United States Attorney Stephen Fishbein referred to the allegations as serious
- and requested the $15,000 bond with the stipulation that the accused have their
- bonds co-signed by parents. Abene, Fernandez and Lee, through their attorneys,
- agreed to the bond as stipulated while the attorneys for Ladopoulos and Stira
- requested no bail or bond for their clients, citing the fact that their clients
- have been available, when requested by authorities, for over a year. After
- consideration by the judge, the same $15,000 bond was set for Ladopoulos and
- Stira but no co-signature was required.
- _______________________________________________________________________________
-
- Young Working-Class Hackers Accused of High-Tech Crime July 23, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Mary B.W. Tabor with Anthony Ramirez (The New York Times)(Page B1, B7)
-
- Computer Savvy, With an Attitude
-
- Late into the night, in working-class neighborhoods around New York City, young
- men with code names like Acid Phreak and Outlaw sat hunched before their
- glowing computer screens, exchanging electronic keys to complex data-processing
- systems. They called themselves the Masters of Deception. Their mission: to
- prove their prowess in the shadowy computer underworld.
-
- Compulsive and competitive, they played out a cybernetic version of "West Side
- Story," trading boasts, tapping into telephone systems, even pulling up
- confidential credit reports to prove their derring-do and taunt other hackers.
- Their frequent target was the Legion of Doom, a hacker group named after a
- gang of comic-book villains. The rivalry seemed to take on class and ethnic
- overtones, too, as the diverse New York group defied the traditional image of
- the young suburban computer whiz.
-
- But Federal prosecutors say the members of MOD, as the group called itself,
- went far beyond harmless pranks.
-
- Facing Federal Charges
-
- On July 16, five young men identified by prosecutors as MOD members pleaded not
- guilty to Federal charges including breaking into some of the nation's most
- powerful computers and stealing confidential data like credit reports, some of
- which were later sold to private investigators. Prosecutors call it one of the
- most extensive thefts of computer information ever reported.
-
- The indictment says the men entered the computer systems of Southwestern Bell,
- TRW Information Services and others "to enhance their image and prestige among
- other computer hackers; to harass and intimidate rival hackers and other people
- they did not like; to obtain telephone, credit, information and other services
- without paying for them; and to obtain passwords, account numbers and other
- things of value which they could sell to others."
-
- With modems that link their terminals to other computers over ordinary
- telephone lines, young hackers have been making mischief for years. But as the
- nation relies more and more on vast networks of powerful computers and as
- personal computers become faster and cheaper, the potential for trouble has
- soared. For example, Robert Tappan Morris, a Cornell student, unleashed a
- program in 1988 that jammed several thousand computers across the country.
-
- A Polyglot Group
-
- But the world of computer hackers has been changing. Unlike the typical
- hackers of old -- well-to-do suburban youths whose parents could afford costly
- equipment -- the Masters of Deception are a polyglot representation of blue-
- collar New York: black, Hispanic, Greek, Lithuanian and Italian. They work
- their mischief often using the least expensive computers.
-
- One of the young men, 21-year-old John Lee, who goes by the name Corrupt, has
- dreadlocks chopped back into stubby "twists," and lives with his mother in a
- dilapidated walk-up in Bedford-Stuyvesant, Brooklyn. He bounced around
- programs for gifted students before dropping out of school in the 11th grade.
- Scorpion -- 22-year-old Paul Stira of Queens -- was his class valedictorian at
- Thomas A. Edison High School in Queens. Outlaw -- Julio Fernandez, 18, of the
- Bronx -- first studied computers in grade school.
-
- They met not on street corners, but via computer bulletin boards used to swap
- messages and programs.
-
- With nothing to identify them on the boards except their nicknames and uncanny
- abilities, the young men found the computer the great democratic leveler.
-
- Questions of Profit
-
- There may be another difference in the new wave of hackers. While the
- traditional hacker ethic forbids cruising computer systems for profit, some new
- hackers are less idealistic. "People who say that," said one former hacker, a
- friend of the MOD who insisted on anonymity, "must have rich parents. When you
- get something of value, you've got to make money."
-
- Mr. Lee, Mr. Fernandez, Mr. Stira and two others described as MOD members --
- 20-year-old Mark Abene (Phiber Optik), and 22-year-old Elias Ladopoulos (Acid
- Phreak), both of Queens -- were charged with crimes including computer
- tampering, computer and wire fraud, illegal wiretapping and conspiracy. They
- face huge fines and up to five years in prison on each of 11 counts.
-
- The youths, on advice of their lawyers, declined to be interviewed.
-
- Prosecutors say they do not know just how and when youthful pranks turned to
- serious crime. Other hackers said the trouble began, perhaps innocently
- enough, as a computer war with ethnic and class overtones.
-
- The Masters of Deception were born in a conflict with the Legion of Doom, which
- had been formed by 1984 and ultimately included among its ranks three Texans,
- one of whom, Kenyon Shulman, is the son of a Houston socialite, Carolyn Farb.
-
- Banished From the Legion
-
- Mr. Abene had been voted into the Legion at one point. But when he began to
- annoy others in the group with his New York braggadocio and refusal to share
- information, he was banished, Legion members said.
-
- Meanwhile, a hacker using a computer party line based in Texas had insulted Mr.
- Lee, who is black, with a racial epithet.
-
- By 1989, both New Yorkers had turned to a new group, MOD, founded by Mr.
- Ladopoulos. They vowed to replace their Legion rivals as the "new elite."
-
- "It's like every other 18- or 19-year-old who walks around knowing he can do
- something better than anyone else can," said Michael Godwin, who knows several
- of the accused and is a lawyer for the Electronic Frontier Foundation of
- Cambridge, Massachusetts, which provides legal aid for hackers. "They are
- offensively arrogant."
-
- Hacker groups tend to rise and fall within six months or so as members leave
- for college, meet girls or, as one former hacker put it, "get a life." But the
- MOD continued to gather new members from monthly meetings in the atrium of the
- Citicorp Building in Manhattan and a computer bulletin board called Kaos.
- According to a history the group kept on the computer network, they enjoyed
- "mischievous pranks," often aimed at their Texas rivals, and the two groups
- began sparring.
-
- Texas-New York Sparring
-
- But in June 1990, the three Texas-based Legion members, including Mr. Shulman,
- Chris Goggans and Scott Chasin, formed Comsec Data Security, a business
- intended to help companies prevent break-ins by other hackers.
-
- Worried that the Texans were acting as police informers, the MOD members
- accused their rivals of defaming them on the network bulletin boards. Several
- members, including Mr. Abene, had become targets of raids by the Secret
- Service, and MOD members believed the Texans were responsible, a contention the
- Texans respond to with "no comment."
-
- But the sparring took on racial overtones as well. When Mr. Lee wrote a
- history of the MOD and left it in the network, Mr. Goggans rewrote it in a jive
- parody.
-
- The text that read, "In the early part of 1987, there were numerous amounts of
- busts in the U.S. and in New York in particular" became "In de early time part
- uh 1987, dere wuz numerous amounts uh busts in de U.S. and in New Yo'k in
- particular."
-
- Mr. Goggans said that it was not meant as a racist attack on Mr. Lee. "It was
- just a good way to get under his skin," he said.
-
- Exposing Identities
-
- MOD's activities, according to the indictment and other hackers, began to
- proliferate.
-
- Unlike most of the "old generation" of hackers who liked to joyride through the
- systems, the New Yorkers began using the file information to harass and
- intimidate others, according to prosecutors. Everything from home addresses to
- credit card numbers to places of employment to hackers' real names -- perhaps
- the biggest taboo of all -- hit the network.
-
- In the indictment, Mr. Lee and Mr. Fernandez are accused of having a
- conversation last fall in which they talked about getting information on how to
- alter TRW credit reports to "destroy people's lives or make them look like
- saints."
-
- The prosecutors say the youths also went after information they could sell,
- though the indictment is not specific about what, if anything, was sold. The
- only such information comes from another case earlier this month in which two
- other New York City hackers, Morton Rosenfeld, 21, of Brooklyn, and Alfredo de
- la Fe, 18, of Manhattan, pleaded guilty to a conspiracy to use passwords and
- other access devices obtained from MOD. They said they had paid "several
- hundred dollars" to the computer group for passwords to obtain credit reports
- and then resold the information for "several thousand dollars" to private
- investigators.
-
- News Media Attention
-
- Competition for attention from the news media also heated up. The former
- Legion members in Comsec had become media darlings, with articles about them
- appearing in Time and Newsweek. Mr. Abene and Mr. Ladopoulos also appeared on
- television or in magazines, proclaiming their right to probe computer systems,
- as long as they did no damage.
-
- In one highly publicized incident, during a 1989 forum on computers and privacy
- sponsored by Harper's magazine, John Perry Barlow, a freelance journalist and
- lyricist for the Grateful Dead, went head to head with Mr. Abene, or Phiber
- Optik. Mr. Barlow called the young hacker a "punk."
-
- According to an article by Mr. Barlow -- an account that Mr. Abene will not
- confirm or deny -- Mr. Abene then retaliated by "downloading" Mr. Barlow's
- credit history, displaying it on the computer screens of Mr. Barlow and other
- network users.
-
- Skirmishes Subside
-
- "I've been in redneck bars wearing shoulder-length curls, police custody while
- on acid, and Harlem after midnight, but no one has ever put the spook in me
- quite as Phiber Optik did at that moment," Mr. Barlow wrote. "To a middle-
- class American, one's credit rating has become nearly identical to his
- freedom."
-
- In recent months, hackers say, the war has calmed down. Comsec went out of
- business, and several Masters of Deception were left without computers after
- the Secret Service raids.
-
- Mr. Abene pleaded guilty last year to misdemeanor charges resulting from the
- raids. On the night before his arrest this month, he gave a guest lecture on
- computers at the New School for Social Research.
-
- Mr. Lee says he works part time as a stand-up comic and is enrolled at Brooklyn
- College studying film production.
-
- Mr. Stira is three credits shy of a degree in computer science at Polytechnic
- University in Brooklyn. Mr. Fernandez hopes to enroll this fall in the
- Technical Computer Institute in Manhattan. Mr. Ladopoulos is studying at
- Queens Community College.
-
- No trial date has been set.
-
- But the battles are apparently not over yet. A couple of days after the
- charges were handed up, one Legion member said, he received a message on his
- computer from Mr. Abene. It was sarcastic as usual, he said, and it closed,
- "Kissy, kissy."
-
- [Editor's Note: Article included photographs of Phiber Optik, Scorpion,
- Corrupt, and Outlaw.]
- _______________________________________________________________________________
-
- Frustrated Hackers May Have Helped Feds In MOD Sting July 20, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By James Daly (ComputerWorld)(Page 6)
-
- NEW YORK -- Are hackers beginning to police themselves? The five men recently
- charged with cracking into scores of complex computer systems during the last
- two years may have been fingered by other hackers who had grown weary of the
- group's penchant for destruction and vindictiveness, members of the hacker
- community said.
-
- The arrest of the defendants, whom federal law enforcement officials claimed
- were members of a confederation variously called the "Masters of Deception" and
- the "Masters of Disaster" (MOD), was cause for celebration in some quarters
- where the group is known as a spiteful fringe element.
-
- "Some of these guys were a big pain," said one source who requested anonymity
- for fear that unindicted MOD members would plot revenge. "They used their
- skills to harass others, which is not what hacking is all about. MOD came with
- a 'you will respect us' attitude, and no one liked it."
-
- Said another: "In the past few months, there has been a lot of muttering on the
- [bulletin] boards about these guys."
-
- In one episode, MOD members reportedly arranged for the modem of a computer at
- the University of Louisville in Kentucky to continually dial the home number of
- a hacker bulletin board member who refused to grant them greater access
- privileges. A similar threat was heard in Maryland.
-
- In the indictment, the defendants are accused of carrying on a conversation in
- early November 1991 in which they sought instructions on how to add and remove
- credit delinquency reports "to destroy people's lives . . . or make them look
- like a saint." Unlike many other hacker organizations, the members of MOD
- agreed to share important computer information only among themselves and not
- with other hackers.
-
- Officials Mum
-
- Who exactly helped the FBI, Secret Service and U.S. Attorney General's Office
- prepare a case against the group is still anyone's guess. Assistant U.S.
- Attorney Stephen Fishbein is not saying. He confirmed that the investigation
- into the MOD began in 1990, but he would not elaborate on how or why it was
- launched or who participated. FBI and Secret Service officials were equally
- mute.
-
-
- Some observers said that if the charges are true, the men were not true
- "hackers" at all.
-
- "Hacking is something done in the spirit of creative playfulness, and people
- who break into computer security systems aren't hackers -- they're criminals,"
- said Richard Stallman, president of the Cambridge, Massachusetts-based Free
- Software Foundation, a public charity that develops free software. The
- foundation had several files on one computer deleted by a hacker who some
- claimed belonged to the MOD.
-
- The MOD hackers are charged with breaking into computer systems at several
- regional telephone companies, Fortune 500 firms including Martin Marietta
- Corp., universities and credit-reporting concerns such as TRW, Inc., which
- reportedly had 176 consumer credit reports stolen and sold to private
- investigators. The 11-count indictment accuses the defendants of computer
- fraud, computer tampering, wire fraud, illegal wiretapping and conspiracy.
-
- But some hackers said the charges are like trying to killing ants with a
- sledgehammer. "These guys may have acted idiotically, but this was a stupid
- way to get back at them," said Emmanuel Goldstein, editor of 2600, a quarterly
- magazine for the hacker community based in Middle Island, New York.
-
- Longtime hackers said the MOD wanted to move into the vacuum left when the
- Legion of Doom began to disintegrate in late 1989 and early 1990 after a series
- of arrests in Atlanta and Texas. Federal law enforcement officials have
- described the Legion of Doom as a group of about 15 computer enthusiasts whose
- members re-routed calls, stole and altered data and disrupted telephone
- services.
- _______________________________________________________________________________
-