| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Issue XXXVII / Part One of Four PWN |
| PWN PWN |
| PWN Compiled by Dispater & Spirit Walker PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| Federal Seizure Of "Hacker" Equipment December 16, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Barbara E. McMullen & John F. McMullen (Newsbytes) |
|
|
| "New York's MOD Hackers Get Raided!" |
|
|
| NEW YORK CITY -- Newsbytes has learned that a joint Unites States Secret |
| Service / Federal Bureau of Investigation (FBI) team has executed search |
| warrants at the homes of so-called "hackers" at various locations across the |
| country and seized computer equipment. |
|
|
| It is Newsbytes information that warrants were executed on Friday, December 6th |
| in various places including New York City, Pennsylvania, and the state of |
| Washington. According to informed sources, the warrants were executed pursuant |
| to investigations of violations of Title 18 of the federal statutes, sections |
| 1029 (Access Device Fraud), 1030 (Computer Fraud and Abuse Act), 1343 (Wire |
| Fraud), and 2511 (Wiretapping). |
|
|
| Law enforcement officials contacted by Newsbytes, while acknowledging the |
| warrant execution, refused to comment on what was called "an on-going |
| investigation." One source told Newsbytes that the affidavits underlying the |
| search warrants have been sealed due to the on-going nature of the |
| investigation." |
|
|
| He added "There was obviously enough in the affidavits to convince judges that |
| there was probable cause that evidence of a crime would be found if the search |
| warrants were issued." |
|
|
| The source also said that he would expect a statement to be issued by the |
| Secret Service/FBI team "somewhere after the first of the year." |
| _______________________________________________________________________________ |
|
|
| Two Cornell Students Arrested for Spreading Computer Virus February 27, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Lee A Daniels (New York Times News Service) |
| Special Thanks: Risks Digest |
|
|
| Two Cornell University undergraduates were arrested Monday night and charged |
| with developing and spreading a computer virus that disrupted computers as far |
| away as California and Japan, Cornell officials said. M. Stewart Lynn, vice |
| president for information technologies at the university in Ithaca, N.Y., |
| identified the students as David Blumenthal and Mark Pilgrim. Lynn said that |
| both Blumenthal, who is in the engineering program, and Pilgrim, in the college |
| of arts and sciences, were 19-year-old sophomores. They were arrested on the |
| evening of February 24 by Cornell and Ithaca police officers. Lynn said the |
| students were arraigned in Ithaca City Court on charges of second-degree |
| computer tampering, a misdemeanor, and taken to the county jail. Lynn said |
| authorities believed that the two were responsible for a computer virus planted |
| in three Macintosh games on February 14. |
|
|
| He identified the games as Obnoxious Tetris, Tetricycle and Ten Tile Puzzle. |
| The virus may have first appeared in a Stanford University public computer |
| archive and spread from there through computer users who loaded the games into |
| their own computers. |
|
|
| Lynn said officials at Cornell and elsewhere became aware of the virus last |
| week and quickly developed what he described as "disinfectant" software to |
| eradicate it. He said officials traced the virus to Cornell last week, but he |
| would not specify how that was done or what led officials to the two students. |
| Lynn said he did not yet know how much damage the virus had caused. "At |
| Cornell we absolutely deplore this kind of behavior," he said. |
|
|
| Note: References to the Robert Morris, Jr. virus incident at Cornell deleted. |
| Associated Press reported that both defendants are being held in the |
| Tompkins County Jail on $10,000 bail. |
| _______________________________________________________________________________ |
|
|
| Man Admits to NASA Hacking November 26, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By John C Ensslin (Rocky Mountain News)(Page 6) |
| Also see Phrack 34, File 11 |
| Special Thanks: The Public |
|
|
| A self-taught computer hacker with a high school education admitted Monday to |
| breaking into a sensitive NASA computer system -- in less time than it takes |
| the Broncos to play a football game. |
|
|
| Richard G. Wittman Jr., 24, told Denver U.S. District Judge Sherman Finesilver |
| that it took him about "1 1/2 to 2 hours" on a personal computer using |
| telephone lines in his apartment to tap into the space agency's restricted |
| files. |
|
|
| Wittman pleaded guilty Monday to one felony count of altering information |
| -- a password -- inside a federal computer. In exchange for the plea, federal |
| prosecutors dropped six similar counts in indictments handed up in September. |
|
|
| The Northglenn High School graduate told the judge he hadn't had much schooling |
| in computers. Most of what he knew about computers he learned from books. |
| And most of those books, he said, are in a federal warehouse, seized after FBI |
| agents searched his Westminster apartment last year. |
|
|
| "Do you think you could teach these two lawyers about computers?" Finesilver |
| asked, referring to Wittman's public defender and the prosecutor. "Probably," |
| Wittman replied. |
|
|
| Wittman not only broke into 118 NASA systems, he also reviewed files and |
| electronic mail of other users, said assistant U.S. attorney Gregory C. Graf. |
|
|
| It took NASA investigators nearly 300 hours to track Wittman an another 100 |
| hours to rewrite the software, Graf said. |
|
|
| Wittman faces up to five years in prison and a $250,000 fine. But Graf said |
| the government will seek a much lighter penalty when Wittman is sentenced in |
| Jan. 13. |
|
|
| Both sides have agreed on repayment of $1,100 in collect calls placed to the |
| other computer system. But they differ on whether Wittman should be held |
| responsible for the cost of new software. |
| _______________________________________________________________________________ |
|
|
| Hacker Pleads Guilty December 5, 1991 |
| ~~~~~~~~~~~~~~~~~~~~ |
| Special Thanks: Iron Eagle |
|
|
| "A 24-year-old Denver hacker who admitted breaking into a sensitive NASA |
| computer system pleaded guilty to a felony count of altering information. |
|
|
| In exchange for the plea Monday, federal prosecutors dropped six similar counts |
| against Richard G. Wittman Jr., who faced up to five years in prison and a |
| $250,000 fine. Authorities said the government will seek a much lighter |
| penalty when Wittman is sentenced January 13. |
|
|
| Both sides have agreed on repayment of $1,100 in collect calls he placed to the |
| computer system, but they differ on whether Wittman should be held responsible |
| for the cost of new software. |
|
|
| Wittman told U.S. District Judge Sherman Finesilver that it took him about two |
| hours on a personal computer in his apartment to tap into the space agency's |
| restricted files. It took NASA investigators nearly 300 hours to track Wittman |
| and an additional 100 hours to rewrite the software to prevent a recurrence, |
| prosecutors said." |
| _______________________________________________________________________________ |
|
|
| Recent Novell Software Contains A Hidden Virus December 20, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By John Markoff (New York Times) |
|
|
| The nation's largest supplier of office-network software for personal computers |
| has sent a letter to approximately 3,800 customers warning that it |
| inadvertently allowed a software virus to invade copies of a disk shipped |
| earlier this month. |
|
|
| The letter, sent on Wednesday to customers of Novell Inc., a Provo, Utah, |
| software publisher, said the diskette, which was mailed on December 11, had |
| been accidentally infected with a virus known by computer experts as "Stoned |
| 111." |
|
|
| A company official said yesterday that Novell had received a number of reports |
| >from customers that the virus had invaded their systems, although there had |
| been no reports of damage. |
|
|
| But a California-based computer virus expert said that the potential for damage |
| was significant and that the virus on the Novell diskette frequently disabled |
| computers that it infected. |
|
|
| MASSIVE POTENTIAL LIABILITIES |
|
|
| "If this was to get into an organization and spread to 1,500 to 2,000 machines, |
| you are looking at millions of dollars of cleanup costs," said John McAfee, |
| president of McAfee & Associates, a Santa Clara, Calif. antivirus consulting |
| firm. "It doesn't matter that only a few are infected," he said. "You can't |
| tell. You have to take the network down and there are massive potential |
| liabilities." Mr. McAfee said he had received several dozen calls from Novell |
| users, some of whom were outraged. |
|
|
| The Novell incident is the second such case this month. On December 6, Konami |
| Inc., a software game manufacturer based in Buffalo Grove, 111.wrote customers |
| that disks of its Spacewrecked game had also become infected with an earlier |
| version of the Stoned virus. The company said in the letter that it had |
| identified the virus before a large volume of disks had been shipped to |
| dealers. |
|
|
| SOURCE OF VIRUS UNKNOWN |
|
|
| Novell officials said that after the company began getting calls earlier this |
| week, they traced the source of the infection to a particular part of their |
| manufacturing process. But the officials said they had not been able to |
| determine how the virus had infected their software initially. |
|
|
| Novell's customers include some of nation's largest corporations. The |
| software, called Netware, controls office networks ranging from just two or |
| three machines to a thousand systems. |
|
|
| "Viruses are a challenge for the marketplace," said John Edwards, director of |
| marketing for Netware systems at Novell. "But we'll keep up our vigilance. He |
| said the virus had attacked a disk that contained a help encyclopedia that the |
| company had distributed to its customers. |
|
|
| SERVERS SAID TO BE UNAFFECTED |
|
|
| Computer viruses are small programs that are passed from computer to computer |
| by secretly attaching themselves to data files that are then copied either by |
| diskette or via a computer network. The programs can be written to perform |
| malicious tasks after infecting a new computer, or do no more than copy |
| themselves from machine to machine. |
|
|
| In its letter to customers the company said that the Stoned 111 virus would not |
| spread over computer networks to infect the file servers that are the |
| foundation of networks. File servers are special computers with large disks |
| that store and distribute data to a network of desktop computers. |
|
|
| The Stoned 111 virus works by attaching itself to a special area on a floppy |
| diskette and then copying itself into the computer's memory to infect other |
| diskettes. |
|
|
| But Mr. McAfee said the program also copied itself to the hard disk of a |
| computer where it could occasionally disable a system. In this case it is |
| possible to lose data if the virus writes information over the area where a |
| special directory is stored. |
|
|
| Mr. McAfee said that the Stoned 111 virus had first been reported in Europe |
| just three months ago. The new virus is representative of a class of programs |
| known as "stealth" viruses, because they mask their location and are difficult |
| to identify. Mr. McAfee speculated that this was why the program had escaped |
| detection by the company. |
|
|
| STEPS TOWARD DETECTION |
|
|
| Novell has been moving toward adding new technology to its software to make it |
| more difficult for viruses to invade it, Mr. Edwards said. Recently, the |
| company licensed special digital-signature software that makes it difficult for |
| viruses to spread undetected. Novell plans to add this new technology to the |
| next major release of its software, due out at the end of 1992. |
|
|
| In the past, courts have generally not held companies liable for damages in |
| cases where a third party is responsible, said Susan Nycum, a Palo Alto, |
| California, lawyer who is an expert on computer issues. "If they have been |
| prudent it wouldn't be fair to hold them liable," she said. "But ultimately it |
| may be a question for a jury." |
| _______________________________________________________________________________ |
|
|
| Working Assets Long Distance! January 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Taken from an advertisement in Mother Jones |
|
|
| (Not pictured is a photo of a college student giving "the finger" to someone |
| and a caption that reads 'Twenty years later, we've given people a better way |
| to put this finger to use.') |
|
|
| The advertisement reads as follows: |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Sit-ins. Protest marches, Flower power. Times have changed but the need for |
| grass roots involvement hasn't. |
|
|
| Introducing "Working Assets Long Distance." The ONLY phone company that is |
| as committed to social and political change as you are. Every time you use |
| your finger to make a long distance call, one percent of the bill goes to |
| non-profit action groups at no cost to you. Hard-hitting advocacy groups like |
| AMNESTY INTERNATIONAL, GREENPEACE, PLANNED PARENTHOOD, FEDERATION OF AMERICA, |
| THE AMERICAN CIVIL LIBERTIES UNION, and many others. |
|
|
| We're more than a phone company that gives money to good causes. Our intent |
| is to make your individual voice heard. That's why we offer *FREE CALLS* to |
| corporate and political leaders. And well-argued letters at a fraction of |
| the cost of a mail-gram. So you can demand a halt to clear-cutting our |
| ancient forests or let Senators know how you feel about important issues like |
| reproductive rights. It's that simple. Your phone becomes a tool for |
| democracy and you don't give up a thing. You see, Working Assets comes with |
| the exact same service as the major long distance carriers. Convenient |
| dial 1 calling 24-hour operation and fiber optic sound quality. All this at |
| rates lower that AT&T's basic rates. And signing up couldn't be simpler. |
|
|
| Just give us a call at 1-800-788-8588 ext 114 or fill out the coupon today. |
| We'll hook you up right away without any intrusion or interruption. So you |
| can help change the world without lifting a finger. Ok, maybe one finger. |
| _______________________________________________________________________________ |
|
|
| Computer Virus Used in Gulf War January 12, 1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Taken from The Boston Globe (Page 12) |
| Special Thanks: Tone Surfer |
|
|
| Several weeks before the start of the Gulf War, US intelligence agents inserted |
| a computer virus into a network of Iraqi computers tied to that country's air |
| defense system, a news magazine reports. US News and World Report said the |
| virus was designed by the supersecret National Security Agency at Fort Meade, |
| Maryland, and was intended to disable a mainframe computer. |
|
|
| The report, citing two unidentified senior US officials, said the virus |
| appeared to have worked, but it gave no details. It said the operation may |
| have been irrelevant, though, since the allies' overwhelming air superiority |
| would have ensured the same results of rendering the air defense radars and |
| missiles ineffective. The secret operation began when American intelligence |
| agents identified a French made computer printer that was to be smuggled from |
| Amman, Jordan, to a military facility in Baghdad. |
|
|
| The agents in Amman replaced a computer chip in the printer with another |
| micro-chip that contained the virus in its electronic circuits. By attacking |
| the Iraqi computer through the printer, the virus was able to avoid detection |
| by normal electronic security procedures, the report said. "Once the virus was |
| in the system, the US officials explained, each time an Iraqi technician opened |
| a "window" on his computer screen to access information, the contents of the |
| screen simply vanished," US News reported. |
|
|
| The report is part of a book, based on 12 months of research by US News |
| reporters, called "Triumph without Victory: The Unreported History of the |
| Persian Gulf War," to be published next month. |
| _______________________________________________________________________________ |
|
|
| Indictments of "Information Brokers" January 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Taken from The Privacy Journal |
|
|
| The unholy alliance between "information brokers" and government bureaucrats |
| who provide personal information has been uncovered in the grand jury |
| indictments of 18 persons in 14 states. |
|
|
| United States Attorney Michael Chertoff in Newark, New Jersey, and his |
| counterpart in Tampa, Florida, accused eight "information brokers" (or |
| "information gatekeepers" or "super bureaus") of bribing two Social Security |
| Administration employees to provide confidential earnings and employee |
| information stored in federal computer files. The brokers, who fill in the |
| cracks not occupied by national credit bureaus and who also track the |
| whereabouts of persons, would sell the information to their clients -- |
| retailers, lawyers, detectives, insurance companies, and others. |
|
|
| Ned Flemming, president of Super Bureau Inc. of Montery, California, was |
| indicted on 32 counts for coaxing a Social Security supervisor in New Jersey |
| named Joseph Lynch (who was not charged) to provide confidential personal |
| information for a fee. Fleming's daughter, Susan, was charged also, as were |
| Victor Fought, operator of Locate Unlimited in Mesa, Arizona; George T. |
| Theodore, owner of Tracers Worldwide Services in Corpus Christi, Texas; |
| Richard Stone, owner of Interstate Information Services in Port Jefferson, New |
| York; and Michael Hawes, former owner of International Criminal Investigative |
| Agency (ICIA) in Port Angeles, Washington, for participating in the same |
| conspiracy. Another broker, Joseph Norman Dillon Ross, who operates a firm |
| under his name in Pauma Valley, California also accepted the personal data, |
| according to Chertoff, but was not charged. Richard Stone was further indicted |
| for corrupting a Social Security claims clerk in Melrose Park, Illinois. Also |
| charged were Allen Schweitzer and his wife Petra, who operate Security Group |
| Group in Sumner, Washington. |
|
|
| The government employees also stole personal information from the FBI's |
| National Crime Information Center (NCIC), which stores data on arrests and |
| missing persons. |
|
|
| Fleming told Privacy Journal that he had never met Lynch. Stone refused to |
| comment. Tracers Worldwide, ICIA, and Locate Unlimited are not listed in |
| telephone information, although all three companies are required by the Fair |
| Credit Reporting Act to permit the subjects of their files to have disclosure |
| of such information to them. |
|
|
| The 18-month long investigation culminating in the December 18 indictments and |
| arrests is only the first phase, said Assistant U.S. Attorney Jose Sierra. "We |
| don't think it stops there." |
|
|
| For the past three years, the Big Three credit bureaus have continued to sell |
| credit information regularly to information brokers, even after complaints that |
| some of them violated the Fair Credit Reporting Act in disclosing credit |
| information for impermissible purposes. Trans Union's president, Albert |
| Flitcraft, told Congress in 1989 that is was not possible for a major credit |
| bureau to protect consumer information sold to brokers. John Baker, Equifax |
| senior vice-president, said at the time that the Big Three would "put together |
| our best thinking" to see if safeguards could be developed. By 1991, Oscar |
| Marquis, vice-president of Trans Union, was asking Congress for solutions, but |
| Baker presented Equifax's new guidelines and checklist for doing business with |
| the brokers. None of the Big Three has been willing to cease doing business |
| with the cloudy merchants of recycled credit reports -- and of purloined Social |
| Security and FBI information. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Meanwhile, at the Internal Revenue Service... |
|
|
| Two weeks after he blew the cover off the information brokers, U.S. Attorney |
| Michael Chertoff in New Jersey indicted a retired chief of the Internal Revenue |
| Service Criminal Investigation Division for selling personal information to a |
| California private investigative firm in his last week on the job in 1988. |
|
|
| For a $300 payment, according to the indictment, the IRS executive, Robert G. |
| Roche, promised to procure non-public marital records from vital records |
| offices. Using false pretenses, he ordered one of his subordinates to get the |
| information, on government time. The aide got the records in one instance only |
| after writing out an IRS summons and in another instance after producing a |
| letter on IRS stationary saying the information was needed for "official |
| investigative matters." Roche, according to the U.S. Attorney, accepted |
| payment from the California investigative firm of Saranow, Wells, & Emirhanian, |
| part of a larger network called Financial Investigative Services Group. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| The Privacy Journal is an independent monthly on privacy in the computer age. |
| They can be reached at: |
|
|
| Privacy Journal |
| P.O Box 28577 |
| Providence, Rhode Island 02908 |
| (401)274-7861 |
| _______________________________________________________________________________ |
|
|
| SSA, FBI Database Violations Prompt Security Evaluations January 13, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Kevin M. Baerson (Federal Computer Week)(Pages 1, 41) |
|
|
| Indictments recently handed down against insiders who bought and sold |
| confidential information held in Federal Bureau of Investigation and Social |
| Security Administration computers have prompted agency officials to evaluate |
| how well the government secures its databases. |
|
|
| "I see this as positive more than negative," said David Nemecek, section chief |
| for the FBI's National Crime Information Center (NCIC), which contains data on |
| thousands of people suspected and convicted of crimes. "Am I happy it |
| happened? No. But it led us to discovering that this was happening and it |
| sends a message that if people try it, they will get caught." |
|
|
| But Renny DiPentima, assistant commissioner of SSA's Office of System Design |
| and Development, said he did not view the indictments as a positive |
| development. |
|
|
| "It's not a victory," DiPentima said. "Even if we catch them, it's a loss. My |
| victory is when I never have a call that someone has abused their position." |
|
|
| The "information broker" bust was the culmination of an 18-month investigation |
| by the Department of Health and Human Services' inspector general's office in |
| Atlanta. Officials said it was the largest case ever prosecuted involving the |
| theft of federal computer data. More indictments could be forthcoming, they |
| said. |
|
|
| Special agents from the FBI joined the inquiry and in the end nabbed 18 people |
| >from 10 states, including one former and two current SSA employees. Others |
| indicted were a Chicago police officer, an employee of the Fulton County |
| Sheriff's Office in Georgia, and several private investigators. |
|
|
| The indictments alleged that the investigators paid for confidential data, |
| including criminal records and earnings histories, that was lifted from the |
| databases by people who exploited their access to the records. |
|
|
| "The FBI cannot manage every person in the United States," Nemecek said. "We |
| have all kinds of protection to prevent this from happening. We keep logs of |
| who uses the systems and for what, security training programs and routine |
| audits of inquiries." |
|
|
| "But the people who committed the violations had access to the system, and |
| there's only one way to deal with that: aggressive prosecution of people who do |
| this. And the FBI is actively pursuing these individuals." |
|
|
| DiPentima's problem is equally delicate. His agency performs 15 million |
| electronic transactions per day -- 500 per second -- and monitoring the rights |
| and wrongs of those people is a daunting task. |
|
|
| Currently, every employee who uses the network is assigned a password and |
| personal identification number, which change frequently. Depending on the |
| nature of the employee's job, the PIN grants him access to certain types of |
| information. |
|
|
| If the employee tries to access a menu in the system that he has not been |
| authorized to enter, or makes more than one error in entering his PIN number, |
| he is locked off the system. Once that happens, only a security office from |
| one of SSA's 10 regional offices can reinstate the employee. |
|
|
| An SSA section chief and six analysts, working from the agency's data center |
| headquarters outside Baltimore, also search routinely for transactional |
| aberrations such as employees who have made an unusual number of transactions |
| on a certain account. |
|
|
| The FBI also has a number of security precautions in place. FBI personnel |
| conduct random audits of searches, and Nemecek said sweeping state and local |
| audits of the system are performed biannually. Furthermore, if the FBI |
| desires, it easily can track an access request back to the terminal and user it |
| came from. |
|
|
| DiPentima said that in the wake of the indictments, he is considering new |
| policies to clamp down on abusers. |
|
|
| Nemecek said that as the FBI continues upgrading the NCIC database, the center |
| might automate further its auditing of state and local agencies to detect |
| patterns and trends of use the way SSA does. |
|
|
| But despite efforts to tighten the screws on network security, both men realize |
| that in cases of federal and municipal employees who exploit authorized access, |
| technology and policies can only go so far in affecting human nature. |
| _______________________________________________________________________________ |
|
|
| Free University Suffers Damage. February 24, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By The Dude (of Holland) |
|
|
| An investigation by the Amsterdam police, in cooperation with an anti-fraud |
| team of the CRI (sort of like the FBI), and the geographical science department |
| of the Free University has led to the arrests of two hackers. The two had |
| succeeded to break into the department's computer system and caused damage of |
| over 100,000 Dutch Guilders. |
|
|
| In a press conference, held by the research teams last Friday, it was stated |
| that the duo, a 25-year old computer-science engineer R.J.N. from Nuenen |
| [aka Fidelio] and a 21-year old student computer-science H.H.H.W. from Roermond |
| [aka Wave], were the first "hackers" to be arrested in the Netherlands. In |
| several other countries this has already happened before. |
|
|
| The arrested hackers made a complete confession. Since November 1991, they |
| have entered the University's computer between 30 and 40 times. The system |
| was known as "bronto." From this system the hackers were able to gain access |
| to other systems, thus travelling to systems in the US, Scandinavia, Spain and |
| Italy. |
|
|
| According to the leader of the computer-crime team of the Amsterdam police, |
| D. Komen, the two cracked codes of the VU-system to get in. They got their |
| hands on so-called "passwords" of officially registered users, which allowed |
| them to use the system at no cost. They were also able to get the "highest of |
| rights" within the computer system "bronto." |
|
|
| A total of four houses were searched, and several PC's, printouts and a large |
| quantity of diskettes was seized. The duo was taken to the DA and imprisoned. |
| Because "hacking" is not a criminal offense in the Netherlands, the suspects |
| are officially accused of falsification of records, destruction of property, |
| and fraud. |
|
|
| This year the government expects to enact legislation that will make hacking a |
| criminal offense, according to P.Slort of the CRI. |
|
|
| The hacker-duo stated that they undertook their illegal activities because of |
| fanatic "hobbyism." "It's a kick to see how far you can go", says Mr. Slort of |
| the CRI. The two said they did not know that their data journeys had caused |
| enormous damages. The police do not see them as real criminals, either since |
| the pair did not earn money from their activities. |
| _______________________________________________________________________________ |
|
|
| Computer Engineer Gets Death Sentence February 9, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Special Thanks: Ninja Master |
|
|
| Richard Farley was cool to the end, taking a sip of water and smoothing his |
| jacket before leaving the courtroom where he was sentenced to die for killing |
| seven people in a rage over unrequited love. |
|
|
| "I'm not somebody who is demonstrative or prone to shedding tears", Farley said |
| Friday before apologizing for the slayings. "I do feel sorry for the |
| victims....I'm not a perfect human being. I'm good. I'm evil." |
|
|
| Farley was convicted in October of the 1988 slayings at ESL Inc., a Sunnyvale |
| defense contractor. Jurrors on November 1st recommended the death penalty for |
| the computer engineer, who prosecutors said planned the rampage to get the |
| attention of a former co-worker who rejected him. |
|
|
| Superior Court Judge Joseph Biafore Jr. called Farley a vicious killer who had |
| "complete disregard for human life." |
|
|
| "The defendant...killed with the attention to prove to the object of his |
| unrequited love that he wasn't a wimp anymore," Biafore said. |
|
|
| During the trial, prosecutors detailed Farley's 3 1/2-year obsessive pursuit of |
| Laura Black. He sent her more than 100 letters, followed her day and night, |
| left gifts on her desk, and rifled through confidential personnel files to |
| glean tidbits about her life. |
|
|
| Despite her repeated rejections, Farley persisted and was fired in 1987 for |
| harassing her. A year later, he returned to ESL. |
|
|
| Black, 30, was shot in the shoulder during the rampage, but survived to testify |
| against Farley. She said that about a week before the slayings, she had |
| received a court order to keep him away. |
|
|
| Farley, 43, admitted the killings but pleaded not guilty, saying he never |
| planned to kill but only wished to get Black's attention or commit suicide in |
| front of her for rejecting him. |
|
|
| Farley's attorney, Gregory Paraskou, argued that Farley's judgement was clouded |
| by his obsession with Black and that he was not violent before the slayings and |
| likely would not kill again. |
|
|
| But Asst. Dist. Atty. Charles Constantinides said Farley spent years preparing |
| for the murder by taking target practice and buying weapons, including the |
| firearms and 98 pounds of ammunition he used at ESL. |
|
|
| The judge rejected the defense's request for a modified sentence of life in |
| prison and a request for a new trial. Under California law, Farley's death |
| sentence will be automatically sent to the state Supreme Court for review. |
|
|
| Among those in the courtroom were family members of some of the victims, |
| including four who addressed the judge. |
|
|
|
|