💾 Archived View for gemini.spam.works › mirrors › textfiles › news › kevin.pol captured on 2020-10-31 at 16:32:38.

View Raw

More Information

-=-=-=-=-=-=-


Date: Fri, 19 Jan 90 00:57:36 PST
From: John Gilmore <gnu@toad.com>
Subject: More Net Friends Charged With Telephone/Computer Crimes


'Tis my sad duty to report to you-all that three folks, Kevin Poulsen,
Mark Lottor (mkl@sri.com), and Robert Gilligan (gilligan@sun.com) have
been charged by the San Jose US Attorney with nineteen counts (mostly
bogus) of telephone and computer crimes.

I got a copy of the 3-page press release from a friendly newspaper
reporter, as well as the 15-page indictment.  Curiously, the
defendents have not been given a copy of the indictment yet, though it
is being blasted out to the press (the reporter got it by fax!).  The
press release is from the US Attorney's office; you can call Robert R.
Crowe at +1 408 291 7221 to complain about it.  The press seems to
have been taken in by this and is giving it a lot of coverage; one
report was that 20 cameramen showed up at the "scene of the crime"
this morning in an attempt to interview a defendent.

The indictment starts off with a conspiracy charge in a feeble attempt
to tie the three defendents together, then proceeds through a bunch of
separate "counts".  Many of these are completely bogus, e.g.  they are
three separate charges under Title 42, USC 408(g)(2) with:

	"...for the purpose of obtaining telephone service from
	Pacific Bell Telephone under a false name, with intent to
	deceive, falsely represented his social security account
	number to be 549-64-3121, when in fact, such number was not
	his social security number".

There are three other charges under 18 USC 1342 with:

	"...for the purpose of defrauding Pacific Bell Telephone
	Company, used, assumed and requested to be addressed by a
	fictitious, false, and assumed name other than his own
	proper name and received from any post office or authorized
	depository of mail matter a letter addressed to such
	fictitious, false and assumed name other than his own proper
	name, specifically, Robert E. Gilligan assumed, used and
	requested to be addressed and to receive mail in the name of
	John Billings...".

Not all the charges are this much hot air, but it really looks to me
like the prosecuters are more interested in writing press releases
than in serving justice.

In short, the charges are:

  1 count conspiracy
  1 count "possession of access devices", 18 USC 1029(a)(3), (b)(2)
  1 count "ownership of a test circuit pack", 18 USC 2512
  3 counts giving the phone company a fake SS#
  3 counts giving the phone company a fake name
  1 count use of calling cards in fake names, 18 USC 1029(a)(2), (b)(2)
  1 count use of a testset to intercept a call
  1 count intercepting a Pacbell security person's conversation 
  1 count attempted access to US Army MASNET, 18 USC 1030(a)(3)
  1 count "intent to transfer" MASNET access codes, 18 USC 1030(a)(6)
  1 count "obtained with intent to convert to his use or gain" Secret
          classified orders from a Ft Bragg military exercise, 18 USC 641
  2 counts intercepting specific phone calls, 18 USC 2511(1)(a)
  1 count "stole a computer printout which was in the custody of
	  PacBell pursuant to a contract with the FBI and which
	contained cable/pair assignments and phone numbers of Ferdinand
	Marcos and others who were target of an FBI investigation" 18 USC 641
  1 count possession of access-device making equipment (including a
	POS terminal for verifying credit card limits!), 18 USC 1029(a)(4),
	(b)(3)

In short, there is little computer crime in here -- mostly the normal
life of a private person (not giving your name to the phone company,
not giving out your SS# to people who have no legal need for it),
having an interest in phones, some possible phreaking, and some
fantasies about innocent stuff they found in searching an apartment.
I find it quite interesting that they are charging these guys with
intercepting calls when it's clear that that's exactly what the FBI
was doing with Ferdinand Marcos's cable pair assignments...but don't
worry, it's against the law for anyone but Big Brother to listen in on
you.

I'll find a copy of these laws sometime soon and see how bad they are.
18 USC 1029 and 1030 are new laws and are specifically mentioned in
the "press release".  1029, on "access devices", is being used to
charge these folks with possession of keys; use of calling cards
issued under false names; and possession of a POS terminal and
locksmith tools.  Sounds like most modern laws -- broad enough to
charge anybody who they want to "get"...and broad enough to be tacked
on to any other charge to give them more to plea bargain with.  And
the ones on use of an incorrect SS# "with intent to deceive"!  Last I
heard, it was not illegal to deceive (lie to) private companies about
your SS#, though it is illegal to defraud (cheat) them.  Welcome to
New Amerika!


Date: Sat, 20 Jan 90 1:37:01 CST
From: Patrick Townson <ptownson@eecs.nwu.edu>
Subject:  Re: More Net Friends Charged With Telephone/Computer Crimes


The purpose of this message is NOT to give an opinion as to the guilt
or innocence of the persons discussed in the original message. Only
the court can rule upon the facts, and detirmine the guilt or
innocence of the defendants. This message is intended ONLY to address
Mr. Gilmore's presentation itself, and discuss what he feels are
frivolous charges.

In volume 9, issue 36 John Gilmore <gnu@toad.com> writes:

>'Tis my sad duty to report to you-all that three folks, Kevin
>Poulsen, Mark Lottor (mkl@sri.com), and Robert Gilligan
>(gilligan@sun.com) have been charged by the San Jose US Attorney with
>nineteen counts (mostly bogus) of telephone and computer crimes.

>The indictment starts off with a conspiracy charge in a feeble attempt
>to tie the three defendents together, then proceeds through a bunch
>of separate "counts".  Many of these are completely bogus, e.g.
>they are three separate charges under Title 42, USC 408(g)(2) with:

>	"...for the purpose of obtaining telephone service from
>	Pacific Bell Telephone under a false name, with intent to
>	deceive, falsely represented his social security account
>	number to be 549-64-3121, when in fact, such number was not
>	his social security number".

>There are three other charges under 18 USC 1342 with:

>	"...for the purpose of defrauding Pacific Bell Telephone
>	Company, used, assumed and requested to be addressed by a
>	fictitious, false, and assumed name other than his own
>	proper name and received from any post office or authorized
>	depository of mail matter a letter addressed to such
>	fictitious, false and assumed name other than his own proper
>	name, specifically, Robert E. Gilligan assumed, used and
>	requested to be addressed and to receive mail in the name of
>	John Billings...".

When an application is made for an extension of credit, it is illegal
to misrepresent who you are. In this case, telco would be the
creditor.  Credit is not a *right*. It does not have to be given to
anyone. Telco must provide service to all *qualified* applicants, and
in this instance, a qualified applicant is one who has demonstrated an
ability and willingness to pay for the service. More on this later.

>In short, the charges are:
  
   (list edited, to address only certain issues)

>  3 counts giving the phone company a fake SS#
>  3 counts giving the phone company a fake name
>  1 count use of calling cards in fake names, 18 USC 1029(a)(2), (b)(2)

Here again, the use of a calling card is the use of an extension of
credit given by telco. It is a crime to apply for credit under a fake
name or using fake credentials, period. No actual loss to the creditor
has to occur. The fact is, the creditor is entitled to set whatever
parameters he desires to define 'credit worthy'; this is not an option
left to the subscriber or purchaser of the service. If you
misrepresent who you are for the purpose of obtaining an extension of
credit, you have committed a federal felony. If you place your written
misrepresentation in a US Postal Service receptacle, you have
committed mail fraud as soon as the envelope lands in the basket
inside. If your oral misrepresentation causes the creditor to place
something inside a mail receptacle, i.e. your monthly bill, then
again, *you* have committed mail fraud.

By 'extension of credit' I mean that these gentlemen could have been
obliged by telco to make a sizeable down payment of earnest money --
or deposit against future charges -- before service was established.
Or, they could have been obliged to make calls from pay stations, on a
pay- as-you-go basis.

>  1 count use of a testset to intercept a call
>  1 count intercepting a Pacbell security person's conversation 

Interception of calls is illegal, whether it is by a private party or
the government without the permission of a court. If these charges are
proven to be factual, then they are very serious matters. I would ask
Mr. Gilmore if he would like to be the victim of such an intercept.
Even 'security persons' have the right to assume their conversation on
the phone is private.


>  1 count attempted access to US Army MASNET, 18 USC 1030(a)(3)
>  1 count "intent to transfer" MASNET access codes, 18 USC 1030(a)(6)
>  1 count "obtained with intent to convert to his use or gain" Secret
>          classified orders from a Ft Bragg military exercise, 18 USC 641

Another way of phrasing it is a charge of attempted burglary; a charge
of attempted theft; plus a charge of theft by deception. If Mr.
Gilmore feels this is not all that serious, perhaps he will share his
modem phone number and personal passwords with us; or not raise too
much of a fuss if someone finds them and uses them.

>  2 counts intercepting specific phone calls, 18 USC 2511(1)(a)

As above; only a court can authorize a wire; would you want it any
other way?

>  1 count "stole a computer printout which was in the custody of
>  PacBell pursuant to a contract with the FBI and which
>  contained cable/pair assignments and phone numbers of Ferdinand
>  Marcos and others who were target of an FBI investigation" 18 USC 641

So now we have another charge of theft. Yes, that is what it is called
when some sleaze on the subway gets into your pockebook -- why not
call it that when someone rifles an office or a briefcase? Does the
fact that the offender is smart enough he doesn't have to strong-arm
you on the street make a difference in the seriousness of the crime?

>  1 count possession of access-device making equipment (including a
>  POS terminal for verifying credit card limits!), 18 USC 1029(a)(4),
>	(b)(3)

What business does anyone have verifying the credit limits of some
other person lacking some business transaction involving credit? Who
the hell are you -- or anyone -- to verify my credit standing unless
we are transacting business with each other?

>In short, there is little computer crime in here -- mostly the normal
>life of a private person (not giving your name to the phone company,
>not giving out your SS# to people who have no legal need for it),

I would suggest that electronic burglary, i.e. breaking and entering
into the military computers and the theft of the information in the
one computer is a 'computer crime', and a rather serious one at that.
If Mr. Gilmore does not regard breaking and entering into a computer
to be a 'computer crime' what does he consider to be such a crime?

I would suggest that tampering with a communications computer, i.e. a
central office ESS to intercept phone calls is a computer crime, if
indeed the alleged interception was done in that manner.

>mostly the normal life of a private person (not giving your name to the
>phone company, not giving out your SS# to people who have no legal
>need for it.....

Most people do not try to defraud the phone company. Most people do
not give bogus identification to the phone company. Telco will list
(or not) the service under any name desired, within reason. They will
send the bill to any third party. But the person who ultimatly
guarentees the payment *must* be known to telco, like any other
creditor. If these allegations of the government are found to be
factual, then I'd say these fellows have a problem: if they intended
to deal in good faith with telco, their true identities would have
been part of telco's service record.

>not giving out your SS# to people who have no legal need for it.

Legal need is one thing; consideration for an extension of credit is
another; or does Mr. Gilmore assume telco should just take the word of
everyone who comes in that everything will be alright and telco will
get paid?  As stated above, when the creditor *gives consideration to*
your request for credit, he requires something by which to positively
identify yourself and your history of meeting your obligations. It is
a perfectly acceptable trade off: identify yourself to your creditor's
satisfaction and your creditor will give consideration to your request
for credit.

This is something that has confused many people in the past: do you,
or don't you have to produce an SSN on the request of a merchant?  NO,
YOU DO NOT!  But....the merchant is NOT obliged to do business with
you on any basis other than CASH. No checks, no credit cards, no open
account -- just cold hard cash, deposit twenty five cents for the
first minute please.....

You don't like those terms, and want to cash your checks, use your
credit or otherwise pay in a more convenient way? Then meet the
creditor's terms.  And the federal government says if you decieve the
creditor in *any way*, they have a beef with you.

>just like the normal life of a private person...

And as a further example, he gives...

>having an interest in phones, some possible phreaking, 

About 95 percent of the public has no idea how phones work, could care
less how they work (until the CO burns down, the employees go on
strike, or the software gets a bug in it), and do not phreak. Most
people do not know anything more than listen for dial tone, dial the
number, talk and hang up. The defendants here are hardly 'normal
living private persons', if their knowledge of telecom is any
indicator.

>some possible phreaking,

Note how casually Mr. Gilmore dismisses this. Instead, substitute the
phrase, 'some possible burglaries; some possible thefts by deception;
possibly some breaking and entering....'

>normal lives of private persons.....

Most people do not burglarize the space of others, be it electronic or
physical in nature. They do not practice theft by deception. 

>and some fantasies about innocent stuff they found in searching 
>an apartment.  

Oh! And, uh, if its not asking too much, WHO authorized the searching
of the apartment? If this is shown to be factual, and if no one can be
found who authorized the 'search', then the 'search' becomes a
burglary...this time of a physical place rather than an electronic
one.

But perhaps I mis-read this. Perhaps the defendants had been invited
by someone to come to their home and search through their possessions.

>I find it quite interesting that they are charging these guys with
>intercepting calls when it's clear that that's exactly what the FBI was
>doing with Ferdinand Marcos's cable pair assignments...

The difference is, the one wire was authorized by a court; the other
one was not. I personally find all wires distasteful -- particularly
those committed by unauthorized persons -- but at least the FBI took
the trouble to do it legally I assume.

And if the FBI did not do it legally? None of us here have virgin ears
and eyes; we all know about the stink at Cincinnatti Bell; the Chicago
Police Red Squad of the 1960's; the marginal legality of some aspects
of the 'war on drugs', etc.... but is the writer saying the current
defendants were no more naughty than the FBI, therefore they should
not be punished if they are found guilty?

>but don't worry,
>it's against the law for anyone but Big Brother to listen in on you.

Let's quit playing games and pointing fingers. Yes, it is illegal for
anyone to listen to your private conversations except the government,
and then, only by specific court order. Mr. Gilmore seems to be almost
confessing for the defendants now, by his admission that the alleged
acts were illegal. But that isn't what he meant. He meant since it is
okay for the government to break the law, it should be okay for the
defendants to do so also. I think otherwise.

>use of calling cards issued under
>false names; and possession of a POS terminal and locksmith tools.
>Sounds like most modern laws -- 

Maybe, but it hardly sounds like the normal life of your average
private person who typically does not carry credit cards with false
names; does not possess a POS terminal unless he is a merchant using
it in his legitimate business; does not have locksmith tools unless he
is a locksmith by trade; and doesn't go around tapping phones,
burglarizing computers and stealing documents.

>broad enough to charge anybody who they want to "get"

Why should the government 'want to get' these chaps? It sounds to me
like the government doesn't need any excuses to 'get' them....if the
claims by the government are factual, then these fellows are hardly
model citizens being persecuted by an evil government.

>And the ones on use of an
>incorrect SS# "with intent to deceive"!  Last I heard, it was not
>illegal to deceive (lie to) private companies about your SS#, though
>it is illegal to defraud (cheat) them.  

It is illegal to deceive anyone for the purpose of obtaining an
extension of credit. If some attorney told you it was not illegal to
deceive your creditor, I suggest you ask for your retainer back and go
find another attorney. Actual loss to the creditor is not required.
The creditor's victimization begins when he grants you credit you
should not (by his standards) be given. He is at risk at that point.
And the feds will back up the creditor *every time* on this. Conduct
business by mail and you can add mail fraud to the rap.

>Welcome to New Amerika!

Isn't that precious..... I'll repeat: quit the game playing and the
role of martyr. If your 'net friends' are found to be guilty, tell
them to quit their belly-aching and take their medicine like a
man-child. A couple years Federal Probation might just hit the spot.
If they follow your line of reasoning, and get too arrogant in court,
that Federal Probation might turn into a couple years in the custody
of the Attorney General or his authorized representative instead.

And if they are not guilty, and all these things the government has
said about them are just damnable lies, by a government 'out to get
them....'

Well then, they can take comfort in the words of Oscar Wilde, who once
said,

     "Injustice? Well I can live with injustice. I've had it heaped
      on me many times...

      But justice.....its justice that stings.....  "



Patrick Townson


or innocence of the defendants. Only the court can detirmine the facts.
It was intended to address tbe recent remarks by Mr. Gilmore.**


From telecomlist-request@mailinglists.eecs.nwu.edu Sun Jan 28 14:59:55 1990
Received: from delta.eecs.nwu.edu by gaak.LCS.MIT.EDU via TCP with SMTP
	id AA11564; Sun, 28 Jan 90 14:59:50 EST
Received: from mailinglists.eecs.nwu.edu by delta.eecs.nwu.edu id ab26020;
          28 Jan 90 13:21 CST
Received: from mailinglists.eecs.nwu.edu by delta.eecs.nwu.edu id ac25758;
          28 Jan 90 12:15 CST
Date:     Sun, 28 Jan 90 11:49:41 CST
From: TELECOM Moderator <telecom@eecs.nwu.edu>
[To]:     telecom@eecs.nwu.edu
Subject:  TELECOM Digest Special: Computer Crime
Message-Id:  <9001281149.ab01824@delta.eecs.nwu.edu>
Status: RO


TELECOM Digest     Sun, 28 Jan 90 11:45:00 CST    Special: Computer Crime

Today's Topics:                             Moderator: Patrick Townson

    Re: More Net Friends Charged With Telephone/Computer Crimes (J. Gilmore)

[Moderator's Note: Mr. Gilmore sent this rebuttal several days ago to
my piece which appeared last week. It had to be re-written slightly,
with Mr. Gilmore's approval and assistance due to a couple technical
problems which made it incompatible with Digest software. I am sorry
it isn't as timely as I would have liked; it should have been
distributed several days ago.  As he notes in the first paragraph, the
legal issues raised should probably be best continued in misc.legal.
In a Digest later today, a detailed look at Kevin Poulsen.  PT]
----------------------------------------------------------------------

Subject: Re: More Net Friends Charged With Telephone/Computer Crimes
Date: Tue, 23 Jan 90 01:08:49 -0800
From: gnu@toad.com <John Gilmore>


I believe this discussion is moving way beyond the bounds of Telecom.
However when the moderator blasts me, in part over misunderstandings
of my message, I wish a chance to rebut.  If the Moderator wants to
limit discussion to phone-related stuff after this message, I think
it's a good idea.  We can move the rest of the discussion to
misc.legal.

Patrick Townson got quite upset about my message regarding this
indictment.  I do not have an opinion on whether these folks are
guilty or innocent either.  My problem is with some of the charges and
with how the US Attorney is publicity-chasing with this case.

Mr. Townson says that it is a crime to misrepresent who you are for
"an extension of credit", including telephone service.  I believe this
should be a civil matter, not a criminal one -- and actual harm must
be shown before anyone could be penalized for it.  In other words, if
I tell the phone company my name is Joe Blow, and I pay my bill on
time, it's none of their business whether my mama calls me Suzie
Thunder -- and particularly none of the government's business.  Why is
the extension of credit different than any other commercial
transaction in this regard?

If a company wants to implement policies about who can and who can't
get credit, it is *their* job to check up on me.  It is not the job of
the government to spend tax money to chase me down and prosecute me.

As for extension of credit by Pac Bell...  When *I* have gotten band
new service from Pacific Bell, not moved from a previous address in
the same telco (e.g. when moving out of a shared household into my own
house), I had to put up a cash deposit before they would offer me
service.  Under those circumstances, is telco "extending me credit"?
I occasionally receive mid-month bills saying "you used your phone a
lot, we want you to pay it now" or "did you make all those calls or
has somebody been charging calls to your number?".  These mechanisms
let them cut off service til the bill (or a larger deposit) is paid,
and protect them against fraud.  In all cases, when I had had the
phone for a year or two and paid the bills regularly, they refunded
the deposit.  E.g. even if I am "Joe Blow" to them, and TRW doesn't
have a dossier on me, I am still creditworthy to them.

> If you misrepresent who you are for the purpose of obtaining an 
> extension of credit, you have committed a federal felony.

If a California company extends credit to a California customer, the
Feds have jurisdiction?  (Yes, I know the case law that blew the
interstate commerce clause all to pieces -- after FDR almost succeeded
in emasculating the Supreme Court.  It's just not right.)

> If you place your written misrepresentation in a US Postal Service 
> receptacle, you have committed mail fraud as soon as the envelope 
> lands in the basket inside. If your oral misrepresentation causes 
> the creditor to place something inside a mail receptacle, i.e. your 
> monthly bill, then again, *you* have committed mail fraud.

It's a good thing the government runs the mail system, so it can turn
a simple communications service into one which makes judgements about
the contents of its 'packets'.  Happily, Federal Express has a policy
diametrically opposed, e.g. unless the cocaine leaking from your
parcel jams their conveyor belt, it goes through and they ask no
questions and threaten no jail terms.  Their job is carriage, not
providing a hook for one more bogus charge to throw at somebody.

> By 'extension of credit' I mean that these gentlemen could have been
> obliged by telco to make a sizeable down payment of earnest money --
> or deposit against future charges -- before service was established.

What if they *did* pay a deposit?  That seems to be PacBell policy for
customers with no prior service.

> >  1 count use of a testset to intercept a call
> >  1 count intercepting a Pacbell security person's conversation 
> Interception of calls is illegal...

I am not defending the interception of calls.  I was listing the
charges, since the newspaper accounts summarize them and leave out the
actual citations from the US Code.

> >  1 count attempted access to US Army MASNET, 18 USC 1030(a)(3)
> >  1 count "intent to transfer" MASNET access codes, 18 USC 1030(a)(6)
> >  1 count "obtained with intent to convert to his use or gain" Secret
> >          classified orders from a Ft Bragg military exercise, 18 USC 641

I think that "attempted" access and "conspiracy to" crimes are bogus.
Why should it be illegal for Americans to test the security of the a
US Military network?  Should we just believe them if they tell us it
is secure?  If it is truly secure, they have nothing to fear from us.
If it is not secure, we the public have a damn strong reason to want
to know.  [If we enter and do damage, that is a completely separate
issue.  The issue here is the mere attempt to access.]

Also note that there is no apparent tie between the MASNET charges and
the classified orders, which were apparently found in hardcopy form.
Perhaps the guy was in the Air Force and kept some of his old
paperwork?

> >  1 count "stole a computer printout which was in the custody of
> >  PacBell pursuant to a contract with the FBI and which
> >  contained cable/pair assignments and phone numbers of Ferdinand
> >  Marcos and others who were target of an FBI investigation" 18 USC 641
> So now we have another charge of theft.

I am not a believer in theft.

> >  1 count possession of access-device making equipment (including a
> >  POS terminal for verifying credit card limits!), 18 USC 1029(a)(4),
> >	(b)(3)
 
> What business does anyone have verifying the credit limits of some
> other person lacking some business transaction involving credit? Who
> the hell are you -- or anyone -- to verify my credit standing unless
> we are transacting business with each other?

I do not believe that possession of a computer terminal should be a crime.

There is no allegation in the indictment that this terminal was used
to commit a crime.  The mere possession of it is apparently illegal
according to this indictment.  There is no allegation that the
terminal was used to verify anyone's credit standing; perhaps it was
bought for parts from a surplus store.

"If POS terminals are outlawed, only department stores will have POS 
terminals" :-)

I do not believe there is a law or practice restricting credit
information to people 'transacting business with each other'.  You
want the info, TRW sells it, as far as I know.  Feel free to educate
me if I'm wrong.

> >In short, there is little computer crime in here...
>
> If Mr. Gilmore does not regard breaking and entering into a computer
> to be a 'computer crime' what does he consider to be such a crime?

I said LITTLE computer crime -- that means 2 out of 19 charges.  But
that is most of what the press coverage is focusing on, because it's
"high-tech" to talk about computer crimes and it sells papers.

The indictment mentions only breaking into a network, not into any
military computers, and no theft of information therefrom.

> I would suggest that tampering with a communications computer, i.e. a
> central office ESS to intercept phone calls is a computer crime, if
> indeed the alleged interception was done in that manner.

This is going out on quite a limb.  Nothing I posted, and nothing I
read in the indictment, indicated ESS tampering to wiretap.  Testsets
and 'test circuit packs' were mentioned.

There followed a long flame about normal life being incompatible with
a interest in phone equipment, etc.  My comment along these lines was
also misunderstood by another poster.  Let me restate and clarify:

me>In short, there is little computer crime in here -- mostly the normal
me>life of a private person (not giving your name to the phone company,
me>not giving out your SS# to people who have no legal need for it),
me>having an interest in phones, some possible phreaking, and some
me>fantasies about innocent stuff they found in searching an apartment. 

Please read this as "the normal life of a private person (...), AND
having an interest in phones, AND possible phreaking, AND some
[prosecutor's] fantasies about some innocent stuff the PROSECUTOR
found in searching an apartment".

I think that keeping your life private is not computer crime, nor any
crime.  I think having an interest in phones is not computer crime,
nor any crime.  I think phreaking (at least tapping phones) is not
computer crime, though it is definitely a crime.  I think
prosecutorial fantasies about computer terminals are not computer
crimes, nor any crime.

> if they intended to deal in good faith with telco, their true 
> identities would have been part of telco's service record.

If you define good faith as paying for services rendered, nothing in
the charge indicates that their bills were unpaid, simply that they
used false names and ss#'s.  A person is free to use any name(s) they
choose as long as it is not for fraud.  My copy of the Uniform
Commercial Code is misplaced, but I think fraud involves *actual
monetary loss* due to false information.

> It is a perfectly acceptable trade off: identify yourself to your 
> creditor's satisfaction and your creditor will give consideration to 
> your request for credit.

They identified themselves to their creditor's satisfaction --
obviously.  Else their creditor would not have issued them credit,
e.g. provided them with phone service and working calling cards.

> This is something that has confused many people in the past: do you,
> or don't you have to produce an SSN on the request of a merchant?  NO,
> YOU DO NOT!  But....the merchant is NOT obliged to do business with
> you on any basis other than CASH. No checks, no credit cards, no open
> account -- just cold hard cash, deposit twenty five cents for the
> first minute please.....
 
> You don't like those terms, and want to cash your checks, use your
> credit or otherwise pay in a more convenient way? Then meet the
> creditor's terms.

All OK by me.

> And the federal government says if you decieve the creditor in 
> *any way*, they have a beef with you.

That is where I have a problem.  None of the Feds' business.  The
gov't does not exist to intervene in private commercial transactions.

> >I find it quite interesting that they are charging these guys with
> >intercepting calls when it's clear that that's exactly what the FBI was
> >doing with Ferdinand Marcos's cable pair assignments...
 
> The difference is, the one wire was authorized by a court...
> Let's quit playing games and pointing fingers. Yes, it is illegal for
> anyone to listen to your private conversations except the government,
> and then, only by specific court order.

You clearly don't know current law in this regard.  Reread the ECPA.
It does not take a court order to tap your phone these days.  A middle
level bureaucrap at the DoJ can legally do it without consulting a
court.

> Mr. Gilmore seems to be almost confessing for the defendants now, by 
> his admission that the alleged acts were illegal. But that isn't what 
> he meant. He meant since it is okay for the government to break the law, 
> it should be okay for the defendants to do so also. I think otherwise.

Certainly if these guys wiretapped people, their acts were illegal.
My statements have nothing to do with "confession" though.  It's the
hypocrisy of the government that says "the act is evil, but if a judge
or bureaucrat does it, it's OK" that I am complaining about.

[As an aside, I believe that if a law is broken by the government, it
should not be able to prosecute people for breaking it.  If the
government is dealing drugs and weapons in violation of the law, any
case against ordinary people for the same charge should be thrown out.
I am quite tired of government employees thinking they are above the
law; the only way to restrain them from this belief is to nullify the
law's effect on us, e.g. if they won't follow the rules that they
themselves lay down, we don't have to either.]

>> broad enough to charge anybody who they want to "get"
> Why should the government 'want to get' these chaps?

Why should the government issue press releases about an indictment?
Perhaps somebody wants to make a name for themself in the Dept of
Justice by prosecuting a famous case.  Perhaps it has been decided
that it's time to "get tough" on computer crime, so a case that's
mostly telephone crime has been stretched with bullshit charges and
then billed to the ignorant media as a major computer crime case.
Bureacracy has its own internally generated reasons.  These particular
people may not be targets except that they were handy to "make an
example of" at the right time.

> ...if the claims by the government are factual, then these fellows 
> are hardly model citizens being persecuted by an evil government.

Civil rights only apply to model citizens?  That is, model citizens
are permitted to own terminals, but people suspected of other crimes
are not?  If someone plants marijuana refuse (or printouts from
telco's trash bin) in Mr. Townson's trash can and calls the cops, will
his computers and telephone memorabilia, his old copies of
confidential "Telephone Test Code Number Directories" that friends had
given him in violation of telco rules, suddenly become illegal 'tools
of crime' too?  Will his magazine subscription in the name 'Betty
Crocker', so he can identify who is selling his name to mailing lists,
become mail fraud?

> If your 'net friends' are found to be guilty, tell
> them to quit their belly-aching and take their medicine like a
> man-child. A couple years Federal Probation might just hit the spot.
> If they follow your line of reasoning, and get too arrogant in court,
> that Federal Probation might turn into a couple years in the custody
> of the Attorney General or his authorized representative instead.

Right.  Be nice to the thugs and they might put you on probation.  You
better watch out boy and play the game *our way* whether you're
innocent or guilty.  A couple of years of living as if you were in a
totalitarian state would be a nice change of pace.  Permission to
work, permission to move, permission to drive, permission to associate
with your undesirable friends, given or refused by your probation
officer.  Instant arrest and confinement at the government's whim,
without arraignment or trial.  Gee, if we could get everyone living
under these rules, there'd be no need for all those silly elections
and freedoms and stuff.

> And if they are not guilty...
> Well then, they can take comfort in the words of Oscar Wilde...

I would take a lot more comfort in suing the government for harassment
and getting the overzealous US Attorney demoted or fired.  You get the
government you allow to survive.  If you leave petty thugs in there
and go back to reading Wilde, don't complain when thugs run your life.

------------------------------

End of TELECOM Digest Special: Computer Crime


From telecomlist-request@mailinglists.eecs.nwu.edu Sun Jan 28 16:45:50 1990
Received: from delta.eecs.nwu.edu by gaak.LCS.MIT.EDU via TCP with SMTP
	id AA15296; Sun, 28 Jan 90 16:45:46 EST
Received: from mailinglists.eecs.nwu.edu by delta.eecs.nwu.edu id aa08091;
          28 Jan 90 15:26 CST
Received: from mailinglists.eecs.nwu.edu by delta.eecs.nwu.edu id aa19183;
          28 Jan 90 14:21 CST
Date:     Sun, 28 Jan 90 13:16:39 CST
From: TELECOM Moderator <telecom@eecs.nwu.edu>
[To]:     telecom@eecs.nwu.edu
Subject:  TELECOM Digest Special: Kevin Poulsen
Message-Id:  <9001281316.ab04870@delta.eecs.nwu.edu>
Status: RO


TELECOM Digest     Sun, 28 Jan 90 13:15:31 CST    Special: Kevin Poulsen

Today's Topics:                             Moderator: Patrick Townson

    Hacker in Trouble: Loner Gone Astray? (Knight-Ridder via TELECOM Moderator)
    Two Surrender in Military Intrusion Case; Third Sought (Joseph Liu)
----------------------------------------------------------------------

Date: Sun, 28 Jan 90 12:44:00 CST
From: TELECOM Moderator <telecom@eecs.nwu.edu>
Subject: Hacker in Trouble: Loner Gone Astray?


[Moderator's Note: This is the story issued by the Knight-Ridder
Newspapers Syndicate several days ago on Kevin Poulsen. A backlog of
work here has kept me from presenting it before now.  PT]

       ==================================================

    SAN JOSE, Calif. -- When Kevin Poulsen's parents bought him his
first computer, they took his interest in it as a good sign,
particularly because their 16-year-old son had recently dropped out of
high school.
  
The Poulsens couldn't conceive that letting their son cloister himself
in his room all day tapping away at the keyboard could be bad for him.

"He was on it many hours. He would stay up all night. I didn't really
know what he was up to until the law knocked on our door," said his
father, Lee.

The knock by FBI agents was the first brush with the law for Kevin,
then 17. Now 24, he is charged by federal authorities with one of the
country's most widespread cases of computer and telephone crime.

He was charged last week with two others with commandeering the
nation's phone network, monitoring and taping phone conversations and
breaking into government computers, including military installations.
He is still at large. (See next article in this issue.)

In conversations several days ago with Lee Poulsen and the mother of a
former girlfriend of Kevin Poulsen's, a picture emerged of a brilliant
but emotionally troubled loner motivated by a need for attention and
for finding out information that few people knew. 

Annette Randol, the former girlfriend's mother, said young Poulsen
became obsessed with her daughter and began stalking her through the
phone lines and taping her family's conversations. She said that he
bragged that his accomplishments as a hacker had landed him a job with
a Silicon Valley company.

Additionally, Randol and Lee Poulsen both said that the FBI had asked
for Kevin Poulsen's help in tracking down computer and telephone
criminals. But they said Kevin refused because of loyalty to his
hacker friends. 

Poulsen's father said he had last heard from his son three weeks ago
and that he had refused to give him the address for his Los Angeles
apartment. 

Like most hackers, Poulsen started out as a phone phreak, one of those
who pirate the national phone network by obtaining phone numbers and
access codes. 

It was through this network that in April, 1978, Kevin met Sean
Randol, a quiet, bookish young girl who turned out to live only a mile
from the Poulsens in North Hollywood, said Sean's mother, Annette.

Responding to a classified ad, Sean and her mother accidentally
stumbled on a telephone bulletin board that gave out the numbers of
phone phreak conference lines. Once a loner, Sean had found a way to
make new friends and quickly took to the phone phreak networks.

Annette Randol describes the two as soulmates who immediatly hit it
off, both avid readers and both loners. "He started out with my
daughter because she was lonely too," she said. "She loved him, but
she loved him as a friend."

Gradually, after three years, her mother says, the friendship faded.
Sean grew interested in other pursuits and other people. But Kevin
didn't share those feelings and wanted to continue the relationship,
her mother said. It ended abruptly when Kevin returned from the Bay
Area for Christmas and took Sean out to dinner. But instead of
bringing her home, Kevin took Sean on a 'wild ride' that frightened
her. After that, she refused to see him again.

But Sean's refusals just fueled Kevin's obsession. He had his sister,
who worked in the same Los Angeles supermarket as Sean, take pictures
of her at work. And two years ago, he allegedly tapped into the
family's phone lines and taped all their conversations without their
knowledge over a two-week period. Those tapes are part of the
indictments against Poulsen in the case pending. 

Sean was not Kevin's only obsession. Ally Sheedy, the actress who
played the hacker's girlfriend in the movie 'War Games' became the
object of phone preaks' and hackers' desire, a kind of underground
idol. With his friends, Kevin got Sheedy's number and address and
stalked her through the phone lines and surveyed her house in the Los
Angeles area, Randol said.

------------------------------

Date: 27 Jan 90 15:11:47 EST (Sat)
From: josephl@wb3ffv.wb3ffv.AMPR.ORG (Joseph Liu)
To: chinet!patrick
Subject: Two Surrender in Military Intrusion Case; Third Sought


Hello Patrick:

I think this article might be of interest to Digest readers. 

TWO SURRENDER IN MILITARY COMPUTER INTRUSION CASE; THIRD SOUGHT

     Two of three men accused of conspiring to break into a military
computer network and a phone system surrendered to authorities this
week. Remaining at large, though, is the alleged ringleader,
24-year-old Kevin L. Poulsen.

     As reported last week the three are all either current or former
employees of Sun Microsystems and SRI International consulting firm.
They were indicted by a federal grand jury on charges of invading or
trying to invade Pacific Bell Telephone and U.S. Army computers.

     In San Jose, Calif., this week, 25-year-old Mark K. Lottor and
Robert E.  Gilligan, 31, surrendered before U.S. District Court
Magistrate Patricia Trumbull. They entered innocent pleas, were
released on $100,000 bond each and were ordered to return to court
next week.

     The Associated Press says Lottor faces five courts and Gilligan
six in the government's 19-count indictment. The prosecutors contend a
scheme existed to steal military secrets and phone numbers from the
FBI investigation of former Philippine President Ferdinand Marcos.

     Federal officials contend the latest computer tampering began in
1985 and started to fall apart in February 1988 when police found
telephone equipment belonging to Pacific Bell in a storage locker
rented by Poulsen.

     The search continues for Poulsen, charged in 16 counts. He faces
up to 37 years in prison if convicted. The other two suspects face 20
years each if found guilty of all charges.

     AP reports Poulsen is believed to have fled to Los Angeles after
leaving a job with Sun. Incidentally, Poulsen also was an unindicted
co-conspirator in the 1984 computer break-in case at the University of
California at Los Angeles.  His friend, Ron Austin, was convicted on
charges related to the break-in. The wire service quotes authorities
as saying that at the time Poulsen used the computer handle "Dark
Dante."

------------------------------

End of TELECOM Digest Special: Kevin Poulsen