| ==Phrack Inc.== | |
| Volume Three, Issue Thirty-five, File 11 of 13 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Issue XXXV / Part Two PWN | |
| PWN PWN | |
| PWN Compiled by Dispater PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Justice Revs Up Battle On Computer Crime October 7, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Michael Alexander (ComputerWorld)(Page 4) | |
| Washington D.C. -- The nation's top federal computer crime law enforcers | |
| announced plans to escalate the war on computer crime. | |
| At the federal government's 14th National Computer Security Conference held in | |
| Washington D.C., officials at the U.S. Department of Justice said the | |
| department is launching a computer crime unit that will be charged with | |
| prosecuting crimes and pushing for stiffer penalties for convicted computer | |
| outlaws. | |
| "Computer crime is on the rise, and the Justice Department is taking this area | |
| very seriously -- as well as the FBI, U.S. Secret Service, and the military," | |
| said Mary Spearing, chief of general litigation and legal advice in the | |
| criminal division at the Justice Department. | |
| The new crime unit will also advocate closing loopholes in the government's | |
| computer crime statute. The Computer Fraud & Abuse Act of 1986 "is outmoded | |
| and outdated," said Scott Charney, a computer crime prosecutor and chief of the | |
| new computer crime unit. | |
| The Justice Department wants to amend the law with a provision that would make | |
| inserting a virus or worm into a computer system a crime, Charney said. | |
| Those convicted of computer crimes will more often be sentenced according to | |
| federal guidelines rather than on recommendation of prosecutors, who may ask | |
| for lighter penalties, said Mark Rasch, the government's attorney who | |
| prosecuted Robert Morris in the infamous Internet worm case. | |
| A new Justice Department policy now mandates that all defendants will be | |
| treated equally, without regard for personal history or other factors that | |
| might mitigate stiffer sentences, Rasch said. | |
| "The penalties for computer crime will become increasingly more severe," | |
| predicted Kent Alexander, assistant U.S. attorney in Atlanta <prosecutor of the | |
| Atlanta members of the Legion of Doom>. "In five years, they are going to look | |
| back and think a year in jail was a light sentence." | |
| The FBI is "staffing up to address concerns about computer crimes" and | |
| increasing its training efforts, said Mike Gibbons, FBI supervisory special | |
| agent <who worked on both the Morris and the Clifford Stoll KGB hackers | |
| cases>. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Supreme Court Refuses Morris Appeal October 14, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Michael Alexander (ComputerWorld)(Page 14) | |
| Washington, D.C. -- The U.S. Supreme Court refused without comment to hear | |
| Robert T. Morris' appeal last week, ending a legal journey that began nearly | |
| three years ago when he injected a worm into the Internet network. | |
| While the trek is over for Morris, there remain serious questions about the | |
| Computer Fraud and Abuse Act of 1986, the statute under which he was | |
| prosecuted. | |
| The refusal to review the Morris case leave intact a "bone breaker" law that | |
| could transform otherwise law-abiding computer users in felons and inhibit the | |
| creative uses of computer technology according to Thomas Viles, an attorney at | |
| the Silverglate & Good law firm in Boston. Viles authored a friend of the | |
| court brief in the Morris appeal on behalf of the Electronic Frontier | |
| Foundation. | |
| Some legal experts worry that computer users who enter a computer system | |
| without authorization, either unwittingly or with the intention of merely | |
| looking around, could be given penalties that are overly severe. | |
| "A single computer entry is of an entirely different order than the destruction | |
| of data or the intentional alteration of data, just as simple trespass is | |
| pretty minor stuff compared to vandalism or burglary," Viles said. "Now if | |
| people whose livelihoods depend on computers get into somebody else's computer | |
| without authorization, they could be in Leavenworth for five years." | |
| The Morris appeal boiled down to the critical question of whether he intended | |
| to cause the harm that ensued after he set loose his ill-conceived computer | |
| program on November 2, 1988. | |
| In 1990, a federal judge in Syracuse, New York ruled that it was not necessary | |
| for the government to prove that Morris intended to cause harm, only that | |
| Morris intended to access computers with authorization or to exceed | |
| authorization that he may have had. Earlier this year a federal appeals court | |
| upheld Morris' May 1990 conviction under which he received three years | |
| probation, a $10,000 fine, and 400 hours of community service. | |
| That affirmation goes against the widely accepted tenet that an injury can | |
| amount to a crime only when deliberately intended, Viles said. "The law | |
| distinguishes, say, between murder and manslaughter. You can't be guilty of | |
| murder if the killing was utterly accidental and unintended." | |
| A General Accounting Office (GAO) report released in 1989 noted other flaws in | |
| the federal computer statute. While the law makes it a felony to access a | |
| computer without authorization, the law does not define what is meant by | |
| "access" or "authorization," the GAO reported. | |
| UPDATING THE LAW | |
| U.S. Department of Justice Officials recently acknowledged that the Computer | |
| Fraud and Abuse Act is outdated and noted that it should be refined <see | |
| Justice Revs Up Battle On Computer Crime (the previous article)>. Scott | |
| Charney, chief of the Justice Department's newly created computer crime unit, | |
| said the department will lobby to fortify the law with provisions that would | |
| outlaw releasing viruses and worms and make it a felony to access a computer | |
| without authorization and cause damage through reckless behavior. | |
| Trespassing into a computer is more serious than it may appear at first | |
| glance, Charney said. "It is not easy to determine what happened, whether | |
| there was damage, how safe the system now is or what the intruder's motives | |
| were." | |
| Some legal experts said they believe the law is already overly broad and do not | |
| advocate expanding it with new provisions. "It is a far-reaching law, whose | |
| boundaries are still not known," said Marc Rotenberg, an attorney and director | |
| of the Washington, D.C. office of Computer Professionals for Social | |
| Responsibility. "The way I read the law is, the Justice Department has | |
| everything it needs and more," he said. "After the Morris decisions, if you | |
| sneeze, you could be indicted." | |
| The Morris case pointed out deficiencies in the law that have resulted from | |
| technology's rapid advance, said Thomas Guidoboni, the Washington, D.C.-based | |
| attorney who defended Morris. | |
| Neither Guidoboni nor Morris were surprised by the Supreme Court's refusal to | |
| hear his appeal, according to Guidoboni. "Robert's case had a particular | |
| problem in that it was the first one involving the 1986 act. They like to take | |
| cases after the circuit courts had had some chance to play with them and see if | |
| there is a disagreement." | |
| Morris is working as a computer programmer in Cambridge, Massachusetts for a | |
| company that "knows who he is and what he's done," Guidoboni said. He declined | |
| to identify the company. | |
| <Editor's Note: Morris was actually the SECOND person to be tried under the | |
| 1986 Computer Fraud and Abuse Act. The first person was Herbert Zinn, Jr. | |
| a/k/a Shadow Hawk of Chicago, Illinois, who was convicted in 1989 in a | |
| prosecution led by William Cook, a now former assistant U.S. attorney whose | |
| name most of you should recognize from the Craig Neidorf (Knight Lightning) | |
| and Lynn Doucette (Kyrie) cases. | |
| Zinn was tried as a minor and therefore in a bench trial before a sole judge. | |
| Morris is the first person to be tried under the Act in front of a jury. | |
| Zinn's conviction earned him 10 months in a juveniles prison facility in South | |
| Dakota, a fine of $10,000, and an additional 2 1/2 years of probation that | |
| began after his prison term ended. | |
| For additional information about the Shadow Hawk case, please read "Shadow | |
| Hawk Gets Prison Term," which appeared in Phrack World News, Issue 24, | |
| Part 2. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Justice Unit Spurred On By Cross-Border Hackers October 21, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Michael Alexander (ComputerWorld)(Page 6) | |
| Washington D.C. -- The U.S. Department of Justice's formal launch of a computer | |
| crime unit was prompted largely by an alarming rise in computer invasions that | |
| traverse geographic and jurisdictional boundaries, according to a top Justice | |
| Department official. | |
| Robert Mueller III, assistant U.S. attorney general, said the Justice | |
| Department needs to be better prepared to prosecute computer criminals. he is | |
| one of the architects of a five-person unit recently established by the justice | |
| department expressly to combat computer crime. | |
| "One of the principal functions of the unit is to anticipate areas where | |
| federal, state, and local law enforcement will have to expend resources in the | |
| future," Mueller said. "One that comes immediately to our attention is crime | |
| related to computers used as a target as in The Cuckoo's Egg." He was | |
| referring to author Clifford Stoll's account of how he tracked West German | |
| hackers who penetrated U.S. computers for the KGB in exchange for cash and | |
| cocaine. | |
| Increasingly, computer crimes cut across state and international boundaries, | |
| making them difficult to investigate because of jurisdictional limits and | |
| differing laws, Mueller said. The computer crime unit will be charged with | |
| coordinating the efforts of U.S. attorneys general nationwide during | |
| investigations of crimes that may have been committed by individuals in several | |
| states. | |
| One of the unit's first assignments will be to take a pivotal role in OPERATION | |
| SUN-DEVIL, last year's much-publicized roundup of computer hackers in several | |
| states. That investigation is still under way, although no arrests have | |
| resulted, Justice Department officials said. | |
| The unit will coordinate efforts with foreign law enforcers to prosecute | |
| hackers who enter U.S. computer systems from abroad while also working to | |
| promote greater cooperation in prosecuting computer criminals according to | |
| Mueller. | |
| The unit will also assist in investigations when computers are used as a tool | |
| of a crime -- for example, when a computer is used to divert electronically | |
| transferred funds -- and when computers are incidental to a crime, such as when | |
| a money launderer uses a computer to store records of illegal activities, | |
| Mueller said. | |
| "There have been many publicized cases involving people illegally accessing | |
| computers, from phone phreaks to hackers trying to take military information," | |
| said Scott Charney, chief of the new computer unit. "Those cases have high | |
| importance to us because any time that computers are the target of an offense, | |
| the social cost is very high. If you bring down the Internet and cripple 6,000 | |
| machines and inconvenience thousands of users, there is a high social cost to | |
| that type of activity." | |
| The computer crime unit will also work to promote closer cooperation between | |
| the Justice Department and businesses that have been the victims of computer | |
| crime, Charney said. | |
| Law enforcers are better trained and more knowledgeable in investigating and | |
| prosecuting computer crimes, Charney said. "Businesses need not be concerned | |
| that we are going to come in, remove all of their computers, and shut their | |
| businesses down. FBI and Secret Service agents can go in and talk to the | |
| victim in a language they understand and get the information they need with a | |
| minimum amount of intrusion." | |
| <Editor's Note: "Businesses need not be concerned that we are going to come | |
| in, remove all of their computers, and shut their businesses down." Excuse | |
| me, but I think STEVE JACKSON GAMES in Austin, Texas might disagree with that | |
| statement. Mr. Charney -- Perhaps you should issue an apology!> | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| V I E W P O I N T | |
| Let's Look Before We Legislate October 21, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Marc Rotenberg (ComputerWorld)(Page 25) | |
| "Laws Are Adequate To Handle Computer Crime -- 'Net Police' Not Needed" | |
| The U.S. Department of Justice is now circulating a proposal to expand the | |
| reach of federal computer crime law. On first pass, this might seem a sensible | |
| response to concerns about computer crime. The reality, however, it that the | |
| current federal law is more than adequate and the Justice Department proposal | |
| is poorly conceived. | |
| The Justice Department proposal will give federal agencies broad authority to | |
| investigate computer crime, allowing them to intercede in any situations | |
| involving a computer hooked to a network. | |
| Creating a worm or virus could become a felony act, no questions asked. | |
| Espionage laws would be broadened and intent requirements would be lowered. | |
| Certain procedural safeguards would be removed from existing law. | |
| CURRENT LAW ADEQUATE | |
| Taken as a whole, the proposal will make it possible for the federal government | |
| to prosecute many more computer crimes, but the question is whether this | |
| additional authority will improve computer security. Between the current | |
| federal statute, the Morris decision, and the sentencing guidelines, federal | |
| prosecutors already have more than enough tools to prosecute computer crime. | |
| Under the Computer Fraud & Abuse Act, passed in 1984 and amended in 1986, the | |
| unauthorized use of a computer system is a felony. Though the act does not | |
| define what "authorization" is or how it is obtained, a person found guilty | |
| faces up to five years in jail and fines of $250,000. It is a far-reaching law | |
| whose boundaries are still not known. | |
| THE MORRIS FACTOR | |
| The Morris case strengthened the hand of federal prosecutors still further. | |
| The judge ruled that it was not necessary for the government to prove that | |
| Morris intended the harm that resulted when the worm was released, only that he | |
| intended unauthorized use when he did what he did. | |
| >From a common law viewpoint, that's a surprising result. Traditional criminal | |
| law distinguishes between trespass, burglary, and arson. In trespass, which is | |
| a misdemeanor, the offense is entering onto someone else's property. Burglary | |
| is simple theft and arson is destruction. To punish a trespasser as an | |
| arsonist is to presume an intent that may not exist. | |
| A federal appeals court affirmed the Morris decision, and the Supreme Court has | |
| refused to hear his appeal, so now the computer crime statute is essentially a | |
| trip-wire law. The government only has to show that the entry was unauthorized | |
| -- not that any resulting harm was intentional. | |
| There is another aspect of the Morris case that should be clearly understood. | |
| Some people were surprised that Morris served no time and jumped to the | |
| conclusion that sentencing provisions for this type of offense were | |
| insufficient. In fact, under the existing federal sentencing guidelines, | |
| Morris could easily have received two years in jail. The judge in Syracuse, | |
| New York, considered that Morris was a first-time offender, had no criminal | |
| record, was unlikely to commit a crime in the future, and, not unreasonably, | |
| decided that community service and a stiff fine were appropriate. | |
| To "depart" as the judge did from the recommended sentence was unusual. Most | |
| judges follow the guidelines and many depart upwards. | |
| That said, if the Department of Justice persists in its efforts, there are at | |
| least three other issues that should be explored. | |
| UNANSWERED QUESTIONS | |
| First there is the question of whether it is sensible to expand the authority | |
| of federal agents at the expense of local police and state government. If | |
| theft from a cash register is routinely prosecuted by local police, why should | |
| the FBI be called in if the cash register is a computer? | |
| What will happen to the ability of state government to tailor their laws to | |
| their particular needs? Do we really want "Net Police"? | |
| There is also the need to explore the government's performance in recent | |
| computer crime investigations before granting new powers. For example, the | |
| botch Operation Sun-Devil raid, which involved almost one quarter of all Secret | |
| Service agents, resulted in hardly a conviction. (A good cop could have done | |
| better in a night's work.) | |
| In a related investigation, Steve Jackson, the operator of a game business in | |
| Texas was nearly forced out of business by a poorly conceived raid. | |
| In fact, documents just released to Computer Professionals for Social | |
| Responsibility by the Secret Service under the Freedom of Information Act raise | |
| substantial questions about the conduct, scope, and purpose of Operation | |
| Sun-Devil investigations. They reveal, for example, that the Secret Service | |
| monitored and downloaded information from a variety of on-line newsletters and | |
| conferences. | |
| A congressional hearing to assess Operation Sun-Devil would certainly be in | |
| order before granting federal officials new powers. | |
| PROTECTION OF RIGHTS | |
| Finally we should not rush to create new criminal sanctions without fully | |
| recognizing the important civil liberties interests in information | |
| technologies, such as the rights of privacy and free expression. There are, | |
| for example, laws that recognize a special First Amendment interest in newsroom | |
| searches. | |
| But no case has yet made clear the important principle that similar protections | |
| should be extended to computer bulletin boards. New criminal sanctions without | |
| necessary procedural safeguards throws off an important balance in the criminal | |
| justice system. | |
| Expanding the reach of federal law might sound good to many people who are | |
| concerned about computer crime, but broadening criminal law is always | |
| double-edged. Could you prove to a court that you have never used a computer | |
| in an "unauthorized" manner? | |
| <Editor's Note: Marc Rotenberg is the Director of the Washington office of | |
| Computer Professionals for Social Responsibility and he has testified in both | |
| the House of Representatives and the Senate on computer crime legislation.> | |
| _______________________________________________________________________________ | |
| PWN Quicknotes | |
| ~~~~~~~~~~~~~ | |
| 1. Operation Sun-Devil Scope Emerges (ComputerWorld, 10/14/91, page 119) | |
| -- | |
| The Computer Professionals for Social Responsibility (CPSR), an advocacy | |
| group, received more than 2,400 documents from the U.S. Secret Service | |
| under the Freedom of Information Act. The documents relate to Operation | |
| Sun-Devil, last year's nationwide dragnet through the hacker underground. | |
| An early look at the documents reveals that the scope of the operation was | |
| considerably broader than the U.S. Secret Service has admitted, said Marc | |
| Rotenberg, director of CPSR's Washington, D.C. office. CPSR will soon hold | |
| a press conference to discuss the findings, he added. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 2. 6 Police Employees Probed for Wiretaps (Washington Post/AP, 10/24/91, page | |
| A4) -- Jefferson City, Missouri -- Missouri's Highway Patrol is | |
| investigating six employees implicated in three illegal wiretaps, officials | |
| said. | |
| The wiretaps were "stupid" and were intended to "gain personal information | |
| in an effort to supervise subordinates," said Colonel C.E. 'Mel' Fisher, | |
| the patrol's chief. | |
| Fisher said that six employees are on administrative leave without pay | |
| after a two-month internal investigation confirmed conversations were | |
| recorded at patrol headquarters and at a troop office in Kirkwood, | |
| Missouri. | |
| Fisher did not identify the employees, who face hearings that could lead | |
| to possible penalties ranging from a written reprimand to dismissal. It is | |
| a federal felony to conduct an illegal wiretap. He said the FBI | |
| investigated the wiretaps. | |
| Major Bobby G. Gibson, chief of the patrol's Criminal Investigation Bureau, | |
| in which two of the wiretaps occurred, committed suicide on October 9, | |
| 1991. He was among five defendants in a $7 million federal lawsuit filed | |
| recently by a black patrolman, Corporal Oliver Dixon, who alleged he had | |
| been wiretapped and denied promotions because of his race. All of the | |
| defendants, including Fisher, are white. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 3. Patrick Townson, the moderator of the Internet's Telecom Digest | |
| (comp.dcom.telecom) was less than pleased when an unknown person placed | |
| Phrack 34 into alt.dcom.telecom. Townson consistently preaches about the | |
| evils of hacking, but we know that he did not learn everything he knows | |
| about telecommunications in the classroom. See you after World War Three | |
| Pat! We know who you are, we know who you WERE and we know what crimes | |
| you have committed in the realm of telecommunications. We're anxious to | |
| talk some more with you about this in the near future. | |
| See below: | |
| "I assume you saw the stuff which was left in alt.dcom.telecom today: | |
| A whole series of messages telling how to break into several voicemail | |
| systems; how to break into the MILNET; a program designed to discover | |
| passwords; and other obnoxious files. All of them were left by the same | |
| anonymous user at the same non-existent site. Siemens Medical Systems | |
| (one of the victims in the theft-of-voicemail-services tutorial in | |
| alt.dcom.telecom today) has been notified that their 800 number link to | |
| voicemail is now under attack, and given the box number involved. Like | |
| cockroaches, you can stomp on those people all you like; they seem to | |
| survive. One person has said in the event of WW-3, the only species to | |
| survive will be the cockroaches and the hackerphreaks. Good socially | |
| responsible computing, that's what it is! PAT" | |
| _______________________________________________________________________________ | |
| 4. The existence of back issues of Phrack Inc. found in a user's home | |
| directory was enough for a system administrator at Tufts University in | |
| Massachusetts to revoke a users account. Michael Godwin, an attorney for | |
| the Electronic Frontier Foundation went to bat for this individual and | |
| succeeded in restoring the user's account. The incident prompted the | |
| following response by a reader of Telecom Digest (comp.dcom.telecom): | |
| On Oct 19 at 11:51, TELECOM Moderator writes: | |
| > Is it easier and more pragmatic for a | |
| > system administrator to answer to his/her superiors regarding files at | |
| > the site which harassed or defrauded some third party (ie. telco) or | |
| > to simply remove the files and/or discontinue the feed" PAT] | |
| But this requires a judgment call on the part of the system | |
| administrator, does it not? Most of the system administrators that I | |
| know are too busy administering the system to worry about this file or | |
| that feed, except perhaps as it relates to traffic volume or disk space | |
| consumed. | |
| Will we ever get to the point where those in charge will stop dreaming of | |
| practicing mind control? I am so sick of those who are paranoid that | |
| someone somewhere may actually express an uncontrolled thought or idea to | |
| someone else. | |
| Ah, the advantages of owning one's own UUCP site ... | |
| _______________________________________________________________________________ | |
| 5. The National Public Network Begins Now. You Can Help Build it. | |
| Telecommunications in the United States is at a crossroads. With the | |
| Regional Bell Operating Companies now free to provide content, the shape | |
| of the information networking is about to be irrevocably altered. But | |
| will that network be the open, accessible, affordable network that the | |
| American public needs? You can help decide this question. | |
| The Electronic Frontier Foundation recently presented a plan to Congress | |
| calling for the immediate deployment of a national network based on | |
| existing ISDN technology, accessible to anyone with a telephone | |
| connection, and priced like local voice service. We believe deployment of | |
| such a platform will spur the development of innovative new information | |
| services, and maximize freedom, competitiveness, and civil liberties | |
| throughout the nation. | |
| The EFF is testifying before Congress and the FCC; making presentations to | |
| public utility commissions from Massachusetts to California; and meeting | |
| with representatives from telephone companies, publishers, consumer | |
| advocates, and other stakeholders in the telecommunications policy debate. | |
| The EFF believes that participants on the Internet, as pioneers on the | |
| electronic frontier, need to have their voices heard at this critical | |
| moment. | |
| To automatically receive a description of the platform and details, send | |
| mail to archive-server@eff.org, with the following line: | |
| send documents open-platform-overview | |
| or send mail to eff@eff.org. | |
| _______________________________________________________________________________ | |
| 6. The September/October 1991 issue of The Humanist has a cover story | |
| regarding Cyberspace, rights and freedoms on nets such as Usenet, and makes | |
| reference to Craig Neidorf, Jolnet, Prodigy and other matters. | |
| _______________________________________________________________________________ | |
| 7. A Virginia Beach restaurateur plead guilty to illegally taping a telephone | |
| call by Governor L. Douglas Wilder and said he arranged for the tape to be | |
| delivered to the staff of Senator Charles Robb, D-Va., hoping it would be | |
| damaging to Wilder and politically helpful to Robb. | |
| Robert Dunnington, a onetime social companion of Robb's, admitted in | |
| federal court that he intercepted a 1988 car phone call by then-Lt. | |
| Governor Wilder as part of his hobby of monitoring and recording cellular | |
| calls. | |
| From February 1988 to October 1990, Dunnington overheard and taped hundreds | |
| of calls and, his attorney said, it was "just happenstance" that Wilder's | |
| call was picked up. (Washington Post) | |
| _______________________________________________________________________________ | |
| 8. A Federal District Judge in New York ruled that a computer-network company | |
| is not legally liable for the contents of information it disseminates. | |
| While the decision could be influential because it tackles free speech on | |
| an electronic network, it is not clear how the ruling would affect bulletin | |
| boards ^S^Qon which users add comments. The decision concerned an electronic | |
| gossip column carried by CompuServe. In the decision, the judge stated | |
| "CompuServe has no more editorial control over such a publication than | |
| does a public library, bookstore or newsstand, and it would be no more | |
| feasible for CompuServe to examine every publication it carries for | |
| potentially defamatory statements than it would be for any other | |
| distributor to do so." (Wall Street Journal, October 31, 1991) | |
| _______________________________________________________________________________ | |