| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Issue XXXVII / Part One of Four PWN | |
| PWN PWN | |
| PWN Compiled by Dispater & Spirit Walker PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Federal Seizure Of "Hacker" Equipment December 16, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Barbara E. McMullen & John F. McMullen (Newsbytes) | |
| "New York's MOD Hackers Get Raided!" | |
| NEW YORK CITY -- Newsbytes has learned that a joint Unites States Secret | |
| Service / Federal Bureau of Investigation (FBI) team has executed search | |
| warrants at the homes of so-called "hackers" at various locations across the | |
| country and seized computer equipment. | |
| It is Newsbytes information that warrants were executed on Friday, December 6th | |
| in various places including New York City, Pennsylvania, and the state of | |
| Washington. According to informed sources, the warrants were executed pursuant | |
| to investigations of violations of Title 18 of the federal statutes, sections | |
| 1029 (Access Device Fraud), 1030 (Computer Fraud and Abuse Act), 1343 (Wire | |
| Fraud), and 2511 (Wiretapping). | |
| Law enforcement officials contacted by Newsbytes, while acknowledging the | |
| warrant execution, refused to comment on what was called "an on-going | |
| investigation." One source told Newsbytes that the affidavits underlying the | |
| search warrants have been sealed due to the on-going nature of the | |
| investigation." | |
| He added "There was obviously enough in the affidavits to convince judges that | |
| there was probable cause that evidence of a crime would be found if the search | |
| warrants were issued." | |
| The source also said that he would expect a statement to be issued by the | |
| Secret Service/FBI team "somewhere after the first of the year." | |
| _______________________________________________________________________________ | |
| Two Cornell Students Arrested for Spreading Computer Virus February 27, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Lee A Daniels (New York Times News Service) | |
| Special Thanks: Risks Digest | |
| Two Cornell University undergraduates were arrested Monday night and charged | |
| with developing and spreading a computer virus that disrupted computers as far | |
| away as California and Japan, Cornell officials said. M. Stewart Lynn, vice | |
| president for information technologies at the university in Ithaca, N.Y., | |
| identified the students as David Blumenthal and Mark Pilgrim. Lynn said that | |
| both Blumenthal, who is in the engineering program, and Pilgrim, in the college | |
| of arts and sciences, were 19-year-old sophomores. They were arrested on the | |
| evening of February 24 by Cornell and Ithaca police officers. Lynn said the | |
| students were arraigned in Ithaca City Court on charges of second-degree | |
| computer tampering, a misdemeanor, and taken to the county jail. Lynn said | |
| authorities believed that the two were responsible for a computer virus planted | |
| in three Macintosh games on February 14. | |
| He identified the games as Obnoxious Tetris, Tetricycle and Ten Tile Puzzle. | |
| The virus may have first appeared in a Stanford University public computer | |
| archive and spread from there through computer users who loaded the games into | |
| their own computers. | |
| Lynn said officials at Cornell and elsewhere became aware of the virus last | |
| week and quickly developed what he described as "disinfectant" software to | |
| eradicate it. He said officials traced the virus to Cornell last week, but he | |
| would not specify how that was done or what led officials to the two students. | |
| Lynn said he did not yet know how much damage the virus had caused. "At | |
| Cornell we absolutely deplore this kind of behavior," he said. | |
| Note: References to the Robert Morris, Jr. virus incident at Cornell deleted. | |
| Associated Press reported that both defendants are being held in the | |
| Tompkins County Jail on $10,000 bail. | |
| _______________________________________________________________________________ | |
| Man Admits to NASA Hacking November 26, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By John C Ensslin (Rocky Mountain News)(Page 6) | |
| Also see Phrack 34, File 11 | |
| Special Thanks: The Public | |
| A self-taught computer hacker with a high school education admitted Monday to | |
| breaking into a sensitive NASA computer system -- in less time than it takes | |
| the Broncos to play a football game. | |
| Richard G. Wittman Jr., 24, told Denver U.S. District Judge Sherman Finesilver | |
| that it took him about "1 1/2 to 2 hours" on a personal computer using | |
| telephone lines in his apartment to tap into the space agency's restricted | |
| files. | |
| Wittman pleaded guilty Monday to one felony count of altering information | |
| -- a password -- inside a federal computer. In exchange for the plea, federal | |
| prosecutors dropped six similar counts in indictments handed up in September. | |
| The Northglenn High School graduate told the judge he hadn't had much schooling | |
| in computers. Most of what he knew about computers he learned from books. | |
| And most of those books, he said, are in a federal warehouse, seized after FBI | |
| agents searched his Westminster apartment last year. | |
| "Do you think you could teach these two lawyers about computers?" Finesilver | |
| asked, referring to Wittman's public defender and the prosecutor. "Probably," | |
| Wittman replied. | |
| Wittman not only broke into 118 NASA systems, he also reviewed files and | |
| electronic mail of other users, said assistant U.S. attorney Gregory C. Graf. | |
| It took NASA investigators nearly 300 hours to track Wittman an another 100 | |
| hours to rewrite the software, Graf said. | |
| Wittman faces up to five years in prison and a $250,000 fine. But Graf said | |
| the government will seek a much lighter penalty when Wittman is sentenced in | |
| Jan. 13. | |
| Both sides have agreed on repayment of $1,100 in collect calls placed to the | |
| other computer system. But they differ on whether Wittman should be held | |
| responsible for the cost of new software. | |
| _______________________________________________________________________________ | |
| Hacker Pleads Guilty December 5, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~ | |
| Special Thanks: Iron Eagle | |
| "A 24-year-old Denver hacker who admitted breaking into a sensitive NASA | |
| computer system pleaded guilty to a felony count of altering information. | |
| In exchange for the plea Monday, federal prosecutors dropped six similar counts | |
| against Richard G. Wittman Jr., who faced up to five years in prison and a | |
| $250,000 fine. Authorities said the government will seek a much lighter | |
| penalty when Wittman is sentenced January 13. | |
| Both sides have agreed on repayment of $1,100 in collect calls he placed to the | |
| computer system, but they differ on whether Wittman should be held responsible | |
| for the cost of new software. | |
| Wittman told U.S. District Judge Sherman Finesilver that it took him about two | |
| hours on a personal computer in his apartment to tap into the space agency's | |
| restricted files. It took NASA investigators nearly 300 hours to track Wittman | |
| and an additional 100 hours to rewrite the software to prevent a recurrence, | |
| prosecutors said." | |
| _______________________________________________________________________________ | |
| Recent Novell Software Contains A Hidden Virus December 20, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By John Markoff (New York Times) | |
| The nation's largest supplier of office-network software for personal computers | |
| has sent a letter to approximately 3,800 customers warning that it | |
| inadvertently allowed a software virus to invade copies of a disk shipped | |
| earlier this month. | |
| The letter, sent on Wednesday to customers of Novell Inc., a Provo, Utah, | |
| software publisher, said the diskette, which was mailed on December 11, had | |
| been accidentally infected with a virus known by computer experts as "Stoned | |
| 111." | |
| A company official said yesterday that Novell had received a number of reports | |
| >from customers that the virus had invaded their systems, although there had | |
| been no reports of damage. | |
| But a California-based computer virus expert said that the potential for damage | |
| was significant and that the virus on the Novell diskette frequently disabled | |
| computers that it infected. | |
| MASSIVE POTENTIAL LIABILITIES | |
| "If this was to get into an organization and spread to 1,500 to 2,000 machines, | |
| you are looking at millions of dollars of cleanup costs," said John McAfee, | |
| president of McAfee & Associates, a Santa Clara, Calif. antivirus consulting | |
| firm. "It doesn't matter that only a few are infected," he said. "You can't | |
| tell. You have to take the network down and there are massive potential | |
| liabilities." Mr. McAfee said he had received several dozen calls from Novell | |
| users, some of whom were outraged. | |
| The Novell incident is the second such case this month. On December 6, Konami | |
| Inc., a software game manufacturer based in Buffalo Grove, 111.wrote customers | |
| that disks of its Spacewrecked game had also become infected with an earlier | |
| version of the Stoned virus. The company said in the letter that it had | |
| identified the virus before a large volume of disks had been shipped to | |
| dealers. | |
| SOURCE OF VIRUS UNKNOWN | |
| Novell officials said that after the company began getting calls earlier this | |
| week, they traced the source of the infection to a particular part of their | |
| manufacturing process. But the officials said they had not been able to | |
| determine how the virus had infected their software initially. | |
| Novell's customers include some of nation's largest corporations. The | |
| software, called Netware, controls office networks ranging from just two or | |
| three machines to a thousand systems. | |
| "Viruses are a challenge for the marketplace," said John Edwards, director of | |
| marketing for Netware systems at Novell. "But we'll keep up our vigilance. He | |
| said the virus had attacked a disk that contained a help encyclopedia that the | |
| company had distributed to its customers. | |
| SERVERS SAID TO BE UNAFFECTED | |
| Computer viruses are small programs that are passed from computer to computer | |
| by secretly attaching themselves to data files that are then copied either by | |
| diskette or via a computer network. The programs can be written to perform | |
| malicious tasks after infecting a new computer, or do no more than copy | |
| themselves from machine to machine. | |
| In its letter to customers the company said that the Stoned 111 virus would not | |
| spread over computer networks to infect the file servers that are the | |
| foundation of networks. File servers are special computers with large disks | |
| that store and distribute data to a network of desktop computers. | |
| The Stoned 111 virus works by attaching itself to a special area on a floppy | |
| diskette and then copying itself into the computer's memory to infect other | |
| diskettes. | |
| But Mr. McAfee said the program also copied itself to the hard disk of a | |
| computer where it could occasionally disable a system. In this case it is | |
| possible to lose data if the virus writes information over the area where a | |
| special directory is stored. | |
| Mr. McAfee said that the Stoned 111 virus had first been reported in Europe | |
| just three months ago. The new virus is representative of a class of programs | |
| known as "stealth" viruses, because they mask their location and are difficult | |
| to identify. Mr. McAfee speculated that this was why the program had escaped | |
| detection by the company. | |
| STEPS TOWARD DETECTION | |
| Novell has been moving toward adding new technology to its software to make it | |
| more difficult for viruses to invade it, Mr. Edwards said. Recently, the | |
| company licensed special digital-signature software that makes it difficult for | |
| viruses to spread undetected. Novell plans to add this new technology to the | |
| next major release of its software, due out at the end of 1992. | |
| In the past, courts have generally not held companies liable for damages in | |
| cases where a third party is responsible, said Susan Nycum, a Palo Alto, | |
| California, lawyer who is an expert on computer issues. "If they have been | |
| prudent it wouldn't be fair to hold them liable," she said. "But ultimately it | |
| may be a question for a jury." | |
| _______________________________________________________________________________ | |
| Working Assets Long Distance! January 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Taken from an advertisement in Mother Jones | |
| (Not pictured is a photo of a college student giving "the finger" to someone | |
| and a caption that reads 'Twenty years later, we've given people a better way | |
| to put this finger to use.') | |
| The advertisement reads as follows: | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Sit-ins. Protest marches, Flower power. Times have changed but the need for | |
| grass roots involvement hasn't. | |
| Introducing "Working Assets Long Distance." The ONLY phone company that is | |
| as committed to social and political change as you are. Every time you use | |
| your finger to make a long distance call, one percent of the bill goes to | |
| non-profit action groups at no cost to you. Hard-hitting advocacy groups like | |
| AMNESTY INTERNATIONAL, GREENPEACE, PLANNED PARENTHOOD, FEDERATION OF AMERICA, | |
| THE AMERICAN CIVIL LIBERTIES UNION, and many others. | |
| We're more than a phone company that gives money to good causes. Our intent | |
| is to make your individual voice heard. That's why we offer *FREE CALLS* to | |
| corporate and political leaders. And well-argued letters at a fraction of | |
| the cost of a mail-gram. So you can demand a halt to clear-cutting our | |
| ancient forests or let Senators know how you feel about important issues like | |
| reproductive rights. It's that simple. Your phone becomes a tool for | |
| democracy and you don't give up a thing. You see, Working Assets comes with | |
| the exact same service as the major long distance carriers. Convenient | |
| dial 1 calling 24-hour operation and fiber optic sound quality. All this at | |
| rates lower that AT&T's basic rates. And signing up couldn't be simpler. | |
| Just give us a call at 1-800-788-8588 ext 114 or fill out the coupon today. | |
| We'll hook you up right away without any intrusion or interruption. So you | |
| can help change the world without lifting a finger. Ok, maybe one finger. | |
| _______________________________________________________________________________ | |
| Computer Virus Used in Gulf War January 12, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Taken from The Boston Globe (Page 12) | |
| Special Thanks: Tone Surfer | |
| Several weeks before the start of the Gulf War, US intelligence agents inserted | |
| a computer virus into a network of Iraqi computers tied to that country's air | |
| defense system, a news magazine reports. US News and World Report said the | |
| virus was designed by the supersecret National Security Agency at Fort Meade, | |
| Maryland, and was intended to disable a mainframe computer. | |
| The report, citing two unidentified senior US officials, said the virus | |
| appeared to have worked, but it gave no details. It said the operation may | |
| have been irrelevant, though, since the allies' overwhelming air superiority | |
| would have ensured the same results of rendering the air defense radars and | |
| missiles ineffective. The secret operation began when American intelligence | |
| agents identified a French made computer printer that was to be smuggled from | |
| Amman, Jordan, to a military facility in Baghdad. | |
| The agents in Amman replaced a computer chip in the printer with another | |
| micro-chip that contained the virus in its electronic circuits. By attacking | |
| the Iraqi computer through the printer, the virus was able to avoid detection | |
| by normal electronic security procedures, the report said. "Once the virus was | |
| in the system, the US officials explained, each time an Iraqi technician opened | |
| a "window" on his computer screen to access information, the contents of the | |
| screen simply vanished," US News reported. | |
| The report is part of a book, based on 12 months of research by US News | |
| reporters, called "Triumph without Victory: The Unreported History of the | |
| Persian Gulf War," to be published next month. | |
| _______________________________________________________________________________ | |
| Indictments of "Information Brokers" January 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Taken from The Privacy Journal | |
| The unholy alliance between "information brokers" and government bureaucrats | |
| who provide personal information has been uncovered in the grand jury | |
| indictments of 18 persons in 14 states. | |
| United States Attorney Michael Chertoff in Newark, New Jersey, and his | |
| counterpart in Tampa, Florida, accused eight "information brokers" (or | |
| "information gatekeepers" or "super bureaus") of bribing two Social Security | |
| Administration employees to provide confidential earnings and employee | |
| information stored in federal computer files. The brokers, who fill in the | |
| cracks not occupied by national credit bureaus and who also track the | |
| whereabouts of persons, would sell the information to their clients -- | |
| retailers, lawyers, detectives, insurance companies, and others. | |
| Ned Flemming, president of Super Bureau Inc. of Montery, California, was | |
| indicted on 32 counts for coaxing a Social Security supervisor in New Jersey | |
| named Joseph Lynch (who was not charged) to provide confidential personal | |
| information for a fee. Fleming's daughter, Susan, was charged also, as were | |
| Victor Fought, operator of Locate Unlimited in Mesa, Arizona; George T. | |
| Theodore, owner of Tracers Worldwide Services in Corpus Christi, Texas; | |
| Richard Stone, owner of Interstate Information Services in Port Jefferson, New | |
| York; and Michael Hawes, former owner of International Criminal Investigative | |
| Agency (ICIA) in Port Angeles, Washington, for participating in the same | |
| conspiracy. Another broker, Joseph Norman Dillon Ross, who operates a firm | |
| under his name in Pauma Valley, California also accepted the personal data, | |
| according to Chertoff, but was not charged. Richard Stone was further indicted | |
| for corrupting a Social Security claims clerk in Melrose Park, Illinois. Also | |
| charged were Allen Schweitzer and his wife Petra, who operate Security Group | |
| Group in Sumner, Washington. | |
| The government employees also stole personal information from the FBI's | |
| National Crime Information Center (NCIC), which stores data on arrests and | |
| missing persons. | |
| Fleming told Privacy Journal that he had never met Lynch. Stone refused to | |
| comment. Tracers Worldwide, ICIA, and Locate Unlimited are not listed in | |
| telephone information, although all three companies are required by the Fair | |
| Credit Reporting Act to permit the subjects of their files to have disclosure | |
| of such information to them. | |
| The 18-month long investigation culminating in the December 18 indictments and | |
| arrests is only the first phase, said Assistant U.S. Attorney Jose Sierra. "We | |
| don't think it stops there." | |
| For the past three years, the Big Three credit bureaus have continued to sell | |
| credit information regularly to information brokers, even after complaints that | |
| some of them violated the Fair Credit Reporting Act in disclosing credit | |
| information for impermissible purposes. Trans Union's president, Albert | |
| Flitcraft, told Congress in 1989 that is was not possible for a major credit | |
| bureau to protect consumer information sold to brokers. John Baker, Equifax | |
| senior vice-president, said at the time that the Big Three would "put together | |
| our best thinking" to see if safeguards could be developed. By 1991, Oscar | |
| Marquis, vice-president of Trans Union, was asking Congress for solutions, but | |
| Baker presented Equifax's new guidelines and checklist for doing business with | |
| the brokers. None of the Big Three has been willing to cease doing business | |
| with the cloudy merchants of recycled credit reports -- and of purloined Social | |
| Security and FBI information. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Meanwhile, at the Internal Revenue Service... | |
| Two weeks after he blew the cover off the information brokers, U.S. Attorney | |
| Michael Chertoff in New Jersey indicted a retired chief of the Internal Revenue | |
| Service Criminal Investigation Division for selling personal information to a | |
| California private investigative firm in his last week on the job in 1988. | |
| For a $300 payment, according to the indictment, the IRS executive, Robert G. | |
| Roche, promised to procure non-public marital records from vital records | |
| offices. Using false pretenses, he ordered one of his subordinates to get the | |
| information, on government time. The aide got the records in one instance only | |
| after writing out an IRS summons and in another instance after producing a | |
| letter on IRS stationary saying the information was needed for "official | |
| investigative matters." Roche, according to the U.S. Attorney, accepted | |
| payment from the California investigative firm of Saranow, Wells, & Emirhanian, | |
| part of a larger network called Financial Investigative Services Group. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| The Privacy Journal is an independent monthly on privacy in the computer age. | |
| They can be reached at: | |
| Privacy Journal | |
| P.O Box 28577 | |
| Providence, Rhode Island 02908 | |
| (401)274-7861 | |
| _______________________________________________________________________________ | |
| SSA, FBI Database Violations Prompt Security Evaluations January 13, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Kevin M. Baerson (Federal Computer Week)(Pages 1, 41) | |
| Indictments recently handed down against insiders who bought and sold | |
| confidential information held in Federal Bureau of Investigation and Social | |
| Security Administration computers have prompted agency officials to evaluate | |
| how well the government secures its databases. | |
| "I see this as positive more than negative," said David Nemecek, section chief | |
| for the FBI's National Crime Information Center (NCIC), which contains data on | |
| thousands of people suspected and convicted of crimes. "Am I happy it | |
| happened? No. But it led us to discovering that this was happening and it | |
| sends a message that if people try it, they will get caught." | |
| But Renny DiPentima, assistant commissioner of SSA's Office of System Design | |
| and Development, said he did not view the indictments as a positive | |
| development. | |
| "It's not a victory," DiPentima said. "Even if we catch them, it's a loss. My | |
| victory is when I never have a call that someone has abused their position." | |
| The "information broker" bust was the culmination of an 18-month investigation | |
| by the Department of Health and Human Services' inspector general's office in | |
| Atlanta. Officials said it was the largest case ever prosecuted involving the | |
| theft of federal computer data. More indictments could be forthcoming, they | |
| said. | |
| Special agents from the FBI joined the inquiry and in the end nabbed 18 people | |
| >from 10 states, including one former and two current SSA employees. Others | |
| indicted were a Chicago police officer, an employee of the Fulton County | |
| Sheriff's Office in Georgia, and several private investigators. | |
| The indictments alleged that the investigators paid for confidential data, | |
| including criminal records and earnings histories, that was lifted from the | |
| databases by people who exploited their access to the records. | |
| "The FBI cannot manage every person in the United States," Nemecek said. "We | |
| have all kinds of protection to prevent this from happening. We keep logs of | |
| who uses the systems and for what, security training programs and routine | |
| audits of inquiries." | |
| "But the people who committed the violations had access to the system, and | |
| there's only one way to deal with that: aggressive prosecution of people who do | |
| this. And the FBI is actively pursuing these individuals." | |
| DiPentima's problem is equally delicate. His agency performs 15 million | |
| electronic transactions per day -- 500 per second -- and monitoring the rights | |
| and wrongs of those people is a daunting task. | |
| Currently, every employee who uses the network is assigned a password and | |
| personal identification number, which change frequently. Depending on the | |
| nature of the employee's job, the PIN grants him access to certain types of | |
| information. | |
| If the employee tries to access a menu in the system that he has not been | |
| authorized to enter, or makes more than one error in entering his PIN number, | |
| he is locked off the system. Once that happens, only a security office from | |
| one of SSA's 10 regional offices can reinstate the employee. | |
| An SSA section chief and six analysts, working from the agency's data center | |
| headquarters outside Baltimore, also search routinely for transactional | |
| aberrations such as employees who have made an unusual number of transactions | |
| on a certain account. | |
| The FBI also has a number of security precautions in place. FBI personnel | |
| conduct random audits of searches, and Nemecek said sweeping state and local | |
| audits of the system are performed biannually. Furthermore, if the FBI | |
| desires, it easily can track an access request back to the terminal and user it | |
| came from. | |
| DiPentima said that in the wake of the indictments, he is considering new | |
| policies to clamp down on abusers. | |
| Nemecek said that as the FBI continues upgrading the NCIC database, the center | |
| might automate further its auditing of state and local agencies to detect | |
| patterns and trends of use the way SSA does. | |
| But despite efforts to tighten the screws on network security, both men realize | |
| that in cases of federal and municipal employees who exploit authorized access, | |
| technology and policies can only go so far in affecting human nature. | |
| _______________________________________________________________________________ | |
| Free University Suffers Damage. February 24, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By The Dude (of Holland) | |
| An investigation by the Amsterdam police, in cooperation with an anti-fraud | |
| team of the CRI (sort of like the FBI), and the geographical science department | |
| of the Free University has led to the arrests of two hackers. The two had | |
| succeeded to break into the department's computer system and caused damage of | |
| over 100,000 Dutch Guilders. | |
| In a press conference, held by the research teams last Friday, it was stated | |
| that the duo, a 25-year old computer-science engineer R.J.N. from Nuenen | |
| [aka Fidelio] and a 21-year old student computer-science H.H.H.W. from Roermond | |
| [aka Wave], were the first "hackers" to be arrested in the Netherlands. In | |
| several other countries this has already happened before. | |
| The arrested hackers made a complete confession. Since November 1991, they | |
| have entered the University's computer between 30 and 40 times. The system | |
| was known as "bronto." From this system the hackers were able to gain access | |
| to other systems, thus travelling to systems in the US, Scandinavia, Spain and | |
| Italy. | |
| According to the leader of the computer-crime team of the Amsterdam police, | |
| D. Komen, the two cracked codes of the VU-system to get in. They got their | |
| hands on so-called "passwords" of officially registered users, which allowed | |
| them to use the system at no cost. They were also able to get the "highest of | |
| rights" within the computer system "bronto." | |
| A total of four houses were searched, and several PC's, printouts and a large | |
| quantity of diskettes was seized. The duo was taken to the DA and imprisoned. | |
| Because "hacking" is not a criminal offense in the Netherlands, the suspects | |
| are officially accused of falsification of records, destruction of property, | |
| and fraud. | |
| This year the government expects to enact legislation that will make hacking a | |
| criminal offense, according to P.Slort of the CRI. | |
| The hacker-duo stated that they undertook their illegal activities because of | |
| fanatic "hobbyism." "It's a kick to see how far you can go", says Mr. Slort of | |
| the CRI. The two said they did not know that their data journeys had caused | |
| enormous damages. The police do not see them as real criminals, either since | |
| the pair did not earn money from their activities. | |
| _______________________________________________________________________________ | |
| Computer Engineer Gets Death Sentence February 9, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Special Thanks: Ninja Master | |
| Richard Farley was cool to the end, taking a sip of water and smoothing his | |
| jacket before leaving the courtroom where he was sentenced to die for killing | |
| seven people in a rage over unrequited love. | |
| "I'm not somebody who is demonstrative or prone to shedding tears", Farley said | |
| Friday before apologizing for the slayings. "I do feel sorry for the | |
| victims....I'm not a perfect human being. I'm good. I'm evil." | |
| Farley was convicted in October of the 1988 slayings at ESL Inc., a Sunnyvale | |
| defense contractor. Jurrors on November 1st recommended the death penalty for | |
| the computer engineer, who prosecutors said planned the rampage to get the | |
| attention of a former co-worker who rejected him. | |
| Superior Court Judge Joseph Biafore Jr. called Farley a vicious killer who had | |
| "complete disregard for human life." | |
| "The defendant...killed with the attention to prove to the object of his | |
| unrequited love that he wasn't a wimp anymore," Biafore said. | |
| During the trial, prosecutors detailed Farley's 3 1/2-year obsessive pursuit of | |
| Laura Black. He sent her more than 100 letters, followed her day and night, | |
| left gifts on her desk, and rifled through confidential personnel files to | |
| glean tidbits about her life. | |
| Despite her repeated rejections, Farley persisted and was fired in 1987 for | |
| harassing her. A year later, he returned to ESL. | |
| Black, 30, was shot in the shoulder during the rampage, but survived to testify | |
| against Farley. She said that about a week before the slayings, she had | |
| received a court order to keep him away. | |
| Farley, 43, admitted the killings but pleaded not guilty, saying he never | |
| planned to kill but only wished to get Black's attention or commit suicide in | |
| front of her for rejecting him. | |
| Farley's attorney, Gregory Paraskou, argued that Farley's judgement was clouded | |
| by his obsession with Black and that he was not violent before the slayings and | |
| likely would not kill again. | |
| But Asst. Dist. Atty. Charles Constantinides said Farley spent years preparing | |
| for the murder by taking target practice and buying weapons, including the | |
| firearms and 98 pounds of ammunition he used at ESL. | |
| The judge rejected the defense's request for a modified sentence of life in | |
| prison and a request for a new trial. Under California law, Farley's death | |
| sentence will be automatically sent to the state Supreme Court for review. | |
| Among those in the courtroom were family members of some of the victims, | |
| including four who addressed the judge. | |