[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: PWN/Part 1 ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ] [ 71 ]
Current issue : #37 | Release date : 1992-03-01 | Editor : Dispater
IntroductionDispater
Phrack LoopbackPhrack Staff
Pirate's CoveRambone
Exploring Information-AmericaWhite Knight & The Omega
Beating The Radar Rap Part 1 of 2Dispater
Card-O-Rama: Magnetic Stripe Technology and BeyondCount Zero
Users Guide to VAX/VMS Part 2 of 3Black Kat
Basic Commands for the VOS SystemDr. No-Good
The CompuServe CaseEFF
PWN Special Report VI on WeenieFest '92Count Zero
PWN/Part 1Spirit Walker
PWN/Part 2Spirit Walker
PWN/Part 3Spirit Walker
PWN/Part 4Spirit Walker
Title : PWN/Part 1
Author : Spirit Walker
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN       Issue XXXVII / Part One of Four       PWN
              PWN                                             PWN
              PWN     Compiled by Dispater & Spirit Walker    PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


 Federal Seizure Of "Hacker" Equipment                        December 16, 1991
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Barbara E. McMullen & John F. McMullen (Newsbytes)

                      "New York's MOD Hackers Get Raided!"

NEW YORK CITY -- Newsbytes has learned that a joint Unites States Secret
Service / Federal Bureau of Investigation (FBI) team has executed search
warrants at the homes of so-called "hackers" at various locations across the
country and seized computer equipment.

It is Newsbytes information that warrants were executed on Friday, December 6th
in various places including New York City, Pennsylvania, and the state of
Washington.  According to informed sources, the warrants were executed pursuant
to investigations of violations of Title 18 of the federal statutes, sections
1029 (Access Device Fraud), 1030 (Computer Fraud and Abuse Act), 1343 (Wire
Fraud), and 2511 (Wiretapping).

Law enforcement officials contacted by Newsbytes, while acknowledging the
warrant execution, refused to comment on what was called "an on-going
investigation." One source told Newsbytes that the affidavits underlying the
search warrants have been sealed due to the on-going nature of the
investigation."

He added "There was obviously enough in the affidavits to convince judges that
there was probable cause that evidence of a crime would be found if the search
warrants were issued."

The source also said that he would expect a statement to be issued by the
Secret Service/FBI team "somewhere after the first of the year."
_______________________________________________________________________________

 Two Cornell Students Arrested for Spreading Computer Virus   February 27, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Lee A Daniels (New York Times News Service)
 Special Thanks: Risks Digest

Two Cornell University undergraduates were arrested Monday night and charged
with developing and spreading a computer virus that disrupted computers as far
away as California and Japan, Cornell officials said.  M. Stewart Lynn, vice
president for information technologies at the university in Ithaca, N.Y.,
identified the students as David Blumenthal and Mark Pilgrim.  Lynn said that
both Blumenthal, who is in the engineering program, and Pilgrim, in the college
of arts and sciences, were 19-year-old sophomores.  They were arrested on the
evening of February 24 by Cornell and Ithaca police officers.  Lynn said the
students were arraigned in Ithaca City Court on charges of second-degree
computer tampering, a misdemeanor, and taken to the county jail.  Lynn said
authorities believed that the two were responsible for a computer virus planted
in three Macintosh games on February 14.

He identified the games as Obnoxious Tetris, Tetricycle and Ten Tile Puzzle.
The virus may have first appeared in a Stanford University public computer
archive and spread from there through computer users who loaded the games into
their own computers.

Lynn said officials at Cornell and elsewhere became aware of the virus last
week and quickly developed what he described as "disinfectant" software to
eradicate it.  He said officials traced the virus to Cornell last week, but he
would not specify how that was done or what led officials to the two students.
Lynn said he did not yet know how much damage the virus had caused.  "At
Cornell we absolutely deplore this kind of behavior," he said.

Note: References to the Robert Morris, Jr. virus incident at Cornell deleted.
      Associated Press reported that both defendants are being held in the
      Tompkins County Jail on $10,000 bail.
_______________________________________________________________________________

 Man Admits to NASA Hacking                                   November 26, 1991
 ~~~~~~~~~~~~~~~~~~~~~~~~~~
 By John C Ensslin (Rocky Mountain News)(Page 6)
 Also see Phrack 34, File 11
 Special Thanks: The Public

A self-taught computer hacker with a high school education admitted Monday to
breaking into a sensitive NASA computer system -- in less time than it takes
the Broncos to play a football game.

Richard G. Wittman Jr., 24, told  Denver U.S. District Judge Sherman Finesilver
that it took him about "1 1/2 to 2 hours" on a personal computer using
telephone lines in his apartment to tap into the space agency's restricted
files.

Wittman pleaded guilty Monday to one felony count of altering information
-- a password -- inside a federal computer.  In exchange for the plea, federal
prosecutors dropped six similar counts in indictments handed up in September.

The Northglenn High School graduate told the judge he hadn't had much schooling
in computers.  Most of what he knew about computers he learned from books.
And most of those books, he said, are in a federal warehouse, seized after FBI
agents searched his Westminster apartment last year.

"Do you think you could teach these two lawyers about computers?"  Finesilver
asked, referring to Wittman's public defender and the prosecutor.  "Probably,"
Wittman replied.

Wittman not only broke into 118 NASA systems,  he also reviewed files and
electronic mail of other users, said assistant U.S. attorney Gregory C. Graf.

It took NASA investigators nearly 300 hours to track Wittman an another 100
hours to rewrite the software, Graf said.

Wittman faces up to five years in prison and a $250,000 fine.  But Graf said
the government will seek a much lighter penalty when Wittman is sentenced in
Jan. 13.

Both sides have agreed on repayment of $1,100 in collect calls placed to the
other computer system.   But they differ on whether Wittman should be held
responsible for the cost of new software.
_______________________________________________________________________________

 Hacker Pleads Guilty                                          December 5, 1991
 ~~~~~~~~~~~~~~~~~~~~
 Special Thanks: Iron Eagle

"A 24-year-old Denver hacker who admitted breaking into a sensitive NASA
computer system pleaded guilty to a felony count of altering information.

In exchange for the plea Monday, federal prosecutors dropped six similar counts
against Richard G. Wittman Jr., who faced up to five years in prison and a
$250,000 fine.  Authorities said the government will seek a much lighter
penalty when Wittman is sentenced January 13.

Both sides have agreed on repayment of $1,100 in collect calls he placed to the
computer system, but they differ on whether Wittman should be held responsible
for the cost of new software.

Wittman told U.S. District Judge Sherman Finesilver that it took him about two
hours on a personal computer in his apartment to tap into the space agency's
restricted files.  It took NASA investigators nearly 300 hours to track Wittman
and an additional 100 hours to rewrite the software to prevent a recurrence,
prosecutors said."
_______________________________________________________________________________

 Recent Novell Software Contains A Hidden Virus               December 20, 1991
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By John Markoff (New York Times)

The nation's largest supplier of office-network software for personal computers
has sent a letter to approximately 3,800 customers warning that it
inadvertently allowed a software virus to invade copies of a disk shipped
earlier this month.

The letter, sent on Wednesday to customers of Novell Inc., a Provo, Utah,
software publisher, said the diskette, which was mailed on December 11, had
been accidentally infected with a virus known by computer experts as "Stoned
111."

A company official said yesterday that Novell had received a number of reports
>from customers that the virus had invaded their systems, although there had
been no reports of damage.

But a California-based computer virus expert said that the potential for damage
was significant and that the virus on the Novell diskette frequently disabled
computers that it infected.

MASSIVE POTENTIAL LIABILITIES

"If this was to get into an organization and spread to 1,500 to 2,000 machines,
you are looking at millions of dollars of cleanup costs," said John McAfee,
president of McAfee & Associates, a Santa Clara, Calif. antivirus consulting
firm.  "It doesn't matter that only a few are infected," he said.  "You can't
tell.  You have to take the network down and there are massive potential
liabilities."  Mr. McAfee said he had received several dozen calls from Novell
users, some of whom were outraged.

The Novell incident is the second such case this month.  On December 6, Konami
Inc., a software game manufacturer based in Buffalo Grove, 111.wrote customers
that disks of its Spacewrecked game had also become infected with an earlier
version of the Stoned virus.  The company said in the letter that it had
identified the virus before a large volume of disks had been shipped to
dealers.

SOURCE OF VIRUS UNKNOWN

Novell officials said that after the company began getting calls earlier this
week, they traced the source of the infection to a particular part of their
manufacturing process.  But the officials said they had not been able to
determine how the virus had infected their software initially.

Novell's customers include some of nation's largest corporations.  The
software, called Netware, controls office networks ranging from just two or
three machines to a thousand systems.

"Viruses are a challenge for the marketplace," said John Edwards, director of
marketing for Netware systems at Novell.  "But we'll keep up our vigilance.  He
said the virus had attacked a disk that contained a help encyclopedia that the
company had distributed to its customers.

SERVERS SAID TO BE UNAFFECTED

Computer viruses are small programs that are passed from computer to computer
by secretly attaching themselves to data files that are then copied either by
diskette or via a computer network.  The programs can be written to perform
malicious tasks after infecting a new computer, or do no more than copy
themselves from machine to machine.

In its letter to customers the company said that the Stoned 111 virus would not
spread over computer networks to infect the file servers that are the
foundation of networks.  File servers are special computers with large disks
that store and distribute data to a network of desktop computers.

The Stoned 111 virus works by attaching itself to a special area on a floppy
diskette and then copying itself into the computer's memory to infect other
diskettes.

But Mr. McAfee said the program also copied itself to the hard disk of a
computer where it could occasionally disable a system.  In this case it is
possible to lose data if the virus writes information over the area where a
special directory is stored.

Mr. McAfee said that the Stoned 111 virus had first been reported in Europe
just three months ago.  The new virus is representative of a class of programs
known as "stealth" viruses, because they mask their location and are difficult
to identify. Mr. McAfee speculated that this was why the program had escaped
detection by the company.

STEPS TOWARD DETECTION

Novell has been moving toward adding new technology to its software to make it
more difficult for viruses to invade it, Mr. Edwards said.  Recently, the
company licensed special digital-signature software that makes it difficult for
viruses to spread undetected. Novell plans to add this new technology to the
next major release of its software, due out at the end of 1992.

In the past, courts have generally not held companies liable for damages in
cases where a third party is responsible, said Susan Nycum, a Palo Alto,
California, lawyer who is an expert on computer issues.  "If they have been
prudent it wouldn't be fair to hold them liable," she said.  "But ultimately it
may be a question for a jury."
_______________________________________________________________________________

 Working Assets Long Distance!                                     January 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 Taken from an advertisement in Mother Jones

(Not pictured is a photo of a college student giving "the finger" to someone
and a caption that reads 'Twenty years later, we've given people a better way
to put this finger to use.')

The advertisement reads as follows:

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Sit-ins.  Protest marches, Flower power.  Times have changed but the need for
grass roots involvement hasn't.

Introducing "Working Assets Long Distance."  The ONLY phone company that is
as committed to social and political change as you are.  Every time you use
your finger to make a long distance call, one percent of the bill goes to
non-profit action groups at no cost to you.  Hard-hitting advocacy groups like
AMNESTY INTERNATIONAL, GREENPEACE, PLANNED PARENTHOOD, FEDERATION OF AMERICA,
THE AMERICAN CIVIL LIBERTIES UNION, and many others.

We're more than a phone company that gives money to good causes.  Our intent
is to make your individual voice heard.  That's why we offer *FREE CALLS* to
corporate and political leaders.  And well-argued letters at a fraction of
the cost of a mail-gram.  So you can demand a halt to clear-cutting our
ancient forests or let Senators know how you feel about important issues like
reproductive rights.  It's that simple.  Your phone becomes a tool for
democracy and you don't give up a thing.  You see, Working Assets comes with
the exact same service as the major long distance carriers.  Convenient
dial 1 calling 24-hour operation and fiber optic sound quality.  All this at
rates lower that AT&T's basic rates.  And signing up couldn't be simpler.

Just give us a call at 1-800-788-8588 ext 114 or fill out the coupon today.
We'll hook you up right away without any intrusion or interruption.  So you
can help change the world without lifting a finger.  Ok, maybe one finger.
_______________________________________________________________________________

 Computer Virus Used in Gulf War                               January 12, 1991
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 Taken from  The Boston Globe (Page 12)
 Special Thanks: Tone Surfer

Several weeks before the start of the Gulf War, US intelligence agents inserted
a computer virus into a network of Iraqi computers tied to that country's air
defense system, a news magazine reports.  US News and World Report said the
virus was designed by the supersecret National Security Agency at Fort Meade,
Maryland, and was intended to disable a mainframe computer.

The report, citing two unidentified senior US officials, said the virus
appeared to have worked, but it gave no details.  It said the operation may
have been irrelevant, though, since the allies' overwhelming air superiority
would have ensured the same results of rendering the air defense radars and
missiles ineffective.  The secret operation began when American intelligence
agents identified a French made computer printer that was to be smuggled from
Amman, Jordan, to a military facility in Baghdad.

The agents in Amman replaced a computer chip in the printer with another
micro-chip that contained the virus in its electronic circuits.  By attacking
the Iraqi computer through the printer, the virus was able to avoid detection
by normal electronic security procedures, the report said.  "Once the virus was
in the system, the US officials explained, each time an Iraqi technician opened
a "window" on his computer screen to access information, the contents of the
screen simply vanished," US News reported.

The report is part of a book, based on 12 months of research by US News
reporters, called "Triumph without Victory: The Unreported History of the
Persian Gulf War," to be published next month.
_______________________________________________________________________________

 Indictments of "Information Brokers"                              January 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 Taken from The Privacy Journal

The unholy alliance between "information brokers" and government bureaucrats
who provide personal information has been uncovered in the grand jury
indictments of 18 persons in 14 states.

United States Attorney Michael Chertoff in Newark, New Jersey, and his
counterpart in Tampa, Florida, accused eight "information brokers" (or
"information gatekeepers" or "super bureaus") of bribing two Social Security
Administration employees to provide confidential earnings and employee
information stored in federal computer files.  The brokers, who fill in the
cracks not occupied by national credit bureaus and who also track the
whereabouts of persons, would sell the information to their clients --
retailers, lawyers, detectives, insurance companies, and others.

Ned Flemming, president of Super Bureau Inc. of Montery, California, was
indicted on 32 counts for coaxing a Social Security supervisor in New Jersey
named Joseph Lynch (who was not charged) to provide confidential personal
information for a fee.  Fleming's daughter, Susan, was charged also, as were
Victor Fought, operator of Locate Unlimited in Mesa, Arizona; George T.
Theodore, owner of Tracers Worldwide Services in Corpus Christi, Texas;
Richard Stone, owner of Interstate Information Services in Port Jefferson, New
York; and Michael Hawes, former owner of International Criminal Investigative
Agency (ICIA) in Port Angeles, Washington, for participating in the same
conspiracy.  Another broker, Joseph Norman Dillon Ross, who operates a firm
under his name in Pauma Valley, California also accepted the personal data,
according to Chertoff, but was not charged.  Richard Stone was further indicted
for corrupting a Social Security claims clerk in Melrose Park, Illinois.  Also
charged were Allen Schweitzer and his wife Petra, who operate Security Group
Group in Sumner, Washington.

The government employees also stole personal information from the FBI's
National Crime Information Center (NCIC), which stores data on arrests and
missing persons.

Fleming told Privacy Journal that he had never met Lynch.  Stone refused to
comment.  Tracers Worldwide, ICIA, and Locate Unlimited are not listed in
telephone information, although all three companies are required by the Fair
Credit Reporting Act to permit the subjects of their files to have disclosure
of such information to them.

The 18-month long investigation culminating in the December 18 indictments and
arrests is only the first phase, said Assistant U.S. Attorney Jose Sierra.  "We
don't think it stops there."

For the past three years, the Big Three credit bureaus have continued to sell
credit information regularly to information brokers, even after complaints that
some of them violated the Fair Credit Reporting Act in disclosing credit
information for impermissible purposes.  Trans Union's president, Albert
Flitcraft, told Congress in 1989 that is was not possible for a major credit
bureau to protect consumer information sold to brokers.  John Baker, Equifax
senior vice-president, said at the time that the Big Three would "put together
our best thinking" to see if safeguards could be developed.  By 1991, Oscar
Marquis, vice-president of Trans Union, was asking Congress for solutions, but
Baker presented Equifax's new guidelines and checklist for doing business with
the brokers.  None of the Big Three has been willing to cease doing business
with the cloudy merchants of recycled credit reports -- and of purloined Social
Security and FBI information.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Meanwhile, at the Internal Revenue Service...

Two weeks after he blew the cover off the information brokers, U.S. Attorney
Michael Chertoff in New Jersey indicted a retired chief of the Internal Revenue
Service Criminal Investigation Division for selling personal information to a
California private investigative firm in his last week on the job in 1988.

For a $300 payment, according to the indictment, the IRS executive, Robert G.
Roche, promised to procure non-public marital records from vital records
offices.  Using false pretenses, he ordered one of his subordinates to get the
information, on government time.  The aide got the records in one instance only
after writing out an IRS summons and in another instance after producing a
letter on IRS stationary saying the information was needed for "official
investigative matters."  Roche, according to the U.S. Attorney, accepted
payment from the California investigative firm of Saranow, Wells, & Emirhanian,
part of a larger network called Financial Investigative Services Group.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

The Privacy Journal is an independent monthly on privacy in the computer age.
They can be reached at:

                                Privacy Journal
                                 P.O Box 28577
                        Providence, Rhode Island  02908
                                 (401)274-7861
_______________________________________________________________________________

 SSA, FBI Database Violations Prompt Security Evaluations      January 13, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Kevin M. Baerson (Federal Computer Week)(Pages 1, 41)

Indictments recently handed down against insiders who bought and sold
confidential information held in Federal Bureau of Investigation and Social
Security Administration computers have prompted agency officials to evaluate
how well the government secures its databases.

"I see this as positive more than negative," said David Nemecek, section chief
for the FBI's National Crime Information Center (NCIC), which contains data on
thousands of people suspected and convicted of crimes.  "Am I happy it
happened?  No.  But it led us to discovering that this was happening and it
sends a message that if people try it, they will get caught."

But Renny DiPentima, assistant commissioner of SSA's Office of System Design
and Development, said he did not view the indictments as a positive
development.

"It's not a victory," DiPentima said.  "Even if we catch them, it's a loss.  My
victory is when I never have a call that someone has abused their position."

The "information broker" bust was the culmination of an 18-month investigation
by the Department of Health and Human Services' inspector general's office in
Atlanta.  Officials said it was the largest case ever prosecuted involving the
theft of federal computer data.  More indictments could be forthcoming, they
said.

Special agents from the FBI joined the inquiry and in the end nabbed 18 people
>from 10 states, including one former and two current SSA employees.  Others
indicted were a Chicago police officer, an employee of the Fulton County
Sheriff's Office in Georgia, and several private investigators.

The indictments alleged that the investigators paid for confidential data,
including criminal records and earnings histories, that was lifted from the
databases by people who exploited their access to the records.

"The FBI cannot manage every person in the United States," Nemecek said.  "We
have all kinds of protection to prevent this from happening.  We keep logs of
who uses the systems and for what, security training programs and routine
audits of inquiries."

"But the people who committed the violations had access to the system, and
there's only one way to deal with that: aggressive prosecution of people who do
this.  And the FBI is actively pursuing these individuals."

DiPentima's problem is equally delicate.  His agency performs 15 million
electronic transactions per day -- 500 per second -- and monitoring the rights
and wrongs of those people is a daunting task.

Currently, every employee who uses the network is assigned a password and
personal identification number, which change frequently.  Depending on the
nature of the employee's job, the PIN grants him access to certain types of
information.

If the employee tries to access a menu in the system that he has not been
authorized to enter, or makes more than one error in entering his PIN number,
he is locked off the system.  Once that happens, only a security office from
one of SSA's 10 regional offices can reinstate the employee.

An SSA section chief and six analysts, working from the agency's data center
headquarters outside Baltimore, also search routinely for transactional
aberrations such as employees who have made an unusual number of transactions
on a certain account.

The FBI also has a number of security precautions in place.  FBI personnel
conduct random audits of searches, and Nemecek said sweeping state and local
audits of the system are performed biannually.  Furthermore, if the FBI
desires, it easily can track an access request back to the terminal and user it
came from.

DiPentima said that in the wake of the indictments, he is considering new
policies to clamp down on abusers.

Nemecek said that as the FBI continues upgrading the NCIC database, the center
might automate further its auditing of state and local agencies to detect
patterns and trends of use the way SSA does.

But despite efforts to tighten the screws on network security, both men realize
that in cases of federal and municipal employees who exploit authorized access,
technology and policies can only go so far in affecting human nature.
_______________________________________________________________________________

 Free University Suffers Damage.                              February 24, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By The Dude (of Holland)

An investigation by the Amsterdam police, in cooperation with an anti-fraud
team of the CRI (sort of like the FBI), and the geographical science department
of the Free University has led to the arrests of two hackers.  The two had
succeeded to break into the department's computer system and caused damage of
over 100,000 Dutch Guilders.

In a press conference, held by the research teams last Friday, it was stated
that the duo, a 25-year old computer-science engineer R.J.N. from Nuenen
[aka Fidelio] and a 21-year old student computer-science H.H.H.W. from Roermond
[aka Wave], were the first "hackers" to be arrested in the Netherlands.  In
several other countries this has already happened before.

The arrested hackers made a complete confession.  Since November 1991, they
have entered the University's computer between 30 and 40 times.  The system
was known as "bronto."  From this system the hackers were able to gain access
to other systems, thus travelling to systems in the US, Scandinavia, Spain and
Italy.

According to the leader of the computer-crime team of the Amsterdam police,
D. Komen, the two cracked codes of the VU-system to get in.  They got their
hands on so-called "passwords" of officially registered users, which allowed
them to use the system at no cost.  They were also able to get the "highest of
rights" within the computer system "bronto."

A total of four houses were searched, and several PC's, printouts and a large
quantity of diskettes was seized.  The duo was taken to the DA and imprisoned.
Because "hacking" is not a criminal offense in the Netherlands, the suspects
are officially accused of falsification of records, destruction of property,
and fraud.

This year the government expects to enact legislation that will make hacking a
criminal offense, according to P.Slort of the CRI.

The hacker-duo stated that they undertook their illegal activities because of
fanatic "hobbyism."  "It's a kick to see how far you can go", says Mr. Slort of
the CRI.  The two said they did not know that their data journeys had caused
enormous damages.  The police do not see them as real criminals, either since
the pair did not earn money from their activities.
_______________________________________________________________________________

 Computer Engineer Gets Death Sentence                         February 9, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 Special Thanks: Ninja Master

Richard Farley was cool to the end, taking a sip of water and smoothing his
jacket before leaving the courtroom where he was sentenced to die for killing
seven people in a rage over unrequited love.

"I'm not somebody who is demonstrative or prone to shedding tears", Farley said
Friday before apologizing for the slayings.  "I do feel sorry for the
victims....I'm not a perfect human being.  I'm good.  I'm evil."

Farley was convicted in October of the 1988 slayings at ESL Inc., a Sunnyvale
defense contractor.  Jurrors on November 1st recommended the death penalty for
the computer engineer, who prosecutors said planned the rampage to get the
attention of a former co-worker who rejected him.

Superior Court Judge Joseph Biafore Jr. called Farley a vicious killer who had
"complete disregard for human life."

"The defendant...killed with the attention to prove to the object of his
unrequited love that he wasn't a wimp anymore," Biafore said.

During the trial, prosecutors detailed Farley's 3 1/2-year obsessive pursuit of
Laura Black.  He sent her more than 100 letters, followed her day and night,
left gifts on her desk, and rifled through confidential personnel files to
glean tidbits about her life.

Despite her repeated rejections, Farley persisted and was fired in 1987 for
harassing her.  A year later, he returned to ESL.

Black, 30, was shot in the shoulder during the rampage, but survived to testify
against Farley.  She said that about a week before the slayings, she had
received a court order to keep him away.

Farley, 43, admitted the killings but pleaded not guilty, saying he never
planned to kill but only wished to get Black's attention or commit suicide in
front of her for rejecting him.

Farley's attorney, Gregory Paraskou, argued that Farley's judgement was clouded
by his obsession with Black and that he was not violent before the slayings and
likely would not kill again.

But Asst. Dist. Atty. Charles Constantinides said Farley spent years preparing
for the murder by taking target practice and buying weapons, including the
firearms and 98 pounds of ammunition he used at ESL.

The judge rejected the defense's request for a modified sentence of life in
prison and a request for a new trial.  Under California law, Farley's death
sentence will be automatically sent to the state Supreme Court for review.

Among those in the courtroom were family members of some of the victims,
including four who addressed the judge.

[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2024, Phrack Magazine.