Article 6642 of comp.dcom.telecom: Path: sci.ccny.cuny.edu!rpi!brutus.cs.uiuc.edu!zaphod.mps.ohio-state.edu! tut.cis.ohio-state.edu!mailrus!accuvax.nwu.edu!nucsrl!telecom-request From: tele...@eecs.nwu.edu (TELECOM Moderator) Newsgroups: comp.dcom.telecom Subject: AT&T Sourcecode: Poison! Message-ID: <4...@accuvax.nwu.edu> Date: 25 Feb 90 01:54:19 GMT Sender: n...@accuvax.nwu.edu Organization: TELECOM Digest Lines: 55 Approved: Tele...@eecs.nwu.edu X-Submissions-To: tele...@eecs.nwu.edu X-Administrivia-To: telecom-requ...@eecs.nwu.edu X-Telecom-Digest: Volume 10, Issue 127, Message 2 of 7 The news on the street is that there is more to the Jolnet stink than has been previously revealed -- We're told by a deep-throat type that AT&T is on the war path about their software, and that 3b2 people in particular are targeted for 'counseling' and whatever corrective action is deemed necessary by 'the authorities'. So the story on the street goes, another prominent netter was arrested just recently by the same friendly folks who shut down Jolnet not long ago. Like jolnet, netsys went down abruptly, with *everything* confiscated, including a box of old busted up circuit boards in the basement which hadn't been looked at in years. Now comes news that attcdc, formerly known as killer went off line in a hurry..... When 'the authorities' come a-calling, with warrant in hand, and their credentials in order, they start looking for Mother's source code; 3b2 stuff and the like, and they keep looking until they find it. You say they won't come knocking at your door? You say you'll take it all off line and store it on a reel of tape stashed in the back of the bottom drawer of an old file cabinet somewhere? They *will* find it. And when they find it, your choices will be: 1) You stole this from AT&T. You are a cracker. You'll go to jail. 2) If you didn't steal it from AT&T, then someone gave it to you. Tell us who.... if you won't tell us, then go back to choice 1. If you will snitch, and tell us who gave you this code, then the Court will be lenient and show mercy upon you -- but we won't put that in writing of course! :) Faced with these two options, of course everyone selects choice 2. And with the new information gleaned from the visit, another site is scheduled for downtime. Consider Rich Andrews of Jolnet: Our deep-throat says Rich was first confronted in the 911 software caper, then the feds found other goodies. Could it be the feds started squeezing in a private place and Rich started singing the tune they wanted to hear? Do crackers stick together when times get tough or do they turn on each other? You just never know about these things. Some people have been saying the only safe thing to do at this point is 'rm illegal.software'; go wash their hands and be done with it, but far be it from me to suggest such a thing. That could be construed as an obstruction of justice in what appears now to be an on-going investigation in our net community of people whose systems are dirty.... Jolnet ===> netsys ===> attcdc (killer) ===> your 3b2 site name here. Patrick Townson
Article 6680 of comp.dcom.telecom: Path: sci.ccny.cuny.edu!rpi!uwm.edu!mailrus!accuvax.nwu.edu!nucsrl!telecom-request From: la063...@zach.fit.edu (Bill Huttig) Newsgroups: comp.dcom.telecom Subject: Re: AT&T Sourcecode: Poison! Message-ID: <4...@accuvax.nwu.edu> Date: 27 Feb 90 20:52:22 GMT Sender: n...@accuvax.nwu.edu Organization: Florida Institute of Technology, ACS, Melbourne, FL Lines: 11 Approved: Tele...@eecs.nwu.edu X-Submissions-To: tele...@eecs.nwu.edu X-Administrivia-To: telecom-requ...@eecs.nwu.edu X-Telecom-Digest: Volume 10, Issue 131, Message 3 of 8 I thought killer was already closed down for the AT&T source code thing a couple years back. When it came back online it became attcdc. Bill [Moderator's Note: You thought correctly, however it is down again, as of a few days ago. Wondering why? Maybe I will have some answers, in the form of comments by Mike Andrews in a day or so. PT]
From: Chip Rosenthal <c...@chinacat.lonestar.org> Subject: Re: AT&T Sourcecode: Poison! Date: 3 Mar 90 00:00:00 GMT Organization: Unicom Systems Development, Austin (yay!) [Moderator's Note: Original date of 2/25 changed to prevent premature expiration. PT] You've got a lot of nerve, Patrick. tele...@eecs.nwu.edu (TELECOM Moderator) writes: >We're told by a deep-throat type that AT&T is on the war path about >their software [...] Like jolnet, netsys went down abruptly, with >*everything* confiscated [...] Now comes news that attcdc [sic], formerly >known as killer went off line in a hurry..... Yessir, after all your complaints about that about anonymous Legion of Doom message, this is a really crummy thing to post. Based upon unattributed conversations, you imply that Len Rose and Charlie Boykin were involved in wrongdoing which lead to the shutdown of their systems. I don't know Len personally, but have had uucp connections with him in the past. Charlie, on the other hand, I do know personally. He is very well regarded in the Dallas/Fort Worth area, and was voted "1989 DFW Administrator of the Year" by the DFW lunch-bunch...errr....DFW Association of Unix System Administrators. You have cast some crummy aspersions towards these guys. Since I know them, I will wait for the facts to come in. Others who don't know them could very well jump to conclusions on the basis of this posting. Was this message really called for? Chip Rosenthal | Yes, you're a happy man and you're c...@chinacat.Lonestar.ORG | a lucky man, but are you a smart Unicom Systems Development, 512-482-8260 | man? -David Bromberg