Path: gmdzi!unido!mcsun!uunet!mailrus!accuvax.nwu.edu!nucsrl!telecom-request From: tele...@eecs.nwu.edu (TELECOM Moderator) Newsgroups: comp.dcom.telecom Subject: Federal Indictment of Len Rose Message-ID: <10735@accuvax.nwu.edu> Date: 12 Aug 90 00:05:00 GMT Sender: n...@accuvax.nwu.edu Organization: TELECOM Digest Lines: 335 Approved: Tele...@eecs.nwu.edu Posted: Sun Aug 12 01:05:00 1990 X-Submissions-To: tele...@eecs.nwu.edu X-Administrivia-To: telecom-requ...@eecs.nwu.edu X-Telecom-Digest: Special Issue: Len Rose Indictment TELECOM Digest Sat, 11 Aug 90 19:05:00 CDT Special: Len Rose Indictment Inside This Issue: Moderator: Patrick A. Townson Len Rose Indictment [Len Rose] ---------------------------------------------------------------------- From: Len Rose <l...@netsys.netsys.com> Subject: Federal Indictment Date: 10 Aug 90 00:00:42 GMT Organization: Netsys Inc., Philadelphia INDICTMENT COUNT ONE The Grand Jury for the District of Maryland charges: FACTUAL BACKGROUND 1. At all times relevant to this Indictment,American Telephone & Telegraph Company ("AT&T"), through it's subsidiary, Bell Laboratories ("Bell Labs"), manufactured and sold UNIX (a trademark of AT&T Bell Laboratories) computer systems to customers throughout the United States of America. 2. At all times relevant to this Indictment, AT&T sold computer programs ("software") designed to run on the UNIX system to those customers. This software is designed and manufactured by AT&T; some software was available to the public for purchase, other software was internal AT&T software (such as accounting and password control programs) designed to operate with the AT&T UNIX system. 3. At all times relevant to this indictment,computer hackers were individuals involved with gaining unauthorized access to computer systems by various means. These means included password scanning (use of a program that employed a large dictionary of words, which the program used in an attempt to decode the passwords of authorized computer system users), masquerading as authorized users, and use of trojan horse programs. 4. At all times relevant to this Indictment, the Legion of Doom ("LOD") was a loosely-associated group of computer hackers. Among other activities, LOD members were involved in: a. Gaining unauthorized access to computer systems for purposes of stealing computer software programs from the companies that owned the programs; b. Gaining unauthorized access to computer systems for purpose of using computer time at no charge to themselves, thereby fraudu- lently obtaining money and property from the companies that owned the computer systems; c. Gaining unauthorized access to computer systems for the purpose of stealing proprietary source code and information from the companies that owned the source code and information; d. Disseminating information about their methods of gaining unauthor- ized access to computer systems to other hackers; e. Gaining unauthorized access to computer systems for the purpose of making telephone calls at no charge to themselves,obtaining and using credit history and data for individuals other than themselves, and the like. 5. At all times relevant to this Indictment, LEONARD ROSE JR. a/k/a "Terminus", was associated with the LOD and operated his own computer system, identified as Netsys. His electronic mailing address was netsys!len COMPUTER TERMINOLOGY 6. For the purpose of this Indictment, an "assembler" is a computer program that translates computer program instructions written in assembly language (source code) into machine language executable by a computer. 7. For the purpose of this Indictment, a "compiler" is a computer program used to translate as computer program expressed in a problem oriented language (source code) into machine language executable by a computer. 8. For the purpose of this Indictment, a "computer" is an internally programmed, automatic device that performs data processing. 9. For the purpose of this Indictment, a "computer network" is a set of related,remotely connected terminals and communications facilities, including more than one computer system, with the capability of transmitting data among them through communicatiions facilities, such as telephones. 10. For the purposes of this Indictment, a "computer program" is a set of data representing coded instructions that, when executed by a computer causes the computer to process data. 11. For the purposes of this Indictment, a "computer system" is a set of related, connected, or unconnected computer equipment, devices, or software. 12. For the purposes of this Indictment,electronic mail ("e-mail") is a computerized method for sending communications and files between computers on computer networks. Persons who send and recieve e-mail are identified by a unique "mailing" address, similar to a postal address. 13. For the purposes of this Indictment a "file" is a collection of related data records treated as a unit by a computer. 14. For the purposes of thie Indictment, "hardware" is the computer and all related or attached machinery, including terminals, keyboard, disk drives, tape drives, cartridges, and other mechanical, magnetic, electrical, and electronic devices used in data processing. 15. For the purposes of this Indictment,a "modem" is a device that modulates and demodulates signals transmitted over data telecommuni- cations facilities. 16. For the purposes of this Indictment, "software" is a set of computer programs, procedures, and associated documentation. 17. For the purposes of this Indictment,"source code" is instructions written by a computer programmer in a computer language that are used as input for a compiler, interpreter, or assembler. Access to source code permits a computer user to change the way in which a given computer system executes a program, without the knowledge of the computer system administrator. 18. For the purposes of this Indictment, "superuser privileges" (sometimes referred to as "root") are privileges on a computer system that grant the "superuser" unlimited access to the system, including the ability to change the system's programs, insert new programs, and the like. 19. For the purposes of this Indictment, a "trojan horse" is a set of computer instructions secretly inserted into a computer program so that when the program is executed, acts occur that were not intended to be performed by the program before modification. 20. For the purposes of this Indictment,"UNIX" (a trademark of AT&T Bell Laboratories) is a computer operating system designed by AT&T Bell Laboratories for use with minicomputers and small business computers, which has been widely adopted by businesses and government agencies throughout the United States. COMPUTER OPERATIONS 21. For the purposes of this Indictment, typical computer operations are as described in the following paragraphs. A computer user initiates communications with a computer system through his terminal and modem. The modem dials the access number for the computer system the user wishes to access and, after the user is connected to the system, the modem transmits and receives data to and from the computer. 22. Once the connection is established, the computer requests the user's login identification and password. If the user fails to provide valid login and password information, he cannot access the computer. 23. Once the user has gained access to the computer, he is capable of instructing the computer to execute existing programs. These programs are composed of a collection of computer files stored in the computer's memory. The commands that make up each file and, in turn, each program, are source code. Users who have source code are able to see all of the commands that make up a particular program. They can change these commands, causing the computer to perform tasks that the author of the program did not intend. 24. The user may also copy certain files or programs from the computer he has accessed; if the user is unauthorized, this procedure allows the user to obtain information that is not otherwise available to him. 25. In addition, once a user has accessed a computer, he may use it's network connections to gain access to other computers. Gaining access from one computer to another permits a user to conceal his location because login information on the second computer will reflect only that the first computer accessed the second computer. 26. If a user has superuser privileges, he may add, replace, or modify existing programs in the computer system. The user performs these tasks by "going root"; that is, by entering a superuser password and instructing the computer to make systemic changes. 27. On or about January 13, 1989, in the State and District of Maryland, and elsewhere, LEONARD ROSE JR. a/k/a Terminus did knowingly, willfully, intentionally, and with intent to defraud, traffic in (that is, transfer, and otherwise dispose of to another, and obtain control of with intent to transfer and dispose of) information through which a computer may be accessed without authorization, to wit: a trojan horse program designed to collect superuser passwords, and by such conduct affected interstate commerce. COUNT TWO And the Grand Jury for the District of Maryland further charges: 1. Paragraphs 1 through 26 of Count One are incorporated by reference, as if fully set forth. 2. On or about January 9,1990, in the State and District of Maryland, and elsewhere, LEONARD ROSE JR. a/k/a/ Terminus did knowingly, willfully, intentionally, and with intent to defraud, traffic in (that is, transfer, and otherwise dispose of to another, and obtain control of with intent to transfer and dispose of) information through which a computer may be accessed without authorization, to wit: a trojan horse login program, and by such conduct affected interstate commerce. COUNT THREE And the Grand Jury for the District of Maryland further charges: 1. Paragraphs 1 through 26 of Count One are incorporated by reference, as if fully set forth. 2. That on or about May 13, 1988 in the State and District of Maryland, and elsewhere, LEONARD ROSE JR. a/k/a/ Terminus did cause to be transported, transmitted, and transformed in interstate commerce goods, wares, and merchandise of the value of $5000 or more, to wit: computer source code that was confidential, proprietary information of AT&T, knowing the same to have been stolen, converted, and taken by fraud. COUNT FOUR And the Grand Jury for the District of Maryland further charges: 1. Paragraphs 1 through 26 of Count One are incorporated by reference, as if fully set forth. 2. That on or about January 15, 1989 in the State and District of Maryland, and elsewhere, LEONARD ROSE JR. a/k/a/ Terminus did cause to be transported, transmitted, and transformed in interstate commerce goods, wares,and merchandise of the value of $5000 or more, to wit: computer source code that was confidential, proprietary information of AT&T, knowing the same to have been stolen, converted, and taken by fraud. COUNT FIVE And the Grand Jury for the District of Maryland further charges: 1. Paragraphs 1 through 26 of Count One are incorporated by reference, as if fully set forth. 2. That on or about January 8, 1990 in the State and District of Maryland, and elsewhere, LEONARD ROSE JR. a/k/a/ Terminus did cause to be transported, transmitted, and transformed in interstate commerce goods, wares, and merchandise of the value of $5000 or more, to wit: computer source code that was confidential, proprietary information of AT&T, knowing the same to have been stolen, converted, and taken by fraud. ____________________ Breckinridge L. Wilcox [Moderator's Note: Mr. Wilcox is probably the foreperson of the Grand Jury. The five counts above, according to Mr. Rose, represent the various occassions on which he is alleged to have transferred a 'password-trapping' program to other individuals, including Craig Neidorf. If my understanding of the allegations is correct, modifications to the source code causing passwords entered by users using the 'su' command to be retained in a separate file for review by unauthorized persons was transmitted. I believe Mr. Neidorf then printed this information in his publication {Phrack}. It is not known to what extent this modification was installed or implemented. Mr. Rose said to me he does not know of anyone 'who actually used or installed' this modification. He said he wrote it legitimatly for testing and diagnostic purposes for his own use at his site and for legitimate clients. He said he can't help it if it fell into the hands of persons who would abuse or misuse his work. Mr. Rose said to me he is destitute at this time due to the financial burden of obtaining legal counsel and being without the tools (his computing machinery and related stuff) he needs to be employed. His trial has been adjourned until sometime early in 1991 at the court's motion, and this additional delay will cause him more financial hardship. He believes this delay was given by the court in retaliation for motions entered by his attorney asking the judge to recuse himself. He said he had been offered 'deals' by the government, including pleading guilty to one count, receiving as punishment several months in the custody of the Attorney General, followed by perhaps a year of federal probation. His equipment would be returned as part of the deal. If this were his choice -- that the matter be adjudicated in conference between the government, his attorney and the court -- resolution could come in a short time. If he prefers, the matter can go to trial, and he can take his chances on complete acquittal, or being found guilty on one or more of the charges against him, followed by imposition of punishment as detirmined by the court at that time. Mr. Rose has received advice from several quarters on this important issue, both for and against cutting deals. He said 'people at the Electronic Frontier Foundation refuse to return his phone calls', but that others, including a prominent person at the Free Software Foundation have encouraged him to hold out for trial and acquittal. In either scenario, Mr. Rose's prior state conviction several months ago involving computer equipment stolen from the warehouse found in his possession does not enhance his ability to cut deals to his liking. It should be remembered that under the Constitution of the United States, Len Rose must be considered innocent of the latest charges against him until his guilt is proven in court, or based on his plea of guilty the court finds him guilty. PAT] ------------------------------ End of TELECOM Digest Special: Len Rose Indictment ******************************
Path: gmdzi!unido!mcsun!uunet!cs.utexas.edu!mailrus!accuvax.nwu.edu!nucsrl!telecom-request From: mnemo...@walt.cc.utexas.edu (Mike Godwin) Newsgroups: comp.dcom.telecom Subject: Re: Federal Indictment of Len Rose Message-ID: <10739@accuvax.nwu.edu> Date: 12 Aug 90 01:21:26 GMT Sender: n...@accuvax.nwu.edu Reply-To: Mike Godwin <mnemo...@walt.cc.utexas.edu> Organization: The University of Texas at Austin, Austin, Texas Lines: 80 Approved: Tele...@eecs.nwu.edu Posted: Sun Aug 12 02:21:26 1990 X-Submissions-To: tele...@eecs.nwu.edu X-Administrivia-To: telecom-requ...@eecs.nwu.edu X-Telecom-Digest: Volume 10, Issue 562, Message 1 of 6 One of the things that troubles me about the Len Rose indictment is that it appears to have been edited. Normally, a federal indictment will state under each or charge the specific statute under which the particular offense has been committed. Lest someone read into this an accusation that Len Rose edited his indictment for some particular purpose, let me add that it is often easy to overlook the statutory references, which typically appear at the bottom of each page, and which often look like pro-forma additions. But without the statutory references, it is unclear which statutes Rose is alleged to have violated. It seems certain that 18 USC 1343 (wire fraud) and 18 USC 2314 (interstate transportation of stolen property) are two of the statutes; it is unclear, however, whether the government is also prosecuting Rose under 18 USC 1030 (use of computers to defraud) or 18 USC 371 (conspiracy). The particular statutes under which Rose is being prosecuted will dictate many of the issues that will be litigated if he goes to trial. My personal favorite of the counts is Count Two: >And the Grand Jury for the District of Maryland further charges: >1. Paragraphs 1 through 26 of Count One are incorporated by reference, >as if fully set forth. >2. On or about January 9,1990, in the State and District of Maryland, >and elsewhere, > LEONARD ROSE JR. a/k/a/ Terminus >did knowingly, willfully, intentionally, and with intent to defraud, >traffic in (that is, transfer, and otherwise dispose of to another, >and obtain control of with intent to transfer and dispose of) >information through which a computer may be accessed without >authorization, to wit: a trojan horse login program, and by such >conduct affected interstate commerce. I know of no federal statute that outlaws "trafficking in" information "through which a computer may be accessed without authorization," absent some allegation that the information was proprietary and stolen. One wonders whether this count is meant to refer to Rose's authoring a password-recording modification to AT&T system software. Our Moderator offers what seems to me to be a correct interpretation of at least one of the counts: >If my understanding of the allegations is correct, >modifications to the source code causing passwords entered by users >using the 'su' command to be retained in a separate file for review by >unauthorized persons was transmitted. I believe Mr. Neidorf then >printed this information in his publication {Phrack}. Assuming this interpretation is correct, it is unclear whether Rose broke the law in this action, unless the federal government has proof that Rose's actions were part of a conspiracy to defraud AT&T or one of the Bells. (That's why it's important to determine whether a conspiracy is being charged here.) In conspiracy prosecutions, an otherwise-legal act may make a defendant liable under the conspiracy statute if that legal act was in furtherance of the conspiracy. Mike Godwin, UT Law School mnemo...@ccwf.cc.utexas.edu (512) 346-4190 [Moderator's Note: Well, you got it the way *I* got it, save tightening up the lines a little, correcting a couple of typos. Was it specifically edited by someone? Well, in the part at the top, the reference was to the 'United States of Amerika' ... I swapped out the /k/ for a /c/ ... it looks like someone was tampering with it. Also, according to Len Rose (on the phone with me), he 'gave it to someone to be typed' for the net. I don't know if *he* personally sent it here; after all his complaints about having no equipment at his disposal, how could he? Someone may have sent it, and used his name. There were no statuatory references in the copy I received.