mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
449 lines
24 KiB
Text
449 lines
24 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Three, Issue Thirty-Three, File 12 of 13
|
||
|
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN PWN
|
||
|
PWN Phrack World News PWN
|
||
|
PWN PWN
|
||
|
PWN Issue XXXIII / Part Two PWN
|
||
|
PWN PWN
|
||
|
PWN Compiled by Dispater PWN
|
||
|
PWN PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
|
||
|
Legion of Doom Goes Corporate
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
The following is a compilation of several articles from by Michael
|
||
|
Alexander of ComputerWorld Magazine about Comsec Data Security, Inc.
|
||
|
|
||
|
Comsec Data Security, Inc.
|
||
|
|
||
|
Chris Goggans a/k/a Erik Bloodaxe 60 Braeswood Square
|
||
|
Scott Chasin a/k/a Doc Holiday Houston, Texas 77096
|
||
|
Kenyon Shulman a/k/a Malefactor (713)721-6500
|
||
|
Robert Cupps - Not a former computer hacker (713)721-6579 FAX
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Hackers Promote Better Image (Page 124) June 24, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
HOUSTON -- Three self-professed members of the Legion of Doom, one of the
|
||
|
most notorious computer hacker groups to operate in the United States, said
|
||
|
they now want to get paid for their skills. Along with a former securities
|
||
|
trader, the members launched a computer security firm called Comsec Data
|
||
|
Security that will show corporations how to keep hackers out.
|
||
|
|
||
|
"We have been in the computer security business for the last 11 years --
|
||
|
just on the different end of the stick," said Scott Chasin who said he once
|
||
|
used the handle Doc Holiday as a Legion of Doom member. The group has been
|
||
|
defunct since late last year, Chasin said.
|
||
|
|
||
|
The start-up firm plans to offer systems penetration testing, auditing,
|
||
|
and training services as well as security products. "We have information that
|
||
|
you can't buy in bookstores: We know why hackers hack, what motivates them,
|
||
|
why they are curious," Chasin said.
|
||
|
|
||
|
Already, the start-up has met with considerable skepticism.
|
||
|
|
||
|
"Would I hire a safecracker to be a security guy at my bank?" asked John
|
||
|
Blackley, information security administrator at Capitol Holding Corporation in
|
||
|
Louisville, Kentucky. "If they stayed straight for 5 to 10 years, I might
|
||
|
reconsider, but 12 to 18 months ago, they were hackers, and now they have to
|
||
|
prove themselves."
|
||
|
|
||
|
"You don't hire ne'er-do-wells to come and look at your system," said Tom
|
||
|
Peletier, an information security specialist at General Motors Corporation.
|
||
|
"The Legion of Doom is a known anti-establishment group, and although it is
|
||
|
good to see they have a capitalist bent, GM would not hire these people."
|
||
|
|
||
|
Comsec already has three contracts with Fortune 500 firms, Chasin said.
|
||
|
|
||
|
"I like their approach, and I am assuming they are legit," said Norman
|
||
|
Sutton, a security consultant at Leemah Datacom Corporation in Hayward,
|
||
|
California. His firm is close to signing a distribution pact with Comsec,
|
||
|
Sutton said.
|
||
|
|
||
|
Federal law enforcers have described the Legion of Doom in indictments,
|
||
|
search warrants, and other documents as a closely knit group of about 15
|
||
|
computer hackers whose members rerouted calls, stole and altered data and
|
||
|
disrupted telephone service by entering telephone switches, among other
|
||
|
activities.
|
||
|
|
||
|
The group was founded in 1984 and has had dozens of members pass through
|
||
|
its ranks. Approximately 12 former members have been arrested for computer
|
||
|
hacking-related crimes; three former members are now serving jail sentences;
|
||
|
and at least three others are under investigation. None of the Comsec founders
|
||
|
have been charged with a computer-related crime.
|
||
|
|
||
|
(Article includes a color photograph of all four founding members of Comsec)
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
An Offer You Could Refuse? (Page 82) July 1, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Tom Peletier, an information security specialist at General Motors in
|
||
|
Detroit, says he would never hire Comsec Data Security, a security consulting
|
||
|
firm launched by three ex-members of the Legion of Doom. "You don't bring in
|
||
|
an unknown commodity and give them the keys to the kingdom," Peletier said.
|
||
|
Chris Goggans, one of Comsec's founders, retorted: "We don't have the keys to
|
||
|
their kingdom, but I know at least four people off the top of my head that do."
|
||
|
Comsec said it will do a free system penetration for GM just to prove the
|
||
|
security firm's sincerity, Goggans said. "All they have to do is sign a
|
||
|
release form saying they won't prosecute."
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Group Dupes Security Experts (Page 16) July 29, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
"Houston-Based Comsec Fools Consultants To Gather Security Information"
|
||
|
|
||
|
HOUSTON -- Computer security consultants are supposed to know better, but
|
||
|
at least six experts acknowledged last week that they were conned. The
|
||
|
consultants said they were the victims of a bit of social engineering by Comsec
|
||
|
Data Security, Inc., a security consulting firm recently launched.
|
||
|
|
||
|
Comsec masqueraded as a prospective customer using the name of Landmark
|
||
|
Graphics Corporation, a large Houston-area software publisher, to gather
|
||
|
information on how to prepare business proposals and conduct security audits
|
||
|
and other security industry business techniques, the consultants said.
|
||
|
|
||
|
Three of Comsec's four founders are self-professed former members of the
|
||
|
Legion of Doom, one of the nation's most notorious hacker groups, according to
|
||
|
law enforcers.
|
||
|
|
||
|
"In their press release, they say, 'Our firm has taken a unique approach
|
||
|
to its sales strategy,'" said one consultant who requested anonymity, citing
|
||
|
professional embarrassment. "Well, social engineering is certainly a unique
|
||
|
sales strategy."
|
||
|
|
||
|
Social engineering is a technique commonly used by hackers to gather
|
||
|
information from helpful, but unsuspecting employees that may be used to
|
||
|
penetrate a computer system.
|
||
|
|
||
|
"They are young kids that don't know their thumbs from third base about
|
||
|
doing business, and they are trying to glean that from everybody else," said
|
||
|
Randy March, director of consulting at Computer Security Consultants, Inc., in
|
||
|
Ridgefield, Connecticut.
|
||
|
|
||
|
The consultants said gathering information by posing as a prospective
|
||
|
customer is a common ploy, but that Comsec violated accepted business ethics by
|
||
|
posing as an actual company.
|
||
|
|
||
|
"It is a pretty significant breech of business ethics to make the
|
||
|
misrepresentation that they did," said Hardie Morgan, chief financial officer
|
||
|
at Landmark Graphics. "They may not be hacking anymore, but they haven't
|
||
|
changed the way they operate."
|
||
|
|
||
|
Morgan said his firm had received seven or eight calls from security
|
||
|
consultants who were following up on information they had sent to "Karl
|
||
|
Stevens," supposedly a company vice president.
|
||
|
|
||
|
SAME OLD STORY
|
||
|
|
||
|
The consultants all told Morgan the same tale: They had been contacted by
|
||
|
"Stevens," who said he was preparing to conduct a security audit and needed
|
||
|
information to sell the idea to upper management. "Stevens" had asked the
|
||
|
consultants to prepare a detailed proposal outlining the steps of a security
|
||
|
audit, pricing and other information.
|
||
|
|
||
|
The consultants had then been instructed to send the information by
|
||
|
overnight mail to a Houston address that later proved to be the home of two of
|
||
|
Comsec's founders. In some instances, the caller had left a telephone number
|
||
|
that when called was found to be a constantly busy telephone company test
|
||
|
number.
|
||
|
|
||
|
Morgan said "Stevens" had an intimate knowledge of the company's computer
|
||
|
systems that is known only to a handful of employees. While there is no
|
||
|
evidence that the company's systems were penetrated by outsiders, Landmark is
|
||
|
"battering down its security hatches," Morgan said.
|
||
|
|
||
|
Posing as a prospective customer is not an uncommon way to gather
|
||
|
competitive information, said Chris Goggans, one of Comsec's founders, who once
|
||
|
used the handle of Erik Bloodaxe.
|
||
|
|
||
|
"Had we not been who we are, it would be a matter of no consequence,"
|
||
|
Goggans said.
|
||
|
|
||
|
"They confirm definitely that they called some of their competitors," said
|
||
|
Michael Cash, an attorney representing Comsec. "The fact they used Landmark
|
||
|
Graphics was an error on their part, but it was the first name that popped into
|
||
|
their heads. They did not infiltrate Landmark Graphics in any way."
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
"LEGION OF DOOM--INTERNET WORLD TOUR" T-SHIRTS!
|
||
|
|
||
|
Now you too can own an official Legion of Doom T-shirt. This is the same
|
||
|
shirt that sold-out rapidly at the "Cyberview" hackers conference in St. Louis.
|
||
|
Join the other proud owners such as award-winning author Bruce Sterling by
|
||
|
adding this collector's item to your wardrobe. This professionally made, 100
|
||
|
percent cotton shirt is printed on both front and back. The front displays
|
||
|
"Legion of Doom Internet World Tour" as well as a sword and telephone
|
||
|
intersecting the planet earth, skull-and-crossbones style. The back displays
|
||
|
the words "Hacking for Jesus" as well as a substantial list of "tour-stops"
|
||
|
(internet sites) and a quote from Aleister Crowley. This T-shirt is sold only
|
||
|
as a novelty item, and is in no way attempting to glorify computer crime.
|
||
|
|
||
|
Shirts are only $15.00, postage included! Overseas add an additional $5.00.
|
||
|
Send check or money-order (No CODs, cash or credit cards--even if it's really
|
||
|
your card :-) made payable to Chris Goggans to:
|
||
|
|
||
|
Chris Goggans
|
||
|
5300 N. Braeswood #4
|
||
|
Suite 181
|
||
|
Houston, TX 77096
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Steve Jackson Games v. United States of America
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Articles reprinted from Effector Online 1.04 and 1.08
|
||
|
May 1, 1991 / August 24, 1991
|
||
|
|
||
|
"Extending the Constitution to American Cyberspace"
|
||
|
|
||
|
To establish constitutional protection for electronic media and to obtain
|
||
|
redress for an unlawful search, seizure, and prior restraint on publication,
|
||
|
Steve Jackson Games and the Electronic Frontier Foundation filed a civil suit
|
||
|
against the United States Secret Service and others.
|
||
|
|
||
|
On March 1, 1990, the United States Secret Service nearly destroyed Steve
|
||
|
Jackson Games (SJG), an award-winning publishing business in Austin, Texas.
|
||
|
|
||
|
In an early morning raid with an unlawful and unconstitutional warrant,
|
||
|
agents of the Secret Service conducted a search of the SJG office. When they
|
||
|
left they took a manuscript being prepared for publication, private electronic
|
||
|
mail, and several computers, including the hardware and software of the SJG
|
||
|
Computer Bulletin Board System. Yet Jackson and his business were not only
|
||
|
innocent of any crime, but never suspects in the first place. The raid had
|
||
|
"been staged on the unfounded suspicion that somewhere in Jackson's office
|
||
|
there "might be" a document compromising the security of the 911 telephone
|
||
|
system.
|
||
|
|
||
|
In the months that followed, Jackson saw the business he had built up over
|
||
|
many years dragged to the edge of bankruptcy. SJG was a successful and
|
||
|
prestigious publisher of books and other materials used in adventure
|
||
|
role-playing games. Jackson also operated a computer bulletin board system
|
||
|
(BBS) to communicate with his customers and writers and obtain feedback and
|
||
|
suggestions on new gaming ideas. The bulletin board was also the repository of
|
||
|
private electronic mail belonging to several of its users. This private mail
|
||
|
was seized in the raid. Despite repeated requests for the return of his
|
||
|
manuscripts and equipment, the Secret Service has refused to comply fully.
|
||
|
|
||
|
More than a year after that raid, the Electronic Frontier Foundation,
|
||
|
acting with SJG owner Steve Jackson, has filed a precedent setting civil suit
|
||
|
against the United States Secret Service, Secret Service Agents Timothy Foley
|
||
|
and Barbara Golden, Assistant United States Attorney William Cook, and Henry
|
||
|
Kluepfel.
|
||
|
|
||
|
"This is the most important case brought to date," said EFF general
|
||
|
counsel Mike Godwin, "to vindicate the Constitutional rights of the users of
|
||
|
computer-based communications technology. It will establish the Constitutional
|
||
|
dimension of electronic expression. It also will be one of the first cases
|
||
|
that invokes the Electronic Communications Privacy Act as a shield and not as a
|
||
|
sword -- an act that guarantees users of this digital medium the same privacy
|
||
|
protections enjoyed by those who use the telephone and the U.S. Mail."
|
||
|
|
||
|
Commenting on the overall role of the Electronic Frontier Foundation in
|
||
|
this case and other matters, EFF's president Mitch Kapor said, "We have been
|
||
|
acting as an organization interested in defending the wrongly accused. But the
|
||
|
Electronic Frontier Foundation is also going to be active in establishing
|
||
|
broader principles. We begin with this case, where the issues are clear. But
|
||
|
behind this specific action, the EFF also believes that it is vital that
|
||
|
government, private entities, and individuals who have violated the
|
||
|
Constitutional rights of individuals be held accountable for their actions. We
|
||
|
also hope this case will help demystify the world of computer users to the
|
||
|
general public and inform them about the potential of computer communities."
|
||
|
|
||
|
Representing Steve Jackson and the Electronic Frontier Foundation in this
|
||
|
suit are Harvey A. Silverglate and Sharon L. Beckman of Silverglate & Good of
|
||
|
Boston; Eric Lieberman and Nick Poser of Rabinowitz, Boudin, Standard, Krinsky
|
||
|
& Lieberman of New York; and James George, Jr. of Graves, Dougherty, Hearon &
|
||
|
Moody of Austin, Texas.
|
||
|
|
||
|
Copies of the complaint, the unlawful search warrant, statements by Steve
|
||
|
Jackson and the Electronic Frontier Foundation, a legal fact sheet and other
|
||
|
pertinent materials are available by request from the EFF.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Also made available to members of the press and electronic media on
|
||
|
request were the following statement by Mitchell Kapor and a legal fact sheet
|
||
|
prepared by Sharon Beckman and Harvey Silverglate of Silverglate & Good, the
|
||
|
law firm central to the filing of this lawsuit.
|
||
|
|
||
|
"Why the Electronic Frontier Foundation Is
|
||
|
Bringing Suit On Behalf of Steve Jackson"
|
||
|
|
||
|
With this case, the Electronic Frontier Foundation begins a new phase of
|
||
|
affirmative legal action. We intend to fight for broad Constitutional
|
||
|
protection for operators and users of computer bulletin boards.
|
||
|
|
||
|
It is essential to establish the principle that computer bulletin boards
|
||
|
and computer conferencing systems are entitled to the same First Amendment
|
||
|
rights enjoyed by other media. It is also critical to establish that operators
|
||
|
of bulletin boards -- whether individuals or businesses -- are not subject to
|
||
|
unconstitutional, overbroad searches and seizures of any of the contents of
|
||
|
their systems, including electronic mail.
|
||
|
|
||
|
The Electronic Frontier Foundation also believes that it is vital to hold
|
||
|
government, private entities, and individuals who have violated the
|
||
|
Constitutional rights of others accountable for their actions.
|
||
|
|
||
|
Mitchell Kapor,
|
||
|
President, The Electronic Frontier Foundation
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
"Legal Fact Sheet: Steve Jackson Games v. United States Secret Service, et al"
|
||
|
|
||
|
This lawsuit seeks to vindicate the rights of a small, successful
|
||
|
entrepreneur/publisher to conduct its entirely lawful business, free of
|
||
|
unjustified governmental interference. It is also the goal of this litigation
|
||
|
to firmly establish the principle that lawful activities carried out with the
|
||
|
aid of computer technology, including computer communications and publishing,
|
||
|
are entitled to the same constitutional protections that have long been
|
||
|
accorded to the print medium. Computers and modems, no less than printing
|
||
|
presses, typewriters, the mail, and telephones -being the methods selected by
|
||
|
Americans to communicate with one another -- are all protected by our
|
||
|
constitutional rights.
|
||
|
|
||
|
Factual Background and Parties:
|
||
|
|
||
|
Steve Jackson, of Austin, Texas, is a successful small businessman. His
|
||
|
company, Steve Jackson Games, is an award- winning publisher of adventure games
|
||
|
and related books and magazines. In addition to its books and magazines, SJG
|
||
|
operates an electronic bulletin board system (the Illuminati BBS) for its
|
||
|
customers and for others interested in adventure games and related literary
|
||
|
genres.
|
||
|
|
||
|
Also named as plaintiffs are various users of the Illuminati BBS. The
|
||
|
professional interests of these users range from writing to computer
|
||
|
technology.
|
||
|
|
||
|
Although neither Jackson nor his company were suspected of any criminal
|
||
|
activity, the company was rendered a near fatal blow on March 1, 1990, when
|
||
|
agents of the United States Secret Service, aided by other law enforcement
|
||
|
officials, raided its office, seizing computer equipment necessary to the
|
||
|
operation of its publishing business. The government seized the Illuminati BBS
|
||
|
and all of the communications stored on it, including private electronic mail,
|
||
|
shutting down the BBS for over a month. The Secret Service also seized
|
||
|
publications protected by the First Amendment, including drafts of the
|
||
|
about-to-be-released role playing game book GURPS Cyberpunk. The publication
|
||
|
of the book was substantially delayed while SJG employees rewrote it from older
|
||
|
drafts. This fantasy game book, which one agent preposterously called "a
|
||
|
handbook for computer crime," has since sold over 16,000 copies and been
|
||
|
nominated for a prestigious game industry award. No evidence of criminal
|
||
|
activity was found.
|
||
|
|
||
|
The warrant application, which remained sealed at the government's request
|
||
|
for seven months, reveals that the agents were investigating an employee of the
|
||
|
company whom they believed to be engaged in activity they found questionable at
|
||
|
his home and on his own time. The warrant application further reveals not only
|
||
|
that the Secret Service had no reason to think any evidence of criminal
|
||
|
activity would be found at SJG, but also that the government omitted telling
|
||
|
the Magistrate who issued the warrant that SJG was a publisher and that the
|
||
|
contemplated raid would cause a prior restraint on constitutionally protected
|
||
|
speech, publication, and association.
|
||
|
|
||
|
The defendants in this case are the United States Secret Service and the
|
||
|
individuals who, by planning and carrying out this grossly illegal search and
|
||
|
seizure, abused the power conferred upon them by the federal government. Those
|
||
|
individuals include Assistant United States Attorney William J. Cook, Secret
|
||
|
Service Agents Timothy M. Foley and Barbara Golden, as well Henry M. Kluepfel
|
||
|
of Bellcore, who actively participated in the unlawful activities as an agent
|
||
|
of the federal government.
|
||
|
|
||
|
These defendants are the same individuals and entities responsible for the
|
||
|
prosecution last year of electronic publisher Craig Neidorf. The government in
|
||
|
that case charged that Neidorf's publication of materials concerning the
|
||
|
enhanced 911 system constituted interstate transportation of stolen property.
|
||
|
The prosecution was resolved in Neidorf's favor in July of 1990 when Neidorf
|
||
|
demonstrated that materials he published were generally available to the
|
||
|
public.
|
||
|
|
||
|
Legal Significance:
|
||
|
|
||
|
This case is about the constitutional and statutory rights of publishers
|
||
|
who conduct their activities in electronic media rather than in the traditional
|
||
|
print and hard copy media, as well as the rights of individuals and companies
|
||
|
that use computer technology to communicate as well as to conduct personal and
|
||
|
business affairs generally.
|
||
|
|
||
|
The government's wholly unjustified raid on SJG, and seizure of its books,
|
||
|
magazines, and BBS, violated clearly established statutory and constitutional
|
||
|
law, including:
|
||
|
|
||
|
o The Privacy Protection Act of 1980, which generally prohibits the
|
||
|
government from searching the offices of publishers for work product and
|
||
|
other documents, including materials that are electronically stored;
|
||
|
|
||
|
o The First Amendment to the U. S. Constitution, which guarantees freedom
|
||
|
of speech, of the press and of association, and which prohibits the
|
||
|
government from censoring publications, whether in printed or electronic
|
||
|
media.
|
||
|
|
||
|
o The Fourth Amendment, which prohibits unreasonable governmental searches
|
||
|
and seizures, including both general searches and searches conducted
|
||
|
without probable cause to believe that specific evidence of criminal
|
||
|
activity will be found at the location searched.
|
||
|
|
||
|
o The Electronic Communications Privacy Act and the Federal Wiretap
|
||
|
statute, which together prohibit the government from seizing electronic
|
||
|
communications without justification and proper authorization.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
STEVE JACKSON GAMES UPDATE:
|
||
|
THE GOVERNMENT FILES ITS RESPONSE
|
||
|
|
||
|
After several delays, the EFF has at last received the government's response to
|
||
|
the Steve Jackson Games lawsuit. Our attorneys are going over these documents
|
||
|
carefully and we'll have more detailed comment on them soon.
|
||
|
|
||
|
Sharon Beckman, of Silverglate and Good, one of the leading attorneys in the
|
||
|
case said:
|
||
|
|
||
|
"In general, this response contains no surprises for us. Indeed, it
|
||
|
confirms that events in this case transpired very much as we thought
|
||
|
that they did. We continue to have a very strong case. In addition,
|
||
|
it becomes clearer as we go forward that the Steve Jackson Games case
|
||
|
will be a watershed piece of litigation when it comes to extending
|
||
|
constitutional guarantees to this medium."
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Feds Arrest "Logic Bomber" July 1, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Michael Alexander (ComputerWorld)(Page 10)
|
||
|
|
||
|
SAN DIEGO -- Federal agents arrested a disgruntled programmer last week
|
||
|
for allegedly planting a logic bomb designed to wipe out programs and data
|
||
|
related to the U.S. government's billion-dollar Atlas Missile program.
|
||
|
According to law enforcers, the programmer hoped to be rehired by General
|
||
|
Dynamics Corporation, his former employer and builder of the missile as a
|
||
|
high-priced consultant to repair the damage.
|
||
|
|
||
|
Michael J. Lauffenburger, age 31, who is accused of planting the bomb, was
|
||
|
arrested after a co-worker accidentally discovered the destructive program on
|
||
|
April 10, 1991, disarmed it and alerted authorities. Lauffenburger had
|
||
|
allegedly programmed the logic bomb to go off at 6 p.m. on May 24, 1991 during
|
||
|
the Memorial Day holiday weekend and then self-destruct.
|
||
|
|
||
|
Lauffenburger is charged with unauthorized access of a federal-interest
|
||
|
computer and attempted computer fraud. If convicted, he could be imprisoned
|
||
|
for up to 10 years and fined $500,000. Lauffenburger pleaded innocent and was
|
||
|
released on $10,000 bail.
|
||
|
|
||
|
The indictment said that while Lauffenburger was employed at the General
|
||
|
Dynamics Space Systems Division plant in San Diego, he was the principle
|
||
|
architect of a database program known as SAS.DB and PTP, which was used to
|
||
|
track the availability and cost of parts used in building the Atlas missile.
|
||
|
|
||
|
On March 20, he created a program called Cleanup that, when executed,
|
||
|
would have deleted the PTP program, deleted another set of programs used to
|
||
|
respond to government requests for information, and then deleted itself without
|
||
|
a trace, according to Mitchell Dembin, the assistant U.S. attorney handling the
|
||
|
case.
|
||
|
_______________________________________________________________________________
|