📄 neidor~1.txt
字号:
was being sent from Riggs in Atlanta to Neidorf in Missouri. To carry the analogy a little further, the evidence isgoing to show that Riggs used the bulletin board. He used it undera false name which he used to disguise his real identity. He use itunder the name of Robert Johnson instead of Robert Riggs. He hadauthorization to use the bulletin board section where you postmessages generally, and he also had a storage locker on the bulletinboard, on of those lockers along the wall in a high school, where hethought he could safely store the text file, the E911 text file thathe had stolen. The evidence is going to be, though, that lawenforcement, Hank Kluepfel, found out about it. Mr. Kluepfel'sefforts to get into and to use Jolnet in that storage area will betestified by Mr. Kluepfel. But the only thing we need to rememberhere at this point is that the information was stored in Lockport,Illinois. That is where the private high school is located. It wasstored in the locker of a private high school in Lockport. But because computer technology is the way it is, Riggs isable to transfer the file by E-mail or a file transfer down toNeidorf in the computers at the University of Missouri. Again, thisanalogy is not quite the same as the bulletin board, but theUniversity of Missouri has a capability there at the university to- 19 -Cook -- opening statementallow students to have essentially a locker on their computer systemwhere Neidorf generated PHRACK Magazine from. Just a final note of reassurance. As we go through theevidence here, we are going to try to have the witnesses explain aseach step progresses what the technology is again. So hang in thereand listen with an open mind, as I know you will anyhow, listen tothe explanations of the technology. (Chart) The evidence in this case is going to show thatthe text file that was stolen here described in vivid detail each ofthe locations along the E911 path to an emergency call. It's goingto show and it did show the central location and the centralsignificance of two places. When an emergency call is made in theBellSouth area, BellSouth region--it is really the areageographically that southerners describe as "Ol' Dixie"--when anemergency call is made there, it goes to a thing called a PSAP, publicsafety access point. The public safety access point is the one thatis in direct communication on secure lines with the fire, police, andambulance. Under the old 911 system, the old emergency dialingsystem, the call would come in, and they would have to trace it backto the origin in many cases. You have a situation potentially wheresomeone would call, perhaps a child, and say, "My dad's hurt", andbefore the operator could talk to the child, they hang up the phone.The child, of course, figures, "Well, I called them. I told them ydad was hurt. They'll e here". So it is, obviously, not thateasy. Under the old 911 system, a complicated tracing procedure had- 20 -Cook -- opening statementto be established. They had to try to find out where the call hadcome from, and it's all done in an emergency posture. Now comes Enhanced 911. You will hear the lady that isoperating that system, or operated it for the balance of timeinvolved in this case. You will also hear from the man, RichardHelms, that brought all the pieces together for the bellSouthregion, and put them in one central location so that all the phonecompanies supporting the 911 system, the Enhanced 911 system, wouldall be on board and be working with the same game plan, never thinkingthat that game plan was going to be over over to hackers. The Enhanced 911 gives you this capability withinthree to five seconds of the time that the person picks up anemergency call and that 911 is entered in, sometimes even before theperson at the public safety access point can pick up the phone. Thecomputers that drive the 911 system have done this: They have gone,in this case, to the remote location in Sunrise, Florida, where theback-up systems and the support systems for the control, themaintenance and the operation of 911 are kept, and it has pulled upall kinds of information about the person making the call. When the person picks up the phone, it's connected wit police,fire and ambulance. They have a TV monitor in front of them or acomputer monitory, if you will, which has all kinds of information.It has the name of the caller or the people that the are known to be at thecalling address. It will have location information with respect towhere the closest department is, fire department, police department,- 21 -Cook -- opening statementto that person. It will also contain information in their computerstorage banks about special problems that may exist. If it's abusiness, if it's a business involving chemicals, the fact that thosechemicals are explosive will be reflected on that screen. If it is aprivate home, if there is a handicapped person there, it will bereflected on that screen. And it's all done within a matter of threeto five seconds. They have it captured there. That is whatEnhanced 911 is about. That's the system that Robert Riggs stole:how that all works together, and how the computers at BellSouthsupport that kind of capability, consistent with the telephonecompany's long history, going back to that first phone call,"watson, I want you", their tradition of providing emergency servicesas the first priority of the phone system. You will be hearing from essentially three groups ofwitnesses. You will be hearing from people at bellSouth that willtell you about the steps taken to protect the system. They will tellyou about the way the file was defined. They will also tell you thatat the same time that they were having these problems with 911 interms of the los of the file, at the same window, they recognizedthat there was a larger problem throughout the network as a resultof hacker intrusions, that there were a series of bellSouthcomputers along the network that had been attacked or were underattack. Some of those computers included the ESS switches. Theyrecognized that the Enhanced 911 theft was a symptom of a disease.The disease was the hackers into switches, and they took remedial- 22 -Cook -- opening statementsteps. They started out slowly to try to identify it, and then theyrapidly expanded, trying to solve the disease along with the problemof E911. So you will hear from the BellSouth people. You are also going to be hearing from three members of theLegion of Doom, three hackers. You're going to be hearing fromRobert Riggs, Frank Darden and Adam Grant. They have hackerhandles. These hacker handles sometimes seem to get to be a littleon the colorful side, a little bit like "CB" handles. You are going to be hearing the testimony of the hackers.You're going to be hearing the testimony of Robert Riggs who willtestify that Mr. Neidorf had been after him to give him informationto put into PHRACK, this hacker newsletter. That when Riggs hadbroken into the AIMS-X computer in BellSouth, he saw on that AIMX-Xcomputer at BellSouth the 911 text file. You're going to hear thathe contacted Neidorf in advance, that in that advance conversation orcommunication, he advised Neidorf that he had the text file, he wassending him the text file to put in PHRACK, that he had gotten it>from an unauthorized account that he had on the BellSouth computer.Essentially, what he told Neidorf is, "This is a stolen piece ofmaterial you're getting". He indicated to Neidorf and Neidorf agreed...first, heagreed to take the stolen property, and he agreed to disguise theidentity of the stolen property to some degree so that it wouldn'trun off on Riggs. Riggs' name wouldn't appear on the file when it waspublished in PHRACK. He would try to disguise some of the- 23 -Cook -- opening testimonyindiations that it was stolen from the BellSouth area...Neidorfwould. You will hear evidence that that is exactly what Neidorf didto some degree or another. You will hear evidence bout Neidorf seeing and noting theproprietary warnings that made it clear that this was stolenproperty belonging to BellSouth. He even made a joke of it. He put alittle, "Whoops"next to it when he sent it back to Riggs because hedidn't want BellSouth to know that he was inside their computers. You're also going to hear evidence that Riggs was neversatisfied with the final result that Neidorf had because it alwayscontained too much information even for Riggs. But the E911 system,the text file and the road map, was published by Neidorf all thesame. You are going to be hearing from Agent Foley who willtestify that he talked to Neidorf about this at his fraternity houseat the University of Missouri. Neidorf said he has freedom ofexpression. That was his response to Foley: Freedom of expressionto publish it in PHRACK. The First Amendment can't be used as a defense to theft.When you steal something, you can't claim that coming up the backdoor, the First Amendment protected you. You will be hearing from Agent Foley though that as partof this discussion with Mr. Neidorf, Mr. Neidorf, in fact, admittedthat he knew the file was stolen, the text file was stolen, and hepublished it in PHRACK.- 24 -Cook -- opening statement He also turns over to Foley a hacker tutorial, a hackerlesson to other hackers on how to break into the ESS switches. Heturns that over. The evidence will also indicate that in addition to thatstolen information was information about a stolen AT&T source codedocument. Here he goes again...source code! The source code programhad a Trojan horse in it. It made it clear right on the faceof it that it was a Trojan horse, a way of stealing passwords from acomputer. I am going to have to pause here for a second to makesure that I reassure you again on the descriptions and the itemswe'll talk about. The source code is a type of language. It is kind of a wayhuman beings write things down as a first step toward communicatingwith computers. They write it down in source code, which isdirections. A rough analogy would be if I'm going to give youdirections on how to get to my house. The source code for that kindof program might be something like:"Go to the door. "Open the door. "Go through the door. "Go forward to the sidewalk. "Go the the sidewalk and stop. "Stop at the sidewalk. Turn left. "After you turn left, start walking.- 25 -Cook -- opening statementStep by step by step progression along the way. That is kind of whatthe source code is about. You will hear, fortunately, a much betterdescription of this from the witnesses on the stand. The source code program that was stolen here thatMr. Neidorf received, again, basically was clear from the face of thedocument that it was stolen. And, again, Mr. Neidorf transferred itout to somebody else. Again, stolen property was received anddistributed in interstate commerce. The nature of this source code was that it would act a lotlike a false front door to a computer, where you walk up to thefalse front door of the computer, you knock on the door, and somebodyinside the door or inside the house says, "Who is it?" The personknocking on the door uses their secret word, or their name or anidentifier, or it's recognized by the person inside the house: "My name is Joe Jones." "My name is Bill Cook." "My name is Colleen Coughlin." "My name is Tim Foley."Except with this door, it was a false door, and what it had thecapability to do is it would record the information. It wouldrecord, "Bill Cook," "Joe Jones," "Colleen Coughlin," "Tim Foley".Those are the passwords to get into the house that a legitimate userof the house would use. But this Trojan horse, what it would do is it would storethose, and after it had stored all that information, it would- 26 -Cook -- opening statementessentially disappear. And the person trying to get in the house wouldall of a sudden get a communication from the other side that wouldsay, "I didn't hear you. Try it again". It would steal those passwords, and it would then put themin a private place where the hacker would come back whenever hewanted to, and just pick up the bucketful of passwords and log-ons,and use them to break into the same computer systems again andagain, kind of an elaborate piced of scientific perversion but thatis what it is about. That was the document that Mr. Neidorf alsotrafficked in as part of this fraud scheme. The final expert that you will probably hear from on thegovernment's side is going to be a man from inside the phonecompany, a man who was with bell laboratories before he was with thephone company. His name is Mr. Williamson. Mr. Williamson will talkto you about the property, the property being the text file, andthe way in which and the reason that the phone company protectsthis kind of property, this information. He will testify, we anticipate, to the obligations of thephone company, to the significance of the text file, along withother people, and the fact that the theft was the theft of criticalinformation for the operation of that system, and that theproprietary markings made it clear to anyone who took it that thatwas stolen and that they didn't have authorization for that document. No matter what other information floating around about 911that might be out there, this document was proprietary and containedthe inside information about what this system was all about, and howan emergency call is driven from the point of someone picking upthe receiver to the time when the help is actually generated fromthe fire, police and ambulance stations. As I've said before, it's that text file that Mr. Neidorfdeliberately compromised into the hacker community. At theconclusion of this case, we are going to be coming back here andasing you to find a guilty verdict against Mr. Neidorf for theinterstate transportation of that stolen text file both from the timehe got it from Riggs, and it was sent from Rigs in Georgia to thebulletin-board in Lockport down to Neidorf at the University ofMissouri, that's one interstate transportation of stolen property,and the interstate transportation of stolen property, that samestolen information back from Neidorf to Riggs in Lockport. In thissituation, it was reviewing the stolen property to make sure thatthey could disguise themselves. And then the final interstatetransportation of that stolen property when Mr. Neidorf compromisedthe text file into the hacker community. I appreciate your attention. That concludees my remarks.I ask you to pay as much attention to Mr. Zenner as he makes hisremarks to you this morning. Thank you. THE COURT: Thank you, Mr. Cook. Mr. Zenner, are you preparedto make your opening statement? <End of Cook -- Opening Comments>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -