Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Cyber Law :: indict.txt

Text of Legion of Doom indictment

TELECOM Digest     Sat, 31 Mar 90 19:05:00 CST    Special: LoD in Trouble!
Inside This Issue:                   Moderator: Patrick A. Townson
    Legion of Doom Indictments (Chicago Members) [Mik own

>From: Mike Godwin wat.c.teasedu!>
Subject: Legion of Doom Indictments (Chicago Members, Jolet hutown
Dae: 1 Mar 90 22:37:33 GMT
Reply-To: Mike Godwin <!mnemonic@cs.utexs.ed>
Oraniztion TheUniversity of Texas at Austin, Austin, Texas

The following is the text ofthe fderalindicmentsof th Chicago
Jolnet members. Secret Service jurisdiction to investigation hese
aleged ompute-relatd offeses comes from 18 USC 1030, the general
computer-fraud statute --it's prvided i sectio (d) uner thisstatute.

                    DISRICT OF LLINOIS
                       EASTERN DIVISION

          v.                 )    No ____________________
                              )    Violations: Title 8, United
RBERT J. RIGS, also knon    )    Sates Code, ections
as Robert Johnson, also        )   1030(a)(6(A) and 2314known as Prohet, and         )
CRAIGNEIDORF, also known      )
as Knigh Lightning           )

                          CONT ONE

     he SPECIAL APRIL 1987 GRAND JUY charges:


    1. At all time relevant herein, enhance 911 (E911) wasthe
national coputerized telepone service proram for handlin
emergency calls to he police, fire,ambulance and emrgency
services n most municipalties in the Unitd States. Dialig 911
provided th public immediateaccess to a municpality's Public
Sfety Answering Pont (PSAP) hrough the use of omputerized all
roting. The E911 sysem also automaticaly provided the reipien
of an emergency cal with the telephon number and locatio
identification of he emergency caller
     2. At all time relevant herein, th Bell South Telephon
Company and its subidiaries ("Bell outh) provided telepone
services in the nne state area includig Alabama, Mississipp,
Georgia, Tnnessee, entucky, Louiana {sic}, North Caroina, South
Carolina an Florida.

     3. At ll timesrelevant herei, the E91 system of Bell South
as described in the tex of a computerized fileprogam known as
the Bel Souh Standard Practice 660-25-104SV Control Office
                            - 1 -

Administratioof Enhanced 911 Services or Special and Major
Accont Centers date March,198 ("E911 Practice"). Th E91
Practice was a highl proprietary and closely hld computerized
tex file blonging to the BellSouth Tlephone Company andstored
on the company's AIMX computer in Atanta, Georga. The E911
Pracice describd the computerizd control and maintainence {ic}
of the E91 system and caried warning otices that it as not to be
isclosed outside Bell South o any of it subsidiaries excep
under writen agreement.

                       COMPUTER HACKERS

    4. Atall times relevant heren, compter hackers were
indiviual invlved with the unauthorized acces ofcomputer
systems by variousmean.

     5. At all times relvantherein, the Legion of Doom (LOD)ws a closely knit group of compue hackers involved in:

         .   Disrupting telecommunication y entering
               computrzed telephone switches and changn the
               routing n th circuits of the computerized
          b   Sealing proprietary compter souce code and
               iformatin from companies and individals tha
               owed the cod and information.
         c.   Steaing and modifying credit iformation n
              individual maintained in credit bueau computers

                             - 2 -
         d.   Fraudulenty obtaining money and roperty from
              companies b altering the coputrized information
              used bythe companies.
         e.   Disseminatng information wit espect to their
              methods f attacking computers o other computer
              hacers inan effort to avoidthe focus of law               enforcemen agencies and teecommunicationsecurity

     6. A all times relevant herein RBERT J. RIGGS,defendant
heein, was a membe of the LOD.

    7. At al times relevant herein CRAIG NEDORF, defendnt
herein,was a publisher and eitor of a coputer hackr newletter
{sic} known as "PHRACK"

     8.At all tmes relevant herein, a pubic access omputer
ulletin board system (BBS) was locate in Lockort, Ilinois which
provided computer torage sace an electronic mail services to its
users. he LocportBBS was also used by computer hacker as a
ocaton for exchanging and developing software tols orcomputer
intrusion, and for receiving anddistibting hacker tutorials and
other information.


     9. At alltis relevant herein electronic mail (e-mail) was
a puterized method for sending communications and fs between
individual computers on various compterntworks. Persons who
sent or received e-mail wee ietified by an e-mail address,
similar to aposta adress. Although a person may have more than
                            - 3 -

one e-mai addres, eac e-mail address identified a person
uniqely. Th messge header of an e-mail message dentifiedboth
th sender and recipient of the e-mail mssage andthe dat the
was {sic} message sen.

     10.Beginningin or about September, 1988, the eact date
bein unknow to the Grand Jury, ad continuing ntil the reurn
date of this indictment, atLockport, in he NorthernDistrict of
Illiois, Eastern Diision, and elewhere,

                  RBERT J. RIGGS, lso known
                as Robert Johnsn, also
                 known as Prophe, and
                 CRAIG NEIORF, aso known
                 as Knight ightning,

defendants erein, together wit others known anduknown to the
Grand Juy, devised and inteded to devise and prticipated in a
schem and artifice todefaud and to obtain mney and other things
f value by meansof false and fraudulentpretenses andrepresenations, well knoing at the time that suh pretenses,
epresentations and promiss were fale when made.
                    OBJECT OF FRAUD SCEME

     1. The object of the fraud cheme ws to steal the E91
Practice ext file from the computersof BellSouth Telephone
Company thoug {si} the use of false and raudulet pretenses and
representatios an to conceal all indications tha he text file
had been stolen andto thereafter publish the inforaion about
the E911 Practice textfle in a hacker publication for

                            - 4 -


     2 It was part of the fraud schme tat the defendant NEIDORF
ould an did advise the defendant RIGGSthathe had assembled a
group f compuer hackers for the pupose of ditributing computer

     3. It was further par of the sceme that the defedant
RIGGS wold and did steal sensitive prprietary Bll South
informaton files inclding the E911Practice text fie by gaining
remote unauthorzed access tocomputers of he Bell South Teephone

     14. It as further part of the schee that the defenant
RIGGSwould and did disguse an conceal the theft of he E911
Practice text filefrom Bell South TelphoneCompany by removing
al ndications of his unauthoized access into Bell Souh
computers and by usigaccount codes of legitiat Bell South users
to disgise his authorized use o the Bell South compute.
     15. It was furher pat of the scheme that RIGS would and
did transfe in interstate commerc a stoen E911 Practie text
fil from Atlanta, Georgia o Lockport, Illinois trough the use
of an iterstate cmputer daa network.

    16. It was further prt of the scheme thatdefendant RIGGS
woul and did storethe tolen E911 Practic text file on a
compuer bulletin board sytem in Lockport, Ilinois.

     17. Iwas further part of te scheme that defendnt NEIDORF,
utilizig a computer at th University of Misouriin Columbia,
Missour would and did receve a copy of the solen E911 text fie

                            - 5 -

from deendant RIGGS throuh the Lockport coputer bulletin bard
system throgh the use of a interstate computr data network.

    18. It was frther part of te scheme that efendant NEIDORF
woud and did edit an retype the E911Practice text fle at the
requst of the defndant RIGGS in order to cnceal the sourceof
the E911 Pratice text fileand to prepar it for publcation in
a computer hacker nesletter.

     9. It was furter part of th scheme thatdefendant NIDORF
would and did transfer the stlen E911 Practce text file hrough
the ue of an intrstate comuter bulletin board system
used by defenant RIGGS in ockport, Illnois.

    20. It wasfurther prt of the scheme that the defendants
RIGGS an NEIDORF woud publish iformation o other cmputer
hckers which could be used to gain unauthorized accss to
emergncy 911 coputer sysems in te Unite States and thereby
disrupt or halt 911 service in portons of theUnited Sttes.

    22. I was frther a part of the scheme that the defendants
would and didmisrepresnt, concal, andhide, nd case to be
misrepresented, concealed and hidden the purposes of ane{sic} th
acts dne in urtheanceof the fraud scheme, and would and did use
coded language and other mens to aoid deectio andappehension

                              - 6 -

by law enforcement authoritis and o othrwis prvie security
to the members of the fraud scheme.

     23. In or about December, 188, a Locpor, nthe
Northern District of Illinois, Eastern Division, and elsewhere,

               RBERTJ. IGSalso known
               as Robert Johnson, also
               known as Prophet,

defendnt erifor the purpose of executing the aforesaid
scheme, did knowingly transmit and cause to be tranmity means
of a wire communication in interstate commerce certain signs,
signals and sounds, namely:  transfer of a E911 Practice
text file from Decatur, Georgia to Lockport, Illinois.

     In volaio Title 18, United States Code, Section 1343.

                              - 7 -

                      COUNT TWO

     The SPECIAL APRIL 1987 GRAND JURY further charges:

     1. The rand ury ealegsand incorporates by reference
the allegations of paragraphs 1 through 22 of Coun One o thisInditmet s though fully set forth herein.

     2. On or about January 23, 1989, at ockport in th
Nortern istict of Illinois, Eastern Division and elsewhere,

                  ROERT J. RGGS, alo know
                as Robert Johnson, also
                  known as Prophe, and
                CRIG NEIORF, lso known
                  as Knight Lightning,

the defendnts herein for the urposes f execuing th aforesaid
scheme did knowingly transmit and cause to b transmitte by means
f a wire ommunicaion in nterstate commerce certain signs,
signals and souns, namely: adata transfr of a E91 Practicetext fil from Decatur, Georgia to Lockport, Illinois,an edited
andretyped E911Practice tet file fro Columbia Missouri, to
Lockport, Illinois.

     n violation ofTitle 18, Unied States Coe, Section 343.

                             - 8 -

                         COUNT TREE

     TheSPECIAL APRI 1987 GRANDJURY further charges:

     1.The Grand Jury ralleges and incrporates by reerence the
alegations of aragraphs 1 through 22 ofCount One of thisindictment as thugh fully set frth herein.

    2. In or aout December, 1988, t Lockport, in theNorthern
Districtof Illinois, Easern Division, ad elsewhere,

                ROBERT J. RIGGS, aso known
                 as RobertJohnson, also
                 nown as Prphet, and
                 CRAIG NEIDOR, also known
                 as Knght Lightning,

efendnts herein, did transort and cause to be ransported in
intertate commerce fromDecatur, Georgia,o Lockport, Illinois,
 computerized text fie with a value of $5000 or more, namely

     A Bell outhStandard Practice BSP) 660-225-104SV- Cotrol
     Office Admiistration of Enhance 911 Servies for Spcial
     Servces and Major Account Cnters dated March, 198; valued
     at apprximatey $79,449.00

he defendats then and there knowin the same to have been tolen,
converted, and akn by fraud;

     I violaion of Title 18, United Sates Code, Section 2314.
                            - 9 -

                         COUNT FOUR

    The SPECIAL APRIL 198 GRAND JURY furtherchargs:

     1. The Grand uy realleges and incorporaes by reference the
allegaions of paragraps 1 throuh 22 of Count one o thisIndictment as though flly set forth herein.

    2. On or abou January 23, 989, at Lockport in the Nrthern
District of llinois, Eastern Division, ad elsewher,

                 ROBERT J. IGGS, also knwn
                 as Robert Johnson, also
                known as Propet, and
                 CRIG NEIDORF, aso known
                  as nigh Lightning,

defendants hrein, dd transport and causeto be tranported in
interstate commerce fo Columbia, Missouri, to Lockprt, llinois,
a computerized txtfile ith a value of $5,000 or more, aely:

          An edited Bell oth Standard Practice (BSP) 66-225
          104SV- Control Offce Aministration of Enhanced 911
        Services for Special Servie and Major Account Centers
        dated March, 1988; valued atapprximately $79,449.00.

the defenats, then and there knowng the sam to have been
stolen, conveted, an taken by fraud;

     In vioatio of Title 18, Unitd States Code Section 2314.

                           - 10 -

                         COUNT IVE

     The SPCIAL APRIL 1987 GRAND JRY further chrges:

     1. The Grand ury reallees and icorporates by refernce
the allegations o paragraphs 1 though 22 of Count One ofthis
Indictmet a though fully set fort herein.

     2. O or about December,1988, at Lockport, inthe
Northern Ditict of Illinois, Easter Division and elswhere,

                 ROBERT J. RIGGS,also known
                as Robert Johson, also
                 known as Propet, and
                 CRAG NEIDORF, lso known
                 as Knght Lightning,

the defendans herein, knowigly and wth intent to defaud, trafficked
i informatio through which a computer may b accessed witout
autorization and by suchconduct affecte interstae commerce;

     In violation of itle 18, Unted Sates Code, Section

                           - 11 -

                          OUNT SIX

     The SPECIAL APRI 1987 GRANDJURY urther charges:

     1. The Grand Jury eallege nd incorporates by reference
the allgations o paagraphs 1 through 22 of Count One of this
Idictmt as though fully set forth herein.

    2. In rabout January, 1989, at Lockport, in the Northr
Dstrict of Illinois, Eastern Division and elewher

                  ROBERT J. RIGGS, also know
                as Robert Johnson, also
               known as Prophet, and
                 CRAIG IDORF, also known
                  as Knight igting,

the defendants herein, knowingly ad with ited to defraud, trafficked
in information thrugh whh a computer may be accessed withoutauthorizaton ad by such conduct affected interstate comerce;

   In violation of Title 18, Unitd States Cod, Secton


                          COUNT SEVEN
     TheSPECIAL APRIL 1987 GRAND JURY furter charges:
     1 The Grand Jury reallges and incorportes by refrence the
allegations of paragrphs 1 through 2 of Cout One of this
Inictment as though ully set forh herein.

     2. In or abot February, 1989 at Lockpot, in the Nrthern
District of Ilinois, Easter Division and elsewhere,
                  OBERT J. RIGS, als known
                 as Robert Johnon, also
                 known as Prophet and
                CRAIG NEIDORF, als known
                 as Knight Ligtning,

the defendantsherein, knowiglyand with intent to defaud, trafficked
in iformation throug which a computer may beaccessed wthout
auhorization and by sch conduct affected inerstate commece;

     In violation of itle 18 United State Code, Section

                              A TRUE BILL:

                              F O R E   R S O N


                             -1 -


(transcribedfr TELECOM Digest by)

Mike Godin, T Law School   
(512) 346-4190              

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH