[CONTACT]

[ABOUT]

[POLICY]

by his legal to whom we

Found at: 0x1bi.net:70/textfiles/file?law/court.law


by his legal counsel, to whom we are indebted. The page numbers
correspond to transcript pagination. The document was retyped by CuD,
and cross-checked against the original. A spell checker removed
they too were removed.>
 
********************************************************************
 
 
                 IN THE UNITED STATES DISTRICT COURT
 
                    NORTHERN DISTRICT OF ILLINOIS
 
                           EASTERN DIVISION
 
THE UNITED STATES OF AMERICA,      .
                   Plaintiff,      .       90 CR 70
                                   .
                                   .
            v.                     .       Chicago, Illinois
                                   .
CRAIG NEIDORF,                     .       Tuesday,
                   Defendant.      .       July 24, 1990
                                   .
                                   .       10:10 a.m.
                                   .
. . . . . . . . . . . . . . . . . ..
 
 
                              VOLUME ONE
                 TRANSCRIPT OF JURY TRIAL PROCEEDINGS
                 BEFORE THE HONORABLE NICHOLAS J. BUA
                              AND A JURY
 
 
 
For the Government:        THE HONORABLE IRA H. RAPHAELSON,
                              United States Attorney, by
                           WILLIAM J. COOK
                           COLLEEN D. COUGHLIN
                           DAVID A. GLOCKNER
                              Assistant United States Attorneys
                              219 South Dearborn Street
                              Fifteenth Floor
                              Chicago, Illinois 60604
 
For Defendant:             SHELDON T. ZENNER
                              Katten, Muchin and Zavis
                              525 West Monroe Street
                              Suite 1600
                              Chicago, Illinois 60606
 
Case Agent:                TIMOTHY M. FOLEY
                              Special Agent
                              United States Secret Service
 
Court Reporter:            Agnes M. Thorne
                              Official Court Reporter
 
- 2 -
 
     (Twelve jurors and four alternate jurors sworn to try
     issues.)
     (Following proceedings transpired out of the presence of the
     jury:)
 
     MR. COOK: Judge, we have two short issues to bring up. The
Amendment mistake of law. We are in a bit of a quandary in terms of
the best way to argue that or front that with the jury during our
openings. Does the court anticipate giving an instruction as to the
law of mistake of law with respect to this either before Mr. Zenner
talks or at the conclusion of the case?
 
     THE COURT: At the conclusion of the case in written instructions
to the jury.
 
     MR. COOK: And that would be along the lines that it is not a
     defense to this violation mistake of law.
 
     THE COURT: That we will decide at the conference on jury
     instructions.
 
     MR. COOK: All right.
 
     THE COURT: Mistake of law is no defense. I think we can agree
to that.
 
     MR. ZENNER: No.
 
     THE COURT: We can't?
 
     MR. ZENNER: Wait. We agreed that the First Amendment is no
 
     MR. COOK: That's enough. That's enough for me to make my
 
- 3 -
 
Cook -- opening statement
 
opening.
 
     THE COURT: Is that enough?
 
     Mr. Cook: Yes.
 
     THE COURT: Okay. What else?
 
     MR. COOK: Also, Mr. Zenner is indicating that he wants to
argue about the videotapes or make some presentation about the
videotapes in his opening remarks. Those are irrelevant.
 
     THE COURT: What is the nature of those videotapes?
 
     MR. ZENNER: It is very simple. On one of the dates charged
n the indictment, the exact date, in fact, the exact date charged
n the indictment in Count Two, the date the scheme was supposed to
Service at SummerCon '88, the hacker convention.
 
     THE COURT: Okay, now I recall.
 
     MR. ZENNER: That is the subject of that. The fact that he is on
videotape for 15 hours on the date he is supposed to have committed
the crime in the midst of a supposed conspiracy with some
of the other people who are on videotape I expect to mention,
albeit very briefly, probably ten seconds worth in an opening,
videotaped on that day, a date charged in the indictment, and that
the worst thing they saw him do or talk about when he was with these
a pizza. I mean, that's it. They have a the videotape in the middle
of this scheme with his coschemers.
 
- 4 -
 
Cook -- opening statement
 
     THE COURT: And what's the problem with that?
 
     MR. GLOCKNER: Judge, we went through all this before on the
(a) the fact that the defendant is videotaped not committing a
crime is not relevant to whether or not on some other occasion
 
       Second, as we argued in the earlier filings with your Honor,
n SummerCon...
 
     THE COURT: You will object to the entry in evidence of that
videotape?
 
     MR. GLOCKNER: Absolutely.
 
     THE COURT: The objection will be sustained.
 
     MR. GLOCKNER: Thank you.
 
     THE COURT: What else?
 
     MR. COOK: Nothing else, Judge.
 
     MR. ZENNER: With respect to the videotape, I accept the court's
certainly refer to the fact that he was videotaped, and I can ask the
agent that, and I intend to ask the agent who investigated this case:
"On a date charged in the indictment..." Mr. Cook is going to show
that. He is going to say, "On July 22, 1988, my client committed
a wire fraud". He's going to tell them to convict him of that.
On that date, he's on videotape for fifteen hours with the Secret
Service looking at him, and he doesn't do anything of the sort.
He's meeting with his coschemers...he's meeting with his
coconspirators.
 
- 5 -
 
Cook -- opening statement
 
     THE COURT: And you will seek to introduce the videotape to
 
     MR. ZENNER: All I want to be able to do is to cross-examine
Agent Foley on that.
 
     THE COURT: Well, you might be able to cross the agent
 
     MR. ZENNER: It is a date charged in the scheme. I have a hard
time imagining how I can't cross.
 
     THE COURT: Mr. Zenner, you can make the opening statements, and
f there is an objection, I will sustain it. Okay.
 
     MR. ZENNER: All right.
 
     THE COURT: What else?
 
     MR. COOK: Nothing.
 
     THE COURT: Bring in the jury please.
 
     (Jury present at 10:20 a.m.)
 
     THE COURT: Good morning ladies and gentlemen.
 
     JURORS: Good morning.
 
     THE COURT: Please be seated.
 
          Mr. Cook, is the government prepared to make its opening
 
     MR. COOK: Yes, Judge.
 
     THE COURT: Very well.
 
     MR. COOK: Thank you.
 
_OPENING STATEMENT ON BEHALF OF THE GOVERNMENT_
 
     MR. COOK: Good Morning, ladies and gentlemen.
 
- 6 -
 
Cook -- opening statement
 
     JURORS: Good morning.
 
     MR. COOK: My name is Bill Cook. I'm an Assistant United States
Attorney. I am going to be substantially aided in this prosecution
by Colleen Coughlin, who is an Assistant United States Attorney, and
Dave Glockner, who is also an Assistant United States Attorney. We
Service working with us. He is sitting at the trial table with us.
           In 1876, the first telephone communication ever made was:
                 "Mr. Watson, come here, I want you".
That was also the very first emergency telephone call ever made.
Since that time, the telephone company has, obviously, sophisticated
their operation to a large degree so that where we stand today in
Southern Bell region of the United States. It's taken for granted.
architecture that that system is based upon. It is built on
computers from bottom to top.
          In 1988, a road map to that computer system, that life
line, was stolen from a computer in Atlanta, Georgia, by a man
by the name of Robert Riggs, who is a member of an organization
known as the Legion of Doom.
          That document, with its proprietary markings, its warnings
 
- 7 -
 
Cook -- opening statement
 
on it, and the clear indications that it was the property of
BellSouth, was transferred electronically to Mr. Craig Neidorf, the
 
          Mr. Riggs is a hacker, a person that breaks into
computers. He answers to no one but his own ability to get into
those computers.
 
          We anticipate that the evidence will show that in February
of 1989, Mr. Neidorf published that extensive road map to the
life line of the entire hacker community so far as he was able to
 
          In many respects, I submit to you that this is not going
to be a, "Whodunit", or "What was done?".
 
          There are two sets of violations charged in the indictment.
Very briefly, they are the interstate transportation of stolen
 
          With respect to the interstate transportation of stolen
Riggs. He further admitted to Agent Foley that at the time he
 
          With respect to the wire fraud the evidence will show
that the wire fraud was really an outgrowth of what you are going to
be hearing about and what will be described as the Phoenix Project,
an effort by Mr. Neidorf to consolidate a group of hackers.
 
          The object of that wire fraud scheme was extensive, but it
 
 
- 8 -
 
Cook -- opening statement
 
ncluded providing hackers with information about how to crack into
other people's computers, soliciting them to try to provide him
articles, articles for his publication PHRACK  newsletter which
 
          The evidence will also show that Mr. Riggs knew of the
follow along with their activities. In that respect, he was almost
a "hacker groupie", except a groupie that sought to be in control and
 
          Now, just one more set of observations about the indictment
and the format of the indictment, and then I'll move on to what
 
          (Chart) Does everybody see that? One juror I know can't
 
     THE COURT: Can all the jurors now see that?
 
     JURORS: Yes.
 
     MR. Cook: Mr. Neidorf is charged in each count of the indictment,
except for the first count here. The coding here is this is the
are the approximate dates that the violations or the activities
occured that are alleged in the indictment.
 
          Specifically, in the second, the second count of the
ndictment alleges that on July 22, 1988 as part of the wire fraud
 
- 9 -
 
Cook -- opening statement
 
collapse of the computer world by virtue of a series of law
enforcement raids. Mr. Neidorf announced here that he wanted the hacker
community to come together again to be more effective than ever.
 
          The next activity is the third count of the indictment,
September 19, 1988, a wire fraud allegation again, E-mail,
electronic mail, generated from Mr. Neidorf to Mr. Riggs and
Mr. Scott O, a computer hacker.
 
          This electronic mail, this electronic mail here also,
these are efforts by Mr. Neidorf reaching out to consolidate,
dentify and pull together a group of hackers that he could be
n fact, supplied him with stolen information, stolen from computers.
 
          These allegations refer more directly to the interstate
transportation and movement and file transfers of the E911 text file.
 
          Count Seven refers to the publication of a series of
computer articles that deal with how to break into a UNIX operating
 
          Counts Eight and Nine refer to the text file being sent from
Neidorf back to Riggs, from Neidorf in Missouri to Riggs who was
bulletin board, in Lockport, Illinois, sending it back for review and
to make sure that Neidorf had done an adequate job of concealing the
 
- 10 -
 
Cook -- opening statement
 
nature of the file fro the point of view not the contents so much
of the file, but concealing where Riggs had stolen it from to protect
Riggs, and, to a large degree, to protect himself so that it couldn't
be identified exactly where the document had been stolen from.
 
          Finally, we have the publication of the E911 text file in
the PHRACK newsletter by Mr. Neidorf.
 
          you will be seeing the indictment in the jury room as you
that you are going to be hearing about.
 
          Now, if I were you, if I were you, I would be sitting
there, as some of you may be, thinking to myself, "What have I gotten
myself in for? He's talking about computers. He's talking about
operating systems. Whooooaaaa!"
 
          First of all, you don't need to be a computer user, or a
computer ace, to understand what this case is going to be about. It
transferring property, the interstate transportation of stolen
taking, taking by deception. But it just involves some relatively
taking and the bottom-line information. I'm telling you to relax
about the computer jargon.
 
          There are several concepts that we're going to be talking
about here. What I'm going to give you is a kind of a lawyer's
 
- 11 -
 
Cook -- opening statement
 
an expert's opinion on some of the things you're going to be hearing.
 
          (Blackboard) Well, let's talk about some of the technology
that's involved, and see if we can't make ourselves more comfortable
 
          I referred to the UNIX operating system. UNIX...U-N-I-X.
What is that? Well, computers speak a language. Computers speak
the language that the people that built the computer want them to
computer want it to speak. Sometimes computers can be set up so that
you can have them speak several different languages. UNIX is just a
language. It is just the language that the computer speaks. It
talks UNIX. Some of you talk about MS/DOS. It's a microsoft disk
operating system. Forget it! It's just the language that the
computer speaks.
 
          (Blackboard) Now, this is a theft of information. You are
nformation from a computer, what you really do is you order the
computer to make a duplicate original o what its memory is or what
t contains with respect to that particular item. And when you are
asking the computer to send that information to you, you are doing a
file transfer. I'll get to that later. You are just telling the
computer to send it to you. What the computer sends to you is a
copy. It's an exact copy in every respect of the original
nformation on the computer.
 
- 12 -
 
Cook -- opening statement
 
          So the value of the property comes from the fact that it
contains information. There is an expression that, "Information is
value of information comes from in our society.
 
          Certain types of information are protected by companies.
They are reasonably protected by companies, especially when they
become sensitive. The E911 road map and the information about where
all the stops along the way are, that was a sensitive piece of
nformation. You're going to be hearing about the protections that
BellSouth put on that information, and the efforts that they made to
copy of the information. You will be receiving further instructions
>from the judge on all that. So it is the information that is being
 
          (Blackboard) Now, the next concept--I talked about
                  "Why is a file transfer the same as a high
                  school graduation?"
Here's the answer. When you hear about this, think about a high
up to the stirs, probably by the path that the nun ordered you to
take to get to the stage, and you had better not vary from the path.
You follow that route up to the stage, across the stage, and a file
transfer takes place at center stage in the auditorium. You reach
out, you shake hands with the principal, and with the other hand,
after you have shaken hands with the principal, you receive your
 
- 13 -
 
Cook -- opening statement
 
That's really all a file transfer is on a computer. You come up,
you are ordered, someone in a remote location, the principal in this
case, calls your name, you come up to the stage, you are the
computer on one side and he is the computer on the other side. You
are able to communicate. It's actually called that. It is called a
"handshake relationship" with another computer. There are some other
a handshake relationship with another computer.
 
          After the handshake is there and the principal recognizes
you to be the problem kid that he's glad to get rid of--he didn't
like you--then he gives you the file. That's the file transfer. It
s no different transferring information from one computer to
another.
 
          (Blackboard)  Computer network. Well, that is probably a
television where you have some designated programming and it comes in
to your machine, your television in this case. Of course, the
the computer you are able to have more of an interchange with the TV
and what is going on with the program. So don't be concerned about
the network idea. Keep in mind the idea of a cable coming into your
computer as part of a centralized system. That is really all the
 
- 14 -
 
Cook -- opening statement
 
network is, a series of computers joined together.
 
          In the case of BellSouth, you are going to see that that is
a very expensive computer network. In order to provide service to
their customers, they hang a lot of computers on that network,
computers that do different things, computers that keep track of
keep track of what telephone number goes with what address, computers
that keep track of the switches, the computer switches. Now,
that's another concept I'll talk about for a second.
 
          (Chart) When people think of computer switches, they
are telephone switches. The concept of a lady at the switchboard
always comes to mind with a knob here that goes to a hole up here,
connecting one person to another person. Today, all of that is done
by high-speed computers, high-speed switches. They are electrical.
Because they are electrical, they are referred to as ESS. All this
means is an electronic switch. This is a computer. This computer
the information about how to get your call all the way across the
country, which route are we going to take to get there, which
 
          The Enhanced 911 system was built on these computers.
You can get the emergency call through faster if it goes like thing.
 
          Now, the switches at various areas: Switch 1, Switch 2.
 
- 15 -
 
Cook -- opening statement
 
This is the first switch we produced, Switch 1. And the second
 
          When they increased the capabilities of those switches, the
label the switches: 1 or 1A, 2, 3, 4, 5, a fairly easy way to keep
track of the switch development. But the idea is that all electronic
 
          The evidence will show that the hackers in the BellSouth
Region had the keys to get into them for a period of time.
 
          Now, another question, a riddle:
               "Why is computer security like a hotel?"
Mr. Garcia is going to be explaining that to you. Actually, it's a
lot like staying in a private hotel.
 
          In the case of the computers at BellSouth, the computers
that drive the E911 system and support the phone company system
aren't known to the public. They are unpublished numbers. They
telephone company, but it is really a closed system. It is designed
to be for protection.
 
         So the hotel, the computer, is not known to the outside
you walk into the hotel, it's like if you try to walk into a hotel
n downtown Chicago. If you go to the desk and ask them, you know,
 
- 16 -
 
Cook -- opening statement
 
               "I want to have Joe Jones' room".
Well, first of all you say:
 
              "I want to see Mr. Jones."
 
                   "Well, we can't tell you if he's here."
 
               "Well, if you tell me he's here, I want
               to talk to him. I want to speak to him.
               Give me his room number.
 
                   "Well, we're not going to give you
                   his room number. You are going to
                   have to call him on the house phone
                   and he'll have to verify that you're
                   somebody he knows."
 
So there are a series of checks that are set up inside the system.
But once you get inside the hotel, you can make contact with Jones.
And you will see, just as in real life, you have a number of people
at one hotel. You will have people going back and forth in the
there for good valid reasons. He's not going to do anything but
 
          It is really the same thing and the same principle is
nvolved if you are the system administrator on one of these
computers. You are in the position, in the shoes, of the hotel
operator, the guy that runs the hotel or the lady that runs the
credentials to get in and you exercise and upfront control. You also
exercise control over some of the common spaces. You make sure the
 
- 17 -
 
Cook -- opening statement
 
So when you hear a person talk about running a system or computer
We have a man, Mr. Garcia, from BellSouth, who will be testifying
to that and to that analogy, and I think you'll find it most
nteresting.
 
          (Blackboard) Text file. You will hear a lot about that.
That is probably a new term for you when you walked in: text file.
Just think of it as a book or a pamphlet stored on a computer.
That's it. That's the end of the mystery. A book or a pamphlet
can be copied if you can get into the computer. That's what
 
          (Blackboard) BBS. It means bulletin board system.
Sometimes it will have a "C" in front of it. All that means is
computer bulletin board system.
 
          Now, here's my analogy to that. The computer bulletin
board system is a lot like a private high school where you have to
the high school have to give you permission to get into their
and as you walk through, one of the first things that meets you as
you walk into the private high school is a bulletin board with
messages posted on it. And what you will also see along the sides of
t are going to be lockers, student lockers.
 
- 18 -
 
Cook -- opening statement
 
          The principal bulletin board that you are going to be
board in Lockport, Illinois. The Jolnet bulletin board in Lockport,
 
          To carry the analogy a little further, the evidence is
a false name which he used to disguise his real identity. He use it
under the name of Robert Johnson instead of Robert Riggs. He had
authorization to use the bulletin board section where you post
messages generally, and he also had a storage locker on the bulletin
board, on of those lockers along the wall in a high school, where he
thought he could safely store the text file, the E911 text file that
enforcement, Hank Kluepfel, found out about it. Mr. Kluepfel's
efforts to get into and to use Jolnet in that storage area will be
testified by Mr. Kluepfel. But the only thing we need to remember
 
          But because computer technology is the way it is, Riggs is
able to transfer the file by E-mail or a file transfer down to
Neidorf in the computers at the University of Missouri. Again, this
analogy is not quite the same as the bulletin board, but the
University of Missouri has a capability there at the university to
 
- 19 -
 
Cook -- opening statement
 
allow students to have essentially a locker on their computer system
 
          Just a final note of reassurance. As we go through the
evidence here, we are going to try to have the witnesses explain as
each step progresses what the technology is again. So hang in there
and listen with an open mind, as I know you will anyhow, listen to
the explanations of the technology.
 
           (Chart) The evidence in this case is going to show that
the text file that was stolen here described in vivid detail each of
the locations along the E911 path to an emergency call. It's going
to show and it did show the central location and the central
BellSouth area, BellSouth region--it is really the area
emergency call is made there, it goes to a thing called a PSAP, public
s in direct communication on secure lines with the fire, police, and
ambulance.
 
          Under the old 911 system, the old emergency dialing
to the origin in many cases. You have a situation potentially where
before the operator could talk to the child, they hang up the phone.
The child, of course, figures, "Well, I called them. I told them y
easy. Under the old 911 system, a complicated tracing procedure had
 
- 20 -
 
Cook -- opening statement
 
to be established. They had to try to find out where the call had
come from, and it's all done in an emergency posture.
 
          Now comes Enhanced 911. You will hear the lady that is
operating that system, or operated it for the balance of time
nvolved in this case. You will also hear from the man, Richard
Helms, that brought all the pieces together for the bellSouth
companies supporting the 911 system, the Enhanced 911 system, would
all be on board and be working with the same game plan, never thinking
that that game plan was going to be over over to hackers.
 
          The Enhanced 911 gives you this capability within
three to five seconds of the time that the person picks up an
emergency call and that 911 is entered in, sometimes even before the
computers that drive the 911 system have done this: They have gone,
n this case, to the remote location in Sunrise, Florida, where the
back-up systems and the support systems for the control, the
maintenance and the operation of 911 are kept, and it has pulled up
all kinds of information about the person making the call.
 
          When the person picks up the phone, it's connected wit police,
fire and ambulance. They have a TV monitor in front of them or a
computer monitory, if you will, which has all kinds of information.
calling address. It will have location information with respect to
 
- 21 -
 
Cook -- opening statement
 
to that person. It will also contain information in their computer
business, if it's a business involving chemicals, the fact that those
chemicals are explosive will be reflected on that screen. If it is a
to five seconds. They have it captured there. That is what
Enhanced 911 is about. That's the system that Robert Riggs stole:
company's long history, going back to that first phone call,
"watson, I want you", their tradition of providing emergency services
as the first priority of the phone system.
 
     You will be hearing from essentially three groups of
tell you about the steps taken to protect the system. They will tell
you about the way the file was defined. They will also tell you that
at the same time that they were having these problems with 911 in
terms of the los of the file, at the same window, they recognized
that there was a larger problem throughout the network as a result
of hacker intrusions, that there were a series of bellSouth
computers along the network that had been attacked or were under
attack. Some of those computers included the ESS switches. They
The disease was the hackers into switches, and they took remedial
 
- 22 -
 
Cook -- opening statement
 
of E911. So you will hear from the BellSouth people.
 
          You are also going to be hearing from three members of the
Legion of Doom, three hackers. You're going to be hearing from
Robert Riggs, Frank Darden and Adam Grant. They have hacker
on the colorful side, a little bit like "CB" handles.
 
          You are going to be hearing the testimony of the hackers.
You're going to be hearing the testimony of Robert Riggs who will
testify that Mr. Neidorf had been after him to give him information
to put into PHRACK, this hacker newsletter. That when Riggs had
broken into the AIMS-X computer in BellSouth, he saw on that AIMX-X
computer at BellSouth the 911 text file. You're going to hear that
communication, he advised Neidorf that he had the text file, he was
>from an unauthorized account that he had on the BellSouth computer.
Essentially, what he told Neidorf is, "This is a stolen piece of
material you're getting".
 
          He indicated to Neidorf and Neidorf agreed...first, he
agreed to take the stolen property, and he agreed to disguise the
dentity of the stolen property to some degree so that it wouldn't
 
- 23 -
 
Cook -- opening testimony
 
ndiations that it was stolen from the BellSouth area...Neidorf
to some degree or another.
 
          You will hear evidence bout Neidorf seeing and noting the
little, "Whoops"next to it when he sent it back to Riggs because he
 
          You're also going to hear evidence that Riggs was never
contained too much information even for Riggs. But the E911 system,
the text file and the road map, was published by Neidorf all the
 
          You are going to be hearing from Agent Foley who will
testify that he talked to Neidorf about this at his fraternity house
at the University of Missouri. Neidorf said he has freedom of
expression. That was his response to Foley: Freedom of expression
to publish it in PHRACK.
 
     The First Amendment can't be used as a defense to theft.
When you steal something, you can't claim that coming up the back
 
     You will be hearing from Agent Foley though that as part
of this discussion with Mr. Neidorf, Mr. Neidorf, in fact, admitted
that he knew the file was stolen, the text file was stolen, and he
 
- 24 -
 
Cook -- opening statement
 
          He also turns over to Foley a hacker tutorial, a hacker
lesson to other hackers on how to break into the ESS switches. He
turns that over.
 
          The evidence will also indicate that in addition to that
of it that it was a Trojan horse, a way of stealing passwords from a
computer.
 
          I am going to have to pause here for a second to make
 
          The source code is a type of language. It is kind of a way
of program might be something like:
 
"Go to the door.
          "Open the door.
          "Go through the door.
          "Go forward to the sidewalk.
          "Go the the sidewalk and stop.
          "Stop at the sidewalk. Turn left.
          "After you turn left, start walking.
 
- 25 -
 
Cook -- opening statement
 
Step by step by step progression along the way. That is kind of what
the source code is about. You will hear, fortunately, a much better
 
          The source code program that was stolen here that
Mr. Neidorf received, again, basically was clear from the face of the
out to somebody else. Again, stolen property was received and
 
          The nature of this source code was that it would act a lot
like a false front door to a computer, where you walk up to the
false front door of the computer, you knock on the door, and somebody
nside the door or inside the house says, "Who is it?" The person
knocking on the door uses their secret word, or their name or an
dentifier, or it's recognized by the person inside the house:
          "My name is Joe Jones."
          "My name is Bill Cook."
          "My name is Colleen Coughlin."
          "My name is Tim Foley."
Except with this door, it was a false door, and what it had the
capability to do is it would record the information. It would
Those are the passwords to get into the house that a legitimate user
of the house would use.
 
          But this Trojan horse, what it would do is it would store
those, and after it had stored all that information, it would
 
- 26 -
 
Cook -- opening statement
 
essentially disappear. And the person trying to get in the house would
all of a sudden get a communication from the other side that would
 
          It would steal those passwords, and it would then put them
n a private place where the hacker would come back whenever he
and use them to break into the same computer systems again and
again, kind of an elaborate piced of scientific perversion but that
s what it is about. That was the document that Mr. Neidorf also
trafficked in as part of this fraud scheme.
 
          The final expert that you will probably hear from on the
company, a man who was with bell laboratories before he was with the
to you about the property, the property being the text file, and
the way in which and the reason that the phone company protects
this kind of property, this information.
 
          He will testify, we anticipate, to the obligations of the
other people, and the fact that the theft was the theft of critical
nformation for the operation of that system, and that the
 
          No matter what other information floating around about 911
that might be out there, this document was proprietary and contained
the inside information about what this system was all about, and how
an emergency call is driven from the point of someone picking up
the receiver to the time when the help is actually generated from
the fire, police and ambulance stations.
 
          As I've said before, it's that text file that Mr. Neidorf
conclusion of this case, we are going to be coming back here and
asing you to find a guilty verdict against Mr. Neidorf for the
nterstate transportation of that stolen text file both from the time
bulletin-board in Lockport down to Neidorf at the University of
Missouri, that's one interstate transportation of stolen property,
and the interstate transportation of stolen property, that same
they could disguise themselves. And then the final interstate
transportation of that stolen property when Mr. Neidorf compromised
the text file into the hacker community.
 
          I appreciate your attention. That concludees my remarks.
 
          Thank you.
 
     THE COURT: Thank you, Mr. Cook. Mr. Zenner, are you prepared
to make your opening statement?
 
                  
 
 

Downloaded From P-80 International Information Systems 304-744-2253


AD: