Date: 17 Jul 92 16:43:21 CDT From: Moderators Subject: File 1--MOD Indictment (July, '92) ((Moderators' note: The following is the complete indictment of five MOD members (see CuD 4.30 for background)). UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK - - - - - - - - - - - - - - - - - - - -X : UNITED STATES OF AMERICA : : - v - : : JULIO FERNANDEZ, a/k/a "Outlaw," : _INDICTMENT_ JOHN LEE, a/k/a "John Farrington," : a/k/a "Corrupt," : MARK ABENE, a/k/a "Phiber Optik," : ELIAS LADOPOULOS, : 92 Cr. a/k/a "Acid Phreak," and : PAUL STIRA, a/k/a "Scorpion" : : Defendants : : - - - - - - - - - - - - - - - - - - - -X _COUNT ONE_ Conspiracy The Grand Jury Charges: _Introduction_ 1. At all times relevant to this indictment: (a) MOD was a closely knit group of computer hackers located primarily in the New York City area. (The term "computer hacker" refers to someone who uses a computer or a telephone to obtain unauthorized access to other computers). The letters "MOD" had various meanings, among them "Masters Of Disaster" and "Masters of Deception." (b) At various times, the defendants JULIO FERNANDEZ, JOHN LEE, MARK ABENE, ELIAS LADOPOULOS and PAUL STIRA were members of MOD. Within MOD and in the course of their computer hacking activities, the defendants frequently identified themselves by their nicknames or hacking "handles." In particular, JULIO FERNANDEZ used the name "Outlaw," JOHN LEE used - 1- the name "Corrupt," MARK ABENE used the name "Phiber Optik," ELIAS LADOPOULOS used the name "Acid Phreak," and PAUL STIRA used the name "Scorpion." JOHN LEE was also known to his associates as "John Farrington." (c) Southwestern Bell Telephone Company ("Southwestern Bell") was a regional telephone company that provided local telephone service to millions of customers in Arkansas, Kansas, Missouri, Oklahoma and Texas. Southwestern Bell's telephone system was controlled and operated by numerous computers located throughout the above-named states, including telephone switching computers. The telephone switching computers operated by Southwestern Bell and other telephone companies were large computers that controlled call routing, calling features (such as call forwarding, call waiting and three-way calling), billing and other telephone services for tens of thousands of telephone lines each. Southwestern Bell's headquarters were located in St. Louis, Missouri. (d) BT North America Inc. was an international corporation that provided telecommunications services throughout the world. Among BT North America's businesses in the United States was the operation of a data transfer network called Tymnet. The Tymnet network was an international network through which customers could transmit electronic communications. The Tymnet network was controlled and operated by numerous computers located throughout the United States and elsewhere. BT North America's headquarters were located in San Jose, California. - 2 - (e) New York Telephone Company ("New York Telephone") was a regional telephone company that provided local telephone service to millions of customers in New York State. New York Telephone's telephone system was controlled and operated by numerous computers located throughout New York State. New York Telephone's headquarters were located in New York City. (f) Pacific Bell and U.S. West were regional telephone companies that provide telephone service to customers in, among other states, California and Idaho, respectively. One of the telephone switching computers operated by Pacific Bell was located in Santa Rosa, California. One of the telephone switching computers operated by U.S. West was located in Boise, Idaho. (g) Martin Marietta Electronics Information and Missile Group ("Martin Marietta") was an aerospace and engineering company located in Orlando, Florida. Martin Marietta operated a telephone switching computer that handled the company's telephone lines. (h) International Telephone and Telegraph Company ("ITT"), was a telecommunications company. One of the ways that ITT provided telephone services to customers was to provide customers with personal identification numbers. Customers could dial local or toll free telephone numbers assigned to ATT, enter their personal identification numbers, and then obtain local and long distance calling services that would be charged to their accounts. - 3 - (i) Information America, Inc., was a computerized information service that provided subscribers with accesses to telephone numbers, addresses, business abstracts and other information regarding individuals and businesses throughout the United States. Information America's headquarters and its primary computer data base were located in Atlanta, Georgia. (j) TRW Information Services ("TRW") and Trans Union Corporation ("Trans Union") were credit reporting services that provided subscribers with access to credit reports and other information. One of the ways that subscribers could obtain credit information was to use a computer to access data bases maintained by TRW and Trans Union. TRW's primary data base was located in Anaheim, California. Trans Union's primary data base was located in Chicago, Illinois. (k) The Learning Link was a computerized information system operated by the Educational Broadcasting Corporation in New York City. The Learning Link computer provided educational and instructional information to hundreds of schools and educators in New York, New Jersey and Connecticut. Access to the Learning Link computer was limited to persons and institutions who subscribed to the service and paid a membership fee. (l) New York University ("NYU") was a large university located in New York City. NYU operated a computer system for faculty, students and other authorized users. One of the services provided by the NYU computer systems was to allow - 4 - authorized users to make local and long distance telephone calls for the purpose of connecting to other computers outside of NYU. Authorized users of the NY computer could obtain outdial service by accessing the NYU computer system and entering a billing code. The call would then be charged to the authorized users' account. (m) The University of Washington was a large university located in Seattle, Washington, The University of Washington operated numerous computers for use by faculty, students and other authorized users. (n) The Bank of America was a national Bank located in California and elsewhere. The Bank of America operated a data transfer network that was used to transmit electronic communications of Bank of America employees and others. _The Conspiracy_ 2. From in or about 1989 through the date of the filing of this Indictment, in the Southern District of New York and elsewhere, JULIO FERNANDEZ, a/k/a "Outlaw," JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," MARK ABENE, a/k/a "Phiber Optik," ELIAS LADOPOULOS, a/k/a "Acid Phreak," and PAUL STIRA, a/k/a "Scorpion," the defendants, and others known and unknown to the Grand Jury (collectively the "co-conspirators"), unlawfully, willfully and knowingly did combine, conspire, confederate and agree together and with each other to commit offenses against the United States of America, to wit, to possess unauthorized access devices with the intent to defraud, in violation of Title 18, United States Code, Section 1029(a)(3); to use and traffic in - 5 - unauthorized access devises with the intent to defraud, in violation of Title 18, United States Code, Section 1029(a)(2); to access federal interest computers without authorization, in violation of Title 18, United States Code, Section 1030(a)(5)(a); to intercept electronic communications, in violation of Title 18, United States Code, Section 2511(1)(a); and to commit wire fraud, in violation of Title 18, United States Code, Section 1343. _Objects of the Conspiracy_ _Possession of Unauthorized Access Devices_ 3. It was a part and object of the conspiracy that the co-conspirators unlawfully, willfully, knowingly and with the intent to defraud, would and did possess fifteen and more unauthorized access devices, to wit, the co-conspirators would and did posess fifteen and more unauthorized passwords, user identifications, personal identification numbers and other access devices that permitted access to computer systems, data bases and telephone services of Southwestern Bell, BT North America, New York Telephone, ITT, Information America, TRW, Trans Union, NYU and others, in violation of Title 18, United States Code, Section 1029(a)(3). _Use of Unauthorized Access Devices_ 4. It was a further part and object of the conspiracy that the co-conspirators unlawfully, willfully, knowingly and with the intent to defraud, would and did use one or more unauthorized access devices during a one year period, and by such conduct obtain something of value aggregating $1,000 and more - 6 - during that period, to wit, the co-conspirators would and did use unauthorized access devices of Southwestern Bell, BT North America, New York Telephone, ITT, Information America, TRW, Trans Union, NYU and others in order to obtain information services, credit reporting services, telephone services and other things of value aggregating in excess of $1,000 during a one year period, in violation of Title 18, United States Code, Section 1029(a)(2). _Unauthorized Access of Computers_ 5. It was a further part and object of the conspiracy that the co-conspirators unlawfully, willfully, knowingly and intentionally would and did access federal interest computers without authorization, and by means of such conduct alter, damage and destroy information in such federal interest computers and prevent authorized use of such computers and information, and thereby cause loss to one or more others of a value aggregating $1,000 and more during a one year period, to wit, the co- conspirators would and did access computers belonging to Southwestern Bell, BT North America and others without authorization, and by means of such conduct altered telephone services, installed their own computer programs and made other modifications, thereby causing losses aggregating $1,000 and more during a one year period, in violation of Title 18, United States Code, Section 1030(a)(5)(A). _Interception of Electronic Communications_ 6. It was a further part and object of the conspiracy that the co-conspirators unlawfully, willfully, knowingly and - 7 - intentionally would and did intercept, endeavor to intercept and procure other persons to intercept electronic communications, to wit, the co-conspirators would and did intercept, endeavor to intercept and procure other persons to intercept passwords, user identifications and other electronic communications as such communications were being transmitted over Tymnet and other data transfer networks, in violation of Title 18, United States Code, Section 2511(1)(a). _Wire Fraud_ 7. It was a further part and object of the conspiracy that the co-conspirators, unlawfully, willfully and knowingly, and having devised a scheme and artifice to defraud and for obtaining money and property by means of false and fraudulent pretenses, representations and promises, would and did transmit and cause to be transmitted by means of wire communications in interstate and foreign commerce, signs, signals and sounds for the purpose of executing the scheme to defraud, to wit, the co- conspirators would and did transmit and cause to be transmitted passwords, user identifications, personal identification numbers, telephone tones and other signs, signals and sounds for the purpose of executing a scheme to obtain telephone services, credit reporting services, information services and other services free of charge, in violation of Title 18, United States Code, Section 1343. - 8 - _Goal of the Conspiracy_ 8. It was the goal of the conspiracy that the members of MOD would gain access to and control of computer systems in order to enhance their image and prestige among other computer hackers; to harass and intimidate rival hackers and other people they did not like; to obtain telephone, credit, information and other services without paying for them; and to obtain passwords, account numbers and other things of value which they could sell to others. _Means and Methods of the Conspiracy_ 9. Among the means and methods by which the co- conspirators would and did carry out the conspiracy were the following: (a) The co-conspirators formed the group MOD to further their computer hacking activities and to compete with other computer hackers in their quest for and access to and control of computer systems. (b) The members of MOD exchanged computer-related information among themselves including passwords, user identifications and personal identification numbers. The members of MOD also assisted each other in breaking into computer systems by sharing technical information regarding the configuration and security systems of target computers. The members of MOD agreed to share important computer information only among themselves and not with other computer hackers. - 9 - (c) The co-conspirators obtained passwords, user identifications and other unauthorized access devices through a variety of means including the following: (i) Data interception--The co-conspirators intercepted access codes as the codes were being transmitted over Tymnet and other data transfer networks. The co-conspirators were able to perform such interceptions on Tymnet by obtaining unauthorized access to Tymnet computers which controlled the transfer of electronic communications over the network. Using their unauthorized access to Tymnet computers, the co- conspirators monitored and intercepted information that Tymnet personnel and others using the Tymnet network were sending through the network, including user identifications and passwords used by Tymnet personnel and others. (ii) Social Engineering -- The co- conspirators made telephone calls to the telephone company employees and other persons, and pretended to be computer technicians or others who were authorized to obtain access devices and related information. The co-conspirators then caused the unwitting targets of their calls to furnish access devices and other proprietary information. The co-conspirators referred to this technique as "social engineering." (iii) Password Grabbing and Password Cracking Programs -- The co-conspirators wrote and used various computer programs that were designed to steal passwords from computers in which the programs were inserted. The co-conspirators maintained - 10 - other programs that were designed to"crack" encrypted passwords, that is, to take passwords that had been scrambled into a code for security purposes, and to break the code so that the passwords could be used to obtain unauthorized access to computer systems. (d) When the co-conspirators broke into computer systems, they installed "back door" programs to ensure that they would continue to have access to the computers. These back door programs were designed to modify computers in which they were inserted so that the computer would give the highest level of access ("root" access) to anyone using a special password that was known to the members of MOD. Some of these back door programs also included additional features that were designed to modify computers in which they were inserted so that (i) the computer would store the passwords of legitimate users in a secret file that was known to the members of MOD; (ii) the computer would display a message that read, in part, "This system is owned, controlled, and administered by MOD" to anyone who accessed the system using the password "MOD"; and (iii) the computer would be destroyed if anyone accessed the system using another special password known to the members of MOD. (e) The co-conspirators obtained free telephone and data transfer services for themselves and for each other by: (i) obtaining unauthorized access to telephone company computers and adding and altering calling features; and (ii) maintaining and exchanging personal identification numbers, passwords, - 11 - billing codes and other access devices that allowed them to make free local and long distance telephone calls as well as to transmit and receive electronic communications free of charge. (f) One of the ways that the co-conspirators obtained free telephone service by their access to telephone switching computers was to call forward unassigned local telephone numbers to long distance numbers or to pay per call services such as conference calling services. By setting up such call forwards the co-conspirators could make long distance and conferences calls for the price of a call to the local unassigned number. (g) The co-conspirators obtained information including credit reports, telephone numbers, addresses, neighbor listings and social security numbers of various individuals by obtaining unauthorized access to information and credit reporting services. _Overt Acts_ 10. In furtherance of the conspiracy and to effect the objects thereof, the co-conspirators committed the following acts among others in the Southern District of New York and elsewhere: (a) On or about November 28, 1989, members of MOD caused virtually all of the information contained within the Learning Link computer operated by the Educational Broadcasting Corporation to be destroyed, and caused a message to be left on the computer that said, in part: "Happy Thanksgiving you turkeys, - 12 - from all of us at MOD" and which was signed with the names "Acid Phreak," "Phiber Optik" and "Scorpion" among others. (b) On or about January 8, 1990, from his residence in Queens, New York, ELIAS LADOPOULOS, a/k/a "Acid Phreak," accessed a New York Telephone switching computer without authorization. During the call, LADOPOULOS issued commands to automatically call forward all calls received by one telephone number to another telephone number. (c) On or about January 24, 1990, at his college dormitory room in Farmingdale, New York, PAUL STIRA, a/k/a "Scorpion," possessed numerous password files containing hundreds of encrypted and unencrypted user identifications and passwords to telephone company computers and other computers. (d) On or about January 24, 1990, at his college dormitory room in Farmingdale, New York, PAUL STIRA, a/k/a "Scorpion," possessed a back door computer program and a password grabbing program. The back door program included a feature that was designed to modify a computer in which the program was inserted so that the computer would be destroyed if someone accessed it using a certain password. (e) On or about May 31, 1991, from his residence in Brooklyn, New York, JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," obtained unauthorized access to a Southwestern Bell computer in St. Louis, Missouri. (f) On or about October 28, 1991, from his residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw," - 13 - obtained unauthorized access to a Southwestern Bell telephone switching computer in Houston, Texas and issued commands so that calls received by one telephone number would be automatically forwarded to another number. (g) On or about October 31, 1991, from his residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw," obtained unauthorized access to a U.S. West telephone switching computer in Boise, Idaho. (h) On or about November 1, 1991, from his residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw," called a New York Telephone technician. During the call, FERNANDEZ pretended to be another New York Telephone employee and convinced the technician to provide information regarding access to a New York Telephone switching computer in Mt. Vernon, New York. (i) On or about November 1, 1991, from his residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw," made multiple calls to a New York Telephone switching computer in Mt. Vernon New York. During the calls, FERNANDEZ call forwarded numbers and obtained detailed information regarding telephone services provided by the switch. (j) On or about November 5, 1991, from his residence in Brooklyn, New York, JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," obtained a user identification and password by monitoring electronic communications on the Tymnet network. Later, on November 5, 1991, JOHN LEE called JULIO - 14 ' FERNANDEZ, a/k/a "Outlaw," and provided FERNANDEZ with the intercepted user identification and password. (k) On or about November 6, 1991, JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," had a telephone conversation with MARK ABENE, a/k/a "Phiber Optik." During the conversation, LEE provided ABENE with the user identification and password that LEE had intercepted the previous day. (l) On or about November 6, 1991, JOHN LEE, a/k/a "John Farrington," a/k/a "corrupt," had a telephone conversation with another member of MOD, during which they discussed obtaining information from another hacker about how to alter TRW credit reports. LEE said that the information he wanted to obtain included instructions on how to add and remove delinquency reports, "to destroy people's lives. . .or make them look like saints." (m) On or about November 14, 1991, JULIO FERNANDEZ, a/k/a "Outlaw," and JOHN LEE, a/k/a "Corrupt," had a telephone conversation. During the conversation, FERNANDEZ and LEE discussed a lengthy list of institutions that operated computers, including government offices, private companies and an Air Force base. In the course of the conversation, FERNANDEZ said, "We've just got to start hitting these sites left and right." (n) On or about November 14, 1991, at his residence in Brooklyn, New York, JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," obtained unauthorized access to - 15 - Trans Union's computerized data base and obtained credit reports on several individuals. (o) On or about November 22, 1991, at his residence in Brooklyn, New York, JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," obtained unauthorized access to Information American's computerized data base and obtained personal information concerning several individuals. (p) On or about November 23, 1991, MARK ABENE, a/k/a "Phiber Optik," and JULIO FERNANDEZ, a/k/a "Outlaw," had a telephone conversation. During the conversation, ABENE gave FERNANDEZ advice concerning how to call forward telephone numbers on a certain type of telephone switching computer. (q) On or about November 25, 1991, JULIO FERNANDEZ, a/k/a "outlaw," and JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," obtained several hundred dollars from Morton Rosenfeld, a co-conspirator not named herein as a defendant, in exchange for providing Rosenfeld with information regarding how to obtain unauthorized access to credit reporting services. (r) On or about November 25, 1991, JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," JULIO FERNANDEZ, a/k/a "Outlaw," and MARK ABENE, a/k/a "Phiber Optik," had a three way telephone conversation. During the conversation, LEE and FERNANDEZ provided ABENE with user identifications and passwords of Southwestern Bell and Information America. (s) On or about November 26, 1991, JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," and MARK ABENE, a/k/a "Phiber - 16 - Optik," had a telephone conversation. During the conversation, LEE and ABENE discussed obtaining unauthorized access to Southwestern Bell computes and LEE provided ABENE with a series of Southwestern Bell user identifications and passwords. A short while later, ABENE called LEE and reported that one of the passwords worked and that he had obtained information from a Southwestern Bell computer. (t) On or about November 27, 1991, ELIAS LADOPOULOS, a/k/a "Acid Phreak," had a telephone conversation with JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt." During the conversation, LADOPOULOS asked LEE to obtain personal information on an individual. (u) On or about November 27, 1991, from his residence in Brooklyn, New York, JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt" obtained unauthorized access to Information America's computerized data base and obtained personal information on the individual that ELIAS LADOPOULOS, a/k/a "Acid Phreak," had requested. LEE the called LADOPOULOS and gave him the information. (v) On or about November 30, 1991, JULIO FERNANDEZ, a/k/a "Outlaw," provided associates of Morton Rosenfeld with an account number and password for TRW. Between November 30, 1991, and December 2, 1991, Rosenfeld and his associates used the TRW account number and password to obtain approximately 176 credit reports on various individuals. - 17 - (w) On or about December 1, 1991, from his residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw," obtained unauthorized access to a Pacific Bell Telephone switching computer in Santa Rosa, California. (x) On or about December 1, 1991, from his residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "outlaw," obtained unauthorized access to a Southwestern ell telephone switching computer in Saginaw, Texas. (y) On or about December 4, 1991, from his residence in Bronx, New York, JULIO FERNANDEZ, a/k/a "Outlaw," obtained unauthorized access to a Martin Marietta telephone switching computer in Orlando, Florida. During the call, FERNANDEZ added a feature to one of the telephone numbers services by the switch. (z) On or about December 6, 1991, at his residence in Queens, New York, MARK ABENE, a/k/a "Phiber Optik," possessed numerous proprietary technical manuals of BT North America, including manuals that described the operation of Tymnet computers and computer programs. (Title 18, United States Code, Section 371.) - 18 - _COUNT TWO_ _Unauthorized Access to Computers_ The Grand Jury further charges: 11. Between on or about January 1, 1991 and on or about January 1, 1992, in the Southern District of New York and elsewhere, JULIO FERNANDEZ, a/k/a "Outlaw," JOHN LEE, a/k/a "John Farrington,"a/k/a "Corrupt," and MARK ABENE, a/k/a "Phiber Optik," the defendants, and others whom they aided and abetted, unlawfully, willfully, knowingly and intentionally did access federal interest computers without authorization, and by means of such conduct did alter, damage and destroy information in such federal interest computers and prevent authorized use of such computers and information and thereby cause loss to one or more others of a value aggregating $1,000 and more during a one year period, to wit, JULIO FERNANDEZ, JOHN LEE, MARK ABENE, and others whom they aided and abetted, accessed Southwestern Bell computers without authorization and by means of such conduct altered calling features, installed back door programs, and made other modifications which caused losses to Southwestern Bell of approximately $370,000 in the form of expenses to locate and replace computer programs and other information that hand been modified or otherwise corrupted, expenses to determine the source of the unauthorized intrusions, and expenses for new computers and security devices that were necessary to prevent continued unauthorized access by the defendants and others whom they aided and abetted. (Title 18, United States Code, Sections 1030(a)(5)A) and 2.) - 19 - _COUNT THREE_ _Possession of Unauthorized Access Devices_ The Grand Jury further charges: 12. On or about December 6, 1991, in the Southern District of New York, JULIO FERNANDEZ, a/k/a "outlaw," the defendant, unlawfully, willfully and knowingly, and with the intent to defraud, did possess fifteen and more unauthorized access devices, to wit, JULIO FERNANDEZ possessed several hundred unauthorized user identifications and passwords of Southwestern Bell, BT North America, TRW and others with the intent to defraud said companies by using the access devices to obtain services and to obtain access to computers operated by said companies under the false pretenses that FERNANDEZ was an authorized user of the access devices. (Title 18, United States Code, Section 1029(a)(3).) _COUNTS FOUR THROUGH SIX_ _Interception of Electronic Communications_ The Grand Jury further charges: 13. On or about the dates set forth below, in the Southern District of New York and elsewhere, JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," the defendant, unlawfully, willfully, knowingly and intentionally, did intercept and endeavor to intercept electronic communications, to wit, on the dates set forth below, JOHN LEE did intercept and endeavor to intercept electronic communications, including user -20 - identifications and passwords, as the communications were being transmitted over the Tymnet network. _Count_ _Date of Interception_ Four November 5, 1991 Five November 12, 1991 Six November 15, 1991 (Title 18, United States Code, Section 2511(1)(a).) _COUNT SEVEN_ _INTERCEPTION OF ELECTRONIC COMMUNICATIONS_ The Grand Jury further charges: 14. On or about December 1, 1991, in the Southern District of New York and elsewhere, JULIO FERNANDEZ, a/k/a "Outlaw," and JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," the defendants, unlawfully, willfully, knowingly and intentionally, did intercept, endeavor to intercept and procure others to intercept electronic communications, to wit, JULIO FERNANDEZ gave JOHN LEE a password that JOHN LEE used to intercept electronic communications as the communications were being transmitted over a data transfer network operated by the Bank of America. (Title 18, United States Code, Sections 2511(1)(a) and 2.) - 21 - _COUNTS EIGHT AND NINE_ _Wire Fraud_ The Grand Jury further charges: 15. From in or about June 1991 through the date of the filing of this Indictment, in the Southern District of New York, JULIO FERNANDEZ, a/k/a "Outlaw," the defendant, unlawfully, willfully and knowingly and having devised and intending to devise a scheme and artifice to defraud and for obtaining property by means of false and fraudulent pretenses and representations, to wit, a scheme to obtain unauthorized access to NYU's computer system and to use an NYU Billing code that was not assigned to him to obtain free telephone connections to computers outside of NYU, did, for the purpose of executing such scheme, transmit and cause to be transmitted by means of wire communications in interstate commerce, writings, signs,and signals, to wit: Destination Called _Count_ _Date of Call to NYU_ _From NYU Computer_ 8 November 29, 1991 Southwestern ell 5ESS telephone switching computer El Paso, Texas 9 December 5, 1991 University of Washington computer system Seattle, Washington (Title 18, United States Code, Section 1343.) - 22 - _COUNTS TEN AND ELEVEN_ _Wire Fraud_ The Grand Jury further charges: 15. From in or about June, 1991 through the date of the filing of this Indictment, in the Southern District of New York, JOHN LEE, a/k/a "John Farrington," a/k/a "Corrupt," the defendant, unlawfully, willfully and knowingly and having devised and intending to devise a scheme and artifice to defraud and for obtaining property by means of false and fraudulent pretenses and representations, to wit, a scheme to obtain unauthorized access to NYU's computer system and to use an NYU billing code that was not assigned to him to obtain free telephone connections to computers outside of NYU, did, for the purpose of executing such scheme, transmit and cause to be transmitted by means of wire communications in interstate commerce, writings, signs, and signals, to wit: Destination Called _Count_ _Date of Call to NYU_ _From NYU Computer_ 10 November 21,1991 University of Washington computer system Seattle, Washington 11 November 23, 1991 University of Washington computer system Seattle, Washington (Title 18, United States Code, Section 1343.) (signed) _________________ ___________________________ Foreperson OTTO G. OBERMAIER United States Attorney - 23 - Downloaded From P-80 International Information Systems 304-744-2253