On September 2, 1992, 25-year
old Otto Sync (ficticious name) was arrested and charged with unauthorized
use of the Datapak computer network. The infractions had taken place during
November 1992, at the expense of Televerket. At the time, Televerket was
a state-owned company with a monopoly on telecommunications in Sweden. The
person who traced and ordered the arrest of Otto was Televerket's own "white
knight" Pege Gustafsson, a zealous 38-year old security expert climbing
the career ladder.
From December 1991 to
February 1993, Otto was doing non-combat service in the French army, "Volontaire
Service National en Enterprises", as an engineer working with PLC (computerized
process controllers) at a French telecommunications company in Flen, Sweden.
After having passed rigorous military tests, and with the help of a master's
degree in engineering with credits in applied mathematics and computer science,
he was offered the opportunity to perform his civil service in the French
company's Swedish branch.
Being a lonely young
Frenchman in Flen wasn't much fun; Otto tells us that the town was full
of political refugees and the public mood wasn't the best -- the Swedish
youths in Flen kept to themselves and saw him as yet another immigrant,
and none of the other immigrants were French, but rather Iraquis, Kurds,
Somalians and so forth. Additionally, Otto was unfamiliar with a small-town
environment, as he had come straight from Lyon -- "Imagine my surprise
when I arrived there alone mid December 1991... I've only lived in big cities
before, and there is this place, without any bars, pubs or computer shops"(1)
. As a result Otto spent most
of his time alone in his apartment or in company office. "Flen is so
boring I practically lived in the office building -- what else can you do
there apart from hacking really?", as he says.
For the above reasons,
Otto spent his time engaging in his favorite hobby: hacking. Otto was already
a skilled hacker when he arrived in Flen, and as time passed he became even
better. He became a regular at Swedens best hacker-BBS at the time: Synchron
City. He explored every system he could reach: Televerket's public phone
network, AT&T, Internet, and so on. However, none of this is very exciting
to an experienced hacker in the long run: the phone network is very easy
to trick, and the Internet was mostly full of regular people. Real hackers
went for BBS:es on the X.25 network. As Otto wished to stay in touch with
his hacker friends, he wanted to access the biggest hacker conference system
at the time - QSD
. QSD was only accessible through
the international X.25 network. In trying to access QSD, he made a fatal
mistake: exploring Televerket's Datapak network.
X.25 and Datapak
Datapak is a network
which is structurally reminiscent of the Internet -- a packet-switched network,
where the users share a few dedicated lines, and pay charges based on the
amount of data transmitted on those lines (i.e., per packet). In general,
it works in such a way that, using a modem, you call up Datapak through
a so-called PAD
connected to a 020-number (Swedish
800-number), then dial a number to a computer permanently connected to Datapak.
All computers on the Datapak network have datapak numbers in the same way
that phones in the public network have phone numbers.
Of course you can also
connect straight through Datapak in case you can afford a permanent connection
for your computer, a method primarily used by large companies to connect
their computer systems. That way, two computers can be permanently connected
through Datapak (which would have been very expensive using regular modems)
and thus you only have to pay charges for the information actually transmitted.
Of course you can also connect through the computer network Datex, which
is used by (among other things) ATMs, and it works like any other phone
network, except that it's designed for computers.
Datapak is built around
the X.25 standard , which describes how computers in the network are to
"talk" to each other. Besides X.25, there are many other standards
on the network, such as X.28 and X.75 ,
but as X.25 is the most common standard, the kind of network that Datapak
belongs to is generally called an "X.25 network". The international
X.25 network is thus made up of a number of interconnected computer networks,
e g Datapak, Tymnet (which also manufactured the equipment used in
the Swedish Datapak network), SPRINTnet, and so forth. Almost every big
phone company in the industrialized world has their own X.25 network.
The international X.25
network has been running since the mid- and late 80's, but the Swedish Datpak
network has never been very big. The reason for this is that X.25 was not
targeted by the consumer market; X.25 is, as opposed to the common telephone
networks, not designed for individuals. X.25 was from the beginning a network
for corporations. The large consumer market that was conquered by the academic
Internet system, which is based on multiple service providers and competition
(as opposed to the X.25 market, which consists of oligopolies and only a
few providers), is so fundamentally different that X.25 does not have a
chance in this respect. X.25 is today mainly used for establishing logical
links between private networks. X.25 is even used for some Internet links.
So, what Otto Sync didn't
know, or didn't think of, when he ordered his Datapak subscription, was
that Datapak was a small system in a small country, and that a person who
tried to manipulate it would immediately be detected by the monitoring systems.
The public phone network is quite safe to explore because of all the odd
and random calls people make to strange places. A few cases of manipulation
instantly disappear in the vast amount of calls, but Datapak
was the backyard of a few subscribers.
To enter the system was equal to walking around wearing emergency flashers
on your head -- your presence was not very discreet. When Otto began scanning
Datapak numbers, he finally drew Televerket's attention.
It is worth mentioning
that Televerket had increased the monitoring of the Datapak network due
to an enormous attack by the British hacker group 8LGM (8-Legged Groovin'
Machine, a name taken from an 80's pop group) who had scanned 22,000 datapak
number entries and accessed 380 computers all over the country about two
years earlier.(2)
Otto describes them as "a group of top-notch hackers who released 'exploits'
advisories between 1991 and 1994". (Exploits are ready-to-use scripts
that were used to get higher privileges, usually root-access, on Unix systems.)
A consequence of 8LGM's scans was that all activity on Datapak was now logged
and analyzed.
Otto didn't subscribe
to Datapak in order to use it -- as a matter of fact, he only subscribed
in order to access the technical documentation given to every subscriber,
so he could find out how the system worked. That way he learned that you
connected to Datapak by dialing 020-910037 and submit your network user
identity (NUI). After this you could call as much as you pleased using Datapak,
and be charged per sent/recieved information packet at the end of the month
. In the Datapak network the NUI is used for customer identification, as
opposed to the common phone network where you are identified by your own
wall socket and phone number.
But the Datapak manual
from Televerket also contained some other interesting things, e. g.
this example from page 4:
To connect with a user
number, call 020-910037 using a modem. When the modem has answered, you
write three dots followed by carriage return: ...<CR> (CR = carriage
return, enter). Then write: N123456XYZ123-024037131270<CR>. N tells
the computer that user identity and password follow, 123456 is the user
number you got when you signed up for the subscription, XYZ123 is your secret
password, and the figures after the dash is the host computer adress. (i.
e., the computer you want to connect to.)
Further on in the manual,
it illustrates how user 123456 changes password from BERTIL to CAESAR. User
identity (NUI) 123456 is clearly used as an example.
When Otto considered
different ways of accessing Datapak, he came up with the idea of writing
a so-called "scanner", which would test different combinations
of usernames and passwords.
Scanning is a technique
originally developed for the public phone network, and works by systematically
calling every possible number in some order, e g 111111, 111112, 111113
and so forth until you get an answer. When a computer answers the call,
you make a note of the number and move on to the next. Afterwards you can
pick systems from this list of accessible computers and see if you can hack
them. Of course you don't do scanning by hand. Just like in the movie War
Games, you write a program to test all numbers one by one. Scanning in itself
is not illegal -- part of the point of having a telephone is that you have
the right to place as many calls as you like, to whomever you like.
Otto's scanner was a
bit different. It was not supposed to call any numbers, just scan for user
identities and passwords that granted access to the Datapak PAD. Usually
a X.25-PAD will only allow you three tries to enter username and password
before the line is disconnected, but Otto found out that by connecting to
the Datapak password-database you could try three passwords at a time without
having the line disconnected. Otto's scanner was a computer program that
could test three passwords at a time, get thrown out of the database (without
being disconnected from the PAD), reconnect to the database, test three
more passwords and so forth. To disconnect / reconnect the phone line would
take a lot of time and result in a slow scan, but with the scanner using
the password database it was lightning-fast!
When Otto wrote his scanner
he needed some number to test the program. By pure chance he entered the
obviously stupid combination of user identity 123456 and password 654321,
and it worked! (Does anybody besides me come to think of the movie "Spaceballs"?
-- only an idiot would use that code on his suitcase.)
User identity 123456
was one of Televerkets own lines, a test line which purpose is yet unknown.
It is perfectly possible that user 123456 was simply "left over"
by mistake by Televerket.
Otto began using identity
123456 for regular calls to the conference system QSD, which functionally
resembles the now very popular IRC, Internet Relay Chat. Apart from the
conferences there are also mailboxes for the users. Among the most frequent
participants were, for example, SCSI, who has hacked into every X.25 network
in the entire world (no overstatement), Sentinel from ex-Yugoslavia, the
female hacker Venix from Greece, Seven Up, the sysop at SECTEC (Sector Tectonics,
another X.25-bulletin board), and Raol from Italy -- the master of VAX-hacking
who was recently arrested for computer intrusion at the Bank of Italia.
This chatting kept going
until he, on the night of the 7th of November, was called (on the chat system
QSD) by another hacker from Sweden.
The "White Knight
"
The hacker that called
Otto named himself White Night. The duality of the name is a conscious misspelling
of the kind that hackers love. The first conversation between Otto Sync
and White Night went thus:(3)
White Night
: Hi! Hej! [Hej is Swedish for
Hi]
Otto Sync
: Hi! Hej! Sorry I'm not Swedish
I'm French. Calling from Flen, a #$&% city 120 km from Stockholm.
WN :
I see. What are you doing there?
OS :
Working as an automation engineer at a French company. And you?
WN :
I'm working at Volvo.
OS :
Where? I worked at their factory in Olofström some months ago.
WN :
DA-verken in Göteborg. [Gothenburg]
Then they began talking
tecnicalities, as all hackers do. Otto asks White Night how he manages to
handle Swedish characters and they discuss the pros and cons of different
terminal programs. White Night then turns the discussion to how he has managed
to call QSD -- "Do you know how much it costs?". Otto suggests
that they should swap "outdials" -- access codes to computers
on public access networks such as Internet, with connected modems allowing
you to dial out for free from that computer by accessing it's modem. He
also tells the stranger that he often calls Synchron City, and that a lot
of "H/P/A" (Hacking, Phreaking, Anarchy -- perfectly legal textfiles
describing hacking techniques) can be found there. Strangely, White Night
has never heard of Synchron City, and is immediately curious.
For some weeks Otto calls
QSD on a regular basis. So on the night of November 29th, the white knight
appears again, but he doesn't recognize Otto, as Otto is using another alias
this time. Otto has already forgotten about White Night and doesn't recognize
him either when he is called. However he can see that White Night is also
using identity 123456, and gets a bit suspicious, as he has revealed that
identity only to a single other hacker, which we will call Phred. A bit
hesitatingly, he starts chatting with the stranger:
WN :
Hi.
OS :
Phred?
WN :
No, but I know him!
OS :
I guess so... I know you?
WN :
Fun, do I know U?
OS :
Maybe, I'm usually Otto Sync here...
WN :
Hi Otto, hm hm hm.
OS :
Hey, could you tell me who you are... cool!
WN :
U speak Swedish?
OS :
Very badly. But can't you tell me who u are??? As for me, I'm the one who
found the NUI you're using.
WN :
Why do U think I use the NUI "you" found?
OS :
You can ask Phred if you don't believe me.
WN :
Why should I ask Phred?
OS :
Because he was the first one to whom I gave the NUI. We talk voice sometimes.
WN :
What NUI?
OS :
The very obvious one with the very obvious password. And the second one
that I see on QSD.
WN :
Wow, I haven't spoken to Phred 4 a long time!
The misunderstandings
between Otto Sync and White Night is of course due to the fact that White
Night is not a hacker. As a matter of fact, he is using Televerket's test
line, 123456, from
inside Televerket.
When Otto claims that he found it, White Night first gets a bit sulky, but
then realizes he has to play the game:
OS :
The previous [NUI I used] was 159800. Are you from Sweden by the way?
WN :
Sweden what.
OS :
Just wondering... If you don't want to chat, then why go on QSD?
WN :
Of course I want 2 chat. I'm Swede! R U?
OS :
Nope I'm French. But I like Televerket, except when they send me bills :)
WN :
Do they? Why?
OS :
I asked for a NUI some weeks ago to get the technical doc about the PAD...
But I won't pay!
When Otto has made these
statements, White Night disconnects the line and picks up the papers with
the print-out of the conversation from the printer. These papers, most of
which contents are cited above, are then used as part of the evidence in
the trial against Otto Sync at the Katrineholm Court of Law.
What Otto didn't know
when this conversation took place, was that Televerket was busy tracing
him. From November 28th to December 1st, the day before the arrest, Televerket
registered all telephone traffic from Ottos office at the French telecom
company. In order to do this, they had taken some extraordinary measures.
Flen's telephone station
was at that time not equipped with the new electronic switching system AXE
(Automatic Cross-connection Equipment). Istead, an old electro-mechanical
exchange was in use. (It has now been replaced.) If
the telephone station had been
equipped with AXE, the monitoring would have been a lot easier, since it
would simply have been a matter of requesting information from Televerket's
information system (IS), which can monitor a number automatically for unlimited
time. Present-day Telia (a private corporation which has replaced Televerket
after deregulation) even investigated the possibility of having computers
examine all calls automatically in order to classify which subscribers that
showed "fraudulent patterns" -- but these investigations didn't
bear fruit .
When Televerket, under
the command of Pege Gustafsson, had traced the "fraudulent" calls
to the Datapak number 020-910037, they found that they came from a group
number belonging to the company Otto worked for. A group number works by
letting a company with an internal exchange connecting some number of telephones,
say 500, share a suitably large number of outgoing lines (perhaps 10--20
of them) so that they can minimize the subscription charges. By tracing
the group number, nothing was proven, as anyone at the company could have
called using the group number. The calls could not be tied to a physical
person, which is the kind of evidence required for this type of case.
To make further tracing
possible, Telverket installed a reader on the exchange of the company Otto
worked for(4) .
With the reader, every outgoing call from any extension at the company was
registered and printed. This list could then be compared by corresponding
list for connections to the Datapak PAD at 020-910037. In this manner, Televerket's
technicians found that Otto had called for 41 hours and 20 minutes through
Datapak during the week the tracing was carried out, and during that time
transmitted information packets for about 4000 Swedish crowns' worth [roughly
$570]. (You can call this the total "postage fee" for the information
packets.) The low cost thus depended upon the fact that you only pay for
the data actually transmitted, not for online time, as in the case of common
telephone calls.
All of this tracing was
supervised by Pege Gustafsson.
A Night at the Hotel
Otto himself tells us
what happened on the morning of December 2:
"They came to arrest
me at work. Imagine the embarrassement. First I see these guys coming in
my room and think 'oh shit, some more customers who want a demo on some
product', but then they showed me their police ID and my heart stopped.
They searched my office, took all notes and computer stuff. Then they took
me out and had me open my apartment, and did a search there as well."
He was then brought to
Katrineholm police station (the police authority closest to Flen) for interrogation.
On his way there all sorts of thoughts ran through his head: "What
to tell? I thought it was a BBS? I thought it was a free line? Reverse-charging?"
The interrogation begins
without the representatives of Televerket as well as Otto's counsel present,
but as Otto doesn't understand all the Swedish words (though he knew some,
as the company sent him to evening Swedish language classes), the interrogation
is postponed until a French interpreter arrives.
When the interpreter
arrives, Otto asks for a counsel but agrees to continue the interrogation
without the defense present. Neither does he find it necessary to talk to
the French embassy. He tells the interrogators that he is in non-combat
military service duty at the company in Flen, and that he has considered
working for them even after the service is finished. The police and Otto
simply get to know each other.
At 14.25 Otto experiences
the luckiest moment of his life so far. That is when his counsel arrives,
and who by a remarkable coincidence happens to be an extremely professional
lawyer with his own firm, who thought the hacker case looked interesting
at first glance, and thus took upon himself to defend Otto. This lawyer
primarily deals in industrial corporate disputes. Otto tells us about his
lawyer that "he was a real pro (I know, as this was the third time
I went to court), a very nice man, well educated, and interested in French
wines".
The remainder of the
interrogation session mostly consists of technical discussions between Pege
and Otto Sync. The other people present soon have trouble understanding
what is being said. Otto claims that he has been searching for a "reverse
charge" number (the X.25 counterpart to a 800-number which are actually
quite common) and that he thought NUI 123456 that he got from Televerket's
manual to be a "test line" of some kind. He says he is very curious
and that is his reason for exploring Televerket's systems. Pege Gustafsson
produces his printouts from the chat sessions where he acts as White Night,
and confronts Otto with parts of these printouts (the same that are partly
reproduced above). Otto, who for the first time gets to know who White Night
actually is, reminds the others that anyone can have used his alias on QSD.
Pege asks if he has passed around the NUI 123456 to others. "No",
he answers.
Today Otto tells us that
"Pege tried to have me say that I knew what I was doing and that I
hacked the NUI etc. All the way I denied it and said I thought it was public
line to be used in reverse-charging mode, and kept that line all the way.
Of course Pege could see it was bullshit, he knew pretty well what I was
up to. And he was right."
When the interrogation
ended at 6 p.m. he was brought to a cell, as it was too late to go to court
that day. Otto was instantly impressed by the Swedish custody standard:
"In France it's dirty, you get to sleep with drunkards, no food, rough
treatment etc. In Katrineholm it was like being at a hotel, I had my own
little bed in a neat room. In the morning I was given a breakfast as good
as the ones you get on planes -- fantastic! Slept really well there."
The next day he was brought
to Katrineholm court, which decided not to keep him in custody. Instead
he was given a travel ban, which meant he had to leave his passport and
had to report to the Flen police office before noon every day until the
start of the trial.
"Dangerous International
Terrorist"
What initiated the chain
of events that culminated in Televerket finding Otto Sync was the scanning
of the Datapak PAD. When Pege found out that someone was scanning the Datapak
PAD for user identities, he must have been shocked. This was exactly the
thing that had happened two years earlier, and that time they had suspected
that this was an act of international terrorism. In reality it proved to
be the brothers Pad and Gandalf from 8LGM, two perfectly normal, curious
hackers without any connection to international terrorists whatsoever.
As all other computer
security officials in Sweden, Pege Gustafsson had read the book
The Cuckoo's Egg
by Clifford Stoll. In the book
Stoll describes how he, using imagination and endless nights of unpaid work,
managed to trace a hacker that had entered his system at Berkeley and started
searching for military secrets throughout the American part of Internet.
The hacker doing this was on mission from the KGB, receiving instructions
through the circle around hackers like Pengo and Hagbard in West Berlin
-- a bunch of freaked-out, coke-snorting, fuzzy leftist hackers who probably
never caused any serious harm. Those last facts are never mentioned in the
book, but it is closer to the truth than the image of international computer
spies that Stoll conjures up.
So as Otto started scanning
the Swedish Datapak network, Pege hit the sirens. The incident was probably
associated with other, similar incidents, and was therefore interpreted
not as the sum total of some small hacking adventures using simple scanners,
but as a systematic pattern of intrusion attempts by some foreign power.
Simply pure paranoia.
After closing a ring
round Otto in Flen and after conducting a series of tracings, there was
also "confirmation" of the suspicions: Otto made several calls
to Thailand -- which were interpreted as communications with his mission
providers, which could be anyone ranging from the KGB to the IRA. Actually,
these calls were made to a long-time friend, and he had the company's permission
in calling Thailand every now and then. Every hacker gets to know lots of
people around the planet, as the "global village" is their home
district.
So what the police and
Televerket expected to find, as they turned up at Otto's office on the 2nd
of December 1992, was a dangerous international terrorist. They found a
25-year-old socially maladjusted, and bored engineer, who had been amusing
himself by exploring the Swedish Datapak network for the lack of anything
better to do. Otto describes the situation as \"Pege thought he was
the good guy trying to catch the bad guy. He told me himself that he was
a fan of Clifford Stoll and that he met him at some security conference
some years ago." During the interrogation with Otto, Pege drew maps
showing which countries Otto's X.25-connections had accessed -- maps that
according to Otto himself looked like "maps from your average international
terrorist handbook".
Even though this was
clearly stated in the following investigation -- which didn't even mention
the suspicion of espionage -- these suspicions about Otto stuck to him long
after he left Sweden. When the computer programs that were to control starting
lists, time measures and result lists during the Olympic Games in Lillehammer
1994 were stolen from a military storage in the autumn of 1993, the Norweigan
police (for some reason) believed that Otto was involved. Expressen (a major
Swedish evening paper) called him "the hacker leader", and took
the opportunity to draw suspicions to Otto as well as to the company he
had worked for in Flen. In between the lines, they hinted that this was
a way in which the French military sent spies to Sweden(5)
. Personally, he tells us that
"I was in Thailand, and at that time didn't have job nor a computer."
Thailand is quite far away from Lillehammer.
He is also backed up
by SÄPO (Swedish counter-espionage) who through director Jörgen
Almblad said that the French volunteer workers in Sweden in general, and
Otto Sync in particular, did not pose a security risk. "If they are
Frenchmen or Russians doesn't matter, as far as being security risks"
he told Expressen. SÄPO are ultimately responsible for the national
security and should be well-informed. If they publicly deny any suspicions,
you can be certain that they are telling the truth. If they had even the
slightest suspicions, they would rather not comment. So much for that terrorist.
Even Pege himself realized
that Otto was not what he first thought him to be. In private he told Otto,
that if he had known what a small-timer he actually was, he wouldn't have
carried the case this far. He even "said he'd like to have a beer with
me when all this was over." Today, Otto is doubtful about Pege's competence
as a security officer: "I remember he told me he was involved in concerts
security as well (rock concerts). Although he was the security officer there,
he didn't know too much about Unix security or hacking techniques. In fact
he seemed to be ignorant of some basic things about Datapak such as reverse-charging".
Good versus Evil
It appears as though
Pege was carried away by the idea of defending Sweden from imaginary terrorists.
Just as American counter-espionage was completely disinterested in the practically
harmless hacker hunted by Clifford Stoll, SÄPO was as disinterested
in the equally harmless hacker hunted by Pege. Otto wasn't even looking
for military secrets -- he was considered a threat just because he was so
curious.
So, on the 18th of December
the, "white knight" from Televerket drags the French dragon to
a Swedish court with the help of district prosecutor Christer Pettersson.
The trial itself is a farce -- soon it turns out that of all the people
present, only Pege and Otto have the technical knowledge required to understand
the summons from Televerket. Then the first thing Otto's counsel does as
the trial begins, is to throw Pege out of the court room, as no reasons
have been given for his presence. The only time that Pege is allowed in
the room, is when he is cross-examined by the court. Suddenly Otto himself
is the only one that understands what the prosecution is actually about.
None of the members of the court have any kind of practical technical knowledge.
"The trial was real
fun because no one really knew the subject. Some of the documents I produced
during the trial were a bit dodgy, like this e-mail from some guy telling
me how to use reverse-charge on Televerket. I also produced a valid list
of all Swedish BBS:es, telling the judge that they were 'free access computer
systems'. Of course no one had a clue about the difference between a BBS
running on a 386SX in a 17-year-old teenager's room and a nationwide X.25
data network."
Otto doesn't think he
is guilty of any crime, and is wise enough to use simple descriptions which
the court can understand. He doesn't deny using Datapak exactly as much
as Televerket claims, and is prepared to pay for it. But he think it's unreasonable
that he shall pay the costs of tracing and investigation by Televerket.
Pege is called in only
to describe how the tracing of Otto was performed. In all other questions
they must refer to the preliminary investigation protocol, a horrible pile
of papers containing almost exclusively technical desciptions and different
lists of tracings carried out by Pege. Among the "evidence" is
Ottos own notes, some of them completely harmless, with detailed technical
information about phone numbers etc. to different computer systems all over
the world. Without further explanation of what kind of information this
is, these cryptic notes are called "hacker notes". There are also
a bunch of print-outs of files found on Ottos hard disk.
This material has apparently
only been included in the protcol in order to make Otto look "obscure".
The print-outs could just as well have been xerox copies of "unsuitable
books" from his bookshelf. The only purpose of including this material
must have been to throw suspicions on Otto for belonging to a certain subculture.
At some point the court
must have grown bored with the fact that Televerket had not been able to
present an understandable prosecution. Regardless of whom had lied or told
the truth, Ottos claim that he had believed that the calls were for free
seemed probable to the court. As the prosecutor could not prove the opposite,
the court found for the defendant. Televerket's claim for damages, and the
claim that Otto should be forced to leave the country, was also dismissed.
Televerket had to pay their own costs for the trial. In short, Televerket
lost, and Otto Sync won. This decision was made December 18th 1992, but
wasn't made public until January 8th.
Lookin back he says that
"although I was guilty like hell and went to court, Televerket lost
the case."
All's well that..
Televerket, now named
Telia, appealed the sentence in the court of appeals on January 15. As Otto
would only be present in Sweden until April 1st, they asked the court of
appeals to review the case before then, which was of course a hopeless request.
In September, Otto was
back in France, still hacking. Then, one night "White Night" turns
up at QSD again. "I started chatting with Pege, who was expecting me
show up at appeals court in October", Otto says. The court of appeals
probably couldn't have him extradited to Sweden, and in any case he had
already booked a ticket to Bangkok for October 4.
The court of appeals
considered the case at a hearing October 25th. As Televerket hadn't added
something new to their application of summons, and as Otto wasn't available,
the court of appeals decided to dismiss the case. Televerket and Pege lost
again.
Note: Otto Sync recently
left his job as an engineer at a huge, multi-national enterprise in Bangkok.
He is currently busy setting up his own Internet-service company. Pege Gustafsson
still handles security issues at Telia.
1. All quotes are lifted from e-mail communication with Otto Sync.
2. Ledell, Göran (ed)
Dataolyckor -- Har det verkligen hänt någon gång?
INFOSEC, Lund 1992
3. Quotes from the conversation are drawn from the court documents.
4. To be technically precise: a DNR -- Dialled Number Recorder.
5. Expressen , Friday February 4th 1994, page 11. |