Advertisement

‘Cracker’ Will Pass on Crumbs of Computer Knowledge

Share
Associated Press

William Landreth, whose alter ego as “The Cracker” led to his federal prosecution, says he won’t exploit his brief criminal past when he tours with his book telling companies how to counter computer “hackers.”

Landreth, a 19-year-old computer whiz who pleaded guilty in federal court last November to one count of wire fraud, will leave April 19 on a national tour with his book, “Out of the Inner Circle.”

Landreth’s case attracted national publicity when he was indicted by a federal grand jury in Alexandria, Va., which charged him with illegally cracking the General Telephone & Electronics Corp. Telemail network.

Advertisement

The federal judge who heard Landreth’s case in San Diego ordered him to serve three years of probation and repay $87 in damages to GTE. He was spared a prison term because, a federal prosecutor said, no computer programs were erased and no money was stolen from GTE.

Sought to Prevent Crime

Bill Gladstone, the literary agent that Landreth hired after undergoing three days of court-ordered psychological counseling, said Landreth wrote his book to prevent crime, not encourage it.

Landreth signed a publishing contract, through which he is said to have received a $15,000 advance. The publisher, Microsoft Press of Bellevue, Wash., has committed $75,000 for advance publicity, according to a company news release.

“He may benefit financially in the long run if there’s an interest in the book, as it was written to help corporations. But profit is not the intent of the book and it would be a secondary result if it happened,” Gladstone said.

He refused to discuss the amount of any advance Landreth received and also declined comment on royalty agreements.

Landreth has declined interviews until an April news conference kicking off the tour, and he referred all questions to Gladstone.

Advertisement

Access to Systems

Landreth specifically pleaded guilty to providing access information to other computer users, filtering the information through a group of close friends and associates who used the code name “The Inner Circle.” Access information was spread nationwide, which allowed computer hackers to communicate with each other for free, using GTE’s Telemail lines.

The phone line access was gained by establishing fraudulent user accounts with fake names and passwords. The phony codes initially allowed the hackers to evade FBI computer investigators until an investigator hit upon one of the fraudulent accounts.

Landreth’s book explains in layman’s terms how he tapped the GTE system and discusses the hacker’s subculture, as well as how to stop the spread of unauthorized access.

“Hackers are like electronic ghosts, in a way--they don’t leave just because you want them to--and they can come back to haunt you,” Landreth’s book says.

“If the hacker knows what he’s doing, he won’t give you his name or phone number and any attempt to trace his call will fail,” Landreth wrote. “If you’re dealing with a bright 10-year-old, which is a distinct possibility, crude threats might work and silly ploys might yield a legitimate telephone number.”

The reaction to Landreth’s book by a spokesman at GTE’s government systems headquarters was cautiously optimistic.

Advertisement

“One book doesn’t make for a cure, but I’m sure it will make it harder for hackers to gain access,” GTE spokesman Frank Arneson said.

Advertisement