Report of Detective P. Lazenby.  

NARRATIVE:

On 11/01/93, writer assisted Sr. Deputy Lilley in the preparation of a
search warrant in regards to Randal Schwartz who had been illegally
bypassing computer systems and using a password cracking program to
obtain passwords to a computer system within Intel.

On 11/01/93, writer and other members of the Special Investigations
Unit served a search warrant at 12290 SW Butner Road, the residence of
Randal Schwartz.  Detective Lilley execute the warrant and advised both
the Schwartz brothers of their Miranda rights.  Writer made contact
with Randal Schwartz in the back bedroom where Detective Lilley was
interviewing him.  Writer introduce myself to Randal Schwartz and we
talked about the incident  Randal admitted to writer that he had been
using the crack program to get passwords and had obtained what he
thought was ten to twelve passwords.  He advised that they were on the
"SNOOPY" program at Intel in a subdirectory "PLAY" under "STUFF.TAR".
Writer then asked Randal if he felt he was doing anything wrong.
Randal told writer that he was in fact violating Intel policy and he
also thought that he could be criminally prosecuted for these
incidents.  I advised Randal that this was still under investigation
but under Oregon law, it could possibly be a misdemeanor or felony and
that if had used the phone lines to transfer any of the information out
of state, there could be federal crimes.  I asked Randal if he
understood this and he said that he did.  I asked Randal if he was
still willing to cooperate with us and he said that he was.

I asked Randall when he first got caught doing this and how he had done
it.  Randal advised that he first had the "GATE" program on the "MINK"
computer a while back and he was caught and confronted by supervisors.
Randal said he stopped using "MINK" and that he switched over "GATE" to
"HERMES" and was doing that but "HERMES" was too slow so he went back
to "MINK" again.  He was caught again on "MINK" so he switched "GATE"
over to "BRILLIG".

Randal advised that he was using "MERLIN" as his login on those
systems.  I asked Randal why he was using the "CRACK" program to obtain
passwords and asked if he realized that these passwords would access
the SSD system.  Randal advised that he did realize this and that he
was obtaining the passwords because he wanted to get his E-mail
quicker.  I asked Randal if he ever logged in on SSD using any of the
passwords.  Randal said first that he only logged in and logged out one
time and later, changed it to two or three times.  I asked Randal if he
ever copied anything or looked at anything and he said that he did
not.

I passed this information on to Intel personnel and they checked the
machine under "STUFF.TAR" and found that there were at least forty to
fifty passwords that had been compromised and obtained by Randal.  I
went back and confronted Randal with this because he had told me that
there were only ten to twelve.  Randal then said, "I don't remember how
many exactly because I was just sticking them under the "STUFF.TAR" and
not really using them."

I asked Randal why he would need forty to fifty passwords and he said,
"I needed them in case they caught me doing it and knew they would shut
me down so the more passwords I had, the longer I could continue doing
what I wanted to do."  Randal advised that he had the capability to do
it and he knew he could do it.  I asked Randal if this was wrong and in
violation of Intel policy and Randal said, "Yes it is, but I knew I
could do it anyway."  Randal said that he wanted to do it because he
wanted to be efficient in getting his E-mail very fast and he felt was
important and when they shut him down, he wanted to continue doing what
he was doing and since he had the capability to do it and knew he could
do it, he did it without permission.

Randal then told me that about one or two years ago, he was a SYS
administrator at Intel with SSD and that he would run the "CRACK"
program back then.  Randal advised that this was a tool used to keep
passwords honest.  Randal said that if you can break it with "CRACK",
bad guys can too.  I then told Randal that if he knew this, and it was
a security measure back then, why was he doing it without authorization
now.  Randal advised that he knew it was totally wrong and would get in
trouble if caught doing it.  I then asked Randal if he remembered using
"CRACK" to enter any other systems to obtain passwords.  Randal advised
that he used "CRACK" on the "ORILEY" system which is his publishers
back east and he obtained a password from them.  I asked Randal how he
did this and he said he put "ORILEY" on "SNOOPY", used "CRACK" on it
and obtained the password.  He said he did it just because he was
curious to see if "ORILEY" had any security.  Randal advised that he
only got one password.  I asked him if he ever used that password to go
into the "ORILEY" system and he said no.  I asked Randal if he used it
anywhere else and he said that he used it on "TECHBOOK".  Randal
advised that this is a bulletin board type system and that he used
"CRACK" on that system to obtain their passwords.  Randal advised that
he did get a password and that he wrote to James D. at "TECHBOOK" and
advised him that he had done this as a way of making him aware of his
weak security.

I asked Randal if he remembered any of the passwords that he used to
log into SSD and Randal advised me that he remembers using the RonB
password to log into SSD and then to get out.  Randal advised that he
never looked at anything, just went in and right out.  Randal also
advised writer that at one time, he let Ed Bunch, a SYS administrator
at Intel know he had obtained SSD passwords.  Randal was very vague
about how this had occurred and when asked what Mr. Bunch's reply was,
he advised, "No response, I don't think he really heard me".

Detect Lilley interviewed Randal Schwartz more extensively.  Refer to
his report for more details.