Massachusetts Bay Transportation Authority v. Anderson et al
Filing
51
DECLARATION re 50 MOTION for Preliminary Injunction DECLARATION OF MAXIMILLIAN J. BODOIN IN SUPPORT OF MOTION FOR ENTRY OF PRELIMINARY INJUNCTION by Massachusetts Bay Transportation Authority. (Attachments: # 1 Exhibit 1, # 2 Exhibit 2, # 3 Exhibit 3, # 4 Exhibit 4, # 5 Exhibit 5)(Mahony, Ieuan-Gael)
Massachusetts Bay Transportation Authority v. Anderson et al
Doc. 51
UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS
MASSACHUSETTS BAY TRANSPORTATION AUTHORITY Plaintiff
v.
Civil Action No. 08-11364-GAO ZACK ANDERSON, RJ RYAN, ALESSANDRO CHIESA, RONALD L. RIVEST, and the MASSACHUSETTS INSTITUTE OF TECHNOLOGY Defendants
DECLARATION OF MAXIMILLIAN J. BODOIN IN SUPPORT OF MOTION FOR ENTRY OF PRELIMINARY INJUNCTION 1. I am an associate at Holland & Knight, LLP, representing Plaintiff, Massachusetts
Bay Transportation Authority ("MBTA") in this matter. This Declaration is submitted in support of the MBTA's Motion for Entry of Preliminary Injunction and Memorandum in Support of its Motion for Entry of Preliminary Injunction. I make this Declaration based on a search of publicly available information on the Internet. 2. Attached as Exhibit 1 is a true and accurate copy of an abstract of a paper by
Arias Hung entitled "Owning the Linksys wrtp54g VOIP Router." See http://www.defcon.org/html/defcon-l4/dc-14-speakers.html. According to the summary, Mr. Hung's presentation included "a demonstration of how easy VOIP and its companion protocol MGCP can be manipulated for illegal purposes such as call spoofing, number hijacking, and untraceable call routing." See Exh. 1. 3. Attached as Exhibit 2 is a true and accurate copy of an article dated August 7,
2007 and entitled "Middle America, Meet the Hackers." See
Dockets.Justia.com
http://www.forbes.com/2007/08/06/security-hacking-challenge-tech-cx ag0806toughhack.html. The article states that DEFCON "... still attracts some true "black hat' hackers, bent on learning the newest tools for illegal intrusion, sabotage, espionage and credit card theft." See Exh. 2. The article also quotes a DEFCON organizer: "When DefCon's hackers do venture into the illegal, it's often based on impulses that are more libertarian than malicious, says a hacker known as 'Dead Addict,' another of DefCon's organizers. 'We simply don't take the law as a moral compass,' he says." See id. at p. 2. 4. Attached as Exhibit 3 is a true and accurate copy of a post on August 9, 2008 and
entitled "Shrinky Dinks as a Threat to National Security." See http://it.slashdot.org/article.pl?sid=08/08/l 0/0013226&from=rss. This post states that, at the DEFCON Convention, Marc Weber Tobias demonstrated a method of picking the "'highsecurity' locks that protect the White House, the Pentagon, embassies, and many other sensitive locations." See Exh. 3. The post states that, using the demonstrated method, one was "... able to open an example lock in about six seconds." Id. 5. Attached as Exhibit 4 is a true and accurate copy of an article by Robert Lemos
entitled "Russian Crypto Expert Arrested at DefCon" dated July 17, 2001. See http://news.cnet.com/21QO-1001-270082.html. The article states that a DEFCON speaker, Dmitry Sklyarov, was arrested a day after his presentation at the DEFCON Convention. See Exh. 4. The article states that the Federal Bureau of Investigation "... acknowledged Tuesday that it had arrested security researcher Dmitry Sklyarov for what it said was a violation of the Digital Millennium Copyright Act." Id. 6. Attached as Exhibit 5 is a true and accurate copy of an article by Erik Larkin
entitled "Simple Hack Can unlock Most Any Office Door" dated August 4, 2007. See
http://blogs.pcworld.com/staffblog/archives/005079.html. The article discusses a DEFCON demonstration by a hacker and DEFCON staffer identified as Zac Franken. See Exh. 5. According to the article, Mr. Franken's demonstration provided instructions for hacking into card readers often found on office doors by using a home-made device comprising of approximately $10 worth of components, called the "Gecko." See id. The hack was used to "subvert[] the Wiegand protocol, commonly used for communication between the card reader and the back-end access control system..." Id. The demonstration also provided information on how an invader could lock authorized users out of the security system - "[w]ith nobody else able to use that door, an invader would have plenty of time to steal data or work his mischief." Id. The demonstration also contained instructions for how and where to splice into wires attached to the security card readers. Id.
Signed under the penalties of perjury this 18th day of August, 2008.
. Bodoin HA. Maximillian J.
#5548457 v2
CERTIFICATE OF SERVICE I, leuan G. Mahony, Attorney for the Massachusetts Bay Transportation Authority in connection with the above-captioned proceeding, hereby certify that on this 18l day of August, 2008, the Declaration of Maximillian J. Bodoin in Support of Motion for Entry of Preliminary Injunction was served via the ECF system on the following interested parties: Counsel
Party
Zack Anderson, RJ Ryan, Emily Berger, Esquire and Alessandro Chiesa Email: emily@eff.org (the "MIT Undergrads") Jennifer Granick, Esquire Email: jennifer@eff.org John Reinstein, Esquire Email: reinstein@aclum.org Thomas A. Brown Email: tbrown@fr.com Cindy Cohn cindy@eff.org Lawrence K. Kolodney kolodney@fr.com Marcia Hoffman marcia@eff.org Adam J. Kessel kessel@fr.com Massachusetts Institute of Technology ("MIT") Jeffrey Swope, Esquire Email: J S wope@eapdlaw.com
/s/ leuan G. Mahony
# 5 5 5 0 2 8 7 vl
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?