835 lines
40 KiB
Plaintext
835 lines
40 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Sun Aug 16, 1992 Volume 4 : Issue 36
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Copy Editor: Etaion Shrdlu, III
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivist: Dan Carosone
|
|||
|
|
|||
|
CONTENTS, #4.36 (Aug 16, 1992)
|
|||
|
File 1--COMP.SOCIETY.CU-DIGEST CHANGE
|
|||
|
File 2--Bell System Policies - in Re CuD 4.35
|
|||
|
File 3--Bell System Policies (John's Response 1)
|
|||
|
File 4--Bell System Policies (Jerry's Response 2)
|
|||
|
File 5--Bell System Policies (John's Response 2)
|
|||
|
File 6--Pacbell security - The Final Word
|
|||
|
File 7--Brooks Statement on INSLAW Report
|
|||
|
File 8--Special Investigator Requested for Inslaw (Press Release)
|
|||
|
File 9--Summary of NBC's Coverage of Danny Casolaro/Inslaw
|
|||
|
File 10--Re: Overstated? (Chic Tribune summary)
|
|||
|
File 11--Elite Pirates? I think not.
|
|||
|
File 12--Deferring the Piracy Debate until September
|
|||
|
File 13--Software piracy in America's schools?
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
|||
|
libraries; from America Online in the PC Telecom forum under
|
|||
|
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
|
|||
|
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
|
|||
|
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source
|
|||
|
is cited. Some authors do copyright their material, and they should
|
|||
|
be contacted for reprint permission. It is assumed that non-personal
|
|||
|
mail to the moderators may be reprinted unless otherwise specified.
|
|||
|
Readers are encouraged to submit reasoned articles relating to
|
|||
|
computer culture and communication. Articles are preferred to short
|
|||
|
responses. Please avoid quoting previous posts unless absolutely
|
|||
|
necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Fri, 14 Aug, 1992 17:15:32 CDT
|
|||
|
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 1--COMP.SOCIETY.CU-DIGEST CHANGE
|
|||
|
|
|||
|
Chip Rosenthal reminds everybody:
|
|||
|
|
|||
|
The comp.society.cu-digest newsgroup has been created. Effective
|
|||
|
immediately, the CuD will be cross-posted into both the old alt
|
|||
|
group and the new comp group. After about a month's time to
|
|||
|
allow for changeover, I will delete the old alt group and send it
|
|||
|
only to the comp group.
|
|||
|
|
|||
|
SO: If you're reading CuD as an ALT group, BE SURE TO unjoin and
|
|||
|
join COMP.SOCIETY.CU-DIGEST instead.
|
|||
|
|
|||
|
Chip took the initiative for the change, managed the discussion on
|
|||
|
newss.groups, and is making the transition smooth and easy.
|
|||
|
|
|||
|
THANKS CHIP!! NICE JOB!!
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 10 Aug 1992 15:51:38 GMT
|
|||
|
From: jmcarli@SRV.PACBELL.COM(Jerry M. Carlin)
|
|||
|
Subject: File 2--Bell System Policies - in Re CuD 4.35
|
|||
|
|
|||
|
((MODERATORS' COMMENT: We asked Jerry Carlin and John Higdon to frame
|
|||
|
their discussion of Bell System/Bellcore policies as a
|
|||
|
point-counterpoint exchange. We found their discussion exceptionally
|
|||
|
informative and commend them for putting together a stimulating
|
|||
|
sequence of posts)).
|
|||
|
|
|||
|
In CuD 4.35, John Higdon wrote:
|
|||
|
|
|||
|
>But the policy of "The Bell System" and now Bellcore and the RBOCs
|
|||
|
>seems to be to do nothing about any such problems and wait for some
|
|||
|
>phreak to get caught with a hand in the cookie jar...
|
|||
|
|
|||
|
I'm not going to argue history but John's contention that Bellcore and
|
|||
|
the RBOCs are doing nothing is incorrect. BTW, I work for PacBell.
|
|||
|
Some examples:
|
|||
|
|
|||
|
Bellcore has issued "Technical Advisories" on the subject of
|
|||
|
security including FA-NWT-000835 "Generic Framework
|
|||
|
Requirements for Network Element and Network System Security
|
|||
|
Administration Messages" and FA-STS-001324 "Framework Generic
|
|||
|
Requirements for X Window System Security".
|
|||
|
|
|||
|
They participate in security organizations such as IEEE P1003.6
|
|||
|
doing security standards for POSIX (UNIX) and ISO/IEC JTC1/SC27
|
|||
|
and ANSI X3T4 (a mouthful :-) I personally voted on the last
|
|||
|
draft of P1003.6, spending quite a bit of time to try to fathom
|
|||
|
a very large document. Also, a set of Bellcore security
|
|||
|
requirements forms a large part of a draft NIST "Minimum
|
|||
|
Security Functionality Requirements for Multi-User Operating
|
|||
|
Systems" (MSFR) document designed to replace the DoD Orange
|
|||
|
Book.
|
|||
|
|
|||
|
They are doing work on using Kerberos and exploring OSF/DCE
|
|||
|
security features to increase the robustness of distributed
|
|||
|
applications.
|
|||
|
|
|||
|
We (Pacbell) have spent millions of dollars implementing
|
|||
|
various security measures including security packages (RACF for
|
|||
|
MVS) and in using Security Dynamics "SecureID" cards for dial
|
|||
|
access.
|
|||
|
|
|||
|
We have been working on enhancing UNIX security. Bellcore has
|
|||
|
developed a UNIX Security Toolkit which added many features to
|
|||
|
the basic scripts first outlined in the book "UNIX System
|
|||
|
Security" by Wood & Kochan. They added a one-week course on
|
|||
|
UNIX security to their curriculum. We and they now have
|
|||
|
security components to reviews of applications. Bellcore
|
|||
|
developed a set of UNIX security requirements and asked all the
|
|||
|
major vendors to respond. Systems security is now part of the
|
|||
|
purchasing decisions.
|
|||
|
|
|||
|
Is all of this enough? Well, that is another argument but I hope it's
|
|||
|
clear that Bellcore and Pacbell (and the other RBOCS) are "doing
|
|||
|
something".
|
|||
|
|
|||
|
++++
|
|||
|
Jerry M. Carlin (510) 823-2441 jmcarli@srv.pacbell.com
|
|||
|
Alchemical Engineer and Virtual Realist
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 10 Aug 92 17:37 PDT
|
|||
|
From: john@ZYGOT.ATI.COM(John Higdon)
|
|||
|
Subject: File 3--Bell System Policies (John's Response 1)
|
|||
|
|
|||
|
jmcarli@SRV.PACBELL.COM(Jerry M. Carlin) writes:
|
|||
|
|
|||
|
[Lots of stuff about how Bellcore and Pac*Bell give major lip service
|
|||
|
to security.]
|
|||
|
|
|||
|
But the truth of the matter is that while Bellcore may have written a
|
|||
|
book on the matter of security, it apparently forgot to read it. Even
|
|||
|
to this day, it is more or less a trivial matter for a knowledgeable
|
|||
|
person to get into things he shouldn't.
|
|||
|
|
|||
|
If you want to have a good horse laugh, you should read the COSMOS
|
|||
|
training manual. This system WAS so full of holes that you could
|
|||
|
literally set up your own phone company using Pac*Bell's network with
|
|||
|
the company becoming none the wiser.
|
|||
|
|
|||
|
This has been tightened up somewhat. And how did it get tightened up?
|
|||
|
Go down to the LA area sometime and pull the microfilm on the LA Times
|
|||
|
and the Orange County Register and see the pictures of the evil
|
|||
|
desperados (a bunch of sixteen year old kids) who easily penetrated
|
|||
|
Pac*Bell and set up all manner of telephonic conveniences for
|
|||
|
themselves using COSMOS. This took place in the mid-eighties. Pac*Bell
|
|||
|
should have been exceedingly embarrassed.
|
|||
|
|
|||
|
> Is all of this enough? Well, that is another argument but I hope it's
|
|||
|
> clear that Bellcore and Pacbell (and the other RBOCS) are "doing
|
|||
|
> something".
|
|||
|
|
|||
|
Dialups into CO switches used to have no password protection
|
|||
|
whatsoever. Now they do. That's a start, folks. So you are now
|
|||
|
thinking about security? Good for you. It is about time. Why has it
|
|||
|
taken so long?
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 11 Aug 92 09:01:16 PDT
|
|||
|
From: jmcarli@SRV.PACBELL.COM(Jerry M. Carlin)
|
|||
|
Subject: File 4--Bell System Policies (Jerry's Response 2)
|
|||
|
|
|||
|
> From zygot!john@apple.com Mon Aug 10 17:48:25 1992
|
|||
|
>
|
|||
|
> jmcarli@SRV.PACBELL.COM(Jerry M. Carlin) writes:
|
|||
|
> [Lots of stuff about how Bellcore and Pac*Bell give major lip service
|
|||
|
> to security.]
|
|||
|
|
|||
|
I don't consider spending tens of millions of dollars over the past
|
|||
|
few years as "lip service". If you wonder what on: such things as RACF
|
|||
|
for MVS is not cheap. SecureID cards cost quite a bit when multiplied by
|
|||
|
10,000 people. Getting lots of shredders costs money. Could we have spent
|
|||
|
it more wisely. Of course, but what else is new. IMHO we've done pretty well.
|
|||
|
|
|||
|
> But the truth of the matter is that while Bellcore may have written a
|
|||
|
> book on the matter of security, it apparently forgot to read it. Even
|
|||
|
> to this day, it is more or less a trivial matter for a knowledgeable
|
|||
|
> person to get into things he shouldn't.
|
|||
|
|
|||
|
It's neither easy nor quick to plug all the holes in 'swiss cheese'. The
|
|||
|
point I'm trying to make is that we've been working on it for a number
|
|||
|
of years and are continuing to work on it and that we've made good progress.
|
|||
|
|
|||
|
> ... Good for you. It is about time. Why has it taken so long?
|
|||
|
|
|||
|
Some of the reasons are our fault and some are not.
|
|||
|
|
|||
|
We have been yelling at vendors to deliver operating systems with adequate
|
|||
|
security features and bug fixes for a number of years now. I'm REALLY
|
|||
|
tired of having stupidities like /etc/hosts.equiv "+" and initial ID's
|
|||
|
without passwords forcing us to do work we should not have to do to clean
|
|||
|
it up.
|
|||
|
|
|||
|
Some of the problems require new technology. We REALLY want Kerberos
|
|||
|
and/or OSF DCE but they are not ready yet. We're just getting to the
|
|||
|
point of having secure SNMP. When the protocols are full of security holes
|
|||
|
it makes it kind of difficult to have true security.
|
|||
|
|
|||
|
By the way, my personal opinion is that the biggest security problem is
|
|||
|
people. We can have the most secure systems in the world, and they can
|
|||
|
even be maintained in a secure state but one successful "social engineer"
|
|||
|
can knock all of that into a cocked hat. It is a non-trivial problem to
|
|||
|
make sure that all legitimate calls from one employee to another get
|
|||
|
responded to without delay while at the same time catching all those
|
|||
|
trying to talk employees out of confidential information or into opening
|
|||
|
up some access in the name of a (bogus) emergency.
|
|||
|
|
|||
|
There is a public trust issue here. If someone gets the unlisted number
|
|||
|
of a public figure and then uses that to harass the person, it's a serious
|
|||
|
matter. If the 911 service is disrupted lives are at stake. If someone's
|
|||
|
conversations are intercepted illegally, we've violated an expectation of
|
|||
|
privacy if not various laws.
|
|||
|
|
|||
|
While I obviously believe that John is overemphasizing the negative, his
|
|||
|
feeling that security is vital and that we need to finish the job is one
|
|||
|
that I share. I think it is mandatory that we do so if we want to succeed
|
|||
|
in the coming era where any customer will have a choice between several
|
|||
|
vendors for basic dial tone. We're getting close now with cellular and
|
|||
|
will get closer with the next generation mobile technology. Even the
|
|||
|
hard-wired local loop will be opened up. We can no longer be arrogant
|
|||
|
since "we're the phone company, after all". It's not true now and it will
|
|||
|
be less true in the future. We're "A" phone company not "THE" phone
|
|||
|
company.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 12 Aug 92 14:13 PDT
|
|||
|
From: john@ZYGOT.ATI.COM(John Higdon)
|
|||
|
Subject: File 5--Bell System Policies (John's Response 2)
|
|||
|
|
|||
|
jmcarli@SRV.PACBELL.COM(Jerry M. Carlin) responds:
|
|||
|
|
|||
|
> It's neither easy nor quick to plug all the holes in 'swiss cheese'. The
|
|||
|
> point I'm trying to make is that we've been working on it for a number
|
|||
|
> of years and are continuing to work on it and that we've made good progress.
|
|||
|
|
|||
|
Yes, and it is important to separate "inherent insecurity" from
|
|||
|
"sloppiness". The matter of inband signaling (from which the
|
|||
|
publication "2600" derives its name) involved an imbedded, virtually
|
|||
|
uncorrectable security hole. Most of these, thank heaven, are becoming
|
|||
|
history.
|
|||
|
|
|||
|
But Pac*Bell, among others, is still just a wee bit sloppy on the
|
|||
|
administrative level. Just one example:
|
|||
|
|
|||
|
After having eight of my residence phone numbers changed, I suddenly
|
|||
|
realized that my Pac*Bell Calling Card was invalid. I called the
|
|||
|
business office and explained that I wanted a new card. No problem. In
|
|||
|
fact, I could select my own PIN. And if I did so, the card would
|
|||
|
become usable almost immediately.
|
|||
|
|
|||
|
Do you see where I am going with this? No effort was made to verify
|
|||
|
that I was who I claimed to be, even though my accounts are all
|
|||
|
flagged with a password. (When I reminded the rep that she forgot to
|
|||
|
ask for my password, she was highly embarrassed.) If I had been Joe
|
|||
|
Crook, I would have a nice new Calling Card, complete with PIN, of
|
|||
|
which the bill-paying sucker (me) would not have had any knowledge. By
|
|||
|
the time the smoke cleared, how many calls to the Dominican Republic
|
|||
|
could have been made?
|
|||
|
|
|||
|
When will Pac*Bell do something about this wide, gaping security hole?
|
|||
|
I will tell you: when losses become significant, and/or the press gets
|
|||
|
wind of it and some notable, visible cases go to court. So, you want
|
|||
|
to go into the "Call Back to your Homeland Cheap" business? Call the
|
|||
|
Pac*Bell business office, tell the rep you want a calling card for a
|
|||
|
particular number (perferably one you do not get the bill for) and
|
|||
|
select your own PIN (one that you can easily remember :-).
|
|||
|
|
|||
|
So, Pac*Bell, do you want to sue me for publishing "sensitive"
|
|||
|
information? Or do you want to plug the hole and fix the problem? I
|
|||
|
think by now you get the point.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 12 Aug 92 16:45:35 PDT
|
|||
|
From: jmcarli@SRV.PACBELL.COM(Jerry M. Carlin)
|
|||
|
Subject: File 6--Pacbell security - The Final Word
|
|||
|
|
|||
|
John writes:
|
|||
|
|
|||
|
> But Pac*Bell, among others, is still just a wee bit sloppy on the
|
|||
|
> administrative level. Just one example:...
|
|||
|
>
|
|||
|
> Do you see where I am going with this? No effort was made to verify
|
|||
|
> that I was who I claimed to be, even though my accounts are all flagged
|
|||
|
> with a password. (When I reminded the rep that she forgot to ask for my
|
|||
|
> password, she was highly embarrassed.)...
|
|||
|
>
|
|||
|
> When will Pac*Bell do something about this wide, gaping security hole?...
|
|||
|
|
|||
|
All I can say is that we're trying. As I pointed out earlier in this
|
|||
|
conversation, it all comes down to people. A mistake was made, no
|
|||
|
doubt about it. Can be do a better job than we are doing? We're
|
|||
|
trying to. Is being Ok enough? As the current advertising slogan says
|
|||
|
"Good enough isn't". This slogan has to translate into real action.
|
|||
|
|
|||
|
As my part in this effort, I'm going to pass all of this along so that
|
|||
|
management realizes that a mistake was made so that action can be
|
|||
|
taken to minimize the chances of it reoccuring. At the very least we
|
|||
|
can remind service reps that they need to remember to verify users and
|
|||
|
to make sure that the procedures and training are up to snuff.
|
|||
|
|
|||
|
Even though it is uncomfortable to be the recipients of criticism, we
|
|||
|
need to listen to our customers, especially knowedgeable ones like
|
|||
|
John, otherwise they will go elsewhere as competition comes to the
|
|||
|
business.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 14 Aug, 1992 17:15:32 CDT
|
|||
|
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 7--Brooks Statement on INSLAW Report
|
|||
|
|
|||
|
Statement of Chairman Jack Brooks
|
|||
|
Committee on the Judiciary
|
|||
|
re: INSLAW Report
|
|||
|
Tuesday, August 11, 1992
|
|||
|
|
|||
|
(MODERATORS' COMMENT: Following is the complete text of Jack Brooks
|
|||
|
(Texas), chair of the House Judiciary Committee, summarizing the
|
|||
|
findings of the Committee's investigation into the dispute between
|
|||
|
INSLAW and the U.S. Department of Justice).
|
|||
|
|
|||
|
THE LAST ITEM ON OUR AGENDA TODAY IS THE CONSIDERATION OF THE
|
|||
|
INVESTIGATIVE REPORT "THE INSLAW AFFAIR," WHICH WITHOUT OBJECTION WILL
|
|||
|
BE CONSIDERED AS READ.
|
|||
|
|
|||
|
THIS REPORT DESCRIBES THE COMMITTEE'S INVESTIGATION INTO SERIOUS
|
|||
|
ALLEGATIONS THAT HIGH-LEVEL DEPARTMENT OF JUSTICE OFFICIALS WERE
|
|||
|
INVOLVED IN A CRIMINAL CONSPIRACY TO FORCE INSLAW, A SMALL COMPUTER
|
|||
|
COMPANY, OUT OF BUSINESS AND STEAL ITS PRIMARY ASSET--A SOFTWARE
|
|||
|
SYSTEM CALLED PROMIS.
|
|||
|
|
|||
|
BASED ON THE COMMITTEE'S INVESTIGATION AND TWO SEPARATE FEDERAL COURT
|
|||
|
RULINGS, THE DRAFT REPORT CONCLUDES THAT HIGH-LEVEL DEPARTMENT OF
|
|||
|
JUSTICE OFFICIALS DELIBERATELY IGNORED INSLAW'S PROPRIETARY RIGHTS IN
|
|||
|
THE ENHANCED VERSION OF PROMIS AND MISAPPROPRIATED THIS SOFTWARE FOR
|
|||
|
USE AT LOCATIONS NOT COVERED UNDER CONTRACT WITH THE COMPANY. JUSTICE
|
|||
|
THEN PROCEEDED TO CHALLENGE INSLAW'S CLAIMS IN COURT EVEN THOUGH IT
|
|||
|
KNEW THAT THESE CLAIMS WERE VALID AND THAT THE DEPARTMENT WOULD MOST
|
|||
|
LIKELY LOSE IN COURT ON THIS ISSUE. AFTER ALMOST SEVEN YEARS OF
|
|||
|
LITIGATION AND $1 MILLION IN COST, THE DEPARTMENT IS STILL DENYING ITS
|
|||
|
CULPABILITY IN THIS MATTER.
|
|||
|
|
|||
|
UNFORTUNATELY, INSTEAD OF CONDUCTING AN INVESTIGATION INTO INSLAW'S
|
|||
|
CLAIMS THAT CRIMINAL WRONGDOING BY HIGH-LEVEL GOVERNMENT OFFICIALS HAD
|
|||
|
OCCURED, ATTORNEYS GENERAL MEESE AND THORNBURGH BLOCKED OR RESTRICTED
|
|||
|
CONGRESSIONAL INQUIRIES INTO THE MATTER, IGNORED THE FINDINGS OF TWO
|
|||
|
FEDERAL COURTS AND REFUSED TO SEEK THE APPOINTMENT OF AN INDEPENDENT
|
|||
|
COUNSEL. THESE ACTIONS WERE TAKEN IN THE FACE OF A GROWING BODY OF
|
|||
|
EVIDENCE THAT SERIOUS WRONGDOING HAD OCCURED WHICH REACHED THE HIGHEST
|
|||
|
LEVELS OF THE DEPARTMENT. THE EVIDENCE RECEIVED BY THE COMMITTEE
|
|||
|
DURING ITS INVESTIGATION CLEARLY RAISES SERIOUS CONCERNS ABOUT THE
|
|||
|
POSSIBILITY THAT A HIGH-LEVEL CONSPIRACY AGAINST INSLAW DID EXIST AND
|
|||
|
THAT GREAT EFFORTS HAVE BEEN EXPENDED BY THE DEPARTMENT TO BLOCK ANY
|
|||
|
OUTSIDE INVESTIGATION INTO THE MATTER.
|
|||
|
|
|||
|
BASED ON THE EVIDENCE PRESENTED IN THIS REPORT, IT IS CLEAR THAT
|
|||
|
EXTRAORDINARY STEPS ARE REQUIRED TO RESOLVE THE INSLAW ISSUE. THE
|
|||
|
REPORT RECOMMENDS THAT THE ATTORNEY GENERAL TAKE IMMEDIATE STEPS TO
|
|||
|
REMUNERATE INSLAW FOR THE HARM THE DEPARTMENT HAS EGREGIOUSLY CAUSED
|
|||
|
THE COMPANY. IT ALSO RECOMMENDS THAT IN INDEPENDENT COUNSEL BE
|
|||
|
APPOINTED WITH BROAD POWERS TO INVESTIGATE ALL MATTERS RELATED TO THE
|
|||
|
ALLEGATIONS OF WRONGDOING IN THE INSLAW MATTER.
|
|||
|
|
|||
|
IN MY VIEW, CONGRESS AND THE EXECUTIVE BRANCH MUST TAKE IMMEDIATE AND
|
|||
|
FORCEFUL STEPS TO RESTORE THE PUBLIC CONFIDENCE AND FAITH IN OUR
|
|||
|
SYSTEM OF JUSTICE WHICH HAS BEEN SEVERELY ERODED BY THIS PAINFUL AND
|
|||
|
UNFORTUNATE AFFAIR. I, THEREFORE URGE ALL MEMBERS TO SUPPORT THE
|
|||
|
ADOPTION OF THIS REPORT.
|
|||
|
|
|||
|
(end -- original report all in upper case)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 14 Aug, 1992 19:52:31 PDT
|
|||
|
From: pinknoiz@well.sf.ca.us
|
|||
|
Subject: File 8--Special Investigator Requested for Inslaw (Press Release)
|
|||
|
|
|||
|
One Hundred Second Congress
|
|||
|
Congress of the United States
|
|||
|
U.S. House of Representatives
|
|||
|
Committee on the Judiciary
|
|||
|
Washington, D.C. 20515
|
|||
|
|
|||
|
For Immediate Release
|
|||
|
August 11, 1992
|
|||
|
|
|||
|
NEWS RELEASE
|
|||
|
|
|||
|
JUDICIARY COMMITTEE REPORT CALLS FOR INDEPENDENT COUNSEL TO
|
|||
|
INVESTIGATE THE INSLAW CONTROVERSY
|
|||
|
|
|||
|
By a vote of 21 to 13, the House Committee on the Judiciary today
|
|||
|
voted to adopt an investigative report entitled, "The INSLAW Affair."
|
|||
|
This report recommends that Attorney General Barr seek the
|
|||
|
appointment of an Independent Counsel to investigate potential
|
|||
|
criminal conduct of current and former Justice officials involved in
|
|||
|
an alleged conspiracy to steal the PROMIS software system from
|
|||
|
INSLAW, Inc.
|
|||
|
|
|||
|
Congressman Jack Brooks (D-Tex.), Chairman of the full
|
|||
|
Committee, stated, "This report culminates the Committee's
|
|||
|
three-year investigation into serious allegations that
|
|||
|
high-level Department of Justice officials were involved in
|
|||
|
a criminal conspiracy to force INSLAW, a small computer
|
|||
|
company, out of business and steal its primary asset -- a
|
|||
|
software system called PROMIS. While the Department
|
|||
|
continues to attempt to describe its conflict with INSLAW as
|
|||
|
a simple contract dispute that has been blown out of
|
|||
|
proportion by the media, the Committee's investigation has
|
|||
|
uncovered information which suggests a much different,
|
|||
|
disturbing conclusion."
|
|||
|
|
|||
|
In March 1982, the Justice Department awarded INSLAW, Inc., a $10
|
|||
|
million, three year contract to implement a case management software
|
|||
|
system called PROMIS at 94 U.S. Attorney's offices across the country
|
|||
|
and U.S. territories. While PROMIS could have gone a long way toward
|
|||
|
correcting the Department's long- standing need for a standardized
|
|||
|
case management system, the contract between INSLAW and Justice
|
|||
|
quickly became embroiled in bitterness and controversy which has
|
|||
|
lasted for almost a decade.
|
|||
|
|
|||
|
The report concludes that there appears to be strong evidence, as
|
|||
|
indicated by the findings of two Federal court proceedings, as well as
|
|||
|
by the Committee investigation, that the Department of Justice "acted
|
|||
|
willfully and fraudulently," and "took, converted and stole" INSLAW's
|
|||
|
Enhanced PROMIS by "trickery, fraud and deceit." The report finds that
|
|||
|
these actions against INSLAW were implemented through the Project
|
|||
|
Manager from the beginning of the contract and under the direction of
|
|||
|
high-level Justice Department officials. The evidence presented in the
|
|||
|
report demonstrates that high-level Department officials deliberately
|
|||
|
ignored INSLAW's proprietary rights and misappropriated its PROMIS
|
|||
|
software for use at locations not covered under contract with the
|
|||
|
company. Justice then proceeded to challenge INSLAW's claims in court
|
|||
|
even though its own internal deliberations had concluded that these
|
|||
|
claims were valid and that the Department would most likely lose in
|
|||
|
court on this issue.
|
|||
|
|
|||
|
Brooks stated, "After almost seven years of litigation and
|
|||
|
$1 million in cost to the taxpayer, the Department is still
|
|||
|
trying to avoid accountability for the actions it took
|
|||
|
against INSLAW. It is time for Justice to recognize its
|
|||
|
mistakes and cut its losses and restore its moral standing
|
|||
|
as an enforcement agency, which is just as committed to
|
|||
|
living by the law as any other citizen."
|
|||
|
|
|||
|
According to the report, the second phase of the Committee's
|
|||
|
investigation concentrated on the allegations that high-level
|
|||
|
officials at the Department of Justice conspired to drive INSLAW into
|
|||
|
insolvency and steal PROMIS. In this regard, the report states that
|
|||
|
several individuals testified under oath that INSLAW's PROMIS software
|
|||
|
was stolen and distributed internationally in order to provide
|
|||
|
financial gain to associates of Justice Department officials and to
|
|||
|
further intelligence and foreign policy objectives of the United
|
|||
|
States. Additional corroborating evidence was uncovered by the
|
|||
|
Committee which substantiated to varying degrees the information
|
|||
|
provided by these individuals.
|
|||
|
|
|||
|
Brooks stated, "It is unfortunate that the Department chose
|
|||
|
not to conduct a thorough investigation into INSLAW's
|
|||
|
allegations of criminal wrongdoing by high-level government
|
|||
|
officials. Although they were faced with a growing body of
|
|||
|
evidence that serious wrongdoing had occurred which reached
|
|||
|
to the highest levels of the Department, both Attorneys
|
|||
|
General Meese and Thornburgh blocked or restricted
|
|||
|
Congressional inquiries into this matter and in the case of
|
|||
|
Attorney General Thornburgh ignored the findings of two
|
|||
|
Federal courts and refused to seek the appointment of an
|
|||
|
Independent Counsel."
|
|||
|
|
|||
|
The report recommends that Attorney General Barr immediately settle
|
|||
|
INSLAW's claims in a fair and equitable manner. The Committee report
|
|||
|
also strongly recommends that the Department seek the appointment of
|
|||
|
an Independent Counsel in accordance with 28 USC $$591-599 to conduct
|
|||
|
a comprehensive investigation of the INSLAW allegations of a high
|
|||
|
level conspiracy within the Justice Department to steal and distribute
|
|||
|
the Enhanced PROMIS software. According to the report, the
|
|||
|
investigation should: (1) ascertain whether there was a strategy by
|
|||
|
former Attorneys General and other Department officials to obstruct
|
|||
|
this and other investigations through employee harassment and denial
|
|||
|
of access to Department records; (2) determine whether current and
|
|||
|
former Justice Department officials and others involved in the INSLAW
|
|||
|
affair resorted to perjury and obstruction in order to cover-up their
|
|||
|
misdeeds; (3) determine whether the documents subpoenaed by the
|
|||
|
Committee and reported missing by the Department were stolen or
|
|||
|
illegally destroyed; and, (4) determine if private sector individuals
|
|||
|
participated in (a) the alleged conspiracy to steal INSLAW's PROMIS
|
|||
|
software and distribute it to various locations domestically and
|
|||
|
overseas, and (b) the alleged cover-up of this conspiracy through
|
|||
|
perjury and obstruction.
|
|||
|
|
|||
|
Finally, the Committee report recommends that the Independent Counsel
|
|||
|
investigate the mysterious death of reporter, Daniel Casolaro, who
|
|||
|
died while conducting an investigation of the INSLAW matter. The
|
|||
|
report notes that the suspicious circumstances surrounding his death
|
|||
|
have led some law enforcement professionals and others to believe that
|
|||
|
his death may not have been a suicide.
|
|||
|
|
|||
|
Brooks concluded: "The conduct of the Department in the
|
|||
|
INSLAW affair has resulted in an erosion of the public's
|
|||
|
trust in the organization charged with enforcing our
|
|||
|
Nation's laws. In order to restore the public's confidence
|
|||
|
in the Department of Justice, there must be a full and open
|
|||
|
investigation into this matter. However, I'm skeptical that
|
|||
|
without the appointment of an individual to conduct this
|
|||
|
investigation who is not under the direct control of the
|
|||
|
Attorney General, this matter will ever be fully resolved."
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: ccb@MACBETH.UMD.EDU(Chrome Cboy)
|
|||
|
Date: Wed, 12 Aug 1992 11:07:44 -0400
|
|||
|
Subject: File 9--Summary of NBC's Coverage of Danny Casolaro/Inslaw
|
|||
|
|
|||
|
The NBC coverage of the Danny Casolaro death in the Inslaw case, which
|
|||
|
aired last week, didn't seem to add many new facts, but I was
|
|||
|
surprised to see that the incident hadn't been forgotten--in fact, it
|
|||
|
seems to finally be making its way back into the spotlight.
|
|||
|
|
|||
|
Interviewed were Jack Anderson, a personal friend of Danny; Timothy
|
|||
|
Hutton, who is playing Danny in a forthcoming HBO docu-drama; John
|
|||
|
Connolly, the investigative reporter who has continued Danny's
|
|||
|
research on behalf of HBO, and the chief counsel for INSLAW, an
|
|||
|
ex-head of the Department of Justice who's name I can't remember.
|
|||
|
|
|||
|
Connolly felt that there wasn't an "Octopus" as Danny thought--eight
|
|||
|
men at the highest levels of government, working in concert to further
|
|||
|
their own desires. He did think, however, that these eight men were
|
|||
|
involved in wrongdoings involving illegal aid to the Contras, the BCCI
|
|||
|
scandal, the INSLAW theft, drug running, and possibly other things.
|
|||
|
They simply weren't in cahoots.
|
|||
|
|
|||
|
There was also a taped interview with a forensic expert who claimed
|
|||
|
that the entire autopsy was poorly performed, that it didn't follow
|
|||
|
standard procedures, and that the report looked like the conclusion
|
|||
|
regarding the cause of Danny's death had been reached a priori, and
|
|||
|
that the rest of the report was then written to justify the
|
|||
|
conclusion. Items that went unmentioned or were glossed over include:
|
|||
|
multiple large contusions, including one to the head; that three of
|
|||
|
Danny's fingernails had either been pulled off or were broken off
|
|||
|
(possibly during a struggle); and that the wounds on his wrists were
|
|||
|
deep and unhesitating, which is extremely rare in suicide victims. (In
|
|||
|
fact, one of his wrists had been slashed eight times, cutting through
|
|||
|
tendons all the way to the bone.)
|
|||
|
|
|||
|
It was Connolly's hypothesis that Danny had been jumped in his hotel
|
|||
|
room in the early morning hours, subdued, interrogated (traces of
|
|||
|
"strange drugs" were found in his system), and then killed. Adding to
|
|||
|
the suspicions of foul play include the fact that none of Danny's
|
|||
|
personal effects have been returned to the family, and that
|
|||
|
investigators have been unable to view any of his personal effects,
|
|||
|
reportedly including some notes that were found hidden in one of his
|
|||
|
shoes. Also, his reporter's note are still missing.
|
|||
|
|
|||
|
I could probably flesh this out, add disclaimers, and touch it up if
|
|||
|
you can't find anyone who managed to record the segment.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 10 Aug 92 13:46:35 -0500
|
|||
|
From: Neil W Rickert <rickert@CS.NIU.EDU>
|
|||
|
Subject: File 10--Re: Overstated? (Chic Tribune summary)
|
|||
|
|
|||
|
>Computer underground Digest Sun Aug 9, 1992 Volume 4 : Issue 35
|
|||
|
|
|||
|
>Sunday Tribune computer columnists Reid and Hume challenged what they
|
|||
|
>call one of the software industry's "periodic public relations
|
|||
|
>campaigns to get people to believe it's being robbed blind by software
|
|||
|
>pirates."
|
|||
|
|
|||
|
I too was glad to see this column.
|
|||
|
|
|||
|
I remember an interview I heard on NPR ("All Things Considered") a few
|
|||
|
years ago. The industry representative asked the rhetorical question
|
|||
|
"What would it be like if, for every car an auto dealer sells, two are
|
|||
|
stolen?" At the time, I thought the analogy was wonderful, except
|
|||
|
that the industry rep had it slightly wrong. He should have asked
|
|||
|
"What would it be like if, for every car an auto dealer sells, two are
|
|||
|
taken for test drives?" And of course the answer would be "That
|
|||
|
already happens."
|
|||
|
|
|||
|
The software piracy problem is, to a considerable extent, the natural
|
|||
|
consequence of industry policies. The software industry would have
|
|||
|
you purchase software sight unseen, in shrink wrapped packaging,
|
|||
|
without any knowledge of whether it will adequately serve your
|
|||
|
purposes, and with no chance of a refund if the product proves
|
|||
|
unsuitable or defective. They exacerbate this problem further by
|
|||
|
setting prices which bear little relation to their costs. They
|
|||
|
justify their costs on a "perceived value" basis, whereby they argue
|
|||
|
about the financial value of say a spreadsheet package to an
|
|||
|
accountancy firm. This "perceived value" pricing might make sense if
|
|||
|
they charged a much lower "perceived value" to the treasurer of a
|
|||
|
small church who wished use the spreadsheet once per month to manage
|
|||
|
the church books; but they don't.
|
|||
|
|
|||
|
In the book publishing industry, the price of a book is much closer to
|
|||
|
the manufacturing cost, except for special topic books with limited
|
|||
|
markets. Natural market forces require this. If publishers charged
|
|||
|
too much other authors would write books of a somewhat similar nature,
|
|||
|
and capture much of the market. But, in an obvious attempt to defeat
|
|||
|
such natural market forces, the software publishing industry uses its
|
|||
|
"look and feel" lawsuits in an attempt to defeat the law of supply and
|
|||
|
demand, and thereby maintain monopoly privileges for their products.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 10 Aug 92 08:06:42 CDT (Mon)
|
|||
|
From: peter@TARONGA.COM(Peter da Silva)
|
|||
|
Subject: File 11--Elite Pirates? I think not.
|
|||
|
|
|||
|
Elite Pirates, as described in (Jim Thomas's article in CuD #4.35)
|
|||
|
article, are virtually unknown: an endangered species at best, perhaps
|
|||
|
by now simply a chimera...
|
|||
|
|
|||
|
>Reid and Hume continue, making several points that pirates would agree
|
|||
|
>with:
|
|||
|
|
|||
|
Not the ones I know about.
|
|||
|
|
|||
|
>1. If you use a program, you should pay for it.
|
|||
|
|
|||
|
Maybe there's an elite among pirates who think this way, but the vast
|
|||
|
majority pirate software because they need it and don't want to pay for
|
|||
|
it. Virtually everyone I know who has pirated software has done so for
|
|||
|
this reason. Many have purchased IBM PCs, as they earlier bought Apples,
|
|||
|
because of the vast amount of pirate domain software available... the
|
|||
|
biggest beneficiaries of piracy are clone vendors.
|
|||
|
|
|||
|
>2. Sharing software can enhance sales.
|
|||
|
|
|||
|
Only if most pirates go along with point 1.
|
|||
|
|
|||
|
>They also note that the shareware concept, based on free distribution
|
|||
|
>of programs, has thrived and has made programmers quite successful.
|
|||
|
|
|||
|
Not really. The main success stories have been from people who have gone
|
|||
|
commercial or switched to crippleware demos to "encourage" people to go
|
|||
|
along with point 1.
|
|||
|
|
|||
|
>3. They, as do most elite pirates, strongly condemn the practice of
|
|||
|
>copying an authorized program in a business and sharing it around to
|
|||
|
>avoid the site license fees.
|
|||
|
|
|||
|
Most pirates I know wouldn't go that far, but they would "borrow" a copy
|
|||
|
from the guy in the next office, which comes to much the same thing.
|
|||
|
|
|||
|
>4. The pre-purchase use of software is "not such a bad thing" because
|
|||
|
>it can help sales. It also provides users a chance to compare the most
|
|||
|
>expensive programs [...]
|
|||
|
|
|||
|
So would a software library, or software rental agencies... something I've
|
|||
|
hoped would start showing up. They did for a while, but large-scale piracy
|
|||
|
has so muddied the waters that there's no hope of them catching on until
|
|||
|
software becomes as hard to copy as a book.
|
|||
|
|
|||
|
>The columnists fall short of advocating responsible piracy, and they
|
|||
|
>make it clear that they oppose unauthorized copying for profit or
|
|||
|
>"free use" simply to avoid paying for a product that will be used.
|
|||
|
|
|||
|
I suspect that they're simply unfamiliar with the normal corporate
|
|||
|
environment, and think that their buddies counting coup on Lotus and
|
|||
|
Borland are what the SPA is really concerned about. The pirate who does
|
|||
|
it simply for the thrill of the chase is a rare bird indeed.
|
|||
|
|
|||
|
BUT, they do make great headlines when they get caught. Sorry if the small
|
|||
|
time corporate thief has ruined your playground, but that's the way it goes
|
|||
|
in the real world.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 14 Aug, 1992 17:15:32 CDT
|
|||
|
From: Jim Thomas <cudigest@mindvox.phantom.com>
|
|||
|
Subject: File 12--Deferring the Piracy Debate until September
|
|||
|
|
|||
|
I partially agree with Peter: The pirate world has changed
|
|||
|
dramatically in the past two years, and the "elite pirates" of the
|
|||
|
1980s--those who enjoyed the thrill (albeit an anal-retentive one) of
|
|||
|
the chase--are an endangered species. Peter and I will address this
|
|||
|
issue in a near-future issue. The points I would make are that the
|
|||
|
types, the motivations, and the consequences of creative software
|
|||
|
sharing are not as clear-cut and certainly not as pernicious as the
|
|||
|
SPA and other anti-piracy activists suggest. I suspect the primary
|
|||
|
difference between the positions of Peter and I are not that *some*
|
|||
|
line must be drawn between acceptable and unacceptable "piracy," but
|
|||
|
*where* that line should be drawn.
|
|||
|
|
|||
|
A spokesperson for the SPA has *tentatively* agree to participate in
|
|||
|
the debate, and we hope to have at least one special issue in early
|
|||
|
September on the pros/cons of the ethics, legality, and responses to
|
|||
|
sharing unpurchased copyright software.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 12 Aug 1992 18:37 CDT
|
|||
|
From: <BOEHLEFELD@WISCSSC.BITNET>
|
|||
|
Subject: File 13--Software piracy in America's schools?
|
|||
|
|
|||
|
In an advertising publication, CPR (Curriculum Product News),
|
|||
|
distributed to school district administrators, an article, "Software
|
|||
|
copying in schools: a 1992 update," presents piracy problems within a
|
|||
|
slightly different population than that which we normally see.
|
|||
|
|
|||
|
The article (unsigned) begins: "The last we heard from Captain
|
|||
|
Diskcopy, a few years ago, she and her brash band of pirates were busy
|
|||
|
encouraging educators to disregard the law that allows only one backup
|
|||
|
copy for each program purchased. Their credo was 'copy, copy,
|
|||
|
copy.'...[their] gospel: 'It's OK because you're doing it for the
|
|||
|
kids!'"
|
|||
|
|
|||
|
It continues by detailing the lessening, but apparently still
|
|||
|
troublesome, level of software copying in US school districts. A
|
|||
|
representative of the National School Boards Assn. (members include
|
|||
|
more than 2000 districts from 50 states) is quoted as saying that
|
|||
|
unauthorized copying has been greatly reduced in recent years.
|
|||
|
|
|||
|
The article continues by citing information from the SPA about the
|
|||
|
dollars lost to piracy ($24 billion in 1990), and the availability of
|
|||
|
the SPAudit program (30,000 distributed in 1991), as well as a
|
|||
|
12-minute videotape, "It's Just Not Worth the Risk." The tape is part
|
|||
|
of an SPA "...public awareness and prevention campaign."
|
|||
|
|
|||
|
Also mentioned is the ICIA and its pamphlet of "...guidelines for
|
|||
|
schools to follow, entitled, 'Should I Copy Micropcomputer Software.'
|
|||
|
The guidelines are drawn from the Software Policy Statement published
|
|||
|
in 1987 by ISTE (International Society for Technology in Education)...
|
|||
|
." ISTE also distributes "A Code of Ethical Conduct for Computer-Using
|
|||
|
Educators."
|
|||
|
|
|||
|
These progams, videos and publications are credited with decreasing
|
|||
|
illegal copying in school districts.
|
|||
|
|
|||
|
The article then explains "lab packs," in which schools can obtain
|
|||
|
multiple copies of software for educational purposes at special rates.
|
|||
|
It notes that a few firms allow unlimited copying within a single
|
|||
|
school building. (Rarely is an entire school district housed in a
|
|||
|
single building, which can mean a district would have to buy multiple
|
|||
|
lab packs for district use.) A smaller number of firms does offer
|
|||
|
district-wide licenses, according to the article.
|
|||
|
|
|||
|
The article notes that the SPA has never sued a kindergarten through
|
|||
|
high school (K-12) district, but does discuss a suit filed against the
|
|||
|
University of Oregon's Continuation Center. A negotiated settlement
|
|||
|
required the university to "...pay the SPA $130,000, launch a massive
|
|||
|
on-campus campaign to educate students and faculty about lawful use of
|
|||
|
copyrighted software, and host a national conference on 'Software and
|
|||
|
the Law.'"
|
|||
|
|
|||
|
ICIA also asked its software publishing members to identify schools
|
|||
|
which were copying software. An Ohio school district, described in the
|
|||
|
article as "average sized," was mentioned frequently after the
|
|||
|
campaign began, resulting in ICIA sending a cease and desist order to
|
|||
|
the district.
|
|||
|
|
|||
|
A coordinator for instructional technology in an Indiana school
|
|||
|
district then describes some of the problems she's had in purchasing
|
|||
|
adequate software for her district's needs at a price that the
|
|||
|
district can afford.
|
|||
|
|
|||
|
She says they are trying to comply with the law, but "'Even when I say
|
|||
|
to a publisher that I'm willing to pay whatever you suggest is fair
|
|||
|
for a building or district-wide license, they won't discuss it.'"
|
|||
|
|
|||
|
She also believes software publishers are not responsive to hardware
|
|||
|
configurations in districts. Many, she says, have older hardware, and
|
|||
|
are in transition periods to newer, but software companies won't allow
|
|||
|
for these variations in selling their products. So districts can be
|
|||
|
forced to buy multiple licensed copies or, as she suggests, revert to
|
|||
|
piracy.
|
|||
|
|
|||
|
The article concludes with a remark paraphrased from "talking to...
|
|||
|
educators" that flexible volume purchasing options would help to
|
|||
|
further eliminate pirating in American schools.
|
|||
|
|
|||
|
The last page of the article (in a three column format) includes a
|
|||
|
two-column ad from the SPA with a hotline number to report
|
|||
|
"...unauthorized use of software including:
|
|||
|
"*bulletin boards
|
|||
|
"*unauthorized sales
|
|||
|
"*hard disk loading
|
|||
|
"*unauthorized internal copying[.]"
|
|||
|
The ad also provides an address for obtaining a free pamphlet about
|
|||
|
software and law.
|
|||
|
|
|||
|
A sidebar to the main story describes potential federal sentences and
|
|||
|
fines for piracy, and notes that school districts are legally allowed
|
|||
|
to lend software to students and staff unless that is "expressly
|
|||
|
prohibited in the publisher's own licensing agreement." The sidebar
|
|||
|
was credited to Mark Sherry, identified as president of Microease
|
|||
|
Consulting, Inc., consultant with the Mecklenburger Group, and former
|
|||
|
director of Software Evaluation for the EPIE Institute.
|
|||
|
|
|||
|
CURRICULUM PRODUCT NEWS is a slick (paper-quality) magazine
|
|||
|
containing articles, advertising, and the ubiquitous "Circle #xxx for
|
|||
|
more information" at the end of the 'news' articles. Its subtitle is
|
|||
|
"The Magazine for District-Level Administrators," and it is published
|
|||
|
10 times a year by Educational Media, Inc., 992 High Ridge Rd.,
|
|||
|
Stamford, CT 06905. The article recapped here was in the May issue,
|
|||
|
Vol. 3, No. 9, pages 22-26.
|
|||
|
|
|||
|
The article was heavy on the industry side (articulation of the
|
|||
|
problems of piracy came from trade and like organizations), but did
|
|||
|
attempt to balance the concerns and problems of educators with those
|
|||
|
of software publishers. The article provides no specific information
|
|||
|
about how much software piracy is going on in elementary and secondary
|
|||
|
schools.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.36
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|