882 lines
44 KiB
Plaintext
882 lines
44 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Wed Sep 30, 1992 Volume 4 : Issue 47
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivist: Dan Carosone
|
|||
|
Copy Editor: Rtaion Shrdleau, Esq.
|
|||
|
|
|||
|
CONTENTS, #4.47 (Sep 30, 1992)
|
|||
|
File 1--Statement of Principle
|
|||
|
File 2--NEW WINDO BILL (HR 5983)
|
|||
|
File 3--"In House Hackers" (Excerpts from the WSJ)
|
|||
|
File 4--Software Piracy: A Felony?
|
|||
|
File 5--Hacker hits Cincinnati Phones
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
|||
|
libraries; from America Online in the PC Telecom forum under
|
|||
|
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
|
|||
|
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
|
|||
|
Back issues also may be obtained from the mail server at
|
|||
|
mailserv@batpad.lgb.ca.us
|
|||
|
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Wed, 23 Sep 92 22:15:02 EDT
|
|||
|
From: bruces@well.sf.ca.us
|
|||
|
Subject: File 1--Statement of Principle
|
|||
|
|
|||
|
Bruce Sterling
|
|||
|
bruces@well.sf.ca.us
|
|||
|
Catscan 10
|
|||
|
From SCIENCE FICTION EYE #10
|
|||
|
|
|||
|
A STATEMENT OF PRINCIPLE
|
|||
|
|
|||
|
I just wrote my first nonfiction book. It's called THE HACKER
|
|||
|
CRACKDOWN: LAW AND DISORDER ON THE ELECTRONIC FRONTIER. Writing
|
|||
|
this book has required me to spend much of the past year and a half in
|
|||
|
the company of hackers, cops, and civil libertarians.
|
|||
|
|
|||
|
I've spent much time listening to arguments over what's legal, what's
|
|||
|
illegal, what's right and wrong, what's decent and what's despicable,
|
|||
|
what's moral and immoral, in the world of computers and civil
|
|||
|
liberties. My various informants were knowledgeable people who cared
|
|||
|
passionately about these issues, and most of them seemed
|
|||
|
well-intentioned. Considered as a whole, however, their opinions were
|
|||
|
a baffling mess of contradictions.
|
|||
|
|
|||
|
When I started this project, my ignorance of the issues involved was
|
|||
|
genuine and profound. I'd never knowingly met anyone from the
|
|||
|
computer underground. I'd never logged-on to an underground
|
|||
|
bulletin-board or read a semilegal hacker magazine. Although I did
|
|||
|
care a great deal about the issue of freedom of expression, I knew
|
|||
|
sadly little about the history of civil rights in America or the legal
|
|||
|
doctrines that surround freedom of the press, freedom of speech, and
|
|||
|
freedom of association. My relations with the police were firmly
|
|||
|
based on the stratagem of avoiding personal contact with police to the
|
|||
|
greatest extent possible. I didn't go looking for this project.
|
|||
|
This project came looking for me. I became inextricably involved when
|
|||
|
agents of the United States Secret Service, acting under the guidance
|
|||
|
of federal attorneys from Chicago, came to my home town of Austin on
|
|||
|
March 1, 1990, and confiscated the computers of a local science
|
|||
|
fiction gaming publisher. Steve Jackson Games, Inc., of Austin, was
|
|||
|
about to publish a gaming-book called GURPS Cyberpunk. When the
|
|||
|
federal law-enforcement agents discovered the electronic manuscript of
|
|||
|
CYBERPUNK on the computers they had seized from Mr. Jackson's
|
|||
|
offices, they expressed grave shock and alarm. They declared that
|
|||
|
CYBERPUNK was "a manual for computer crime."
|
|||
|
|
|||
|
It's not my intention to reprise the story of the Jackson case in this
|
|||
|
column. I've done that to the best of my ability in THE HACKER
|
|||
|
CRACKDOWN; and in any case the ramifications of March 1 are far from
|
|||
|
over.
|
|||
|
|
|||
|
Mr Jackson was never charged with any crime. His civil suit against
|
|||
|
the raiders is still in federal court as I write this.
|
|||
|
|
|||
|
I don't want to repeat here what some cops believe, what some hackers
|
|||
|
believe, or what some civil libertarians believe. Instead, I want to
|
|||
|
discuss my own moral beliefs as a science fiction writer -- such as
|
|||
|
they are. As an SF writer, I want to attempt a personal statement of
|
|||
|
principle.
|
|||
|
|
|||
|
It has not escaped my attention that there are many people who believe
|
|||
|
that anyone called a "cyberpunk" must be, almost by definition,
|
|||
|
entirely devoid of principle. I offer as evidence an excerpt from
|
|||
|
Buck BloomBecker's 1990 book, SPECTACULAR COMPUTER CRIMES. On page
|
|||
|
53, in a chapter titled "Who Are The Computer Criminals?", Mr.
|
|||
|
BloomBecker introduces the formal classification of "cyberpunk"
|
|||
|
criminality.
|
|||
|
|
|||
|
"In the last few years, a new genre of science fiction has arisen
|
|||
|
under the evocative name of 'cyberpunk.' Introduced in the work of
|
|||
|
William Gibson, particularly in his prize-winning novel NEUROMANCER,
|
|||
|
cyberpunk takes an apocalyptic view of the technological future. In
|
|||
|
NEUROMANCER, the protagonist is a futuristic hacker who must use the
|
|||
|
most sophisticated computer strategies to commit crimes for people who
|
|||
|
offer him enough money to buy the biological creations he needs to
|
|||
|
survive. His life is one of cynical despair, fueled by the desire to
|
|||
|
avoid death. Though none of the virus cases actually seen so far have
|
|||
|
been so devastating, this book certainly represents an attitude that
|
|||
|
should be watched for when we find new cases of computer virus and try
|
|||
|
to understand the motivations behind them.
|
|||
|
|
|||
|
"The New York Times's John Markoff, one of the more perceptive and
|
|||
|
accomplished writers in the field, has written than a number of
|
|||
|
computer criminals demonstrate new levels of meanness. He
|
|||
|
characterizes them, as do I, as cyberpunks."
|
|||
|
|
|||
|
Those of us who have read Gibson's NEUROMANCER closely will be aware
|
|||
|
of certain factual inaccuracies in Mr. BloomBecker's brief review.
|
|||
|
NEUROMANCER is not "apocalyptic." The chief conspirator in
|
|||
|
NEUROMANCER forces Case's loyalty, not by buying his services, but by
|
|||
|
planting poison-sacs in his brain. Case is "fueled" not by his greed
|
|||
|
for money or "biological creations," or even by the cynical "desire to
|
|||
|
avoid death," but rather by his burning desire to hack cyberspace.
|
|||
|
And so forth.
|
|||
|
|
|||
|
However, I don't think this misreading of NEUROMANCER is based on
|
|||
|
carelessness or malice. The rest of Mr. BloomBecker's book generally
|
|||
|
is informative, well-organized, and thoughtful. Instead, I feel that
|
|||
|
Mr. BloomBecker manfully absorbed as much of NEUROMANCER as he could
|
|||
|
without suffering a mental toxic reaction. This report of his is what
|
|||
|
he actually *saw* when reading the novel.
|
|||
|
|
|||
|
NEUROMANCER has won quite a following in the world of computer crime
|
|||
|
investigation. A prominent law enforcement official once told me
|
|||
|
that police unfailingly conclude the worst when they find a teenager
|
|||
|
with a computer and a copy of NEUROMANCER. When I declared that I
|
|||
|
too was a "cyberpunk" writer, she asked me if I would print the recipe
|
|||
|
for a pipe-bomb in my works. I was astonished by this question, which
|
|||
|
struck me as bizarre rhetorical excess at the time. That was before I
|
|||
|
had actually examined bulletin-boards in the computer underground,
|
|||
|
which I found to be chock-a-block with recipes for pipe-bombs, and
|
|||
|
worse. (I didn't have the heart to tell her that my friend and
|
|||
|
colleague Walter Jon Williams had once written and published an SF
|
|||
|
story closely describing explosives derived from simple household
|
|||
|
chemicals.)
|
|||
|
|
|||
|
Cyberpunk SF (along with SF in general) has, in fact, permeated the
|
|||
|
computer underground. I have met young underground hackers who use
|
|||
|
the aliases "Neuromancer," "Wintermute" and "Count Zero." The Legion
|
|||
|
of Doom, the absolute bete noire of computer law-enforcement, used to
|
|||
|
congregate on a bulletin-board called "Black Ice."
|
|||
|
|
|||
|
In the past, I didn't know much about anyone in the underground, but
|
|||
|
they certainly knew about me. Since that time, I've had people
|
|||
|
express sincere admiration for my novels, and then, in almost the same
|
|||
|
breath, brag to me about breaking into hospital computers to chortle
|
|||
|
over confidential medical reports about herpes victims.
|
|||
|
|
|||
|
The single most stinging example of this syndrome is "Pengo," a member
|
|||
|
of the German hacker-group that broke into Internet computers while in
|
|||
|
the pay of the KGB. He told German police, and the judge at the
|
|||
|
trial of his co-conspirators, that he was inspired by NEUROMANCER and
|
|||
|
John Brunner's SHOCKWAVE RIDER.
|
|||
|
|
|||
|
I didn't write NEUROMANCER. I did, however, read it in manuscript
|
|||
|
and offered many purportedly helpful comments. I praised the book
|
|||
|
publicly and repeatedly and at length. I've done everything I can to
|
|||
|
get people to read this book.
|
|||
|
|
|||
|
I don't recall cautioning Gibson that his novel might lead to
|
|||
|
anarchist hackers selling their expertise to the ferocious and
|
|||
|
repulsive apparat that gave the world the Lubyanka and the Gulag
|
|||
|
Archipelago. I don't think I could have issued any such caution, even
|
|||
|
if I'd felt the danger of such a possibility, which I didn't. I still
|
|||
|
don't know in what fashion Gibson might have changed his book to avoid
|
|||
|
inciting evildoers, while still retaining the integrity of his vision
|
|||
|
-- the very quality about the book that makes it compelling and
|
|||
|
worthwhile.
|
|||
|
|
|||
|
This leads me to my first statements of moral principle.
|
|||
|
|
|||
|
As a "cyberpunk" SF writer, I am not responsible for every act
|
|||
|
committed by a Bohemian with a computer. I don't own the word
|
|||
|
"cyberpunk" and cannot help where it is bestowed, or who uses it, or
|
|||
|
to what ends.
|
|||
|
|
|||
|
As a science fiction writer, it is not my business to make people
|
|||
|
behave. It is my business to make people imagine. I cannot control
|
|||
|
other people's imaginations -- any more than I would allow them to
|
|||
|
control mine.
|
|||
|
|
|||
|
I am, however, morally obliged to speak out when acts of evil are
|
|||
|
committed that use my ideas or my rhetoric, however distantly, as a
|
|||
|
justification.
|
|||
|
|
|||
|
Pengo and his friends committed a grave crime that was worthy of
|
|||
|
condemnation and punishment. They were clever, but treacherously
|
|||
|
clever.
|
|||
|
They were imaginative, but it was imagination in a bad cause. They
|
|||
|
were technically accomplished, but they abused their expertise for
|
|||
|
illicit profit and to feed their egos. They may be "cyberpunks" --
|
|||
|
according to many, they may deserve that title far more than I do --
|
|||
|
but they're no friends of mine.
|
|||
|
|
|||
|
What is "crime"? What is a moral offense? What actions are evil and
|
|||
|
dishonorable? I find these extraordinarily difficult questions. I
|
|||
|
have no special status that should allow me to speak with authority on
|
|||
|
such subjects. Quite the contrary. As a writer in a scorned popular
|
|||
|
literature and a self-professed eccentric Bohemian, I have next to no
|
|||
|
authority of any kind. I'm not a moralist, philosopher, or prophet.
|
|||
|
I've always considered my "moral role," such as it is, to be that of
|
|||
|
a court jester -- a person sometimes allowed to speak the unspeakable,
|
|||
|
to explore ideas and issues in a format where they can be treated as
|
|||
|
games, thought-experiments, or metaphors, not as prescriptions, laws,
|
|||
|
or sermons.
|
|||
|
|
|||
|
I have no religion, no sacred scripture to guide my actions and
|
|||
|
provide an infallible moral bedrock. I'm not seeking political
|
|||
|
responsibilities or the power of public office. I habitually
|
|||
|
question any pronouncement of authority, and entertain the liveliest
|
|||
|
skepticism about the processes of law and justice. I feel no urge to
|
|||
|
conform to the behavior of the majority of my fellow citizens. I'm a
|
|||
|
pain in the neck.
|
|||
|
|
|||
|
My behavior is far from flawless. I lived and thrived in Austin,
|
|||
|
Texas in the 1970s and 1980s, in a festering milieu of arty
|
|||
|
crypto-intellectual hippies. I've committed countless "crimes,"
|
|||
|
like millions of other people in my generation. These crimes were
|
|||
|
of the glamorous "victimless" variety, but they would surely have
|
|||
|
served to put me in prison had I done them, say, in front of the State
|
|||
|
Legislature.
|
|||
|
|
|||
|
Had I lived a hundred years ago as I live today, I would probably have
|
|||
|
been lynched by outraged fellow Texans as a moral abomination. If I
|
|||
|
lived in Iran today and wrote and thought as I do, I would probably be
|
|||
|
tried and executed.
|
|||
|
|
|||
|
As far as I can tell, moral relativism is a fact of life. I think it
|
|||
|
might be possible to outwardly conform to every jot and tittle of the
|
|||
|
taboos of one's society, while feeling no emotional or intellectual
|
|||
|
commitment to them. I understand that certain philosophers have
|
|||
|
argued that this is morally proper behavior for a good citizen. But
|
|||
|
I can't live that life. I feel, sincerely, that my society is
|
|||
|
engaged in many actions which are foolish and shortsighted and likely
|
|||
|
to lead to our destruction. I feel that our society must change, and
|
|||
|
change radically, in a process that will cause great damage to our
|
|||
|
present system of values.
|
|||
|
|
|||
|
This doesn't excuse my own failings, which I regret, but it does
|
|||
|
explain, I hope, why my lifestyle and my actions are not likely to
|
|||
|
make authority feel entirely comfortable.
|
|||
|
|
|||
|
Knowledge is power. The rise of computer networking, of the
|
|||
|
Information Society, is doing strange and disruptive things to the
|
|||
|
processes by which power and knowledge are currently distributed.
|
|||
|
Knowledge and information, supplied through these new conduits, are
|
|||
|
highly corrosive to the status quo. People living in the midst of
|
|||
|
technological revolution are living outside the law: not necessarily
|
|||
|
because they mean to break laws, but because the laws are vague,
|
|||
|
obsolete, overbroad, draconian, or unenforceable. Hackers break laws
|
|||
|
as a matter of course, and some have been punished unduly for
|
|||
|
relatively minor infractions not motivated by malice. Even computer
|
|||
|
police, seeking earnestly to apprehend and punish wrongdoers, have
|
|||
|
been accused of abuse of their offices, and of violation of the
|
|||
|
Constitution and the civil statutes. These police may indeed have
|
|||
|
committed these "crimes." Some officials have already suffered grave
|
|||
|
damage to their reputations and careers -- all the time convinced that
|
|||
|
they were morally in the right; and, like the hackers they pursued,
|
|||
|
never feeling any genuine sense of shame, remorse, or guilt.
|
|||
|
|
|||
|
I have lived, and still live, in a counterculture, with its own
|
|||
|
system of values. Counterculture -- Bohemia -- is never far from
|
|||
|
criminality. "To live outside the law you must be honest" was Bob
|
|||
|
Dylan's classic hippie motto. A Bohemian finds romance in the notion
|
|||
|
that "his clothes are dirty but his hands are clean." But there's
|
|||
|
danger in setting aside the strictures of the law to linchpin one's
|
|||
|
honor on one's personal integrity. If you throw away the rulebook to
|
|||
|
rely on your individual conscience you will be put in the way of
|
|||
|
temptation.
|
|||
|
|
|||
|
And temptation is a burden. It hurts. It is grotesquely easy to
|
|||
|
justify, to rationalize, an action of which one should properly be
|
|||
|
ashamed. In investigating the milieu of computer-crime I have come
|
|||
|
into contact with a world of temptation formerly closed to me.
|
|||
|
Nowadays, it would take no great effort on my part to break into
|
|||
|
computers, to steal long-distance telephone service, to ingratiate
|
|||
|
myself with people who would merrily supply me with huge amounts of
|
|||
|
illicitly copied software. I could even build pipe-bombs. I haven't
|
|||
|
done these things, and disapprove of them; in fact, having come to
|
|||
|
know these practices better than I cared to, I feel sincere revulsion
|
|||
|
for them now. But this knowledge is a kind of power, and power is
|
|||
|
tempting. Journalistic objectivity, or the urge to play with ideas,
|
|||
|
cannot entirely protect you. Temptation clings to the mind like a
|
|||
|
series of small but nagging weights. Carrying these weights may make
|
|||
|
you stronger. Or they may drag you down.
|
|||
|
|
|||
|
"His clothes are dirty but his hands are clean." It's a fine ideal,
|
|||
|
when you can live up to it. Like a lot of Bohemians, I've gazed with
|
|||
|
a fine disdain on certain people in power whose clothes were clean but
|
|||
|
their hands conspicuously dirty. But I've also met a few people
|
|||
|
eager to pat me on the back, whose clothes were dirty and their hands
|
|||
|
as well. They're not pleasant company.
|
|||
|
|
|||
|
Somehow one must draw a line. I'm not very good at drawing lines.
|
|||
|
When other people have drawn me a line, I've generally been quite
|
|||
|
anxious to have a good long contemplative look at the other side. I
|
|||
|
don't feel much confidence in my ability to draw these lines. But I
|
|||
|
feel that I should. The world won't wait. It only took a few guys
|
|||
|
with poolcues and switchblades to turn Woodstock Nation into
|
|||
|
Altamont. Haight-Ashbury was once full of people who could trust
|
|||
|
anyone they'd smoked grass with and love anyone they'd dropped acid
|
|||
|
with -- for about six months. Soon the place was aswarm with
|
|||
|
speed-freaks and junkies, and heaven help us if they didn't look just
|
|||
|
like the love-bead dudes from the League of Spiritual Discovery.
|
|||
|
Corruption exists, temptation exists. Some people fall. And the
|
|||
|
temptation is there for all of us, all the time.
|
|||
|
|
|||
|
I've come to draw a line at money. It's not a good line, but it's
|
|||
|
something. There are certain activities that are unorthodox,
|
|||
|
dubious, illegal or quasi-legal, but they might perhaps be justified
|
|||
|
by an honest person with unconventional standards. But in my
|
|||
|
opinion, when you're making a commercial living from breaking the
|
|||
|
law, you're beyond the pale. I find it hard to accept your
|
|||
|
countercultural sincerity when you're grinning and pocketing the cash,
|
|||
|
compadre.
|
|||
|
|
|||
|
I can understand a kid swiping phone service when he's broke,
|
|||
|
powerless, and dying to explore the new world of the networks. I
|
|||
|
don't approve of this, but I can understand it. I scorn to do this
|
|||
|
myself, and I never have; but I don't find it so heinous that it
|
|||
|
deserves pitiless repression. But if you're stealing phone service
|
|||
|
and selling it -- if you've made yourself a miniature phone company
|
|||
|
and you're pimping off the energy of others just to line your own
|
|||
|
pockets -- you're a thief. When the heat comes to put you away,
|
|||
|
don't come crying "brother" to me.
|
|||
|
|
|||
|
If you're creating software and giving it away, you're a fine human
|
|||
|
being. If you're writing software and letting other people copy it
|
|||
|
and try it out as shareware, I appreciate your sense of trust, and if
|
|||
|
I
|
|||
|
like your work, I'll pay you. If you're copying other people's
|
|||
|
software and giving it away, you're damaging other people's interests,
|
|||
|
and should be ashamed, even if you're posing as a glamorous
|
|||
|
info-liberating subversive. But if you're copying other people's
|
|||
|
software and selling it, you're a crook and I despise you.
|
|||
|
|
|||
|
Writing and spreading viruses is a vile, hurtful, and shameful
|
|||
|
activity that I unreservedly condemn.
|
|||
|
|
|||
|
There's something wrong with the Information Society. There's
|
|||
|
something wrong with the idea that "information" is a commodity like a
|
|||
|
desk or a chair. There's something wrong with patenting software
|
|||
|
algorithms. There's something direly mean-spirited and ungenerous
|
|||
|
about inventing a language and then renting it out to other people to
|
|||
|
speak. There's something unprecedented and sinister in this process
|
|||
|
of creeping commodification of data and knowledge. A computer is
|
|||
|
something too close to the human brain for me to rest entirely content
|
|||
|
with someone patenting or copyrighting the process of its thought.
|
|||
|
There's something sick and unworkable about an economic system which
|
|||
|
has already spewed forth such a vast black market. I don't think
|
|||
|
democracy will thrive in a milieu where vast empires of data are
|
|||
|
encrypted, restricted, proprietary, confidential, top secret, and
|
|||
|
sensitive. I fear for the stability of a society that builds
|
|||
|
sandcastles out of databits and tries to stop a real-world tide with
|
|||
|
royal commands.
|
|||
|
|
|||
|
Whole societies can fall. In Eastern Europe we have seen whole
|
|||
|
nations collapse in a slough of corruption. In pursuit of their
|
|||
|
unworkable economic doctrine, the Marxists doubled and redoubled their
|
|||
|
efforts at social control, while losing all sight of the values that
|
|||
|
make life worth living. At last the entire power structure was so
|
|||
|
discredited that the last remaining shred of moral integrity could
|
|||
|
only be found in Bohemia: in dissidents and dramatists and their
|
|||
|
illegal samizdat underground fanzines. Their clothes were dirty but
|
|||
|
their hands were clean. The only agitprop poster Vaclav Havel needed
|
|||
|
was a sign saying *Vaclav Havel Guarantees Free Elections.* He'd
|
|||
|
never held power, but people believed him, and they believed his
|
|||
|
Velvet Revolution friends.
|
|||
|
|
|||
|
I wish there were people in the Computer Revolution who could inspire,
|
|||
|
and deserved to inspire, that level of trust. I wish there were
|
|||
|
people in the Electronic Frontier whose moral integrity unquestionably
|
|||
|
matched the unleashed power of those digital machines. A society is
|
|||
|
in dire straits when it puts its Bohemia in power. I tremble for my
|
|||
|
country when I contemplate this prospect. And yet it's possible. If
|
|||
|
dire straits come, it can even be the last best hope.
|
|||
|
|
|||
|
The issues that enmeshed me in 1990 are not going to go away. I
|
|||
|
became involved as a writer and journalist, because I felt it was
|
|||
|
right. Having made that decision, I intend to stand by my commitment.
|
|||
|
I expect to stay involved in these issues, in this debate, for the
|
|||
|
rest of my life. These are timeless issues: civil rights,
|
|||
|
knowledge, power, freedom and privacy, the necessary steps that a
|
|||
|
civilized society must take to protect itself from criminals. There
|
|||
|
is no finality in politics; it creates itself anew, it must be dealt
|
|||
|
with every day.
|
|||
|
|
|||
|
The future is a dark road and our speed is headlong. I didn't ask
|
|||
|
for power or responsibility. I'm a science fiction writer, I only
|
|||
|
wanted to play with Big Ideas in my cheerfully lunatic sandbox. What
|
|||
|
little benefit I myself can contribute to society would likely be best
|
|||
|
employed in writing better SF novels. I intend to write those better
|
|||
|
novels, if I can. But in the meantime I seem to have accumulated a
|
|||
|
few odd shreds of influence. It's a very minor kind of power, and
|
|||
|
doubtless more than I deserve; but power without responsibility is a
|
|||
|
monstrous thing.
|
|||
|
|
|||
|
In writing HACKER CRACKDOWN, I tried to describe the truth as other
|
|||
|
people saw it. I see it too, with my own eyes, but I can't yet
|
|||
|
pretend to understand what I'm seeing. The best I can do, it seems to
|
|||
|
me, is to try to approach the situation as an open-minded person of
|
|||
|
goodwill. I therefore offer the following final set of principles,
|
|||
|
which I hope will guide me in the days to come.
|
|||
|
|
|||
|
I'll listen to anybody, and I'll try to imagine myself in their
|
|||
|
situation.
|
|||
|
|
|||
|
I'll assume goodwill on the part of others until they fully earn my
|
|||
|
distrust.
|
|||
|
|
|||
|
I won't cherish grudges. I'll forgive those who change their minds
|
|||
|
and actions, just as I reserve the right to change my own mind and
|
|||
|
actions.
|
|||
|
|
|||
|
I'll look hard for the disadvantages to others, in the things that
|
|||
|
give me advantage. I won't assume that the way I live today is the
|
|||
|
natural order of the universe, just because I happen to be benefiting
|
|||
|
from it at the moment.
|
|||
|
|
|||
|
And while I don't plan to give up making money from my ethically
|
|||
|
dubious cyberpunk activities, I hope to temper my impropriety by
|
|||
|
giving more work away for no money at all.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 29 Sep 1992 20:14:02 EDT
|
|||
|
From: LOVE@TEMPLEVM.BITNET
|
|||
|
Subject: File 2--NEW WINDO BILL (HR 5983)
|
|||
|
|
|||
|
From--James Love <love@essential.org>
|
|||
|
Taxpayer Assets Project
|
|||
|
|
|||
|
Re--HR 5983, legislation to provide online access to
|
|||
|
federal information
|
|||
|
(Successor to Gateway/WINDO bills)
|
|||
|
|
|||
|
Date--September 23, 1992, Washington, DC.
|
|||
|
|
|||
|
On Wednesday, September 23, the House Administration Committee
|
|||
|
unanimously approved H.R. 5983, the "Government Printing Office (GPO)
|
|||
|
Electronic Information Access Enhancement Act of 1992." The bill,
|
|||
|
which had been introduced the day before, was cosponsored by committee
|
|||
|
chairman Charlie Rose (D-NC), ranking minority member William Thomas
|
|||
|
(R-CA) and Pat Roberts (R-KA). The measure was a watered down version
|
|||
|
of the GPO Gateway/WINDO bills (S. 2813, HR 2772), which would provide
|
|||
|
one-stop-shopping online access to hundreds of federal information
|
|||
|
systems and databases.
|
|||
|
|
|||
|
The new bill was the product of negotiations between
|
|||
|
Representative Rose and the republican members of the House
|
|||
|
Administration Committee, who had opposed the broader scope of the
|
|||
|
Gateway/WINDO bills. Early responses to the new bill are mixed.
|
|||
|
Supporters of the Gateway/WINDO bill were disappointed by the narrower
|
|||
|
scope of the bill, but pleased that the legislation retained the
|
|||
|
Gateway/WINDO policies on pricing of the service (free use by
|
|||
|
depository libraries, prices equal to the incremental cost of
|
|||
|
dissemination for everyone else). On balance, however, the new bill
|
|||
|
would substantially broaden public access to federal information
|
|||
|
systems and databases, when compared to the status quo.
|
|||
|
|
|||
|
WHAT HR 5983 DOES
|
|||
|
|
|||
|
The bill that would require the Government Printing Office (GPO) to
|
|||
|
provide public online access to:
|
|||
|
|
|||
|
- the Federal Register
|
|||
|
- the Congressional Record
|
|||
|
- an electronic directory of Federal public information
|
|||
|
stored electronically,
|
|||
|
- other appropriate publications distributed by the
|
|||
|
Superintendent of Documents, and
|
|||
|
- information under the control of other federal
|
|||
|
departments or agencies, when requested by the
|
|||
|
department or agency.
|
|||
|
|
|||
|
The Superintendent of Documents is also required to undertake a
|
|||
|
feasibility study of further enhancing public access to federal
|
|||
|
electronic information, including assessments the feasibility of:
|
|||
|
|
|||
|
- public access to existing federal information systems,
|
|||
|
- the use of computer networks such as the Internet and
|
|||
|
NREN, and
|
|||
|
- the development (with NIST and other agencies) of
|
|||
|
compatible standards for disseminating electronic
|
|||
|
information.
|
|||
|
|
|||
|
There will also be studies of the costs, cost savings, and
|
|||
|
utility of the online systems that are developed, including an
|
|||
|
independent study of GPO's services by GAO.
|
|||
|
|
|||
|
|
|||
|
WHAT HR 5983 DOESN'T DO
|
|||
|
|
|||
|
The new bill discarded the names WINDO or Gateway without a
|
|||
|
replacement. The new system is simply called "the system," a
|
|||
|
seemingly minor change, but one designed to give the service a
|
|||
|
lower profile.
|
|||
|
|
|||
|
A number of other features of the Gateway/WINDO legislation were
|
|||
|
also lost.
|
|||
|
|
|||
|
- While both S. 2813 and HR 2772 would have required GPO to
|
|||
|
provide online access through the Internet, the new bill
|
|||
|
only requires that GPO study the issue of Internet access.
|
|||
|
|
|||
|
- The Gateway/WINDO bills would have given GPO broad authority
|
|||
|
to publish federal information online, but the new bill
|
|||
|
would restrict such authority to documents published by the
|
|||
|
Superintendent of Documents (A small subset of federal
|
|||
|
information stored electronically), or situations where the
|
|||
|
agency itself asked GPO to disseminate information stored in
|
|||
|
electronic formats. This change gives agencies more
|
|||
|
discretion in deciding whether or not to allow GPO to
|
|||
|
provide online access to their databases, including those
|
|||
|
cases where agencies want to maintain control over databases
|
|||
|
for financial reasons (to make money off the data).
|
|||
|
|
|||
|
- The republican minority insisted on removing language that
|
|||
|
would have explicitly allowed GPO to reimburse agencies for
|
|||
|
their costs in providing public access. This is a
|
|||
|
potentially important issue, since many federal agencies
|
|||
|
will not work with GPO to provide public access to their own
|
|||
|
information systems, unless they are reimbursed for costs
|
|||
|
that they incur. Thus, a major incentive for federal
|
|||
|
agencies was eliminated.
|
|||
|
|
|||
|
- S. 2813 and HR 2772 would have required GPO to publish an
|
|||
|
annual report on the operation of the Gateway/WINDO and
|
|||
|
accept and consider *annual* comments from users on a wide
|
|||
|
range of issues. The new bill only makes a general
|
|||
|
requirement that GPO "consult" with users and data vendors.
|
|||
|
The annual notice requirement that was eliminated was
|
|||
|
designed to give citizens more say in how the service
|
|||
|
evolves, by creating a dynamic public record of citizen
|
|||
|
views on topics such as the product line, prices, standards
|
|||
|
and the quality of the service. Given the poor record of
|
|||
|
many federal agencies in addressing user concerns, this is
|
|||
|
an important omission.
|
|||
|
|
|||
|
- S. 2813 would have provided startup funding of $3 million in
|
|||
|
fy 92 and $10 million in fy 93. The new bill doesn't
|
|||
|
include any appropriation at all, causing some observers to
|
|||
|
wonder how GPO will be able to develop the online
|
|||
|
Congressional Record, Federal Register, and directory of
|
|||
|
databases, as required by the bill.
|
|||
|
|
|||
|
|
|||
|
WHAT HAPPENED?
|
|||
|
|
|||
|
The bill which emerged from Committee on Wednesday substantially
|
|||
|
reflected the viewpoints of the republicans on the House
|
|||
|
Administration Committee. The republican staffers who negotiated
|
|||
|
the new bill worked closely with lobbyists for the Industry
|
|||
|
Information Association (IIA), a trade group which represents
|
|||
|
commercial data vendors, and who opposed the broader
|
|||
|
dissemination mandates of the Gateway/WINDO bills.
|
|||
|
|
|||
|
Why did WINDO sponsor Charlie Rose, who is Chair of the House
|
|||
|
Administration Committee, give up so much in the new bill?
|
|||
|
Because Congress is about to adjourn, and it is difficult to pass
|
|||
|
any controversial legislation at the end of a Congressional
|
|||
|
session. The failure to schedule earlier hearings or markups on
|
|||
|
the WINDO legislation (due largely to bitter partisan battles
|
|||
|
over the House bank and post office, October Surprise and
|
|||
|
campaign financing reform) gave the republican minority on the
|
|||
|
committee enormous clout, since they could (and did) threaten to
|
|||
|
kill the bill.
|
|||
|
|
|||
|
Rose deserves credit, however, for being the first member of
|
|||
|
congress to give the issue of citizen online access to federal
|
|||
|
information systems and databases such high prominence, and his
|
|||
|
promise to revisit the question next session is very encouraging.
|
|||
|
|
|||
|
|
|||
|
PROSPECTS FOR PASSAGE
|
|||
|
|
|||
|
The new bill has a long way to go. It must be scheduled for a
|
|||
|
floor vote in the House and a vote in the Senate. The last step
|
|||
|
will likely be the most difficult. In the last few weeks of a
|
|||
|
Congressional session, any member of the Senate can put a "hold"
|
|||
|
on the bill, preventing it from receiving Senate approval this
|
|||
|
year, thus killing the bill until next legislative session. OMB
|
|||
|
and the republican minority on the House Administration Committee
|
|||
|
have both signed off on the bill, but commercial data vendors
|
|||
|
would still like to kill the bill. There's a catch, however.
|
|||
|
|
|||
|
Rose's staff has reportedly told the Information Industry
|
|||
|
Association (IIA) that if it kills HR 5983, it will see an even
|
|||
|
bolder bill next year. Since IIA was an active participant in
|
|||
|
the negotiations over the compromise bill, any effort to kill the
|
|||
|
bill will likely antagonize Rose. Of course, some observers
|
|||
|
think that an individual firm, such as Congressional Quarterly,
|
|||
|
may try to kill the bill. Only time will tell.
|
|||
|
|
|||
|
|
|||
|
IS THE GLASS HALF EMPTY OR HALF FULL?
|
|||
|
|
|||
|
Despite the many changes that have weakened the bill, HR 5983 is
|
|||
|
still an important step forward for those who want to broaden
|
|||
|
public access to federal information systems and databases. Not
|
|||
|
only does the bill require GPO to create three important online
|
|||
|
services (the directory, the Congressional Record and the Federal
|
|||
|
Register), but it creates a vehicle that can do much more.
|
|||
|
Moreover, HR 5983 would provide free online access for 1,400
|
|||
|
federal depository libraries, and limit prices for everyone else
|
|||
|
to the incremental cost of dissemination. These pricing rules
|
|||
|
are far superior to those used by NTIS, or line agencies like
|
|||
|
NLM, who earn substantial profits on the sale of electronic
|
|||
|
products and services.
|
|||
|
|
|||
|
WHAT YOU CAN DO
|
|||
|
|
|||
|
Urge your Senators and Representatives to support passage of HR
|
|||
|
5983, quickly, before Congress adjourns in October. All members
|
|||
|
of Congress can be reached by telephone at 202/224-3121, or by
|
|||
|
mail at the following addresses:
|
|||
|
|
|||
|
Senator John Smith Representative Susan Smith
|
|||
|
US Senate US House of Representatives
|
|||
|
Washington, DC 20510 Washington, DC 21515
|
|||
|
|
|||
|
|
|||
|
The most important persons to contact are your own delegation, as
|
|||
|
well as Senators George Mitchell (D-ME) and Bob Dole (R-KA).
|
|||
|
|
|||
|
For more information, contact the American Library Association at
|
|||
|
202/547-4440 or the Taxpayer Assets Project at 215-658-0880. For a
|
|||
|
copy of HR 5983 or the original Gateway/WINDO bills, send an email
|
|||
|
message to tap@essential.org.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 30 Aug 92 05:19:34 EDT
|
|||
|
From: Anonymous@anonvill.uunet.uu.net
|
|||
|
Subject: File 3--"In House Hackers" (Excerpts from the WSJ)
|
|||
|
|
|||
|
Although cyber-surfing computer explorers receive the bulk of media
|
|||
|
attention, there is little evidence that they comprise the greatest
|
|||
|
danger to corporate computers or other resources. Confirming what
|
|||
|
some observers have been saying for years, the Wall Street Journal
|
|||
|
recently reported on the dangers of in-house hackers to corporate
|
|||
|
computer security.
|
|||
|
|
|||
|
Summary of: "In House Hackers"
|
|||
|
From: THE WALL STREET JOURNAL (Thursday, Aug. 27, 1992)
|
|||
|
|
|||
|
At its London office, American Telephone and Telegraph Co. says
|
|||
|
three technicians used a computer to funnel company funds into
|
|||
|
their own pockets. At General Dynamics Corp.'s space division in
|
|||
|
San Diego, an employee plotted to sabotage the company by wiping
|
|||
|
out a computer program used to build missiles. And at Charles
|
|||
|
Schwab & CO. headquarters in San Francisco, some employees used
|
|||
|
the stock brokerage firm's computer system to buy and sell
|
|||
|
cocaine.
|
|||
|
|
|||
|
As these examples suggest, employees are finding increasingly
|
|||
|
ingenious ways to misuse their companies' computer systems.
|
|||
|
Although publicity about computer wrongdoing has often focused on
|
|||
|
outside hackers gaining entry to systems to wreak havoc, insiders
|
|||
|
are proving far more adept at creating computer mayhem.
|
|||
|
|
|||
|
Workers may use company computer system to line their own
|
|||
|
pockets, to seek revenge because they didn't get a promotion or
|
|||
|
because of other perceived slights. Whatever the motive,
|
|||
|
high-tech misdeeds are creating significant problems for
|
|||
|
companies large and small.
|
|||
|
|
|||
|
MEANS AND MOTIVE
|
|||
|
|
|||
|
Although figures for damages from computer abuse are scarce, some
|
|||
|
companies report internal frauds involving losses of more than $1
|
|||
|
million. Even more costly are losses from disrupted operations
|
|||
|
or form repairing the damage.
|
|||
|
|
|||
|
"Employees are the ones with the skill, the knowledge and the
|
|||
|
access to do bad things," says Donn Parker, an expert on computer
|
|||
|
security at SRI International, Menlo Park, Calif. "They're the
|
|||
|
ones, for example, who can most easily plant a which can crash
|
|||
|
your entire computer system." Most companies quietly fire the
|
|||
|
culprits without publicity, Mr. Parker adds. Dishonest or
|
|||
|
disgruntled employees pose "a far greater problem than most
|
|||
|
people realize."
|
|||
|
|
|||
|
The story reports interviews with various security experts who agree
|
|||
|
that the increase of computer use also creates risks of unauthorized
|
|||
|
computer access and tampering within a company. According to the
|
|||
|
story, laptops cause special concern because of their flexibility and
|
|||
|
power, which make it easier for employees to steal trade secrets.
|
|||
|
Companies are beginning to recognize the need to develop increased
|
|||
|
security measures to protect themselves from INTERNAL security
|
|||
|
breaches. These include closer monitoring of who has access to
|
|||
|
systems, encryption of sensitive files, and more carefully protecting
|
|||
|
systems against unauthorized company users.
|
|||
|
|
|||
|
The story summarizes the AT&T trojan in England last year, in which
|
|||
|
three AT&T technicians were charged with unauthorized modification of
|
|||
|
computers and conspiracy to defraud. Although the case was later
|
|||
|
dropped because of legal technicalities, it underscores the dangers of
|
|||
|
the potential for inhouse crime.
|
|||
|
|
|||
|
The story summarizes the case of Michael Lauffenburger, a 31 year old
|
|||
|
General Dynamics programmer in California, who was indicted in federal
|
|||
|
court for trying to destroy parts of a computer program, quit the
|
|||
|
company, and then get rehired as a well-paid consultant to rebuild the
|
|||
|
program:
|
|||
|
|
|||
|
The plot, the indictment alleges, went like this: In March last
|
|||
|
year, Mr. Lauffenburger created a second computer program, this
|
|||
|
one a logic bomb called "Cleanup." It would totally erase the
|
|||
|
original parts program starting at 6 p.m. May 24, the beginning
|
|||
|
of the Memorial Day weekend, when few would be around to notice.
|
|||
|
When the bomb went off, Mr Lauffenburger wouldn't be around
|
|||
|
either; he quit March 29.
|
|||
|
|
|||
|
Lauffenburger pleaded guilty to computer tampering in early 1992 and
|
|||
|
was fined $5,000 and required to perform community service.
|
|||
|
|
|||
|
The story lists another company, Pinkerton Security and
|
|||
|
Investigation Services, that was victimized by an Employee. Tammy
|
|||
|
Juse, 48, used the name "Tammy Gonzalez" to obtain a position in the
|
|||
|
accounting department in 1988. She accessed Pinkerton accounts at
|
|||
|
Security Pacific National Bank, and was discovered in 1990 to be
|
|||
|
embezzling from the accounts. She was sentenced to 27 months in prison
|
|||
|
for embezzling over $1 from the company:
|
|||
|
|
|||
|
Normally, a reconciliation of accounts would have caught the
|
|||
|
discrepancies. But Ms. Gonzalez was also supposed to do the
|
|||
|
reconciling, and somehow she didn't get around to it. At one
|
|||
|
point, it was nearly two years behind.
|
|||
|
|
|||
|
The story lists the usual dangers of security lapses in companies,
|
|||
|
including password problems, open computers, and other "people
|
|||
|
problems" that leave systems vulnerable. It also identifies illegal
|
|||
|
uses of company computers as a potential problem:
|
|||
|
|
|||
|
Sometimes it is the very advantages of computers, including speed
|
|||
|
and convenience of communication, that make them tempting tools
|
|||
|
of abuses. Late last year, officials at Charles Schwab, got a
|
|||
|
tip that a cocaine ring was flourishing among its headquarters
|
|||
|
employees in San Francisco. Hal Lipset, a private investigator
|
|||
|
hired by Schwab, soon discovered that sales were being arranged
|
|||
|
over Schwab's computer communications system.
|
|||
|
|
|||
|
Schwab officials secretly began monitoring the messages and
|
|||
|
copying them for evidence. Two employees who allegedly were
|
|||
|
selling drugs masked their messages by seeming to talk of tickets
|
|||
|
to sports events or about a game of pool called eightball. But
|
|||
|
according to one investigator, a "ticket" represented a half gram
|
|||
|
of cocaine for $40, and "eightball" represented 3 grams for about
|
|||
|
$280.
|
|||
|
..............
|
|||
|
An undercover man working for Mr. Lipset, in cooperation with San
|
|||
|
Francisco police, began buying cocaine to gather more evidence.
|
|||
|
In April, the police arrested two back-office workers at Schwab
|
|||
|
for drug dealing. Both pleaded guilty. Schwab has fired them as
|
|||
|
well as two others allegedly in the drug ring.
|
|||
|
|
|||
|
|
|||
|
The WSJ story nicely details the threats to security from those within
|
|||
|
the company entrusted to use and maintain them. Most "hackers"
|
|||
|
operating from the outside agree that poor security rather than
|
|||
|
external explorers are the greatest threat to company systems. It is
|
|||
|
refreshing to see the media recognize that the greatest potential for
|
|||
|
abuse comes from inside, and that the costs of computer crime are
|
|||
|
overwhelming created not by curious teenagers, but by predators who
|
|||
|
betray an employees trust.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 27 Sep 92 22:59:05 EDT
|
|||
|
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
|||
|
Subject: File 4--Software Piracy: A Felony?
|
|||
|
|
|||
|
Washington is currently considering a bill, S.893, which would expand
|
|||
|
felony provisions to all copyrighted materials, including computer
|
|||
|
software. The bill provides for felony convictions punishable by up
|
|||
|
to $250,000 in fines and two years in prison for willfully infringing
|
|||
|
on software copyrights in amounts exceeding retail amounts of $5,000.
|
|||
|
|
|||
|
The bill is currently under consideration by the House Intellectual
|
|||
|
Property and Judicial Administration Subcommittee, chaired by Rep.
|
|||
|
William Hughes. For more details see 'A Felonious Crime', Amy
|
|||
|
Cortese, INFORMATION WEEK, Sept 14,1992, p14
|
|||
|
|
|||
|
VIRUS SPREAD LESS THAN EXPECTED
|
|||
|
|
|||
|
A report released by IBM's High Integrity Computing Laboratory says
|
|||
|
that computer viruses are spreading slower than expected because
|
|||
|
assumptions made in earlier estimates haven't held true. Virus
|
|||
|
epidemics were predicted based on a "homogeneous mixing" theory
|
|||
|
modeled after the way diseases spread in humans. It turns out that
|
|||
|
despite all the computer networks, most viruses are spread via shared
|
|||
|
diskettes, which limits each computer's risk of exposure. (As
|
|||
|
reported in INFORMATION WEEK, Sept 14, 1992, p16)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 27 Sep 92 23:20:17 EDT
|
|||
|
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
|||
|
Subject: File 5--Hacker hits Cincinnati Phones
|
|||
|
|
|||
|
HACKER HITS CINCINNATI PHONES
|
|||
|
|
|||
|
A computer hacker apparently in the New York area broke the code into
|
|||
|
one of the Cincinnati, Ohio, phone trunk lines, building up a $65,000
|
|||
|
phone bill. Cincinnati city officials say the unknown invader racked
|
|||
|
up the charges last winter and spring by placing calls around the
|
|||
|
world.
|
|||
|
|
|||
|
David Chapman, the city's assistant superintendent for
|
|||
|
telecommunica-tions, said that investigators think the tap originated
|
|||
|
in the New York-New Jersey area, but they have no suspects and the
|
|||
|
investigation is considered closed.
|
|||
|
|
|||
|
Chapman added, "Apparently these people were pretty darn slick, but
|
|||
|
talking to the Secret Service, we were small potatoes. I understand
|
|||
|
there have been some major companies hit." (reprinted from STReport
|
|||
|
#8.38 with permission)
|
|||
|
|
|||
|
COMPUTER EXEC'S ENDORSE CLINTON FOR PRESIDENT
|
|||
|
|
|||
|
Thirty executives at a number of high-tech Silicon Valley firms
|
|||
|
--including Apple Computer, Hewlett Packard, National Semiconductor,
|
|||
|
Oracle Systems and Link Technologies -- have endorsed Democrat Bill
|
|||
|
Clinton in his bid for the White House.
|
|||
|
|
|||
|
"Many of us here are actually not Democrats but Republicans," said
|
|||
|
Apple CEO John Sculley. Sculley added the group believes Clinton can
|
|||
|
put the country "back in the forefront of leading the world again."
|
|||
|
|
|||
|
Oracle Systems CEO Lawrence Ellison said that the Democrat's economic
|
|||
|
plan is "why I am departing this year from my life-long support of the
|
|||
|
Republican Party to endorse the Clinton-Gore ticket."
|
|||
|
|
|||
|
Besides Sculley and Ellison, those endorsing Clinton include HP
|
|||
|
President/CEO John Young, as well as Gil Amelio, CEO of National
|
|||
|
Semiconductor; Dave Barram, vice president of Apple Computers; Gerry
|
|||
|
Beemiller, CEO of Infant Advantage; Chuck Boesenberg, CEO of Central
|
|||
|
Point Software; Dick Brass, president of Oracle Data Publishing; Chuck
|
|||
|
Comiso, president of Link Technologies.
|
|||
|
|
|||
|
Also: Gloria Rose Ott, president of GO Strategies; Ed McCracken, CEO
|
|||
|
of Silicon Graphics; Regis McKenna, chairman of Regis McKenna; Bill
|
|||
|
Miller, former CEO of SRI international, Sandy Robertson, general
|
|||
|
partner of Roberston, Colman and Stephans. (Reprinted from STReport
|
|||
|
#8.38 with permission)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.47
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|