868 lines
40 KiB
Plaintext
868 lines
40 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Sun Dec 13, 1992 Volume 4 : Issue 65
|
|||
|
ISSN 1066-652X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Copy Editor: Etaion Shrdlu, Junior
|
|||
|
|
|||
|
CONTENTS, #4.65 (Dec 13, 1992)
|
|||
|
File 1--DOJ Authorizes Keystroke Monitoring
|
|||
|
File 2--Teen "Computer Whiz" Strikes Store
|
|||
|
File 3--Enviro. Tech. Policy
|
|||
|
File 4--DELPHI Announces Full Access to the Internet
|
|||
|
File 5--Virus Destroyed Report on Drug Lord
|
|||
|
File 6--COM DAILY ON F.C.C. TRANSITION
|
|||
|
File 7--Virus Conference (ACMBUL) Call for Papers
|
|||
|
File 8--GRAY AREAS -- 'Zine Review
|
|||
|
File 9--Bibliography on codes and ciphers
|
|||
|
File 10--Comments on the Nov. 2600 Disruption in D.C.
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
|||
|
libraries; from America Online in the PC Telecom forum under
|
|||
|
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
|
|||
|
Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
|
|||
|
anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
|
|||
|
/pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
|
|||
|
(192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
|
|||
|
in /pub/text/CuD.
|
|||
|
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
|
|||
|
Back issues also may be obtained from the mail
|
|||
|
server at mailserv@batpad.lgb.ca.us.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Mon, 7 Dec 1992 22:48:06 +0000
|
|||
|
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
|||
|
Subject: File 1--DOJ Authorizes Keystroke Monitoring
|
|||
|
|
|||
|
CA-92:19 CERT Advisory
|
|||
|
December 7, 1992
|
|||
|
Keystroke Logging Banner
|
|||
|
|
|||
|
The CERT Coordination Center has received information from the United
|
|||
|
States Department of Justice, General Litigation and Legal Advice
|
|||
|
Section, Criminal Division, regarding keystroke monitoring by
|
|||
|
computer systems administrators, as a method of protecting computer
|
|||
|
systems from unauthorized access.
|
|||
|
|
|||
|
The information that follows is based on the Justice Department's
|
|||
|
advice to all federal agencies. CERT strongly suggests adding a
|
|||
|
notice banner such as the one included below to all systems. Sites
|
|||
|
not covered by U.S. law should consult their legal counsel.
|
|||
|
|
|||
|
+++++++++++++++++++
|
|||
|
|
|||
|
The legality of such monitoring is governed by 18 U.S.C. section
|
|||
|
2510 et seq. That statute was last amended in 1986, years before
|
|||
|
the words "virus" and "worm" became part of our everyday
|
|||
|
vocabulary. Therefore, not surprisingly, the statute does not
|
|||
|
directly address the propriety of keystroke monitoring by system
|
|||
|
administrators.
|
|||
|
|
|||
|
Attorneys for the Department have engaged in a review of the
|
|||
|
statute and its legislative history. We believe that such
|
|||
|
keystroke monitoring of intruders may be defensible under the
|
|||
|
statute. However, the statute does not expressly authorize such
|
|||
|
monitoring. Moreover, no court has yet had an opportunity to
|
|||
|
rule on this issue. If the courts were to decide that such
|
|||
|
monitoring is improper, it would potentially give rise to both
|
|||
|
criminal and civil liability for system administrators.
|
|||
|
Therefore, absent clear guidance from the courts, we believe it
|
|||
|
is advisable for system administrators who will be engaged in
|
|||
|
such monitoring to give notice to those who would be subject to
|
|||
|
monitoring that, by using the system, they are expressly
|
|||
|
consenting to such monitoring. Since it is important that
|
|||
|
unauthorized intruders be given notice, some form of banner
|
|||
|
notice at the time of signing on to the system is required.
|
|||
|
Simply providing written notice in advance to only authorized
|
|||
|
users will not be sufficient to place outside hackers on notice.
|
|||
|
|
|||
|
An agency's banner should give clear and unequivocal notice to
|
|||
|
intruders that by signing onto the system they are expressly
|
|||
|
consenting to such monitoring. The banner should also indicate
|
|||
|
to authorized users that they may be monitored during the effort
|
|||
|
to monitor the intruder (e.g., if a hacker is downloading a
|
|||
|
user's file, keystroke monitoring will intercept both the
|
|||
|
hacker's download command and the authorized user's file). We
|
|||
|
also understand that system administrators may in some cases
|
|||
|
monitor authorized users in the course of routine system
|
|||
|
maintenance. If this is the case, the banner should indicate
|
|||
|
this fact. An example of an appropriate banner might be as
|
|||
|
follows:
|
|||
|
|
|||
|
This system is for the use of authorized users only.
|
|||
|
Individuals using this computer system without authority,
|
|||
|
or in excess of their authority, are subject to having
|
|||
|
all of their activities on this system monitored and
|
|||
|
recorded by system personnel.
|
|||
|
|
|||
|
In the course of monitoring individuals improperly using
|
|||
|
this system, or in the course of system maintenance, the
|
|||
|
activities of authorized users may also be monitored.
|
|||
|
|
|||
|
Anyone using this system expressly consents to such
|
|||
|
monitoring and is advised that if such monitoring reveals
|
|||
|
possible evidence of criminal activity, system personnel
|
|||
|
may provide the evidence of such monitoring to law
|
|||
|
enforcement officials.
|
|||
|
|
|||
|
++++++++++++++++++++
|
|||
|
Each site using this suggested banner should tailor it to their
|
|||
|
precise needs. Any questions should be directed to your
|
|||
|
organization's legal counsel.
|
|||
|
|
|||
|
++++++++++++++++++++
|
|||
|
The CERT Coordination Center wishes to thank Robert S. Mueller, III,
|
|||
|
Scott Charney and Marty Stansell-Gamm from the United States
|
|||
|
Department of Justice for their help in preparing this Advisory.
|
|||
|
|
|||
|
If you believe that your system has been compromised, contact the
|
|||
|
CERT Coordination Center or your representative in FIRST (Forum of
|
|||
|
Incident Response and Security Teams).
|
|||
|
|
|||
|
Internet E-mail: cert@cert.org
|
|||
|
Telephone: 412-268-7090 (24-hour hotline)
|
|||
|
CERT personnel answer 7:30 a.m.-6:00 p.m. EST(GMT-5)/EDT(GMT-4),
|
|||
|
on call for emergencies during other hours.
|
|||
|
|
|||
|
CERT Coordination Center
|
|||
|
Software Engineering Institute
|
|||
|
Carnegie Mellon University
|
|||
|
Pittsburgh, PA 15213-3890
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 26 Nov 92 10:57:18 CST
|
|||
|
From: ICEMAN@CCU.UMANITOBA.CA
|
|||
|
Subject: File 2--Teen "Computer Whiz" Strikes Store
|
|||
|
|
|||
|
From--Winnipeg Free Press (Winnipeg,Manitoba,Canada) on Nov 26,1992:
|
|||
|
|
|||
|
STAFF THREATENED, FILES RUINED AS TEEN COMPUTER WHIZ STRIKES
|
|||
|
|
|||
|
By George Nikides
|
|||
|
Staff Reporter
|
|||
|
|
|||
|
A teen hacker uncovered a hole in a downtown software shop's
|
|||
|
computer system and went on a rampage, destroying every file and
|
|||
|
threatening employees.
|
|||
|
|
|||
|
"It's an ego thing. 'Boy look what i've accomplished,' " said
|
|||
|
Sgt. Dennis Loupin of the Winnipeg police fraud unit. "He's very,
|
|||
|
very intelligent. He's got a tremendous future in the computer world."
|
|||
|
|
|||
|
An 18 year-old, who can't be named because he's charged under the
|
|||
|
Young Offender's Act, faces fraud charges.
|
|||
|
|
|||
|
Police say a hacker discovered a "hole" - an opening that allows
|
|||
|
a user to circumvent a computer system's passwords - in the bulletin
|
|||
|
board program at Adventure Software Ltd., a Hargrave Street software
|
|||
|
shop.
|
|||
|
|
|||
|
The computer whiz unlocked the program several times, at one
|
|||
|
point destroying every file.
|
|||
|
|
|||
|
Bulletin Board
|
|||
|
|
|||
|
The hacking is believed to have been carried out with an
|
|||
|
IBM-style computer from a home.
|
|||
|
|
|||
|
Adventure Software offers a computer bulletin board where
|
|||
|
customers can communicate, read about news products, or leave messages
|
|||
|
from their home systems. The system has about 400 users, police say.
|
|||
|
|
|||
|
An Adventure Software employee, who asked not to be identified,
|
|||
|
said threatening messages were left in the system, some suggesting
|
|||
|
that selling software was immoral. Some messages attacked a store
|
|||
|
employee. The system was out of operation at one point for 3 1/2
|
|||
|
weeks, he said.
|
|||
|
|
|||
|
But the employee said police are overstating the hacker's skills.
|
|||
|
"It doesn't take a genius to hear about a 'hole' in the program," said
|
|||
|
the man.
|
|||
|
|
|||
|
The system was infiltrated four to six times, he said.
|
|||
|
|
|||
|
"It's not crippling. It's just extremely annoying, " the employee
|
|||
|
said. By breaking into the system the computer bandit found home
|
|||
|
phone numbers and addresses, he said.
|
|||
|
|
|||
|
Police say they are also investigating the teen in connection
|
|||
|
with break-ins at other systems across North America.
|
|||
|
|
|||
|
Mischief
|
|||
|
|
|||
|
"He's now going to have to face the consequences of something he
|
|||
|
thought was just a challenge but it's more than that - it's a crime, "
|
|||
|
said Loupin.
|
|||
|
|
|||
|
A Victor Street teenager was arrested Tuesday night and charged
|
|||
|
with using a computer service to commit mischief, an offence that
|
|||
|
carries a maximum 10-year sentence.
|
|||
|
|
|||
|
The teen is now 18, but police say he was 17 when the alleged
|
|||
|
crimes occured.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 4 Dec 1992 14:33:31 EDT
|
|||
|
From: Rick Crawford <crawford@CS.UCDAVIS.EDU>
|
|||
|
Subject: File 3--Enviro. Tech. Policy
|
|||
|
|
|||
|
Saw this on the net and found much of it relevant to various
|
|||
|
efforts to develop an explicit national technology policy
|
|||
|
(vs. a default, pork-barrel-driven policy vacuum).
|
|||
|
|
|||
|
-rick
|
|||
|
++++++++++
|
|||
|
|
|||
|
From--tgray@igc.apc.org (Tom Gray)
|
|||
|
Newsgroups--sci.environment
|
|||
|
Subject----Renewables Critical, Says WRI
|
|||
|
Date--2 Nov 92 15:49:00 GMT
|
|||
|
|
|||
|
RENEWABLE ENERGY 'ENVIRONMENTALLY CRITICAL', SAYS NEW WRI REPORT
|
|||
|
|
|||
|
Renewable energy technologies are part of a list of "environmentally
|
|||
|
critical" technologies that the federal government should support,
|
|||
|
according to a new report from the World Resources Institute, a
|
|||
|
Washington, DC, policy organization.
|
|||
|
|
|||
|
The report, entitled Backs to the Future: U.S. Government Policy
|
|||
|
Toward Environmentally Critical Technology, was authored by George
|
|||
|
Heatton and Robert Repetto, and is billed by the Institute as "the
|
|||
|
first attempt in this country to define and identify areas of
|
|||
|
technological advance that would markedly reduce the environmental
|
|||
|
burdens of economic progress."
|
|||
|
|
|||
|
The authors focus on government policy because it strongly influences
|
|||
|
the development of new technologies, "from research dollars and
|
|||
|
procurement decisions to infrastructure design and standard-setting,"
|
|||
|
an Institute news release added.
|
|||
|
|
|||
|
"Among the most promising environmental R&D areas," it said, " . . .
|
|||
|
are methods of non-fossil fuel energy production and use ... and
|
|||
|
hydrogen and other storage methods. Many such technologies, now in
|
|||
|
early stages of development, would yield large social returns from
|
|||
|
technical advances ... "
|
|||
|
|
|||
|
Backs to the Future's recommendations, the release said, include the
|
|||
|
creating of a national research and development (R&D) institute,
|
|||
|
altering the missions of the national laboratories, and changing
|
|||
|
criteria for funding environmental R&D.
|
|||
|
|
|||
|
Copies of Backs to the Future can be obtained for $9.95 plus $3
|
|||
|
shipping and handling from WRI Publications, PO Box 4852, Hampden
|
|||
|
Station, Baltimore, MD 21211, USA, phone (800) 822-0504.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 09 Dec 1992 00:13:55 -0500 (EST)
|
|||
|
From: "WALT HOWE, DELPHI INTERNET SIG MANAGER" <WALTHOWE@DELPHI.COM>
|
|||
|
Subject: File 4--DELPHI Announces Full Access to the Internet
|
|||
|
|
|||
|
FOR IMMEDIATE RELEASE:
|
|||
|
|
|||
|
DELPHI Online Service Announces Full Access to the Internet
|
|||
|
|
|||
|
Cambridge MA, December 9, 1992 -- DELPHI, an international online
|
|||
|
service, today announced full access to the Internet including
|
|||
|
real-time electronic mail, file transfers with "FTP," and remote
|
|||
|
log-ins to other Internet hosts using "Telnet." With this
|
|||
|
announcement, DELPHI becomes the only leading consumer online service
|
|||
|
to offer such a wide variety of Internet features.
|
|||
|
|
|||
|
Russell Williams, DELPHI's general manager, explains the significance
|
|||
|
of this announcement. "Prior to now, anyone interested in accessing
|
|||
|
the Internet had a very limited number of options. In most cases you
|
|||
|
had to be connected directly through your company or school. DELPHI
|
|||
|
is now an important low-cost access option available to home computer
|
|||
|
users. Anyone can connect to DELPHI with a local call from over 600
|
|||
|
cities and towns throughout the US and in many other countries."
|
|||
|
|
|||
|
The Internet is considered the world's largest computer network. It
|
|||
|
is comprised of thousands of companies, colleges, schools, government
|
|||
|
agencies, and other organizations. There are currently an estimated 4
|
|||
|
million users. "This incredible collection of resources will mean
|
|||
|
better and more specialized services for all users" adds Mr. Williams.
|
|||
|
"For example, users can take electronic courses conducted by leading
|
|||
|
universities, access databases and reports from government agencies,
|
|||
|
and get product information and support directly from companies. There
|
|||
|
are also mailing lists and discussion groups for almost every special
|
|||
|
interest imaginable. Electronic mail can be used to send private
|
|||
|
messages to anyone on the Internet and even many commercial networks
|
|||
|
like Compuserve and MCI Mail."
|
|||
|
|
|||
|
DELPHI's connection to the Internet works both ways: In addition to
|
|||
|
offering access out to other networks, DELPHI provides value-added
|
|||
|
services to people already on the Internet. Any user of the Internet
|
|||
|
can access DELPHI to use services such as Grolier's Academic American
|
|||
|
Encyclopedia, the Dictionary of Cultural Literacy, Reuters and UPI
|
|||
|
newswires, stock quotes, computer support, travel reservations,
|
|||
|
special interest groups, real-time conferencing, downloadable
|
|||
|
programs, and multi-player games. All these services can be reached
|
|||
|
through the Internet simply by joining DELPHI and then telnetting to
|
|||
|
the address "delphi.com" via the commercial Internet.
|
|||
|
|
|||
|
In order to help new users with questions related to the Internet,
|
|||
|
DELPHI has an area online to provide support. The Internet Special
|
|||
|
Interest Group (SIG) includes an active message forum where members
|
|||
|
and staff can exchange useful information. Comprehensive guide books,
|
|||
|
downloadable software, and information files are also available.
|
|||
|
|
|||
|
DELPHI has two membership plans: the 10/4 Plan is $10 per month and
|
|||
|
includes the first 4 hours of use; additional use is $4 per hour. The
|
|||
|
20/20 Advantage Plan is $20 per month, includes 20 hours of use, and
|
|||
|
is only $1.80 per hour for additional time. The Internet service
|
|||
|
option is an extra $3 per month and includes a generous transfer
|
|||
|
allocation of 10 megabytes (the equivalent of about 3,000 type-written
|
|||
|
pages). Access during business hours via Sprintnet or Tymnet carries
|
|||
|
a surcharge.
|
|||
|
|
|||
|
Through a special trial membership offer, anyone interested in
|
|||
|
learning more about DELPHI and the Internet can receive 5 hours of
|
|||
|
access for free. To join, dial by modem, 1-800-365-4636 (current
|
|||
|
Internet users should telnet to "delphi.com" instead). After
|
|||
|
connecting, press return once or twice. At the Username prompt, enter
|
|||
|
JOINDELPHI and at the password prompt, type INTERNETSIG. DELPHI Member
|
|||
|
Service Representatives can also be reached by voice at
|
|||
|
1-800-695-4005.
|
|||
|
|
|||
|
DELPHI is a service of General Videotex Corporation, a leading
|
|||
|
developer of interactive and online services based in Cambridge,
|
|||
|
Massachusetts. For more information, call either of the above numbers
|
|||
|
or send email to Walt Howe, Internet SIG manager at
|
|||
|
walthowe@delphi.com.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 05 Dec 92 15:51:46 EST
|
|||
|
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
|||
|
Subject: File 5--Virus Destroyed Report on Drug Lord
|
|||
|
|
|||
|
Virus Destroyed Report on Drug Lord Say Colombian Officials
|
|||
|
|
|||
|
Colombian politicians allege a mysterious computer virus this week
|
|||
|
wiped out conclusions of a Senate investigation into the jailbreak of
|
|||
|
cocaine king Pablo Escobar just hours before the data was due to be
|
|||
|
presented.
|
|||
|
|
|||
|
Reports from various committee members call the virus the "ghost of
|
|||
|
La Catedral," a reference to the prison from which Escobar and nine
|
|||
|
of his lieutenants escaped on July 22 during a bungled military
|
|||
|
operation to transfer them to another prison.
|
|||
|
|
|||
|
"The committee's conclusions, reached after more than two months of
|
|||
|
investigation, supposedly held top military officials, ministers and
|
|||
|
former ministers responsible for the escape." REPRINTED FROM STREPORT
|
|||
|
#8.46 WITH PERMISSION
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 8 Dec 1992 12:27:28 CST
|
|||
|
From: LOVE%TEMPLEVM@PSUVM.PSU.EDU
|
|||
|
Subject: File 6--COM DAILY ON F.C.C. TRANSITION
|
|||
|
|
|||
|
From Discussion of Government Document Issues <GOVDOC-L@PSUVM.BITNET>
|
|||
|
|
|||
|
* Communications Daily article on Clinton transition
|
|||
|
appointment for Federal Communications Commission
|
|||
|
(F.C.C.)
|
|||
|
|
|||
|
The following article, written by Art Brodsky (202/872-9202, x252), is
|
|||
|
reprinted from the December 7, 1992 issue of Communications Daily,
|
|||
|
with permission. Communications Daily is published by Warren
|
|||
|
Publishing, Inc., 2115 Ward Court, N.W. Washington, DC 20037.
|
|||
|
|
|||
|
%Far End of Spectrum'
|
|||
|
|
|||
|
PLESSER TRANSITION APPOINTMENT DRAWS FIRE
|
|||
|
|
|||
|
Public interest groups friday criticized naming of Washington
|
|||
|
attorney Ronald Plesser to head up communications issues for Clinton
|
|||
|
transition effort (CD Dec4, p1). Groups said Plesser, partner in
|
|||
|
Washington office of Baltimore law firm Piper & Marbury, represents
|
|||
|
clients that characterize Washington special interests. As might be
|
|||
|
expected, Plesser's appointment was defended by Clinton confidants.
|
|||
|
|
|||
|
Plesser will head one of 2 groups in science and technology
|
|||
|
transition section led by ex-astronaut Sally Ride. Other group in
|
|||
|
Ride's section will evaluate hard science agencies such as NASA and
|
|||
|
National Science Foundation. Those transition groups were established
|
|||
|
to assess policies and agencies, not to make appointment
|
|||
|
recommendations. Personnel matters for permanent jobs are to be
|
|||
|
handled by ex-S.C. Gov. Richard Riley (CD Nov 20 p1).
|
|||
|
|
|||
|
Clinton confidants praised Plesser's designation. "He's the
|
|||
|
right guy," we were told. "He'll take a snapshot of the agency,"
|
|||
|
covering budget needs, personnel and similar matters. Transition team
|
|||
|
"will look to Ron for insights. He's the guy." Referring to much
|
|||
|
speculation in press about what Clinton has in mind and who his
|
|||
|
appointments might be, source said: "I wonder what on earth motivates
|
|||
|
some of this stuff...most of which is wildly inaccurate."
|
|||
|
|
|||
|
Most criticism of Plesser centers on his advocacy on behalf of
|
|||
|
Direct Marketing Assn. (DMA) and Information Industry Assn. (IIA),
|
|||
|
particularly for advocating private sector control of databases
|
|||
|
constructed by public agencies. Taxpayer Assets Project Dir. James
|
|||
|
Love said Plesser "himself is the architect of the basic privatization
|
|||
|
policies that came about in the Reagan Administration." Plesser, he
|
|||
|
said, is "most ferocious opponent of librarians, citizen groups and
|
|||
|
the research community, who want to broaden public access to
|
|||
|
government, taxpayer-supported information systems. He's the devil
|
|||
|
himself when it comes to government information policy."
|
|||
|
|
|||
|
Similarly, Marc Rotenberg, dir. of Washington office of Computer
|
|||
|
Professionals for Social Responsibility (CPSR), said that "while there
|
|||
|
is personal regard for Ron Plesser, there is not happiness about this
|
|||
|
decision." Rotenberg said that Plesser's clients have great deal at
|
|||
|
stake at FCC, including decisions on 800 number portability and
|
|||
|
automatic number identification (ANI) that affect direct marketers, as
|
|||
|
well as on video dial tone and access to networks. Plesser represents
|
|||
|
"a far end of the spectrum in the policy debates," Rotenberg said. He
|
|||
|
said CPSR's main concerns are in areas of privacy protection, public
|
|||
|
access to govt. information, communications infrastructure. In each
|
|||
|
of those areas, "Ron has been from our viewpoint on the opposite side
|
|||
|
of the issue."
|
|||
|
|
|||
|
Rotenberg said that if transition effort is merely to be brief
|
|||
|
fact-finding exercise, Clinton team could have sought out "someone
|
|||
|
with less bias," perhaps in academic community. Jeff Chester, co-dir.
|
|||
|
of Center for Media Education, said his group is "very concerned"
|
|||
|
about Plesser because "of the special interest lobbying baggage he
|
|||
|
carries with him." Chester said his group believes that Plesser's
|
|||
|
appointment "places an extra burden, a double duty on the Clinton
|
|||
|
Administration, to find people for the FCC and other
|
|||
|
telecommunications policy positions who don't come with any kind of
|
|||
|
lobbying baggage and reflect the kind of public interest concerns the
|
|||
|
Commission definitely needs."
|
|||
|
|
|||
|
Transition team still having difficulty deciding how to apply its
|
|||
|
proposed tough ethics requirements for Presidential appointees (CD Nov
|
|||
|
5 p1). There's still been no decision as "to how deep the 5-year
|
|||
|
restriction will be applied," we're told. That means, according to
|
|||
|
sources, restrictions--when they finally come out--may not go below
|
|||
|
Cabinet level. As for FCC appointees and top staffers (such as bureau
|
|||
|
chiefs) brought in, it hasn't been decided whether attempt will be
|
|||
|
made to extend period they couldn't practice or lobby agency to 5
|
|||
|
years from one year. Proposal has been roundly criticized by
|
|||
|
Democrats who are know to be, or expect to be, in line for top jobs in
|
|||
|
Clinton Administration.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 10 Dec 92 17:28:07 EST
|
|||
|
From: sara@GATOR.USE.COM(Sara Gordon)
|
|||
|
Subject: File 7--Virus Conference (ACMBUL) Call for Papers
|
|||
|
|
|||
|
C A L L F O R P A P E R S
|
|||
|
|
|||
|
ACMBUL's 1st INTERNATIONAL COMPUTER VIRUS PROBLEMS AND
|
|||
|
ALTERNATIVES CONFERENCE
|
|||
|
|
|||
|
April, 1993 - Varna, Bulgaria
|
|||
|
|
|||
|
The purpose of the 1993 International Computer Virus Conference is to
|
|||
|
provide a forum for anti-virus product developers, researchers and
|
|||
|
academicians to exchange information among themselves, the students,
|
|||
|
the public and the industry. ICVC'93 will consist of open forums,
|
|||
|
distinguished keynote speakers, and the presentation of high-quality
|
|||
|
accepted papers. A high degree of interaction and discussion among
|
|||
|
Conference participants is expected, as a workshop-like setting is
|
|||
|
promoted.
|
|||
|
|
|||
|
Because ICVC'93 is a not-for-profit activity funded primarily by
|
|||
|
registration fees, all participants are expected to have their
|
|||
|
organizations bear the costs of their expenses and registration.
|
|||
|
Accommodations will be available at reduced rates for conference
|
|||
|
participants.
|
|||
|
|
|||
|
WHO SHOULD ATTEND
|
|||
|
|
|||
|
The conference is intended for computer security researchers,
|
|||
|
managers, advisors, EDP auditors, network administrators, and help
|
|||
|
desk personnel from government and industry, as well as other
|
|||
|
information technology professionals interested in computer security.
|
|||
|
|
|||
|
CONFERENCE THEME
|
|||
|
|
|||
|
This Conference, devoted to advances in virus prevention, will
|
|||
|
encompass developments in both theory and practice. Papers are
|
|||
|
invited in the areas shown and may be theoretical, conceptual,
|
|||
|
tutorial or descriptive in nature. Submitted papers will be refereed,
|
|||
|
and those presented at the Conference will be included in the
|
|||
|
proceedings.
|
|||
|
|
|||
|
Possible topics of submissions include, but are not restricted to:
|
|||
|
|
|||
|
o Virus Detection o Virus Trends and Forecast
|
|||
|
o Virus Removal o Virus Prevention Policies
|
|||
|
o Recovering from Viruses o Incident Reporting
|
|||
|
o Viruses on various platforms o Emergency Response
|
|||
|
(Windows, Unix, LANs, WANs, etc.) o Viruses and the Law
|
|||
|
o Virus Genealogy o Education & Training
|
|||
|
o The "Virusology" as scientific o Costs of virus protection
|
|||
|
discipline o Communications and viruses
|
|||
|
o Psychological aspects of computer
|
|||
|
viruses
|
|||
|
|
|||
|
THE REFEREEING PROCESS
|
|||
|
|
|||
|
All papers and panel proposals received by the submission deadline and
|
|||
|
which meet submission requirements will be considered for presentation
|
|||
|
at the Conference.
|
|||
|
|
|||
|
All papers presented at ICVC'93 will be included in the Conference
|
|||
|
proceedings, copies of which will be provided to Conference attendees.
|
|||
|
All papers presented, will also be included in proceedings to be published
|
|||
|
by the ACMBUL.
|
|||
|
|
|||
|
INSTRUCTIONS TO AUTHORS
|
|||
|
|
|||
|
[1] Two (2) copies of the full paper, consisting of up-to 20
|
|||
|
double-spaced, typewritten quality pages, including diagrams, must
|
|||
|
be received no later than 28 February 1993.
|
|||
|
|
|||
|
[2] The language of the Conference is English.
|
|||
|
|
|||
|
[3] The first page of the manuscript should include the title of
|
|||
|
the paper, full name of all authors, their complete addresses
|
|||
|
including affiliation, telephone numbers and e-mail addresses,
|
|||
|
as well as an abstract of the paper.
|
|||
|
|
|||
|
[4] Authors willing to submit their manuscripts electronically
|
|||
|
should contact the Organizering Committee at the address below.
|
|||
|
|
|||
|
IMPORTANT DATES
|
|||
|
|
|||
|
o Full papers to be received in camera-ready form by the Organizing
|
|||
|
Committee by 28 February 1993.
|
|||
|
|
|||
|
o Notification of accepted papers will be mailed to the author on
|
|||
|
or before 10 March 1993.
|
|||
|
|
|||
|
o Conference: 5-11 April 1993, St. Konstantine Resort, Varna, Bulgaria
|
|||
|
|
|||
|
WHOM TO CONTACT
|
|||
|
|
|||
|
Questions or matters related to the Conference Program should be directed
|
|||
|
to the ACMBUL:
|
|||
|
|
|||
|
ICVC'93
|
|||
|
Attn: Mr. Nickolay Lyutov
|
|||
|
ACMBUL Office
|
|||
|
Varna University of Economics
|
|||
|
77 Boris I Blvd, 9002 P.O.Box 3
|
|||
|
Varna
|
|||
|
Bulgaria
|
|||
|
|
|||
|
Telephone/Fax: +359-52-236213
|
|||
|
|
|||
|
ICVC93@acmbul.bg
|
|||
|
|
|||
|
+++++
|
|||
|
# "talk to me about computer viruses............"
|
|||
|
# fax/voice: 219-277-8599 sara@gator.use.com
|
|||
|
# data 219-273-2431 SGordon@Dockmaster.ncsc.mil
|
|||
|
# fidomail 1:227/190 vfr@netcom.com
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 13 Dec 92 20:38:01 EST
|
|||
|
From: Moderators <Cudigest@mindvox.phantom.com>
|
|||
|
Subject: File 8--GRAY AREAS -- 'Zine Review
|
|||
|
|
|||
|
We've come across another new periodical, GRAY AREAS, that promises to
|
|||
|
be a useful resource for anybody interested in counter-culture or
|
|||
|
alternative lifestyles. As the name implies, GRAY AREAS intends to
|
|||
|
focus on a broad range of topics that normally fall between the cracks
|
|||
|
of conventional magazines, especially in the realm of technology,
|
|||
|
music, video, art, and other snippets of (unconventional) culture.
|
|||
|
According to the editorial statement of purpose:
|
|||
|
|
|||
|
GRAY AREAS exists to examine the gray areas of life. We hope
|
|||
|
to unite people involved in all sorts of alternative
|
|||
|
lifestyles and deviant subcultures. We are everywhere! We
|
|||
|
feel that the government has done a great job of splitting
|
|||
|
people up so that we do not identify with other minority
|
|||
|
groups anymore. There are so many causes now that we often
|
|||
|
do not talk to others not directly involved in our chosen
|
|||
|
causes. We believe that the methods used to catch criminals
|
|||
|
are the same regardless of the crime and that much can be
|
|||
|
learned by studying how crimes in general are prosecuted and
|
|||
|
how people's morals are judged. It is our mission to educate
|
|||
|
people so they begin to care more about the world around
|
|||
|
them. Please join our efforts by subscribing, advertising
|
|||
|
your business with us and by spreading the word about what
|
|||
|
we're up to.
|
|||
|
|
|||
|
The first issue (Fall, 1992) includes snippets of news, reviews of
|
|||
|
books, alternative magazines, music, and videos, and other nifty
|
|||
|
esoteria. Two feature-interviews captivated us. The first, with John
|
|||
|
Barlow (by editor and publisher Netta Gilboa), is incisive and ranges
|
|||
|
from The Grateful Dead to the EFF. The second, also by Gilboa, is
|
|||
|
with former "X-rated" movie queen Kay Parker. The latter is a
|
|||
|
sensitive look at the changes she has gone through in the past 20
|
|||
|
years. The tenor of both interviews, as with much of the magazine
|
|||
|
itself, is about personal and social transformation as we, and
|
|||
|
society, move through a succession of phases as we age and change.
|
|||
|
|
|||
|
Upcoming features include an article on Howard Stern (New York
|
|||
|
"shock-DJ"), audio sampling, law enforcement search & seizure,
|
|||
|
interviews with John Trubee about prank phone calls, Jefferson
|
|||
|
Airplane/Hot Tuna guitarist Jorma Kaukonen, porn director Candida
|
|||
|
Royalle, criminal attorney and professional musician Barry Melton (an
|
|||
|
original member of Country Joe & The Fish), and an interview with Bob
|
|||
|
Dobbs. Some of the items reviewed in issue 2 will include a tape sold
|
|||
|
to police departments on how to seize computers, and Bruce Sterling's
|
|||
|
_Speaking_ _For_ _The_ _Unspeakable_, Mystic Fire's _Cyberpunk_.
|
|||
|
|
|||
|
The editors also plan to include an on-going series on viruses
|
|||
|
and offer anonymity to virus writers and software crackers willing to
|
|||
|
discuss their views of the issues.
|
|||
|
|
|||
|
The type of topics--rock music, films, off-beat cultural
|
|||
|
interests--are the type that easily encourage fluff pieces and
|
|||
|
superficial treatment. But, if the first issue of GRAY AREAS is
|
|||
|
representative of what's to follow, there will be no fluff here. The
|
|||
|
'Zine seems targeted to BBWBs (baby-boomers with brains) and appears
|
|||
|
intended to reflect changing times with commentary and analysis by
|
|||
|
those making the changes.
|
|||
|
|
|||
|
A one-year (four issue) subscription is available for $18 (US) or $24
|
|||
|
(foreign), and a twelve-issue sub is $50 (US) or $75 (foreign). The
|
|||
|
editors, Netta Gilboa and Alan Sheckter, can be contacted through
|
|||
|
e-mail at GRAYAREA@WELL.SF.CA.US
|
|||
|
|
|||
|
For subscriptions, submissions, or other information, write:
|
|||
|
GRAY AREAS
|
|||
|
PO Box 808
|
|||
|
Broomall, PA 19008-0808
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 6 Dec 92 07:47 EST
|
|||
|
From: "Michael E. Marotta" <MERCURY@LCC.EDU>
|
|||
|
Subject: File 9--Bibliography on codes and ciphers
|
|||
|
|
|||
|
number 006 CLACKER'S DIGEST December 6, 1992.
|
|||
|
philosophy and applications for analytical engines
|
|||
|
+++++++++++++++++++++++++
|
|||
|
A Cryptography Bibliography by mercury@well.sf.ca.us
|
|||
|
|
|||
|
(Technically, cryptography is MAKING codes while cryptanalysis is
|
|||
|
BREAKING them. Both are subsumed under cryptology. A CIPHER is a
|
|||
|
regular transposition such as A=Z, B=Y, etc., while a CODE is a table
|
|||
|
of arbitrary symbols.)
|
|||
|
|
|||
|
Kahn, David, THE CODEBREAKERS, MacMillan, 1967. The MOST complete
|
|||
|
history with specific examples. Written before public keys, RSA,
|
|||
|
etc., but still THE place to start.
|
|||
|
|
|||
|
Marotta, Michael, THE CODE BOOK, Loompanics, 1987, Overview of history
|
|||
|
and post-1967 developments.
|
|||
|
|
|||
|
Sinkov, Abraham, ELEMENTARY CRYPTANALYSIS: A MATHEMATICAL APPROACH,
|
|||
|
Random House, 1968. Sinkov worked for Friedman on the breaking of
|
|||
|
Purple. First rate.
|
|||
|
|
|||
|
Gaines, Helen Fouche, CRYPTANALYSIS, Dover, 1956. A classic work. The
|
|||
|
first step to breaking codes and ciphers.
|
|||
|
|
|||
|
Lysing, Henry, SECRET WRITING, Dover, 1974. Another reprint of
|
|||
|
another classic.
|
|||
|
|
|||
|
Smith, Laurence Dwight, CRYPTOGRAPHY, Dover, 1955. Ditto.
|
|||
|
|
|||
|
Konheim, Alan G., CRYPTOGRAPHY: A PRIMER, John Wiley, 1981. Textbook
|
|||
|
for mathematicians from IBM's Watson Center. Includes public keys,
|
|||
|
digital signatures.
|
|||
|
|
|||
|
Meyer, Carl H., and Matyas Stephen M., CRYPTOGRAPHY, John Wiley, 1982.
|
|||
|
From IBM Cryptography Competency Center. For computers, includes
|
|||
|
public keys, digital signatures.
|
|||
|
|
|||
|
Weber, Ralph E., UNITED STATES DIPLOMATIC CODES AND CIPHERS 1775-1938,
|
|||
|
Precedent, 1979. Not just a history! The appendix contains the
|
|||
|
all the keys!!
|
|||
|
|
|||
|
Chadwick, THE DECIPHERMENT OF LINEAR B, Vintage, 1958. Worked with
|
|||
|
Michael Ventris on unraveling Minoan script.
|
|||
|
|
|||
|
Yardley, Herbert O., THE AMERICAN BLACK CHAMBER, Ballantine 1981,
|
|||
|
Random House, 1931. Yardley broke German ciphers in WWI and then
|
|||
|
Japanese ciphers of 1920, and was fired in 1931 because "Gentlemen
|
|||
|
don't read each other's mail."
|
|||
|
|
|||
|
(anonymous), THE DATA ENCRYPTION STANDARD, National Bureau of
|
|||
|
Standards, January 1977, NTIS NBS-FIPS PUB 46.
|
|||
|
|
|||
|
(anonymous), DATA SECURITY AND THE DATA ENCRYPTION STANDARD,
|
|||
|
|
|||
|
National Bureau of Standards, 1978, Pub 500-27; CODEN: XNBSAV.
|
|||
|
|
|||
|
Rivest, Ronald L., Shamir, A., and Adleman, L., "A Method for
|
|||
|
Obtaining Digital Signatures and Public-key Cryptosystems,"
|
|||
|
COMMUNICATIONS OF THE ACM, February, 1979. The last word.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 13 Dec 92 14:00:21 EST
|
|||
|
From: Emmanuel Goldstein <emmanuel@well.sf.ca.us>
|
|||
|
Subject: File 10--Comments on the Nov. 2600 Disruption in D.C.
|
|||
|
|
|||
|
((MODERATORS' NOTE: Following is a letter to the editor of the
|
|||
|
Washington Post that they chose not to print as a "Viewpoint."
|
|||
|
The author, Emmanuel Goldstein, is editor of the magazine 2600,
|
|||
|
which can be contacted at 2600 Magazine - PO Box 752 -
|
|||
|
Middle Island, NY 11953. A yearly subscription is only $21 (US)).
|
|||
|
|
|||
|
While managing to convey some of the facts concerning the Pentagon
|
|||
|
City Mall hacker incident on November 6, "Hackers Allege Harassment at
|
|||
|
Mall" (November 13, page A1) fails to focus on the startling
|
|||
|
revelation of federal government involvement and the ominous
|
|||
|
implications of such an action. The article also does little to lessen
|
|||
|
the near hysteria that is pumped into the general public every time
|
|||
|
the word "hacker" is mentioned. Let us take a good look at what has
|
|||
|
been confirmed so far. A group of computer hackers gathered at a local
|
|||
|
mall as they do once a month. Similar meetings have been going on in
|
|||
|
other cities for years without incident. This gathering was not for
|
|||
|
the purposes of causing trouble and nobody has accused the hackers of
|
|||
|
doing anything wrong. Rather, the gathering was simply a place to meet
|
|||
|
and socialize. This is what people seem to do in food courts and it
|
|||
|
was the hackers' intention to do nothing more.
|
|||
|
|
|||
|
When mall security personnel surrounded the group and demanded that
|
|||
|
they all submit to a search, it became very clear that something
|
|||
|
bizarre was happening. Those who resisted were threatened with arrest.
|
|||
|
Everyone's names were written down, everyone's bags gone through. One
|
|||
|
person attempted to write down the badge numbers of the people doing
|
|||
|
this. The list was snatched out of his hand and ripped to pieces.
|
|||
|
Another hacker attempted to catch the episode on film. He was
|
|||
|
apprehended and the film was ripped from his camera. School books,
|
|||
|
notepads, and personal property were seized. Much of it has still not
|
|||
|
been returned. The group was held for close to an hour and then told
|
|||
|
to stay out of the mall or be arrested.
|
|||
|
|
|||
|
This kind of treatment is enough to shock most people, particularly
|
|||
|
when coupled with the overwhelming evidence and eyewitness accounts
|
|||
|
confirming no unusual or disruptive behavior on the part of the group.
|
|||
|
It is against everything that our society stands for to subject people
|
|||
|
to random searches and official intimidation, simply because of their
|
|||
|
interests, lifestyles, or the way they look. This occurrence alone
|
|||
|
would warrant condemnation of a blatant abuse of power. But the story
|
|||
|
doesn't end there.
|
|||
|
|
|||
|
The harassment of the hackers by the mall police was only the most
|
|||
|
obvious element. Where the most attention should be focused at this
|
|||
|
point is on the United States Secret Service which, according to Al
|
|||
|
Johnson, head of mall security, "ramrodded" the whole thing. Other
|
|||
|
media sources, such as the industry newsletter Communications Daily,
|
|||
|
were told by Johnson that the Secret Service was all over the mall
|
|||
|
that day and that they had, in effect, ordered the harassment.
|
|||
|
Arlington police confirm that the Secret Service was at the mall that
|
|||
|
day.
|
|||
|
|
|||
|
It is understood that the Secret Service, as a branch of the Treasury
|
|||
|
Department, investigates credit card fraud. Credit card fraud, in
|
|||
|
turn, can be accomplished through computer crime. Some computer
|
|||
|
hackers could conceivably use their talents to accomplish computer
|
|||
|
crime. Thus we arrive at the current Secret Service policy, which
|
|||
|
appears to treat everybody in the hacker world as if they were a
|
|||
|
proven counterfeiter. This feeling is grounded in misperceptions and
|
|||
|
an apprehension that borders on panic. Not helping the situation any
|
|||
|
is the everpresent generation gap - most hackers are young and most
|
|||
|
government officials are not.
|
|||
|
|
|||
|
Apart from being disturbed by the gross generalizations that comprise
|
|||
|
their policy, it seems a tremendous waste of resources to use our
|
|||
|
Secret Service to spy on public gatherings in shopping malls. It seems
|
|||
|
certain to be a violation of our rights to allow them to disrupt these
|
|||
|
meetings and intimidate the participants, albeit indirectly. Like any
|
|||
|
other governmental agency, it is expected that the Secret Service
|
|||
|
follow the rules and not violate the constitutional rights of
|
|||
|
citizens.
|
|||
|
|
|||
|
If such actions are not publicly condemned, we will in effect be
|
|||
|
granting a license for their continuance and expansion. The incident
|
|||
|
above sounds like something from the darkest days of the Soviet Union
|
|||
|
when human rights activists were intimidated by government agents and
|
|||
|
their subordinates. True, these are technology enthusiasts, not
|
|||
|
activists. But who they are is not the issue. We cannot permit
|
|||
|
governmental abuse of any person or group simply because they may be
|
|||
|
controversial.
|
|||
|
|
|||
|
Why do hackers evoke such controversy? Their mere presence is an
|
|||
|
inconvenience to those who want so desperately to believe the emperor
|
|||
|
is wearing clothes. Hackers have a tendency of pointing out the
|
|||
|
obvious inadequacies of the computer systems we entrust with such a
|
|||
|
large and growing part of our lives. Many people don't want to be told
|
|||
|
how flimsily these various systems are held together and how so much
|
|||
|
personal data is readily available to so many. Because hackers manage
|
|||
|
to demonstrate how simple it is to get and manipulate this
|
|||
|
information, they are held fully responsible for the security holes
|
|||
|
themselves. But, contrary to most media perceptions, hackers have very
|
|||
|
little interest in looking at other people's personal files.
|
|||
|
Ironically, they tend to value privacy more than the rest of us
|
|||
|
because they know firsthand how vulnerable it is. Over the years,
|
|||
|
hackers have gone to the media to expose weaknesses in our credit
|
|||
|
reporting agencies, the grading system for New York City public
|
|||
|
schools, military computer systems, voice mail systems, and even
|
|||
|
commonly used pushbutton locks that give a false sense of security.
|
|||
|
Not one of these examples resulted in significant media attention and,
|
|||
|
consequently, adequate security was either delayed or not implemented
|
|||
|
at all. Conversely, whenever the government chooses to prosecute a
|
|||
|
hacker, most media attention focuses on what the hacker "could have
|
|||
|
done" had he been malicious. This reinforces the inaccurate depiction
|
|||
|
of hackers as the major threat to our privacy and completely ignores
|
|||
|
the failure of the system itself.
|
|||
|
|
|||
|
By coming out publicly and meeting with other hackers and non-hackers
|
|||
|
in an open atmosphere, we have dispelled many of the myths and helped
|
|||
|
foster an environment conducive to learning. But the message we
|
|||
|
received at the Pentagon City Mall tells us to hide, be secretive, and
|
|||
|
not trust anybody. Perhaps that's how the Secret Service wants hackers
|
|||
|
to behave. But we are not criminals and we refuse to act as such
|
|||
|
simply because we are perceived that way by uninformed bureaucrats.
|
|||
|
|
|||
|
Regardless of our individual outlooks on the hacker issue, we should
|
|||
|
be outraged and extremely frightened to see the Secret Service act as
|
|||
|
they did. Whether or not we believe that hackers are decent people, we
|
|||
|
must agree that they are entitled to the same constitutional freedoms
|
|||
|
the rest of us take for granted. Any less is tantamount to a very
|
|||
|
dangerous and ill-advised precedent.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.65
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|