810 lines
37 KiB
Plaintext
810 lines
37 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Wed June 23 1993 Volume 5 : Issue 46
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Copy Editor: Etaoin Shrdlu, Seniur
|
|||
|
|
|||
|
CONTENTS, #5.46 (June 23 1993)
|
|||
|
File 1--Re: File 6--Course on "Politics and Technology"
|
|||
|
File 2--A public experiment in how private our lives really are
|
|||
|
File 3--AB1624/Calif Legislature Computer Access -- Full Text
|
|||
|
File 4--Summercon Synopsis & Playful Precis
|
|||
|
File 5--Defense Contractor Attacks Full Disclosure (Reprint) (#1)
|
|||
|
File 6--The "Offending" Full Disclosure Story (#2)
|
|||
|
File 7--The Harris Letter Threatening Litigation against FD (#3)
|
|||
|
File 8--The Full Disclosure Atty's Response to Harris (#4)
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|||
|
WHQ) 203-832-8441 NUP:Conspiracy
|
|||
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|||
|
nodes and points welcome.
|
|||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Mon, 21 Jun 93 14:00:26 EDT
|
|||
|
From: phyland@ESSENTIAL.ORG(Paul Hyland)
|
|||
|
Subject: File 1--Re: File 6--Course on "Politics and Technology"
|
|||
|
|
|||
|
CPSR distributes for $10 (I think) a list of Course Syllabi on
|
|||
|
Computers and Society, written by Terry Winograd and Batya Friedman.
|
|||
|
Ordering information can be obtained in the file cpsr.books at the
|
|||
|
info server cpsr.org (listserv/ftp/gopher/wais), or write to the
|
|||
|
national office at cpsr@cpsr.org.
|
|||
|
|
|||
|
There are many other files there that chould be helpful to you in the
|
|||
|
preparation of your class materials.
|
|||
|
|
|||
|
Paul Hyland phyland@gwuvm.gwu.edu or essential.org
|
|||
|
Moderator, CPSR List cpsr@gwuvm.gwu.edu
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 21 Jun 93 14:41:58 -0700
|
|||
|
From: gnu@TOAD.COM
|
|||
|
Subject: File 2--A public experiment in how private our lives really are
|
|||
|
|
|||
|
A reported has asked me for help in finding people who will help to
|
|||
|
penetrate the privacy of four volunteers, for a major newspaper story.
|
|||
|
|
|||
|
Any takers? Contact the reporter:
|
|||
|
|
|||
|
Reporter for major metro paper is interested in help finding out
|
|||
|
anything there is to find on four prominent people who have
|
|||
|
volunteered to have their privacy breached.
|
|||
|
|
|||
|
Financial fundamentals. Lives of crime. Aches and pains. How rich
|
|||
|
they are, where they vacation, who they socialize with. You name it,
|
|||
|
we're interested in seeing if it's out there.
|
|||
|
|
|||
|
All for a good cause.
|
|||
|
If you're willing to advise this computer-ignorant reporter, or dig
|
|||
|
in and get the dope on these volunteers, please contact him at
|
|||
|
tye@nws.globe.com
|
|||
|
Or call at +1 617 929 3342. Soon.
|
|||
|
|
|||
|
Thanks.
|
|||
|
|
|||
|
Feel free to forward this far and wide.
|
|||
|
--
|
|||
|
John Gilmore gnu@toad.com -- gnu@cygnus.com -- gnu@eff.org
|
|||
|
Creating freedom, rather than longer chains, bigger cages, better meals, . . .
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 22 Jun 1993 03:54:09 GMT
|
|||
|
From: kiddyr@GALLANT.APPLE.COM(Ray Kiddy)
|
|||
|
Subject: File 3--AB1624/Calif Legislature Computer Access -- Full Text
|
|||
|
|
|||
|
Well, it has changed and it is definitely an improvement. so, without
|
|||
|
further ado, the full text of AB1624.
|
|||
|
|
|||
|
AMENDED IN SENATE JUNE 17, 1993
|
|||
|
AMENDED IN ASSEMBLY MAY 18, 1993
|
|||
|
CALIFORNIA LEGISLATURE--1993-94 REGULAR SESSION
|
|||
|
|
|||
|
ASSEMBLY BILL No. 1624
|
|||
|
|
|||
|
Introduced by Assembly Member Bowen
|
|||
|
(Principal coauthor: Senator Torres) (Coauthors: Assembly Members
|
|||
|
Areias, Bornstein, Goldsmith, Isenberg, Johnson, Karnette, Katz
|
|||
|
Mountjoy, Nolan, Polanco, Speier, and Vasconcellos)
|
|||
|
(Coauthors: Senators Dills, Hayden, Killea, Morgan, and Rosenthal)
|
|||
|
|
|||
|
March 4, 1993
|
|||
|
|
|||
|
An act to add Section 10248 to the Government Code,
|
|||
|
relating to the Legislature;
|
|||
|
|
|||
|
LEGISLATIVE COUNSELUS DIGEST
|
|||
|
|
|||
|
AB 1624, as amended, Bowen. Legislature: legislative
|
|||
|
information: access by computer network.
|
|||
|
Under existing law, all meetings of a house of the Legislature
|
|||
|
or a committee thereof are required to be open and public, unless
|
|||
|
specifically exempted, and any meeting that is required to be open
|
|||
|
and public, including specified closed sessions, may be held only
|
|||
|
after full and timely notice to the public as provided by the
|
|||
|
Joint Rules of the Assembly and Senate.
|
|||
|
This bill would make legislative findings and declarations that
|
|||
|
the public should be informed to the fullest extent possible as to
|
|||
|
the time, place, and agenda for each meeting.
|
|||
|
This bill would require the Legislative Counsel, with the advice
|
|||
|
of the Joint Rules Committee of the Senate and Assembly, to make
|
|||
|
available to the public, by means of access by way of the largest
|
|||
|
nonproprietary, nonprofit cooperative public computer network,
|
|||
|
specified information concerning bills, the proceedings of the
|
|||
|
houses and committees of the Legislature, statutory enactments,
|
|||
|
and the California Constitution.
|
|||
|
Vote: 2/3 majority. Appropriation: no. Fiscal committee: yes.
|
|||
|
State-mandated local program: no.
|
|||
|
|
|||
|
The people of the State of California do enact as follows:
|
|||
|
|
|||
|
1 SECTION 1. Section 10248 is added to the
|
|||
|
2 Government Code, to read:
|
|||
|
3 10248. (a) The Legislature finds and declares that
|
|||
|
4 the public should be informed to the fullest extent
|
|||
|
5 possible as to the time, place, and agenda for each
|
|||
|
6 meeting of the houses and committees of the Legislature.
|
|||
|
7 The Legislature further finds and declares that it is
|
|||
|
8 desirable to make timely information regarding these
|
|||
|
9 proceedings available to each member of the public,
|
|||
|
10 irrespective of where he or she resides, for the least cost
|
|||
|
11 possible.
|
|||
|
12 (b) The Legislative Counsel shall, with the advice of
|
|||
|
13 the Joint Rules Committee, make all of the following
|
|||
|
14 information available to the public in electronic form:
|
|||
|
15 (1) The most recent Assembly Daily File and most
|
|||
|
16 recent Daily Senate File.
|
|||
|
17 (2) The text of each bill introduced in each current
|
|||
|
18 legislative session, including all amended forms of the
|
|||
|
19 bill.
|
|||
|
20 (3) The bill history of each bill introduced and
|
|||
|
21 amended in each current legislative session.
|
|||
|
22 (4) The bill status of each bill introduced and
|
|||
|
1 amended in each current legislative session.
|
|||
|
2 (5) All bill analyses prepared in connection with each
|
|||
|
3 bill in each current legislative session.
|
|||
|
4 (6) All vote information concerning each bill in each
|
|||
|
5 current legislative session.
|
|||
|
6 (7) Veto messages concerning each bill, when issued,
|
|||
|
7 in each current legislative session.
|
|||
|
8 (8) The California Codes.
|
|||
|
9 (9) The California Constitution.
|
|||
|
10 (10) All uncodified statutes enacted on or after
|
|||
|
11 January 1, 1993.
|
|||
|
35 (11) Documentation that is available to the public and
|
|||
|
36 maintained in computerized form by the Legislative
|
|||
|
37 Counsel which describes the computerized digital
|
|||
|
38 formats of the files containing the information specified
|
|||
|
39 in this subdivision.
|
|||
|
40 (c) The Legislative Counsel shall automatically
|
|||
|
1 transmit copies of files of the information specified in
|
|||
|
2 subdivision (b) by way of the largest nonproprietary,
|
|||
|
3 nonprofit cooperative public computer network upon
|
|||
|
4 receiving any computerized request for the files. These
|
|||
|
5 files shall be made available in this manner immediately
|
|||
|
6 after they are transmitted to the Office of State Printing.
|
|||
|
7 The files shall contain all of the text and formatting
|
|||
|
8 information transmitted to the Office of State Printing. In
|
|||
|
9 the event that a technical malfunction prevents these
|
|||
|
10 files from being transmitted immediately after they are
|
|||
|
11 transmitted to the Office of State Printing, the
|
|||
|
12 Legislative Counsel shall report that fact to the Joint
|
|||
|
13 Rules Committee within one business day.
|
|||
|
14 (d) Any file that is available pursuant to subdivision
|
|||
|
15 (c) shall remain available to the public upon request by
|
|||
|
16 electronic digital data transmission until it is updated.
|
|||
|
17 When a file is updated, a copy of the file without the
|
|||
|
18 updated information shall remain available to the public
|
|||
|
19 by electronic data digital transmission for at least 90 days
|
|||
|
20 after the update.
|
|||
|
21 (e) The Legislative Counsel may not control which or
|
|||
|
22 how many files are available to a person who requests the
|
|||
|
23 files nor monitor or keep any records about those persons
|
|||
|
24 who request files, except for the purpose of assuring the
|
|||
|
25 quality of computer operations. No fee or other charge
|
|||
|
26 shall be imposed as a condition to public access to any files
|
|||
|
27 that are made available to the public pursuant to this
|
|||
|
28 section.
|
|||
|
29 (f) No action taken pursuant to this section shall be
|
|||
|
30 deemed to alter or relinquish any copyright or other
|
|||
|
31 proprietary interest or entitlement of the State of
|
|||
|
32 California relating to any of the information made
|
|||
|
33 available pursuant to this section.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 22 Jun 93 15:17 CDT
|
|||
|
From: rejones@SEABASS.ST.USM.EDU
|
|||
|
Subject: File 4--Summercon Synopsis & Playful Precis
|
|||
|
|
|||
|
Presenting :::
|
|||
|
|
|||
|
SummerCon 1993 in Review !!!
|
|||
|
|
|||
|
Hacking Tales and Exploits by the SotMESC
|
|||
|
|
|||
|
Additional Activities by the GCMS MechWarriors
|
|||
|
|
|||
|
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
|
|||
|
|
|||
|
The weather was right, too right. Something was foul in the
|
|||
|
air. It was akin to that mythical 'Calm before the Storm' scenario
|
|||
|
that is dreaded by so many. But, Scribbles and I boarded the
|
|||
|
Techno-Laden SotMESC compact and took off down the Highway to our
|
|||
|
ultimate goal . . . Hacker Heaven in Summertime Fun - SummerCon !!!
|
|||
|
|
|||
|
Instantly, weather was seen brewing in the Caribbean. Hints
|
|||
|
of Hurricanes echoed through the towns we drifted through. To
|
|||
|
alleviate any anxieties, massive quantities of Jolt! were obtained
|
|||
|
in the infamous town of Hatties-Gulch, a small town taken over by
|
|||
|
the virulent filth called College Students.
|
|||
|
|
|||
|
The trip continued, over hill and over dale. Dale was quite
|
|||
|
considerate not to press charges. Colleges were passed in a blink
|
|||
|
of the eye. Nothing was going to stop us. We were on a mission
|
|||
|
from the Church. But, that's another story.
|
|||
|
|
|||
|
After locating that famous arch, a beeline was made at speeds
|
|||
|
over 100 MPH through St. Louis until our destination came into
|
|||
|
view: The St. Louis Executive International (800-325-4850). We
|
|||
|
came to meet our nemesis and friends at the fest hosted by the
|
|||
|
Missouri Programming Institute. Brakes were quickly applied
|
|||
|
as the car appeared to be going off the off-ramp and into the ditch.
|
|||
|
|
|||
|
From the lobby it was obvious, there were unusual people here.
|
|||
|
These were the kind of people that you fear your daughters would
|
|||
|
never meet. The kind of people that kicked themselves into
|
|||
|
caffeine frenzies and would become infatuated with virtual lands.
|
|||
|
Yes, these were my kind of people.
|
|||
|
|
|||
|
Now, the adventure may start . . .
|
|||
|
|
|||
|
( More to come after I get out of the shower real quick )
|
|||
|
|
|||
|
-Frosty, ilKhan of the SotMESC
|
|||
|
|
|||
|
=========================================================================
|
|||
|
|
|||
|
The continuing story of Hackers gone astray in the big city =:)
|
|||
|
|
|||
|
For those of you that were waiting, we apologize for the delay.
|
|||
|
But, nobody can interrupt an original episode of ST:TNG and the
|
|||
|
discovery of the latest 2600 'zine.
|
|||
|
|
|||
|
Oh, and in response to A-Gal on pg 30 of 2600, Scribbles says
|
|||
|
she's the sexiest hacker on the nets. Hmmmmm, I'm inclined to agree
|
|||
|
with that. I'm sure Control-C will agree too, especially after he
|
|||
|
trailed her for half of SCon.
|
|||
|
|
|||
|
Now, we all know that Friday is the warm-up day on what we can
|
|||
|
expect to see at SCon during the main saturday drag. It was no
|
|||
|
surprise to find the main junction box rewired, pay-phones providing
|
|||
|
free services, rooms rerouted and computers running rampant down the
|
|||
|
hallways. But, the traditional trashing of Control-C's room this
|
|||
|
early signaled that more would be needed to top the night. The maid
|
|||
|
was definitely not pleased.
|
|||
|
|
|||
|
For a list of those that attended, maybe KL can provide us
|
|||
|
with that information. There were too many faces for my fingers
|
|||
|
to lap into. And, there were quite a few new faces. I believe
|
|||
|
that Weevel was the youngest hacker at 16, and Emmanuel was the
|
|||
|
oldest, although he didn't give his age.
|
|||
|
|
|||
|
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
|
|||
|
|
|||
|
THE CONFERENCE
|
|||
|
|
|||
|
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
|
|||
|
|
|||
|
Let's get to the meat of the matter. The conference had
|
|||
|
a nice spacious central area with tables neatly lining alongside
|
|||
|
the wall. Between the tables and the walls were many hacks packed
|
|||
|
as tightly as they could get. Why didn't we think of moving the tables
|
|||
|
closer together ???
|
|||
|
|
|||
|
KL took control and ran the conference smoothly. dFx panned
|
|||
|
everyone on his digital camcorder. Several cameras were around
|
|||
|
to provide us with gifs later. And the conference took off . . .
|
|||
|
|
|||
|
First up was Stewart from SRI ( Stanford Research Institute ).
|
|||
|
He elaborated on SRI's being involved in research, engineering and
|
|||
|
design. From studies done around the world with hackers and those
|
|||
|
associated, malicious hacking can not be stopped. There is no
|
|||
|
evidence, though, that the current hackers are interested in bringing
|
|||
|
the networks down at all. Concern was given to new hackers that may
|
|||
|
be emerging with financial gain and maliciousness occurring. The top
|
|||
|
security hole with system was noted as being the infamous social
|
|||
|
engineering technique. SRI did note that many places did not utilize
|
|||
|
the security that they even had in place. It was also noted that laws
|
|||
|
against malicious hackers, and probably any hacker, should be fair and
|
|||
|
just. The most malicious hacks that are turning up have been spotted
|
|||
|
in the following named countries: Holland, Scandinavia countries, very
|
|||
|
possibly soon in the UK, Australia, Israel, the former USSR, and
|
|||
|
Bulgaria ( noted for virii writers ).
|
|||
|
|
|||
|
A voice made mention of Operation Rahab, hackers in German
|
|||
|
Intelligence.
|
|||
|
|
|||
|
Next up was Count Zero from cDc/RDT to talk about packet radio.
|
|||
|
His talk included information about the IESS and handed out a flyer on
|
|||
|
America 2000 ( school under 1984 regimes ). Maybe someone will
|
|||
|
provide us with a copy of this. A packet radio modem at 1200 can be
|
|||
|
obtained easily for $50. TCP/IP packets are already being send over
|
|||
|
the bandwidth along with other network protocols. The usefulness of
|
|||
|
all this is that the information is broadcast and it is virgin
|
|||
|
territory. The baud limitation is due only based upon the bandwidth
|
|||
|
you are operating at and the number of collisions occurring. On a
|
|||
|
band you can see every packet that is being transmitted if you wish.
|
|||
|
All this is located on a 2 meter band. Currently the FCC forbids
|
|||
|
encryptions on the airwaves, although this is noted as being virtually
|
|||
|
impossible to enforce. It also takes 5 months to get an amateur
|
|||
|
radio license, and your personal info is recorded in a book easily
|
|||
|
obtained at libraries. The problem with going around the FCC is that
|
|||
|
there exist vigilante HAMs that monitor the bands and have nothing
|
|||
|
better to do than filter info and whine to the FCC. Bandwidths are
|
|||
|
decreasing though. This is due to an increased interest overall by
|
|||
|
communications in these areas. Unless you do something major the FCC
|
|||
|
will not give you much interest. The book on preparing yourself for a
|
|||
|
Tech Class can be obtained from Radio Shak for $9.
|
|||
|
|
|||
|
Next up was dFx. He was promoting the HCon and Tone-Loc t-shirts
|
|||
|
that were for sale. Merchandising was getting pretty high. He also
|
|||
|
gave out a few Mitsubishi 800 disks. He was also recognized as the
|
|||
|
ONLY and LAST member of the Neon Knights, a club that had a wide range
|
|||
|
of comedy names generated. The word was put out the HCon '93 will be
|
|||
|
in December 17-19 with a hint that it could also wind up being in
|
|||
|
Austin. Then the conversation turned to Lord Byron's bust, which we
|
|||
|
should here more information on any day this week. The conversation
|
|||
|
reiterated the government narc that was at the AA meeting that was
|
|||
|
pressuring Byron. Byron was also noted as having rejected a plea
|
|||
|
bargain the courts offered him. And lastly, it is going to happen
|
|||
|
soon so get them while you can. The FTP site at eff.org will be
|
|||
|
dropping its CuD directory due to a conflict of interest with EFFs
|
|||
|
major contributors, mainly the RBOCs and other interest groups that
|
|||
|
don't like us.
|
|||
|
|
|||
|
Erik Bloodaxe took the table next to talk about what was
|
|||
|
happening with his involvement with Phrack and some interesting info
|
|||
|
about Agent Steel. As for Phrack, the Email list is being with-held
|
|||
|
by Tuc. The mailing list has been refused at Mindvox due to files
|
|||
|
missing mysteriously at that site. And, no organization registered
|
|||
|
for Phrack #42 since it was copyrighted with a nice and lengthy
|
|||
|
preamble, except for one company from Midar. Currently Phrack #43 is
|
|||
|
in limbo and is estimated at 1 Meg long. Going onto the info about
|
|||
|
Agent Steel, basically he's a narc. Lord Havok from Canada is trying
|
|||
|
to restart the LOD under some unknown logical rationale that since LOD
|
|||
|
is defunct, anyone can reclaim the name. Lord HAvok, aka Cameron, has
|
|||
|
been going around trying to get documentation to put together an LOD
|
|||
|
technical journal #5. Supposedly there is a skin-head group in Canada
|
|||
|
that is now tracking Cameron down.
|
|||
|
|
|||
|
Someone next came up and gave us an update on Codec. Two weeks
|
|||
|
after the last SCon, Codec was pulled over while on the run from the
|
|||
|
law for speeding and then arrested for burglary, resisting arrest, etc
|
|||
|
. . . He is estimated to be out of jail in 1995 and still has time to
|
|||
|
serve in a few other states. Mail can be sent to him at this address:
|
|||
|
codec@cypher.com. Maybe Crunch can give Codec some hints on how to
|
|||
|
get by in prison?
|
|||
|
|
|||
|
From the CPSR, Eric Nielson took the table. He elaborated on
|
|||
|
the CPSR and ran a Q&A period. Basically, the CPSR files many FOIA
|
|||
|
requests and sues the government. Their focus is on the workplace
|
|||
|
computing. Elaboration was given on the Clipper Chip and computer
|
|||
|
ship security. The CPSR is staffed with lawyers and takes their
|
|||
|
funding from dues and grants. They are not sponsored by any
|
|||
|
corporations.
|
|||
|
|
|||
|
From the far side of the table came the infamous Emmanuel
|
|||
|
Goldstein from 2600. He stated how he had testified at congress and
|
|||
|
gave them a live demonstration of bandwidth scanning and redboxing.
|
|||
|
While he was there, the inquisition started against him on the issue
|
|||
|
of 2600. Emmanuel then tried to explain the culture to our
|
|||
|
representative that it is bad to classify all hackers as criminals.
|
|||
|
Goldstein then went on to talk about the DC 2600 bust and how it has
|
|||
|
resulted in 2600 meetings springing up all across the country. A
|
|||
|
review of several films on software piracy at the office, disaster
|
|||
|
recovery and viruses from Commonwealth Films was given. And, to
|
|||
|
hilight everything, 2600 has purchased an AT&T van that they plan to
|
|||
|
take to assorted conventions and
|
|||
|
start a fleet of these up.
|
|||
|
|
|||
|
Pst, BTW, on pg 43 of 2600 the intersection should be a jump =:)
|
|||
|
|
|||
|
Last up was Errath Ackby, a Certified Netware Engineer. He
|
|||
|
explained that the only upgrade in Novell 4.0 is the disk compression.
|
|||
|
He also informed us that the supervisor and guest accounts generally
|
|||
|
have default passwords. TO hack into this Net, you should use a PC
|
|||
|
with full alt and functions keys. The supervisor p/w is on the
|
|||
|
RConsole in a file called autoexec.mcf on version 3.11. Netcrack
|
|||
|
will not work on a system with Intruder Lock-Out. Non-dedicated
|
|||
|
netware must boot from a floppy. Best of all, you can dial out
|
|||
|
by using cubix-quarts, which are PC with modems on the system.
|
|||
|
|
|||
|
Thus we have come to the end of the conference part of
|
|||
|
SummerCon. Part III will go into detail about several of the
|
|||
|
flyers that were floating about and the post-conference excitement
|
|||
|
that nobody there would ever forget !!!
|
|||
|
|
|||
|
Below is a quick reprint of a paper that was recovered
|
|||
|
from Control-C's trashed room.
|
|||
|
|
|||
|
Mrs Jarnagin,
|
|||
|
|
|||
|
I would like to set up a meeting
|
|||
|
to discuss Kevin's progress in Social
|
|||
|
Studies and English. Please let
|
|||
|
me know when it would be
|
|||
|
convenient.
|
|||
|
|
|||
|
Thank you
|
|||
|
|
|||
|
( Scribble , scribble )
|
|||
|
|
|||
|
Dear Mr + Mrs Gormby,
|
|||
|
|
|||
|
We would be happy
|
|||
|
to meet with you at
|
|||
|
9:30 on Thursday, April
|
|||
|
1st in Room 104
|
|||
|
|
|||
|
Sincerely,
|
|||
|
M.Jarnagin
|
|||
|
&
|
|||
|
S.Dietrich
|
|||
|
|
|||
|
|
|||
|
Now, could this be Kevin Poulson ??? Naaa, no way.
|
|||
|
Amazing what technical data trashing will uncover. I guess
|
|||
|
I should throw this away now . . .
|
|||
|
|
|||
|
THE ADVENTURE CONTINUES !!!
|
|||
|
|
|||
|
-Frosty, ilKhan of the SotMESC
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 22 Jun 1993 22:32:12 PDT
|
|||
|
From: Alex Zelchenko <alexz@well.sf.ca.us>
|
|||
|
Subject: File 5--Defense Contractor Attacks Full Disclosure (Reprint) (#1)
|
|||
|
|
|||
|
((MODERATORS' NOTE: Glen Roberts, editor of Full Disclosure, a gadfly
|
|||
|
hardcopy journal/newsletter, has been threatened with a lawsuit by
|
|||
|
Harris Corp. over a review of one of its products. As the experiences
|
|||
|
of 2600 Magazine illustrate, the threat of litigation by large
|
|||
|
corporations seems to be a way of silencing speech of those writing on
|
|||
|
cyber-issues.
|
|||
|
|
|||
|
CuD readers will recall that Roberts and his co-gadfly Bill Vajk
|
|||
|
obtained and made available a number of sealed federal warrants and
|
|||
|
affidavits during the so-called "Hacker Crackdown" of the 1990s,
|
|||
|
including the Ripco BBS and Rich Andrews documents. Full Disclosure was
|
|||
|
also one of the first print media to attack the crackdowns and
|
|||
|
provided considerable information about the events to the computer
|
|||
|
community. Vajk and Roberts aggressively use the Freedom of
|
|||
|
Information Act (FOIA) to ferret out information. The generosity of
|
|||
|
Roberts and Vajk in sharing their information with CuD, amongst
|
|||
|
others, makes any threat to their enterprise a threat to our own
|
|||
|
information flow for two reasons. First, if media such as 2600 or Full
|
|||
|
Disclosure are silenced from legitimate pursuit and publication of
|
|||
|
information because of the chilling effect of intimidation, then a
|
|||
|
significant source of information is lost. Second, if large
|
|||
|
corporations or government agencies can threaten publications of which
|
|||
|
they disapprove into silence, it severely curtails the free flow of
|
|||
|
information and makes other media more cautious lest they also be
|
|||
|
targeted.
|
|||
|
|
|||
|
Alex Zelchenko collected the basic documents related to this case. In
|
|||
|
this file, we reprint a (forthcoming) Full Disclosure piece
|
|||
|
summarizing the events. Second is the "offending" story that resulted
|
|||
|
in the threat of litigation. Third is the letter from Harris attorneys
|
|||
|
threatening the suit, and finally is the response of Full Disclosure
|
|||
|
legal counsel to Harris.
|
|||
|
|
|||
|
++++++
|
|||
|
|
|||
|
DEFENSE CONTRACTOR ATTACKS NEWSPAPER EDITOR
|
|||
|
|
|||
|
(CHICAGO) -- Harris Corporation, through its Electronic Systems
|
|||
|
Sector in Melbourne, Florida, has attacked Glen L. Roberts, Editor of
|
|||
|
Full Disclosure, the nation's #1 surveillance journal, threatening
|
|||
|
him with civil and criminal proceedings over his editorial review of
|
|||
|
one of their products.
|
|||
|
|
|||
|
In 1991, Full Disclosure reported on the National Technical
|
|||
|
Investigators Assoc conference held Washington, DC. Harris, an
|
|||
|
exhibitor at the conference, was included in Full Disclosure's
|
|||
|
coverage.
|
|||
|
|
|||
|
A Harris product called "Triggerfish," which the company promoted at
|
|||
|
the conference as a cellular phone interception system, was included
|
|||
|
in Full Disclosure's report. Harris now claims that this editorial
|
|||
|
review was an "apparently unauthorized advertisement," and that it
|
|||
|
constitutes a deceptive trade practice, violates its trademarks and
|
|||
|
may be a "felony."
|
|||
|
|
|||
|
Roberts stated, "clearly, I have a First Amendment right to discuss
|
|||
|
the products or services of any company in my publication. The First
|
|||
|
Amendment has no requirement that I get 'authorization' to talk about
|
|||
|
what's being sold to the public, or law enforcement agencies."
|
|||
|
Further, Roberts said that this issue is especially important to the
|
|||
|
public and political discussions about privacy and surveillance
|
|||
|
technology. Roberts thinks that Harris has failed to learn the lesson
|
|||
|
of the "Pentagon Papers" case.
|
|||
|
|
|||
|
"We're seeing laws passed relating to issues of privacy, and in
|
|||
|
particular cellular phone privacy, without informed public debate on
|
|||
|
the issue, by either the public, or our Congress." Roberts considers
|
|||
|
this action by Harris as an effort to prevent such public debate.
|
|||
|
Roberts said, "Full Disclosure was started to encourage debate and
|
|||
|
public knowledge of these topics."
|
|||
|
|
|||
|
FULL DISCLOSURE, BOX 903, LIBERTYVILLE, ILLINOIS 60048. PHONE:
|
|||
|
(708) 395-6200. FAX: (708) 395-6022. TOLL FREE: (800) 235-1414
|
|||
|
: For sub a message left on 800-235-1414 will do it
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 22 Jun 1993 22:32:12 PDT
|
|||
|
From: Alex Zelchenko <alexz@well.sf.ca.us>
|
|||
|
Subject: File 6--The "Offending" Full Disclosure Story (#2)
|
|||
|
|
|||
|
Here is the original story as it appeared in "Full Disclosure." It
|
|||
|
will be followed by the text of a letter received by the publication.
|
|||
|
|
|||
|
++++++++
|
|||
|
|
|||
|
NATIA Conference
|
|||
|
|
|||
|
The following pages highlight some companies and products that
|
|||
|
exhibited at the 1991 National Technical Investigators Conference
|
|||
|
(NATIA) show in Washington, DC.
|
|||
|
|
|||
|
NATIA is an organization of over 2300 law enforcement officers,
|
|||
|
communications and security managers assigned to support technical
|
|||
|
investigative activities in the major federal, state and local law
|
|||
|
enforcement and intelligence agencies.
|
|||
|
|
|||
|
The NATIA membership is responsible for supplying all of the various
|
|||
|
audio, video, photographic, specialized electronic and investigative
|
|||
|
aids used in support of these sensitive bugging, wiretapping and
|
|||
|
intelligence activities.
|
|||
|
|
|||
|
As with the 1990 show, there was a strong showing of covert video
|
|||
|
systems. Cellular phone interception systems are now becoming
|
|||
|
commonplace.
|
|||
|
|
|||
|
The following information has been complied from product literature
|
|||
|
made available at the show. It should be remembered that NATIA has a
|
|||
|
law enforcement membership and some of the products are only available
|
|||
|
to such agencies. Additionally, some RF devices are not FCC approved
|
|||
|
and therefore, only available to Federal law enforcement agencies.
|
|||
|
|
|||
|
Even though the sale of some devices may be limited to official law
|
|||
|
enforcement agencies, the technology is relatively simple. For
|
|||
|
example, the cellular phone monitoring equipment is sold only to the
|
|||
|
law enforcement market. However, anyone wishes to exert a little elbow
|
|||
|
grease can accomplish the same on their own. This should be taken as a
|
|||
|
stern warning to those who have an expectation of privacy when using
|
|||
|
their cellular phones. As the information shows, commercial units can
|
|||
|
record the calls, as well as tracking by mobile phone number,
|
|||
|
electronic serial number and also direction finding to physically
|
|||
|
locate an individual using a cellular phone.
|
|||
|
|
|||
|
+++++++++++
|
|||
|
|
|||
|
Harris Law Enforcement Products
|
|||
|
|
|||
|
TRIGGERFISH has a number of cellular phone based applications:
|
|||
|
determining a suspects phone number, dialed number recorder, and
|
|||
|
wiretapping. According to Harris, %%for the first time, law
|
|||
|
enforcement is not at a disadvantage in tracking the high-tech
|
|||
|
criminal.'' Additionally, the unit %%collects and integrates all
|
|||
|
relevant data, including voice, directly from the ether.''
|
|||
|
|
|||
|
Box 91000, Melbourne, FL 32902. Phone: (800) 442-7747, Fax: (407) 768-4005
|
|||
|
+++
|
|||
|
Reprinted from Full Disclosure, Box 903, Libertyville, Illinois 60048
|
|||
|
Phone: (800) 235-1414
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 22 Jun 1993 22:32:12 PDT
|
|||
|
From: Alex Zelchenko <alexz@well.sf.ca.us>
|
|||
|
Subject: File 7--The Harris Letter Threatening Litigation against FD (#3)
|
|||
|
|
|||
|
HARRIS
|
|||
|
|
|||
|
May 26, 1993
|
|||
|
|
|||
|
Mr. Glen L. Roberts
|
|||
|
Editor/Publisher
|
|||
|
Full Disclosure
|
|||
|
Box 903 - FD24
|
|||
|
Libertyville, Illinois 60048
|
|||
|
|
|||
|
Dear Mr. Roberts:
|
|||
|
|
|||
|
Your issue No. 24 of Full Disclosure has been brought to my attention
|
|||
|
because of an apparently unauthorized advertisement on page 8 for a
|
|||
|
Harris law enforcement product referred to as "Triggerfish." It is my
|
|||
|
understanding that the publication of this advertisement was not
|
|||
|
previously requested nor authorized by Harris. The unapproved use of
|
|||
|
this advertisement constitutes a deceptive trade practice, which
|
|||
|
would potentially subject you and your newspaper to civil liability.
|
|||
|
Further, you have used our trademarks -- Harris and Triggerfish --
|
|||
|
without permission.
|
|||
|
|
|||
|
Lastly, you may have committed a felony under 18 USC 2512(1)(c)(i).
|
|||
|
This criminal statute prohibits the placement in a newspaper or
|
|||
|
magazine of an advertisement for an electronic product that is
|
|||
|
primarily useful for the purpose of surreptitiously intercepting
|
|||
|
electronic communications. Further, these actions on your part may
|
|||
|
have also subjected Harris Corporation to such liability under this
|
|||
|
statute.
|
|||
|
|
|||
|
You are hereby instructed to immediately desist from placing
|
|||
|
advertisements or promotional material related to Harris electronic
|
|||
|
law enforcement products in your newspaper. Any further actions of
|
|||
|
this nature will be dealt with by filing a suit against you and your
|
|||
|
newspaper.
|
|||
|
|
|||
|
Sincerely, /s/ John L. DeAngelis, Intellectual Property and Licensing
|
|||
|
Counsel.
|
|||
|
|
|||
|
JLD/bea
|
|||
|
|
|||
|
Harris Corporation Electronic Systems Section P.O. Box 37, Melbourne,
|
|||
|
Florida 32902 Telephone 407-727-4000
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 22 Jun 1993 22:32:12 PDT
|
|||
|
From: Alex Zelchenko <alexz@well.sf.ca.us>
|
|||
|
Subject: File 8--The Full Disclosure Atty's Response to Harris (#4)
|
|||
|
|
|||
|
Drath & Dwyer
|
|||
|
- Lawyers -
|
|||
|
400 South Beverly Drive * Suite 214
|
|||
|
Beverly Hills, California 90212-4402
|
|||
|
|
|||
|
Tel: (310) 364-3444 * Fax: (310) 858-7458
|
|||
|
|
|||
|
Tuesday, June 1, 1993
|
|||
|
|
|||
|
John L. DeAngelis Jr., Esq.
|
|||
|
Harris Corp.
|
|||
|
P.O. Box 37
|
|||
|
Melbourne, FL 32902
|
|||
|
|
|||
|
Dear Mr. DeAndelis:
|
|||
|
|
|||
|
I write on behalf of Glen L. Roberts, the editor and publisher of the
|
|||
|
magazine, Full Disclosure, in reply to your May 26 letter addressed to
|
|||
|
him. In addition to advising Mr. Roberts, I serve as privacy law
|
|||
|
columnist for his publication and co-host with him of "Full Disclosure
|
|||
|
Live," a one-hour live radio program carried across the country on the
|
|||
|
Let's Talk Radio Network.
|
|||
|
|
|||
|
It is shocking sophistry on your part to have characterized Full
|
|||
|
Disclosure's editorial expression about the product, "Triggerfish," as
|
|||
|
an "advertisement" Of course, I recognize your procrustean need to do
|
|||
|
that, because "advertisement," is the operative word of the criminal
|
|||
|
statute you cite.
|
|||
|
|
|||
|
Had you taken time to research even a few of the many cases in which
|
|||
|
"advertisement" not only has been defined as the space one associated
|
|||
|
with a product purchases from a publisher, but as well distinguished
|
|||
|
from editorial expression or news reporting by such a publisher or his
|
|||
|
or her subaltern, for example, an editor, you might have saved your
|
|||
|
company the embarrassment that well may flow from your misguided
|
|||
|
missive. Cary Grant couldn't make an Esquire magazine news article,
|
|||
|
which used a photograph of his head, into an advertisement in the
|
|||
|
Southern District of New York 20 years ago; I doubt you'll have any
|
|||
|
greater success today, venue notwithstanding.
|
|||
|
|
|||
|
Respecting your assertion of trademark use without permission, we are
|
|||
|
unable to locate any authority, statutory or decisional, that even
|
|||
|
suggests that editorial mention of a product or service, which enjoys
|
|||
|
registered or common law trade or service mark protection, obliges the
|
|||
|
publisher to include an indication of such status or forbids such
|
|||
|
publication "without permission." Perhaps, given your stated role as
|
|||
|
intellectual property counsel, you can afford us the benefit of your
|
|||
|
expertise in this realm.
|
|||
|
|
|||
|
What I find most troubling about your letter is your apparent
|
|||
|
indifference to First Amendment law. A careful reading of the 1968
|
|||
|
legislative history of 18 USC 2512 acquaints one with the fact that
|
|||
|
Congress did not seek to abridge free press rights in proscribing the
|
|||
|
advertising of "bugging" devices.
|
|||
|
|
|||
|
unknown." It continues to be Mr. Robert's persistent and pervasive
|
|||
|
theme that for our democratic society to defeat the depredations of
|
|||
|
privacy-invasive devices, it must know that they exist and how they
|
|||
|
work.
|
|||
|
|
|||
|
Hence, attempts like yours to chill or impair free exercise of
|
|||
|
expression in the arena of such public affairs can only be viewed as
|
|||
|
inimical to the legislative underpinnings of the statute involved. You
|
|||
|
use of it is akin to the drunkard's fondness for the lamppost: more
|
|||
|
for support than illumination. Really, sir, for a lawyer to tell a
|
|||
|
reporter that there's potential criminality involved in writing about
|
|||
|
a product in the marketplace should make you tremble to know that God
|
|||
|
is just.
|
|||
|
|
|||
|
The First Amendment, you seem to require reminding, is an absolute bar
|
|||
|
to the imposition of such government restraints of the press as you
|
|||
|
erroneously think your cited statute imports. The press must be free
|
|||
|
to publish news, whatever the source, without censorship. Guarding
|
|||
|
little secrets, like the existence of your "Triggerfish," at the
|
|||
|
expense of an informed representative government is about as tawdry a
|
|||
|
legal proposition as I can imagine.
|
|||
|
|
|||
|
Let me add that your menacing Full Disclosure's editor with the
|
|||
|
prospect of criminal charges, in our opinion, implicates issues of
|
|||
|
professional responsibility. When lawyers in jurisdictions with which
|
|||
|
I am familiar try that technique to obtain an advantage in a civil
|
|||
|
dispute, they are subject to discipline. Is there no such sanction for
|
|||
|
Pennsylvania practitioners?
|
|||
|
|
|||
|
I invite your reply on the points raised, including your proposal as
|
|||
|
to how we might avoid formal proceedings to right the wrong you have
|
|||
|
done Full Disclosure. Failing your willingness to apologize or submit
|
|||
|
this matter to an alternative dispute resolution mechanism for a
|
|||
|
declaration of rights, I shall advise Full Disclosure to proceed with
|
|||
|
an action under 28 USC 2201 as a possible predicate to seeking further
|
|||
|
relief.
|
|||
|
|
|||
|
As a matter of professional courtesy, I wish to inform you that the
|
|||
|
Harris Corp. officers and directors shown as recipients of copies of
|
|||
|
this letter and its enclosure are not being sent a copy of your letter
|
|||
|
to Mr. Roberts; it, I believe, more appropriately should reach them
|
|||
|
from you. For your further information, the two other copy recipients
|
|||
|
in addition to Mr. Roberts, namely, Messrs.. Ward and Rudnick, are,
|
|||
|
respectively, our intellectual property adviser and our litigation
|
|||
|
counsel. You doubtless know Mr. Ward from his prominence at the
|
|||
|
trademark bar. Mr. Rudnick, who would handle a Rule 57 matter, if such
|
|||
|
proves necessary, is a former federal prosecutor with the Los Angeles
|
|||
|
Strike Force.
|
|||
|
|
|||
|
Sincerely, /s/ Will Dwyer II
|
|||
|
|
|||
|
Enclosure
|
|||
|
|
|||
|
Copies: Richard L. Ballantyne, Esq., Mr. John T. Hartley, Mr. Joseph Boyd,
|
|||
|
Mr. Lester Coleman, Mr. Ralph D. Denunzio, Mr. C. Jackson Grayson, Jr.,
|
|||
|
Mr. George I. Meisel, Mr. Walter Raab, Mr. Robert Cizik. Mr. Joseph
|
|||
|
Dionne, Mr. Alexander Trowbrige, Mr. Allan J. Huber, Mr. Glen L. Roberts,
|
|||
|
Marvin L. Rudnick, Esq., Thomas J. Ward, Esq.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.46
|
|||
|
************************************
|
|||
|
|
|||
|
|