839 lines
43 KiB
Plaintext
839 lines
43 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Sun July 4 1993 Volume 5 : Issue 49
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Copy Editor: Etaoin Shrdlu, Seniur
|
|||
|
|
|||
|
CONTENTS, #5.49 (July 4 1993)
|
|||
|
File 1--*GEnie* Roundtable transcript of VIRUS/SECURITY
|
|||
|
File 2--CPSR Workplace Privacy Test
|
|||
|
File 3--JOB OPENING AT EFF
|
|||
|
File 4--CuDs on BBSes: "Other Side of Infinity"
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|||
|
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
|||
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|||
|
nodes and points welcome.
|
|||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: 11 Jun 93 21:01:22 EDT
|
|||
|
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
|||
|
Subject: File 1--*GEnie* Roundtable transcript of VIRUS/SECURITY
|
|||
|
|
|||
|
The following is a transcript from the VIRUS/SECURITY RoundTable on
|
|||
|
GEnie. Note that "ga" in the text stands for "go ahead" and signals
|
|||
|
that the current speaker has finished their thought. This transcript
|
|||
|
is reprinted with permission.
|
|||
|
|
|||
|
Real Time Conference in the Virus/Security RoundTable on GEnie with
|
|||
|
Ken Citarella, Assistant District Attorney, Deputy Bureau Chief of the
|
|||
|
Frauds Bureau for Westchester County, New York. Sysop: Ross
|
|||
|
Greenberg. Assistant sysops: Mitch Wagner and Sarah Collier. June 2,
|
|||
|
1993, 9:00 PM EDT.
|
|||
|
|
|||
|
-----# Participants #-----
|
|||
|
|
|||
|
<[ken] GUEST-3>
|
|||
|
<[ross] GREENBER>
|
|||
|
<SARAH>
|
|||
|
<[Mitch] MITCHWAGNER>
|
|||
|
<[AmigaNut] JABBA>
|
|||
|
<[Cy TROic] F.GLYNN>
|
|||
|
<MIKE.C>
|
|||
|
<[Chuck] C.LEPAGE>
|
|||
|
<[Dennis] D.MCCAULEY1>
|
|||
|
<[Ron] R.RITCH>
|
|||
|
<[Joe] J.HOLLIDAY6>
|
|||
|
<[Dennis] D.MCCAULEY1>
|
|||
|
<R.GREENBERG5>
|
|||
|
<N C.HORNER1>
|
|||
|
<[Janet] J.ATTARD>
|
|||
|
|
|||
|
-----# Room 1 #-----
|
|||
|
|
|||
|
<SARAH> Welcome, Ken! We're glad to have you here. ga
|
|||
|
<[Mitch] MITCHWAGNER> Hi, Ken. Could you give a brief rundown of your
|
|||
|
experience? ga
|
|||
|
<[ken] GUEST-3> OK. Hi everyone. Let me introduce myself. I am an
|
|||
|
Asst DA in Westchester County, NY (just north of NYC).
|
|||
|
I do fraud cases, with a speciality in tech crimes.
|
|||
|
Whatever you would like to talk about is ok with me.
|
|||
|
I have been a prosecutor for 12 years, and helped
|
|||
|
write the NY computer crime laws.
|
|||
|
<SARAH> What kinds of tech crimes, Ken? ga
|
|||
|
<[ken] GUEST-3> I do telephone fraud and computer crimes, ranging
|
|||
|
from intrusions to theft of developmental software.
|
|||
|
ga
|
|||
|
<SARAH> Theft of developmental software? ga
|
|||
|
<[ken] GUEST-3> Yes, I have had two investigations in which it was
|
|||
|
alleged that person A stole software developed by
|
|||
|
person B. B claimed it was worth zillions. ga
|
|||
|
<[AmigaNut] JABBA> Ken, any comments/opinion on the controversial
|
|||
|
"Clipper Chip" proposal?
|
|||
|
<[ken] GUEST-3> Well, we are a bit out of my league, but I share many
|
|||
|
of the concerns that have appeared in the media: why
|
|||
|
the secret development? why no public debate over
|
|||
|
adoption, etc. ga
|
|||
|
<[AmigaNut] JABBA> How about your view of the necessity of such a thing
|
|||
|
for law enforcement?
|
|||
|
<[ken] GUEST-3> If I may be so bold, I think what you and others are
|
|||
|
really asking is if the need to tap any and all
|
|||
|
communications is a necessary skill for LE. That is a
|
|||
|
societal balancing act. What LE can do helps it fight
|
|||
|
crime. It also raises the spectre of abuse. And that
|
|||
|
can be scary. ga
|
|||
|
<[ross] GREENBER> LE = Law Enforcement
|
|||
|
<SARAH> More on Jabba's question, how often would you say you
|
|||
|
might have need of a phone tap on a scrambled phone?
|
|||
|
ga
|
|||
|
<[ken] GUEST-3> Not to be flippant, but whenever the bad guys use a
|
|||
|
scrambled phone. Actually, there are relatively few
|
|||
|
crimes for which taps are allowed, and the number
|
|||
|
varies state by state. There is no hard data yet on
|
|||
|
how often bad guys use scrambled phones. The real
|
|||
|
threat is from their use of cellular clones which
|
|||
|
makes tapping them as impossible as a scrambled phone
|
|||
|
does. ga
|
|||
|
<SARAH> Well, say, in your career, how many times have you had
|
|||
|
to do it? ga
|
|||
|
<[ken] GUEST-3> Never. ga
|
|||
|
<[Chuck] C.LEPAGE> Ken, have you ever handled any cases of
|
|||
|
harassment/obscene messaging on public BBs, or through
|
|||
|
e-mail? Do you ever have to deal with "stalker" cases?
|
|||
|
ga
|
|||
|
<[ken] GUEST-3> I have recently had a case like that brought to my
|
|||
|
attention. Frankly, it is not a fact pattern that I am
|
|||
|
inclined to do much with. I view it more as a matter
|
|||
|
internal to the bbs. I am more interested if the perp
|
|||
|
used a stolen credit card to get the bbs account. Now
|
|||
|
that's a real crime. ga
|
|||
|
<SARAH> Follow-up, Chuck?
|
|||
|
<[Cy TROic] F.GLYNN> Ken, what kind d of "intrusion" cases have you done?
|
|||
|
ga
|
|||
|
<[ken] GUEST-3> The most notable one is the outgrowth of the infamous
|
|||
|
(grin) Pumpcon police action. I cannot go into too
|
|||
|
much detail because charges are still pending.
|
|||
|
But, I have one person under indictment for breaking
|
|||
|
into a business computer and installing three user-ids
|
|||
|
into the PASSWD file. Two were superusers. He is
|
|||
|
charged with felony computer tampering and forgery.
|
|||
|
ga
|
|||
|
<[ross] GREENBER> Why only TWO superuser ids?
|
|||
|
<SARAH> (You might oughta define superuser.)
|
|||
|
<[ken] GUEST-3> One was set up as a regular id. ***(Prefer omission of
|
|||
|
rest of this answer; or if you must proceed as edited)***Want to know why? Ask
|
|||
|
the <intruder>. ga
|
|||
|
<[ross] GREENBER> (A superuser can do anything they like to a system,
|
|||
|
without exception.)
|
|||
|
<[ken] GUEST-3> Superuser means the computer thought he was god. ga
|
|||
|
<SARAH> This is the case I know as the Marriott Hotel Bust,
|
|||
|
right? Thanks, Ross. ga
|
|||
|
<[ken] GUEST-3> Right. ga
|
|||
|
<SARAH> What about theft of phone service? Is it just mostly
|
|||
|
kids cutting corners? ga
|
|||
|
<[ken] GUEST-3> That's how it starts. Unfortunately, it is a
|
|||
|
multi-billion dollar business that has caused at least
|
|||
|
one street murder in NYC in a battle over control of
|
|||
|
phone booths. ga
|
|||
|
<SARAH> A murder?! ga
|
|||
|
<[ken] GUEST-3> Yeah, the dead man tried to run his own call sell
|
|||
|
operation. That means he used stolen access codes and
|
|||
|
sold calls to people in the street. Ten bucks for 20
|
|||
|
minutes, anywhere in the world. His competitor wanted
|
|||
|
to control all the illegal street phone use in the
|
|||
|
neighborhood. It seems they could not reach an
|
|||
|
amicable settlement. ga
|
|||
|
<SARAH> This is a pretty big business? ga
|
|||
|
<[ken] GUEST-3> Estimates run from 1 to 6 billion dollars annually in
|
|||
|
lost revenue. ga
|
|||
|
<SARAH> Ouch! The Mafia? ga
|
|||
|
<[ken] GUEST-3> If you mean the good ole La Cosa Nostra, I do not
|
|||
|
know. If you mean organized crime: Yes! ga
|
|||
|
|
|||
|
|
|||
|
***(Prefer omission of next q&a or use edited version)***
|
|||
|
|
|||
|
|
|||
|
<[Chuck] C.LEPAGE> My gosh! How do you become a "super-user"? (Especially
|
|||
|
here on GEnie.) <g> How could you ever convince a
|
|||
|
system to let you do ANYTHING you wanted, as if you
|
|||
|
were the sysop? ga
|
|||
|
<[ken] GUEST-3> The <intruder> accessed the PASSWD file in an edit
|
|||
|
mode, and simply typed in the superuser ids. ga
|
|||
|
*****
|
|||
|
|
|||
|
<[ross] GREENBER> Follow-up, Chuck?
|
|||
|
<[Chuck] C.LEPAGE> Thanks. Is the average BB that easy to break
|
|||
|
into/tamper with?
|
|||
|
<[ken] GUEST-3> This was not a bbs, but the business computer of a
|
|||
|
retail store chain. It was very easy to break in to.
|
|||
|
They had not removed any default passwords from the
|
|||
|
initial login sequences. ga
|
|||
|
<[ross] GREENBER> Another, Chuck?
|
|||
|
<SARAH> Good grief!
|
|||
|
<[ross] GREENBER> Cy's up now. Go ahead, Cy
|
|||
|
<[Cy TROic] F.GLYNN> Ken, have you run into any cases involving Storm
|
|||
|
Shadow (Morty Rosenfield) or Phiber Obtik (Mark
|
|||
|
Abene). If so, what are your view of the cases? ga
|
|||
|
<[ken] GUEST-3> I have heard of these gentlemen, and met Phiber once.
|
|||
|
But no allegations against them have been made to me.
|
|||
|
ga
|
|||
|
<[ross] GREENBER> Follow up, Cy?
|
|||
|
<[Cy TROic] F.GLYNN> As a follow up to your last comment, Ken... What is
|
|||
|
your view about systems not getting rid of their
|
|||
|
defaults or lowering their security. Shouldn't they be
|
|||
|
held responsible for the "attacks" against them? ga
|
|||
|
<[ken] GUEST-3> NO! The law permits people to be sloppy, lazy, even
|
|||
|
stupid. None of that excuses an unauthorized break-in.
|
|||
|
You can leave your car with the door open,
|
|||
|
the key in the ignition, and the motor running, and no
|
|||
|
one can use it w/o your permission. Why should a
|
|||
|
computer be different?. ga
|
|||
|
<[ross] GREENBER> Another, Cy?
|
|||
|
<[Cy TROic] F.GLYNN> But, if you park your car in a bad section of the
|
|||
|
city, and even w/out "THECLUB" in better parts, you
|
|||
|
are asking for trouble. GA
|
|||
|
<[ken] GUEST-3> I am not saying that sloppy security is bright, and it
|
|||
|
is certainly true that LE looks askance at undue
|
|||
|
stupidity, but those are practical questions .. of how
|
|||
|
you treat a case, and separate from the question of
|
|||
|
whether the intrusion was ok under the law. ga
|
|||
|
<[ross] GREENBER> Done, Cy?
|
|||
|
<[Cy TROic] F.GLYNN> Yes. Thanks. :) GA!
|
|||
|
<[ross] GREENBER> Dennis, You're on! LE-to-LE!
|
|||
|
<[Dennis] D.MCCAULEY1> Ken, what's your assessment of the hacker threat these
|
|||
|
days? Is it mischief or is it a true concern to
|
|||
|
society? ga
|
|||
|
<[ken] GUEST-3> Sounding like a true lawyer, it is both! (g) Most
|
|||
|
teenage hacking is mischief, just like most other
|
|||
|
teenage misconduct. However, I know teenagers who
|
|||
|
are in the racket of stealing credit profiles from
|
|||
|
TRW-type companies and selling them to organized crime
|
|||
|
for illicit use. ga
|
|||
|
<[ross] GREENBER> Another, Dennis?
|
|||
|
<[Dennis] D.MCCAULEY1> Well, I meant public concern in the sense of starting
|
|||
|
World War III and that kind of thing.
|
|||
|
Like Kevin Mitnick was said to be able to do. ga
|
|||
|
<[ken] GUEST-3> No, that is pure media-hype BS! ga
|
|||
|
<[ross] GREENBER> Done, Dennis? (I take it you LIKED Wargames?)
|
|||
|
<[Dennis] D.MCCAULEY1> Well, I also wanted to ask Ken about porn on BBS's. ga
|
|||
|
<[ross] GREENBER> Go for it, then!
|
|||
|
<[ken] GUEST-3> Do you mean my favorite type <g>? ga
|
|||
|
<[Dennis] D.MCCAULEY1> OK Ken - what about garden-variety dirty pix on BBS?
|
|||
|
Seems to generate a lot of bad PR for the BBS world,
|
|||
|
but most don't carry more than your average video
|
|||
|
store. Not kiddie porn, of course, that's clearly
|
|||
|
illegal. ga
|
|||
|
<[ken] GUEST-3> The only problem has to do with the kids: can they get
|
|||
|
at it? or are they in it?
|
|||
|
Re the first issue, MOM and DAD are the best cops
|
|||
|
there are. Re the second, that's just about the most
|
|||
|
depraved bahavior there is. ga
|
|||
|
<[ross] GREENBER> Mitch, you're FINALLY up.
|
|||
|
<[Mitch] MITCHWAGNER> Okay, my question is whether computer crime really is
|
|||
|
a big business. All the stuff we read about seems to
|
|||
|
be penny-ante. Credit-card fraud for a couple of
|
|||
|
thousand of dollars at most. Is anyone making big
|
|||
|
money off of computer crime? This is something of a
|
|||
|
follow-up to Dennis's question. -ga-
|
|||
|
<[ken] GUEST-3> I am not aware of any big capers that I do not
|
|||
|
personally handle unless they get some publicity.
|
|||
|
The biggest bucks have been stolen as far as I know,
|
|||
|
not through intrusions, but by using the computer as
|
|||
|
the burglar tool or record keeper for the crime. In
|
|||
|
those types of cases, tens of millions have been
|
|||
|
stolen. ga
|
|||
|
<[ross] GREENBER> Follow-up, Mitch?
|
|||
|
<[Mitch] MITCHWAGNER> How did that work? ga
|
|||
|
<[ken] GUEST-3> Take your pick. Making up phony insurance policies to
|
|||
|
lure investors into the Equity Funding swindle about
|
|||
|
15 years ago was the first biggie.
|
|||
|
There is also the story that VW Corp in Germany got
|
|||
|
ripped off for many millions due a computer-directed
|
|||
|
fund transfer. But I cannot vouch for that. ga
|
|||
|
<[ross] GREENBER> Done, Mitch?
|
|||
|
<[Mitch] MITCHWAGNER> Yup.
|
|||
|
<[ross] GREENBER> Jabba, the AmigaNut, is up.
|
|||
|
<[AmigaNut] JABBA> Ken, when you participated in drafting the computer
|
|||
|
crime statutes, was there any significant opposition
|
|||
|
to the legislation? [ga]
|
|||
|
<[ken] GUEST-3> Not to the idea of it, but there was a lot of fighting
|
|||
|
about how they should be structured. The big problem
|
|||
|
was whether teenage curiosity was to be outlawed or
|
|||
|
not. ga
|
|||
|
<[ross] GREENBER> Follow-up, Jabba?
|
|||
|
<[AmigaNut] JABBA> Teenage curiosity? ga
|
|||
|
<[ken] GUEST-3> Yeah, "hackers" breaking in just to look. The answer
|
|||
|
was that it is illegal, but we trust the discretion of
|
|||
|
LE to know when to prosecute or not, just like in
|
|||
|
other crimes. ga
|
|||
|
<[ross] GREENBER> Another, Jabba?
|
|||
|
<[AmigaNut] JABBA> Ah. Does the statute contain confiscation provisions?
|
|||
|
ga
|
|||
|
<[ken] GUEST-3> No, not specifically. But if a computer is used to
|
|||
|
commit a crime, it goes under the general idea that
|
|||
|
the bad guy must forfeit the tools of his crime. ga
|
|||
|
<[ross] GREENBER> Does this fit under RICO?
|
|||
|
<[AmigaNut] JABBA> OK. Thanks.
|
|||
|
<[ken] GUEST-3> No. RICO is a federal statute that would not apply to
|
|||
|
a single person committing intrusions. ga
|
|||
|
<[ross] GREENBER> Thanks. Mike, you're up!
|
|||
|
<MIKE.C> Jabba just touched on this, but as a follow-up... Do
|
|||
|
you feel that there are adequate computer crime laws
|
|||
|
on the books? If not, is this because of a lack of
|
|||
|
understanding among legislators of how serious
|
|||
|
computer crime can be? ga
|
|||
|
<[ken] GUEST-3> The laws in NY are okay, but could be tighter. For
|
|||
|
example, there is no specific provision outlawing the
|
|||
|
unauthorized insertion of a virus, and to prove
|
|||
|
unauthorized use, LE has to show that the defendant
|
|||
|
was warned to stay out of the system! The problem
|
|||
|
is the ignorance of the legislature. ga
|
|||
|
<[ross] GREENBER> Mike, another question for Ken?
|
|||
|
<MIKE.C> Is a computer criminal prosecuted under the laws of
|
|||
|
the state he/she lives in, or where the computer is
|
|||
|
located? ga
|
|||
|
<[ken] GUEST-3> Can be either or both. Just like shooting someone
|
|||
|
across a state line. You can prosecute for murder in
|
|||
|
either state. We can assert jurisdiction where the
|
|||
|
actor was or where the penetrated computer was. ga
|
|||
|
<[ross] GREENBER> Follow-up on that, Mike?
|
|||
|
<MIKE.C> Do you think a strong national computer crime law
|
|||
|
would be a good idea? ga
|
|||
|
<[ken] GUEST-3> Sure, why not? But more important are well trained
|
|||
|
cops and prosecutors at all levels, especially the
|
|||
|
states. I hate to see the feds take over the field.
|
|||
|
They tend to treat everything as a national
|
|||
|
emergency. ga
|
|||
|
<MIKE.C> Thanks Ken, Ross!
|
|||
|
<[ross] GREENBER> Thanks for the questions, Mike. Cy's up!
|
|||
|
<[Cy TROic] F.GLYNN> Ken, what do you think of cases where a user on a BIG
|
|||
|
system (national), knows the system to a large extent.
|
|||
|
The user tells the Sysops of the systems of bugs and
|
|||
|
problems he has found. Do you think this user deserves
|
|||
|
thanks, or at least recognition or his finding?
|
|||
|
<[ken] GUEST-3> Is he an authorized user? ga
|
|||
|
<[Cy TROic] F.GLYNN> In my opinion, this kind of "hacker" is a asset. To
|
|||
|
other people, such as those on a system, he is a
|
|||
|
hacker. The user is authorized -- it is a public
|
|||
|
system. ga
|
|||
|
<[ken] GUEST-3> If he is authorized and does not exceed his
|
|||
|
authorization, then thank him. If he in not
|
|||
|
authorized or exceeds the level, that's like thanking
|
|||
|
the burglar for pointing out your loose window. ga
|
|||
|
<[ross] GREENBER> Cy, another?
|
|||
|
<[Cy TROic] F.GLYNN> Nope. Thanks!
|
|||
|
<[ross] GREENBER> Okey doke. Chuck, you're on stage!
|
|||
|
<[Chuck] C.LEPAGE> Ken, do you know if other countries have national
|
|||
|
computer crime laws? How do other nations deal with
|
|||
|
computer crime? Especially European nations. ga
|
|||
|
<[ken] GUEST-3> Most European nations, at least western, do have them.
|
|||
|
I do not know the details, however.ga
|
|||
|
<[ross] GREENBER> I know that the UK has VERY strong laws against
|
|||
|
Computer Misuse! Chuck, another?
|
|||
|
<[Chuck] C.LEPAGE> Do you know of any international statutes concerning
|
|||
|
computer crimes? ga
|
|||
|
<[ken] GUEST-3> I have not heard of any international provisions of
|
|||
|
any sort. ga
|
|||
|
<[ross] GREENBER> Chuck, another question for Ken?
|
|||
|
<[Chuck] C.LEPAGE> That's all for now.
|
|||
|
<[ross] GREENBER> Thanks, Chuck. Sarah? You're up!
|
|||
|
<SARAH> Backing up to computer porn, if someone handed you a
|
|||
|
case where a kid (say 19) with a local BBS had a
|
|||
|
closed directory for x-rated files, but a couple of
|
|||
|
x-rated files were found in an open directory, what
|
|||
|
would you do? ga
|
|||
|
<[ken] GUEST-3> Didn't this just happen somewhere near Cleveland?...
|
|||
|
<SARAH> I think so, but I don't remember the name.
|
|||
|
<[ken] GUEST-3> If the availability of the porn was accidental, then
|
|||
|
so what, IMHO. ga
|
|||
|
<SARAH> How would the kid prove it was accidental? ga
|
|||
|
<[ken] GUEST-3> By showing the protections he normally has in place.
|
|||
|
ga
|
|||
|
<SARAH> Ah, I see. Thanks. ga
|
|||
|
<[ross] GREENBER> Ken: if a person unknowingly spreads a virus, are they
|
|||
|
criminally negligent?
|
|||
|
<[ken] GUEST-3> No, not if they do so knowingly. That's intentional.ga
|
|||
|
Sorry, I misread your question....
|
|||
|
If they did so unknowingly, they they are not guilty
|
|||
|
of anything. Even criminal negligence requires a
|
|||
|
grossly sloppy and negligent behavior. Simple not
|
|||
|
knowing cannot convict you of anything. ga
|
|||
|
<[ross] GREENBER> Sarah advises me that cops like to get up early and go
|
|||
|
to bed early. This being Ken's first RTC (but
|
|||
|
hopefully not his last), let's wrap up. Any last
|
|||
|
questions?
|
|||
|
<[ross] GREENBER> Okey doke. Last question for the evening. Chuck, you
|
|||
|
have the honors!
|
|||
|
<[Chuck] C.LEPAGE Would you prosecute someone who spread a harmless
|
|||
|
virus, one that simply flashed a message at a given
|
|||
|
time, or would you just "slap his wrist"? I mean,
|
|||
|
would you NOT slap his wrist.
|
|||
|
<[ken] GUEST-3> If the virus is harmless, but it did intrude without
|
|||
|
any authorization, then some low level LE attention is
|
|||
|
warranted. How low level would depend on the details
|
|||
|
of the behavior and the extent of the spread. ga
|
|||
|
<[ross] GREENBER> Chuck, last question?
|
|||
|
<[Chuck] C.LEPAGE> That's it. Thank you, Ken.
|
|||
|
<SARAH> Ken, thanks so much for coming. This has been a really
|
|||
|
informative RTC. Can we ask you again some other time?
|
|||
|
<[ken] GUEST-3> Sure, be delighted. ga
|
|||
|
<SARAH> Then we'll say good night and let you get some sleep.
|
|||
|
:)
|
|||
|
<[ross] GREENBER> Ken, my thanks, too. I have a feeling that only about
|
|||
|
10% of the questions people wanted to ask got asked.
|
|||
|
So you'll be back sooner than you thought!
|
|||
|
<[ken] GUEST-3> OK, good night to all, and thanks for the opportunity
|
|||
|
to RTC with you. I think this sort of dialogue is
|
|||
|
VIP. ga
|
|||
|
<[ross] GREENBER> Good night, Ken!
|
|||
|
<SARAH> 'Night, Ken. :)
|
|||
|
<[ross] GREENBER> And, for those in the audience and for the
|
|||
|
question-askers: thanks for being here and for asking
|
|||
|
the questions!
|
|||
|
|
|||
|
|
|
|||
|
| This listing was generated by LRTC Version 1.00
|
|||
|
| (C)opyright by Hartmut W. Malzahn, 1991. All rights reserved.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 2 Jul 1993 16:00:05 EST
|
|||
|
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
|||
|
Subject: File 2--CPSR Workplace Privacy Test
|
|||
|
|
|||
|
CPSR Workplace Privacy Testimony
|
|||
|
=====================================================
|
|||
|
|
|||
|
Prepared Testimony
|
|||
|
and
|
|||
|
Statement for the Record
|
|||
|
of
|
|||
|
Marc Rotenberg,
|
|||
|
Director, CPSR Washington office,
|
|||
|
Adjunct Professor, Georgetown University Law Center
|
|||
|
on
|
|||
|
H.R. 1900,
|
|||
|
The Privacy for Consumers and Workers Act
|
|||
|
|
|||
|
Before
|
|||
|
The Subcommittee on Labor-Management Relations,
|
|||
|
Committee on Education and Labor,
|
|||
|
U.S. House of Representatives June 30, 1993
|
|||
|
|
|||
|
Mr. Chairman, members of the Subcommittee, thank for the opportunity
|
|||
|
to testify today on H.R. 1900, the Privacy for Consumers and Workers
|
|||
|
Act. My name is Marc Rotenberg and I am the director of the CPSR
|
|||
|
Washington office and an adjunct professor at Georgetown University
|
|||
|
Law Center where I teach a course on information privacy law.
|
|||
|
|
|||
|
Speaking on behalf of CPSR, we strongly endorse the Privacy for
|
|||
|
Consumers and Workers Act. The measure will establish important
|
|||
|
safeguards for workers and consumers in the United States. We believe
|
|||
|
that H.R. 1900 is particularly important as our country becomes more
|
|||
|
dependent on computerized information systems and the risk of privacy
|
|||
|
abuse increases.
|
|||
|
|
|||
|
CPSR has a special interest in workplace privacy. For almost a
|
|||
|
decade we have advocated for the design of computer systems that
|
|||
|
better serve the needs of employees in the workplace. We do not view
|
|||
|
this particular goal as a trade-off between labor and management. It
|
|||
|
is our belief that computer systems and information policies that are
|
|||
|
designed so as to value employees will lead to a more productive work
|
|||
|
environment and ultimately more successful companies and
|
|||
|
organizations. As Charles Hecksher of the Harvard Business School has
|
|||
|
said good managers have no use for secret monitoring.
|
|||
|
|
|||
|
Equally important is the need to ensure that certain fundamental
|
|||
|
rights of employees are safeguarded. The protection of personal
|
|||
|
privacy in the information age may be as crucial for American workers
|
|||
|
as the protection of safety was in the age of machines. Organizations
|
|||
|
that fail to develop appropriate workplace privacy policies leave
|
|||
|
employees at risk of abuse, embarrassment, and harassment.
|
|||
|
|
|||
|
The concern about workplace privacy is widely felt in the computer
|
|||
|
profession. This month MacWorld magazine, a leading publication in
|
|||
|
the computer industry, released a special report on workplace privacy.
|
|||
|
The report, based on a survey of 301 companies in the United States
|
|||
|
and authored by noted science writer Charles Piller, made clear the
|
|||
|
need for a strong federal policy.
|
|||
|
|
|||
|
Among the key findings of the MacWorld survey:
|
|||
|
|
|||
|
> More than 21 percent of those polled said that they had
|
|||
|
"engaged in searches of employee computer files, voice mail,
|
|||
|
electronic mail, or other networking communications."
|
|||
|
|
|||
|
> "Monitoring work flow" is the most frequently cited reason for
|
|||
|
electronic searches.
|
|||
|
|
|||
|
> In two out of three cases, employees are not warned about
|
|||
|
electronic searches.
|
|||
|
|
|||
|
> Only one third of the companies surveyed have a written policy on
|
|||
|
privacy
|
|||
|
|
|||
|
What is also interesting about the MacWorld survey is the high level
|
|||
|
of concern expressed by top corporate managers about electronic
|
|||
|
monitoring. More than a half of those polled said that electronic
|
|||
|
monitoring was either "never acceptable" or "usually or always
|
|||
|
counterproductive." Less than five percent believed that electronic
|
|||
|
monitoring was a good tool to routinely verify honesty.
|
|||
|
|
|||
|
These numbers suggest that managers would support a sensible privacy
|
|||
|
law. Indeed, they are consistent with other privacy polls conducted
|
|||
|
by Professor Alan Westin for the Lou Harris organization which show
|
|||
|
that managers are well aware of privacy concerns and may, with a
|
|||
|
little prodding, agree to sensible policies.
|
|||
|
|
|||
|
What would such a policy look like? The MacWorld report also
|
|||
|
includes a model privacy policy that is based on several U.S. and
|
|||
|
international privacy codes. Here are the key elements:
|
|||
|
|
|||
|
> Employees should know what electronic surveillance tools are used,
|
|||
|
and how management will use the data gathered.
|
|||
|
|
|||
|
> Management should minimize electronic monitoring as much as
|
|||
|
possible. Continuous monitoring should not be permitted.
|
|||
|
|
|||
|
> Data should only be used for clearly defined, work-related
|
|||
|
purposes.
|
|||
|
|
|||
|
> Management should not engage in secret monitoring unless there is
|
|||
|
credible evidence of criminal activity or serious wrongdoing.
|
|||
|
|
|||
|
> Data gathered through monitoring should not be the sole factor in
|
|||
|
employee evaluations.
|
|||
|
|
|||
|
> Personal information gathered by employers should not be disclosed
|
|||
|
to any third parties, except to comply with legal requirements.
|
|||
|
|
|||
|
> Employees or prospective employees should not be asked to waive
|
|||
|
privacy rights.
|
|||
|
|
|||
|
> Managers who violate these privacy principles should be subject to
|
|||
|
discipline or termination.
|
|||
|
|
|||
|
Many of these provisions are contained in H.R. 1900, the Privacy for
|
|||
|
Consumers and Workers Act. Clearly, the policies and the bill itself
|
|||
|
are not intended to prohibit monitoring, nor to prevent employers from
|
|||
|
protecting their business interests. What the bill will do is help
|
|||
|
establish a clear framework that ensures employees are properly
|
|||
|
notified of monitoring practices, that personal information is not
|
|||
|
misused, and that monitoring capability is not abused. It is a
|
|||
|
straightforward, sensible approach that does not so much balance
|
|||
|
rights as it clarifies interests and ensures that both employers and
|
|||
|
employees will respect appropriate limitations on monitoring
|
|||
|
capability.
|
|||
|
|
|||
|
The need to move quickly to establish a framework for workplace
|
|||
|
privacy protection is clear. Privacy problems will become more acute
|
|||
|
in the years ahead as new monitoring schemes are developed and new
|
|||
|
forms of personal data are collected. As Professor Gary Marx has made
|
|||
|
clear, there is little that can be imagined in the monitoring realm
|
|||
|
that can not be achieved. Already, some members of the computer
|
|||
|
profession are wearing "active badges" that provide full-time
|
|||
|
geographical monitoring. Properly used, these devices help employees
|
|||
|
use new tools in the hi-tech workplace. Improperly used, such devices
|
|||
|
could track the physical movements of an employee throughout the day,
|
|||
|
almost like a blip on a radar screen.
|
|||
|
|
|||
|
Computers are certainly powerful tools. We believe that they can be
|
|||
|
used to improve productivity and increase job satisfaction. But this
|
|||
|
requires that appropriate policies be developed to address employee
|
|||
|
concerns and that laws be passed, when necessary, to ensure that
|
|||
|
computer abuse does not occur.
|
|||
|
|
|||
|
This concludes my testimony. I would be pleased to answer your
|
|||
|
questions.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 30 Jun 1993 13:44:52 -0500
|
|||
|
From: lbreit@EFF.ORG(Lisa Breit)
|
|||
|
Subject: File 3--JOB OPENING AT EFF
|
|||
|
|
|||
|
Position Announcement
|
|||
|
|
|||
|
SYSTEMS ADMINISTRATOR
|
|||
|
|
|||
|
Electronic Frontier Foundation
|
|||
|
|
|||
|
The Electronic Frontier Foundation is a nonprofit public interest
|
|||
|
organization located in Washington, D.C. We are looking for a skilled
|
|||
|
Systems Administrator experienced with management of Unix-based Internet
|
|||
|
hosts, Macintosh LAN management, business applications, and user support.
|
|||
|
This is a key technical and administrative role in a rapidly growing
|
|||
|
organization with national visibility.
|
|||
|
|
|||
|
EFF recently moved its headquarters from Massachusetts to Washington. The
|
|||
|
Systems Administrator's initial responsibilities will include relocating
|
|||
|
EFF's servers and setting up a tech center in the DC office. The Systems
|
|||
|
Administrator reports to the Business Manager, and interfaces on a regular
|
|||
|
basis with program and support staff, members, subcontractors,
|
|||
|
collaborators, and the Board of Directors.
|
|||
|
|
|||
|
The current EFF Sun cluster includes a pair of SparcStation 2 workstations,
|
|||
|
and a SparcStation ELC workstation, with 3.0+ Gb. storage, Exabyte 8200
|
|||
|
(8mm) tape backup, and a CDROM drive. There is also a Telebit Netblazer
|
|||
|
doing double duty as a router (56kb to PSInet) and a terminal server with
|
|||
|
Telebit modems.
|
|||
|
|
|||
|
Most of EFF's projects are electronically mediated. Eff.org is the primary
|
|||
|
host for the core staff and volunteers of EFF for whom electronic mail is a
|
|||
|
"mission critical" function.
|
|||
|
|
|||
|
The Systems Administrator Position
|
|||
|
|
|||
|
The Electronic Frontier Foundation is seeking a hands-on, multi-talented
|
|||
|
Systems Administrator. In the coming year EFF will be expanding its
|
|||
|
internal system functions and providing more Internet-based services to
|
|||
|
individuals who are frequent Net users. We are looking for an individual
|
|||
|
with an outstanding technical background, good communication skills, a user
|
|||
|
service orientation, and a commitment to the Electronic Frontier
|
|||
|
Foundations's mission.
|
|||
|
|
|||
|
The Systems Administrator's job responsibilities include:
|
|||
|
|
|||
|
System Administration
|
|||
|
|
|||
|
o Eff.org is the Foundation's Internet access point. Support and
|
|||
|
maintain all hardware, software, and net traffic related to eff.org,
|
|||
|
including a cluster of Sun workstations, associated communications
|
|||
|
equipment, and key systems including SMTP, ftp archive, Gopher, and WAIS
|
|||
|
site.
|
|||
|
|
|||
|
o EFF LAN: Manage a 15 station Appletalk LAN (may be expanded).
|
|||
|
|
|||
|
o Voice Telephone System: Manage and maintain a 50 port PBX.
|
|||
|
|
|||
|
o System Maintenance: Ensure regular servicing, upgrading and
|
|||
|
maintenance of all hardware and communications systems; maintain data
|
|||
|
security and virus protections; perform regular backups.
|
|||
|
|
|||
|
o Record Keeping and Documentation: Maintain logs, inventories,
|
|||
|
reports, and any other records or paperwork required for management,
|
|||
|
insurance, administration, etc.; regularly draft and update documentation
|
|||
|
for internal systems and procedures.
|
|||
|
|
|||
|
Application Support and Training
|
|||
|
|
|||
|
o Support EFF's internal systems for MIS, communication,
|
|||
|
publications, and other functions, including hardware and software
|
|||
|
selection, purchase, installation and upgrade, troubleshooting, problem
|
|||
|
solving, and answering users' questions.
|
|||
|
|
|||
|
o Train staff and others as designated on a wide variety of
|
|||
|
applications used at EFF, including Microsoft Word, Excel, Filemaker Pro,
|
|||
|
Pagemaker, Internet-based utilities and other online services.
|
|||
|
|
|||
|
Program Support
|
|||
|
|
|||
|
o Work with policy, communications, and administrative staff to
|
|||
|
conduct online political organizing, fundraising, and education efforts.
|
|||
|
|
|||
|
o Assist in development of database applications to support EFF
|
|||
|
membership and fundraising.
|
|||
|
|
|||
|
o Support communications and membership staff by monitoring EFF's
|
|||
|
email and EFF hosted on-line newsgroups and discussion groups.
|
|||
|
|
|||
|
o Provide technical advise and expertise necessary to comprehend or
|
|||
|
formulate policy issues.
|
|||
|
|
|||
|
Qualifications:
|
|||
|
|
|||
|
This is a key position requiring a completely dependable individual who is
|
|||
|
able to be keep the trains running on time for day to day operations while
|
|||
|
completing special projects and a variety new development projects. S/he
|
|||
|
occasionally may be required to do some weekend work, and will wear a
|
|||
|
beeper. Ideal candidates will enjoy the challenge of a high demand job and
|
|||
|
the unpredictability of an interrupt-driven environment: We are seeking:
|
|||
|
|
|||
|
Substantial experience in Unix systems administration, including mastery of
|
|||
|
sendmail, DNS, and other Internet functions. Ability to write shell scripts
|
|||
|
using Unix tools such as perl and awk. Background in C programming an
|
|||
|
ability to customize, install and debug C programs.
|
|||
|
|
|||
|
Extensive Macintosh support including System 7.x, and networking both with
|
|||
|
LocalTalk an dEthernet, plus MacTCP. Hardware experience a plus.
|
|||
|
|
|||
|
Minimum 3 years experience in systems administration, including hardware
|
|||
|
and software purchase, setup and maintenance, record keeping, security,
|
|||
|
etc.
|
|||
|
|
|||
|
Good communication skills, and a helpful, instructive approach to
|
|||
|
supporting users;
|
|||
|
|
|||
|
Ability to work independently on multiple projects and as part of a team.
|
|||
|
|
|||
|
Ability to write clear and simple documentation, keep records and maintain
|
|||
|
an organized, orderly environment;
|
|||
|
|
|||
|
Interest in EFF's mission a definite plus;
|
|||
|
|
|||
|
B.S. or other technical degree in Computer Science, Electrical Engineering,
|
|||
|
MIS, or related field. Will consider experience in lieu of education.
|
|||
|
|
|||
|
Compensation:
|
|||
|
|
|||
|
Salary $28,000-$32,000 depending on experience
|
|||
|
|
|||
|
Full benefits include health insurance, disability, life insurance,
|
|||
|
pension, vacation.
|
|||
|
|
|||
|
How to apply:
|
|||
|
|
|||
|
This position is located in Washington DC. Deadline for applications is
|
|||
|
July 6. To apply, send a resume and cover letter by US mail to our
|
|||
|
recruiter in Massachusetts:
|
|||
|
|
|||
|
Electronic Frontier Foundation
|
|||
|
Systems Administrator Position
|
|||
|
238 Main Street
|
|||
|
Cambridge, MA 02142
|
|||
|
Attn: Lisa Breit
|
|||
|
|
|||
|
by email (ASCII only please): lbreit@eff.org
|
|||
|
|
|||
|
About the Electronic Frontier Foundation (EFF)
|
|||
|
|
|||
|
The Electronic Frontier Foundation was founded in July, 1990 to ensure
|
|||
|
freedom of expression in digital media, with a particular emphasis on
|
|||
|
applying the principles embodied in the Constitution and the Bill of Rights
|
|||
|
to computer-based communication. EFF has rapidly evolved into one of the
|
|||
|
leading organizations that individuals, corporations, the media, and
|
|||
|
government turn to when considering questions involving new communications
|
|||
|
technology.
|
|||
|
|
|||
|
EFF's mission is to foster the opportunities of digital communication for
|
|||
|
individuals and communities in a free and open society. The Foundation:
|
|||
|
|
|||
|
o Shapes the national policy debate on how the communications
|
|||
|
infrastructure will develop, and how electronic communications will be
|
|||
|
regulated;
|
|||
|
|
|||
|
o Facilitates discussion and organizes action around technology
|
|||
|
policy issues of interest to a wide range of groups and individuals, such
|
|||
|
as digital privacy and cryptography, the future of the Internet; etc. and
|
|||
|
|
|||
|
o Seeks and undertakes cases to defend the civil liberties of
|
|||
|
individuals and organizations using computers and communication technology,
|
|||
|
and provides informal legal services to net users;
|
|||
|
|
|||
|
o Engages in outreach and educational activities within the community
|
|||
|
of electronic network users as well as among law enforcement officials,
|
|||
|
policy makers, corporations and others.
|
|||
|
|
|||
|
EFF also creates forums, publications and information resources, available
|
|||
|
in print and on a number of electronic networks, to raise awareness of
|
|||
|
political, legal, social and cultural issues that result from the
|
|||
|
widespread use of electronic communication. Over the next few years, EFF
|
|||
|
will continue its work in the civil liberties, policy, and public education
|
|||
|
arenas, while sponsoring research projects and events that explore the
|
|||
|
nature of communities in Cyberspace, and support their evolution here and
|
|||
|
abroad.
|
|||
|
|
|||
|
In the next two years, EFF expects to broaden its presence on a range of
|
|||
|
electronic networks, expand its membership; experiment with organizing and
|
|||
|
fundraising campaigns conducted on electronic networks; add new members to
|
|||
|
its Board; and improve its communication program encompassing media
|
|||
|
relations, public speaking engagements for staff and Board members, the
|
|||
|
development of a number of online forums, and regular production of
|
|||
|
electronic and printed publications. EFF currently has 7 full time
|
|||
|
professional staff and two support staff. The staff size is expected to
|
|||
|
double over the next year to accommodate the anticipated growth of EFF's
|
|||
|
programs and operations.
|
|||
|
|
|||
|
EFF receives funding from a variety of sources, including corporations,
|
|||
|
individual donors, and other foundations. EFF also receives membership fees
|
|||
|
from several hundred individual and corporate members, which entitles them
|
|||
|
to publications and online access to discussions and seminars on the
|
|||
|
Internet.
|
|||
|
|
|||
|
oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
|
|||
|
Lisa A. Breit o c/o EFF o 238 Main Street, Cambridge, MA 02142
|
|||
|
Mailing address: 29 Beechwood Road, Waltham, MA 02154
|
|||
|
617-894-5415 phone o email: lbreit@eff.org
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 29 Jun 1993 22:15:17 -0400 (EDT)
|
|||
|
From: KAMAKIZE@DELPHI.COM
|
|||
|
Subject: File 4--CuDs on BBSes: "Other Side of Infinity"
|
|||
|
|
|||
|
((MODERATORS' NOTE: About one-third of CuD readers obtain CuD from
|
|||
|
local BBSes. We receive a few calls or letters each week from readers
|
|||
|
wondering if there are BBSes in their area that carry CuD, but we
|
|||
|
haven't kept formal list of boards that maintain up-to-date archives.
|
|||
|
There are so many, we can't maintain systematic records. But, we'll
|
|||
|
periodically publish a list of BBSes around the world that do. If your
|
|||
|
board does, let us know. Send a summary of the board and other
|
|||
|
information (in a brief paragraph or two) and every few months we will
|
|||
|
list them. Here's another board that maintains complete CuD files)).
|
|||
|
|
|||
|
BBS Name : The Other Side Of Reality
|
|||
|
BBS Phone: 703-366-4620
|
|||
|
Hours: 24
|
|||
|
All Cuds online and available on release date, and many EFF files
|
|||
|
available on first call.
|
|||
|
BBS is FREE.
|
|||
|
Run on WWIV BBS Software with a 14.4K modem
|
|||
|
Networked With WWIV-link,Icenet,Insanity
|
|||
|
CD-Rom Online with approx 10,000+ files online for D/l on first call
|
|||
|
|
|||
|
located in Roanoke,Virginia
|
|||
|
We also carry many Occult text Files, along with Computer related Files
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.49
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|