881 lines
42 KiB
Plaintext
881 lines
42 KiB
Plaintext
|
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Volume 2, Issue #2.10 (November 2, 1990) **
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|||
|
ARCHIVISTS: Bob Krause / Alex Smith
|
|||
|
USENET readers can currently receive CuD as alt.society.cu-digest.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source is
|
|||
|
cited. It is assumed that non-personal mail to the moderators may be
|
|||
|
reprinted, unless otherwise specified. Readers are encouraged to submit
|
|||
|
reasoned articles relating to the Computer Underground.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent the
|
|||
|
views of the moderators. Contributors assume all responsibility
|
|||
|
for assuring that articles submitted do not violate copyright
|
|||
|
protections.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: Len Rose Funds--A Humanitarian Necessity
|
|||
|
File 3: EFF Seeks Executive Director (Job Announcement)
|
|||
|
File 4: Massachusetts Computer Crime Bill
|
|||
|
File 5: Re: C-u-D, #2.09 Censoring of gif's
|
|||
|
File 6: The Piratical Dilemma
|
|||
|
File 7: Obtaining Identification Cards
|
|||
|
File 8: Logisticon vs. Revlon
|
|||
|
File 9: In-House Security Problems
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #2.10, File 1 of 9: Moderator's corner ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: Moderators' Corner
|
|||
|
Date: November 2, 1990
|
|||
|
|
|||
|
++++++++++
|
|||
|
In this file:
|
|||
|
1. CuD TAKING A FEW WEEKS OFF
|
|||
|
2. RE-SENDING ATI #51
|
|||
|
3. MULTIPLE MAILINGS OF CuD
|
|||
|
4. FOREIGN BBSs
|
|||
|
|
|||
|
+++++++++++++++
|
|||
|
An Hiatus of CuD
|
|||
|
+++++++++++++++
|
|||
|
|
|||
|
CuD will be taking a bit of time off. Gordon is off to Texas for a few weeks
|
|||
|
to his company's training grounds. Jim will be at the national criminology
|
|||
|
conference for a week, and then spending a week catching up on matters past
|
|||
|
deadline. The next issue should be about November 17. If you have articles,
|
|||
|
keep them coming, and be sure to send along papers you come across at
|
|||
|
conferences or elsewhere for the archives.
|
|||
|
|
|||
|
++++++++++++++
|
|||
|
ATI #51 will be Resent
|
|||
|
++++++++++++++
|
|||
|
|
|||
|
Those who received ATI #51 from the nets noticed that it was about a third as
|
|||
|
long as it should be. The reason was a formatting problem (periods in the
|
|||
|
first column between files truncated the remaining files). We have corrected
|
|||
|
this in the archives, but if you want to receive the corrected version,
|
|||
|
contact the ATI folks.
|
|||
|
|
|||
|
+++++++++++
|
|||
|
Receiving Multiple Copies of CuD
|
|||
|
+++++++++++
|
|||
|
|
|||
|
Some readers have received as many as ten identical copies of a single CuD
|
|||
|
issue. No, we do not send out 10 copies. The problem is that some mailers
|
|||
|
receive a copy for an address, but then kick it back to each of the other
|
|||
|
addresses listed in the blind carbon copy line. Sometimes we receive a
|
|||
|
returned issue as "non deliverable mail," even though the posting actually
|
|||
|
made it through. We have no way of knowing which bounces are accidents and
|
|||
|
which are real, so we re-send, and this sometimes leads to duplicate copies.
|
|||
|
Sorry 'bout that.
|
|||
|
|
|||
|
+++++++++++++++++
|
|||
|
Foreign BBSs
|
|||
|
+++++++++++++++++
|
|||
|
|
|||
|
We've received a few letters in the past week from Europe, Australia, New
|
|||
|
Zealand, and England (yeh, ok, it's part of Europe) indicating that the
|
|||
|
BBS/net world there should be addressed. We agree. SEND ALONG ARTICLES ON THE
|
|||
|
non-U.S. scene describing the net culture, what the BBSs are like, or any
|
|||
|
other news.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: Len Rose Funds--A Humanitarian Necessity
|
|||
|
Date: November 2, 1990
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #2.10: File 2 of 9: Len Rose Funds--Humanitarianism ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Len Rose has been released from DuPage County Jail through the successful
|
|||
|
efforts of Sheldon Zenner to reduce the original $50,000 bond to $10,000. An
|
|||
|
anonymous benefactor posted the bond.
|
|||
|
|
|||
|
Many of us feel that Len has, for some reason, been the victim of law
|
|||
|
enforcement excesses in "hacker-hunting." He had begun to put his life back
|
|||
|
together and had obtained a job with Interactive Systems Corporation. He
|
|||
|
worked there a week before being terminated for reasons that are not yet
|
|||
|
clear.
|
|||
|
|
|||
|
Len remains in Naperville, Ill., without a job. He is eligible for minimal
|
|||
|
social service benefits. However, he is currently unable to afford even the
|
|||
|
fare for public transportation between Naperville and his attorney in
|
|||
|
Chicago. Although there are individuals who have taken an interest in the
|
|||
|
legal issues involved in his situation, he has no means of providing for his
|
|||
|
wife and two young children. The holiday season is a lousy time to be in this
|
|||
|
situation.
|
|||
|
|
|||
|
Sheldon Zenner, the attorney who successfully defended Craig Neidorf, has
|
|||
|
agreed to channel donations to Len for those wishing to support him. *THIS IS
|
|||
|
NOT* a legal defense fund, but humanitarian assistance to provide food, rent,
|
|||
|
and utilities for wife and family. Contributing even a few dollars, the cost
|
|||
|
of renting a video tape, is one means of supporting one who appears to be
|
|||
|
bearing the brunt of the hostility of government toward the CU.
|
|||
|
|
|||
|
Len Rose Donation
|
|||
|
c/o Sheldon Zenner
|
|||
|
c/o Katten, Muchin and Zavis
|
|||
|
525 W. Monroe, Suite 1600
|
|||
|
Chicago, IL 60606
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Public Posting
|
|||
|
Subject: EFF Seeks Executive Director (Job Announcement)
|
|||
|
Date: October 31, 1990
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #2.10: File 3 of 9: EFF Job Announcement ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
JOB ANNOUNCEMENT
|
|||
|
|
|||
|
The Electronic Frontier Foundation, Inc. Executive Director
|
|||
|
|
|||
|
The Electronic Frontier Foundation (EFF) is conducting a search for an
|
|||
|
Executive Director. This is a full-time position, based in Cambridge,
|
|||
|
Massachusetts. The Executive Director will have overall responsibility for
|
|||
|
the operation of the EFF and will work closely with its five person Board of
|
|||
|
Directors.
|
|||
|
|
|||
|
About the EFF
|
|||
|
|
|||
|
The Electronic Frontier Foundation, Inc. is an operating foundation which
|
|||
|
engages in public education and legal programs to increase popular
|
|||
|
understanding of the social opportunities and challenges posed by
|
|||
|
developments in computing and telecommunications. It seeks the development
|
|||
|
of a new cultural and legal consensus in this country regarding digital
|
|||
|
media to benefit the lives of all people and preserve and protect the
|
|||
|
constitutionally guaranteed civil liberties of its citizens.
|
|||
|
|
|||
|
Responsibilities
|
|||
|
|
|||
|
The Executive Director will provide the overall management and leadership of
|
|||
|
the EFF's programs and activities, as supported closely by the EFF's Board.
|
|||
|
|
|||
|
Specifically, he or she will direct the EFF's public education and
|
|||
|
communications programs and will serve as a spokesperson and coordinator with
|
|||
|
the news media, other public interest organizations concerned with the social
|
|||
|
impact of technology, relevant professional societies, industry trade
|
|||
|
associations, government officials, law enforcement agencies, and other
|
|||
|
constituencies.
|
|||
|
|
|||
|
He or she will oversee the ongoing activities of the EFF's staff counsel and
|
|||
|
outside attorneys.
|
|||
|
|
|||
|
The Director will be responsible for the internal administration of EFF
|
|||
|
activities, including budgeting and financial management.
|
|||
|
|
|||
|
The Director will also be responsible for defining and initiating activities
|
|||
|
such as the EFF membership and fund raising programs.
|
|||
|
|
|||
|
Skills
|
|||
|
|
|||
|
An applicant should have relevant experience and accomplishments in the
|
|||
|
leadership and management of public sector and/or entrepreneurial
|
|||
|
organizations or activities. He or she should possess very strong oral and
|
|||
|
written communication skills and be both comfortable and proficient as a user
|
|||
|
of computer technology. A strong interest in public policy, technology, and
|
|||
|
civil liberties is a must. The ideal candidate will be a highly focused and
|
|||
|
self-motivated individual with an inclusive personal style.
|
|||
|
|
|||
|
Compensation is $42,000-$48,000, depending on experience. A strong benefits
|
|||
|
package is included.
|
|||
|
|
|||
|
To apply, please send a resume and a statement of qualifications to:
|
|||
|
|
|||
|
Mitchell Kapor, Chairman The Electronic Frontier Foundation, Inc. 155
|
|||
|
Second St. Cambridge, Massachusetts 02141
|
|||
|
|
|||
|
(617) 864-1550 (617) 864-0866 (fax) mkapor@well.sf.ca.us
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Mitch Kapor
|
|||
|
Subject: Massachusetts Computer Crime Bill
|
|||
|
Date: Mon, Oct 29, 1990
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #2.10: File 4 of 9: Massachusetts Computer Crime Bill ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
%The following summary is reprinted with permission from The Well--
|
|||
|
Moderators%.
|
|||
|
|
|||
|
Background
|
|||
|
***********
|
|||
|
|
|||
|
The EFF has, for the past three months, been involved with an extensive series
|
|||
|
of events concerning pending legislation in the state of Massachusetts
|
|||
|
concerning computer crime. Unbeknownst to almost everyone a computer crime
|
|||
|
bill had passed both houses of the Massachusetts legislature and was sitting
|
|||
|
on the Governor's desk awaiting signature.
|
|||
|
The original bill had a number of fundamental flaws, not the least of which
|
|||
|
was the unproven assumption that a bill which broadly criminalized whole
|
|||
|
ranges of computer-related activities was even called for. In fact, the bill
|
|||
|
appeared to operate from the same set of assumptions that we have seen too
|
|||
|
often in other EFF activities: an untested belief that more regulation is
|
|||
|
necessarily better and a disregard for the consequences of such an approach in
|
|||
|
stifling free speech and ordinary commerce. The result was a bill which was
|
|||
|
both unwise as well as unconstitutional.
|
|||
|
|
|||
|
The bill, while arguably well-intentioned, would have had severe unintended
|
|||
|
consequences such as making it a criminal act to teach a course in computer
|
|||
|
security and making a criminal of a software customer who failed to renew a
|
|||
|
license agreement.
|
|||
|
|
|||
|
In addition, there was virtually no real input into the process which led to
|
|||
|
the bill's passage, although the formalities were followed.
|
|||
|
|
|||
|
For these reasons the EFF joined with the Software Council in requesting the
|
|||
|
Governor veto the bill. Through a series of meetings with the Governor, his
|
|||
|
staff, the Attorney General, the Bar Association, and members of the Council,
|
|||
|
we were able to work out a compromise. It can be said without exaggeration
|
|||
|
that the EFF played the key role in this process. Sharon Beckman, in
|
|||
|
particular, was invaluable in spearheading the legal work, including the
|
|||
|
drafting of a replacement bill.
|
|||
|
|
|||
|
The Bill Itself
|
|||
|
*************
|
|||
|
|
|||
|
The language of the bill now balances property and free speech interests, and
|
|||
|
is the first such legislation to do so, as far as we know. As such, after its
|
|||
|
passage, it can serve as model legislation for other states as well as the
|
|||
|
country as a whole.
|
|||
|
|
|||
|
The preamble of the bill explicitly recognizes that the integrity of computer
|
|||
|
systems must be protected in a way which does not infringe on the rights of
|
|||
|
users of computer technology, including freedoms of speech, association, and
|
|||
|
privacy.
|
|||
|
|
|||
|
In its first provision, the bill makes it a crime to knowingly and without
|
|||
|
authorization access a controlled computer system with the intention of
|
|||
|
causing damage and actually cause damage in excess of $10,000. The second
|
|||
|
provision of the bill is identical to the one above except that it covers
|
|||
|
activities undertaken with reckless disregard of the consequences as opposed
|
|||
|
to intent to cause damage and carries a lesser penalty.
|
|||
|
|
|||
|
The bill breaks new ground is in the area of enforcement. Prosecutions may be
|
|||
|
brought only by the Attorney General and only after guidelines are established
|
|||
|
regarding the conduct of search and seizure operations. These guidelines must
|
|||
|
be consistent with the concerns stated in the preamble.
|
|||
|
|
|||
|
The bill also establishes a 17 person commission charged with recommending
|
|||
|
future legislation in this area.
|
|||
|
|
|||
|
The Task Ahead
|
|||
|
***************
|
|||
|
|
|||
|
Now that the Governor has sent a revised bill back to the Legislature, it is
|
|||
|
up to them. We will be meeting with the Legislative co-sponsors of the bill
|
|||
|
in the next few weeks to find out where they stand and, we hope, gather their
|
|||
|
support.
|
|||
|
|
|||
|
Here is the text of the bill itself
|
|||
|
|
|||
|
Proposed text of Mass. Computer Crime Bill
|
|||
|
|
|||
|
|
|||
|
Carefully balancing the need to make unlawful entry into
|
|||
|
computer systems a criminal offense against the need to protect
|
|||
|
the privacy and First Amendment rights of users of computers
|
|||
|
has, and remains, a basic tenet guiding Massachusetts efforts
|
|||
|
to prevent computer crime. To better strike this vital
|
|||
|
balance, and pursuant to authority vested in me by Article LVI
|
|||
|
of the Amendments to the Massachusetts Constitution, I am
|
|||
|
returning for amendment S.1543, "An Act Prohibiting Certain
|
|||
|
Acts Relative to Computers, Computer Data and Computer
|
|||
|
Systems".
|
|||
|
|
|||
|
S.1543 would have the unintended effect of restricting access
|
|||
|
to computers by legitimate users. Such restricted access would
|
|||
|
inadvertently chill the energy and creativity which are the
|
|||
|
hallmarks of Massachusetts business and industry.
|
|||
|
I agree with the bill's sponsors that there is a need for
|
|||
|
Massachusetts to make more clear that it is a crime to
|
|||
|
unlawfully enter some one else's computer system and through
|
|||
|
reckless or intentional behavior cause harm or damage.
|
|||
|
Therefore, in lieu of vetoing S. 1543, I recommend that it be
|
|||
|
amended by striking the language of the bill in its entirety
|
|||
|
and substituting in its place the following:
|
|||
|
|
|||
|
|
|||
|
AN ACT PROHIBITING CERTAIN ACTS RELATIVE TO COMPUTERS AND
|
|||
|
COMPUTER SYSTEMS.
|
|||
|
|
|||
|
Be it enacted by the Senate and House of Representatives in
|
|||
|
General Court assembled and by the authority of same, as
|
|||
|
follows:
|
|||
|
|
|||
|
SECTION 1. The General Court hereby finds and declares that the
|
|||
|
development of computer technology has given rise to new communication,
|
|||
|
privacy and property interests of importance to individuals,
|
|||
|
businesses, and government agencies in this Commonwealth. The
|
|||
|
protection of computer systems is therefore vital to the welfare of
|
|||
|
individuals and businesses in the Commonwealth.
|
|||
|
|
|||
|
The General court also finds and declares that computers and
|
|||
|
computer networks have enabled new forms of communication,
|
|||
|
including electronic publications, electronic bulletin boards,
|
|||
|
electronic conferences, and electronic mail,m which are
|
|||
|
protected by fundamental rights, including freedom of speech
|
|||
|
and association and freedom from unreasonable governmental
|
|||
|
intrusion.
|
|||
|
|
|||
|
It is the intention of this act to protect the integrity of
|
|||
|
computer systems without infringing on the rights described
|
|||
|
above and without impeding the use and development of computer
|
|||
|
and communications technology.
|
|||
|
|
|||
|
Therefore, the General Laws are hereby amended by inserting after
|
|||
|
chapter 266 the following chapter:
|
|||
|
|
|||
|
Chapter 266A.
|
|||
|
SECTION: 1.
|
|||
|
|
|||
|
(A) Whoever knowingly accesses a controlled access computer system
|
|||
|
knowing such access to be without authorization and knowingly causes
|
|||
|
the transmission of a program, information, code or command to a
|
|||
|
computer or computer system, without authorization and intending that
|
|||
|
such program, information, code or command will damage or cause damage
|
|||
|
to a computer, computer system, network, information, data or program,
|
|||
|
or withhold or deny, or cause the withholding or denial, of the use of a
|
|||
|
computer, computer services, system or network, information, data or
|
|||
|
program, and thereby causes loss or damage to one or more other persons
|
|||
|
of $10,000 or more shall be punished by imprisonment in a jail or house
|
|||
|
of correction for not more that 2 1/2 years, or a fine of not more than
|
|||
|
25,000 or both.
|
|||
|
|
|||
|
(B) Whoever knowingly accesses a controlled access computer system
|
|||
|
knowing such access to be without authorization and knowingly causes
|
|||
|
the transmission of a program, information, code or command to a
|
|||
|
computer or computer system, without authorization and with reckless
|
|||
|
disregard of a substantial and unjustifiable risk that such program,
|
|||
|
information, code or command will damage or cause damage to a computer,
|
|||
|
computer system, network, information, data or program, or withhold or
|
|||
|
deny, or cause the withholding or denial, of the use of a computer,
|
|||
|
computer services, system, or network, information, data or program,
|
|||
|
and thereby causes loss or damage to one or more other persons of
|
|||
|
$10,000 or more shall be punished by imprisonment in a jail or house of
|
|||
|
corrections for not more than 1 year, or a fine of not more than $5000,
|
|||
|
or both.
|
|||
|
|
|||
|
(C) Prosecutions, Investigations, and Reporting by the Attorney
|
|||
|
General
|
|||
|
|
|||
|
(1) Prosecutions under this section shall be brought only by
|
|||
|
the Attorney General.
|
|||
|
|
|||
|
(2) Any Application for a warrant to conduct a search or
|
|||
|
seizure of a computer, computer system, or electronic
|
|||
|
communication system under this section must be approved by the
|
|||
|
Attorney General or an Assistant Attorney General.
|
|||
|
|
|||
|
(3) The Attorney General shall, within six months of the
|
|||
|
effective data of this Act, issue guidelines for the procedures
|
|||
|
governing the investigation and prosecution of an offense under
|
|||
|
this section, incorporating in such guidelines a requirement
|
|||
|
that violations of this section be investigated by methods that
|
|||
|
are least restrictive of the rights of freedom of speech and
|
|||
|
association and the right to privacy implicated in computer
|
|||
|
systems, and least disruptive to legitimate use of computer
|
|||
|
systems, without jeopardizing compelling law enforcement
|
|||
|
interests.
|
|||
|
|
|||
|
Such guidelines shall not provide a basis for dismissal
|
|||
|
of an otherwise proper complaint brought under this
|
|||
|
sections or for exclusion of evidence that is otherwise
|
|||
|
admissible in a proceeding under this section.
|
|||
|
|
|||
|
(4) The Attorney General shall collect and compile
|
|||
|
information on, and report to the General Court annually on,
|
|||
|
searches, seizures, and prosecutions commenced pursuant to this
|
|||
|
section.
|
|||
|
|
|||
|
SECTION: 2.
|
|||
|
There is hereby established a study commission on
|
|||
|
computer technology and the law. The Commission shall
|
|||
|
consist of sixteen members who shall serve without
|
|||
|
compensation. Notwithstanding any provision of section
|
|||
|
six of chapter two hundred and sixty-eight A to the
|
|||
|
contrary, the commission shall consist of the attorney
|
|||
|
general or his designee who shall be chairman, the
|
|||
|
secretary of the executive office of economic affairs
|
|||
|
or his designee, the senate chair of the joint
|
|||
|
committee on criminal justice, the house chair of the
|
|||
|
joint committee on criminal justice, and twelve persons
|
|||
|
appointed by the governor, including two
|
|||
|
representatives from the Massachusetts Software Council
|
|||
|
and one representative of each of the following
|
|||
|
organizations, to be selected from a list of
|
|||
|
recommendations provided by that organization: the
|
|||
|
Massachusetts Bar Association, the Boston Bar
|
|||
|
Association, the state council of the AFL-CIO, the
|
|||
|
Boston Computer Society, and one representative from
|
|||
|
the computer hardware industry, one r
|
|||
|
|
|||
|
Said Commission shall investigate the legitimate communication,
|
|||
|
privacy, and property interests of individuals, businesses, and
|
|||
|
government agencies within this Commonwealth implicated by new
|
|||
|
computer technologies and shall evaluate the sufficiency of
|
|||
|
existing Massachusetts law to protect and preserve those
|
|||
|
interests.
|
|||
|
|
|||
|
The Commission shall report to the General Court the results of
|
|||
|
its investigation and study, and its recommendations, together
|
|||
|
with drafts of legislation to carry its recommendations into
|
|||
|
effect, by filing its report with the clerk of the house of
|
|||
|
representatives and with the clerk of the senate on or
|
|||
|
before____.
|
|||
|
|
|||
|
|
|||
|
Makes it a felony intentionally to cause harm to a computer or the
|
|||
|
information stored in it by transmitting a computer program or code
|
|||
|
(including computer viruses) without the knowledge and authorization of
|
|||
|
the person responsible for the computer attacked.
|
|||
|
|
|||
|
Makes it a misdemeanor recklessly to cause harm to a computer or the
|
|||
|
information stored in it by transmitting a computer program or code
|
|||
|
(including computer viruses) without the knowledge and authorization of
|
|||
|
the person responsible for the computer attacked.
|
|||
|
|
|||
|
JURISDICTION
|
|||
|
Covers harm to any computer or program that involves $1,000 worth of
|
|||
|
damage or tampering with medical records.
|
|||
|
|
|||
|
PENALTY
|
|||
|
Find and/or imprisonment for up to five years for the felony. Fine and/or
|
|||
|
imprisonment for up to one yer for the misdemeanor.
|
|||
|
|
|||
|
CIVIL CAUSE OF ACTION
|
|||
|
Creates a new, civil cause of action for those harmed by a violation of the
|
|||
|
Act for compensatory or injunctive relief.
|
|||
|
|
|||
|
DEFINITION OF "ACCESS"
|
|||
|
Defines "access" -- a term used throughout the Computer Fraud and
|
|||
|
Abuse Act -- to cover the remote transmission of a program to affect a
|
|||
|
computer or the information stored in it.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Alfred Heitink <U251010@HNYKUN11.BITNET>
|
|||
|
Subject: Re: C-u-D, #2.09 Censoring of gif's
|
|||
|
Date: Tue, 30 Oct 90 09:56:55 MET
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #2.10: File 5 of 9: Censorship outside the U.S. ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
The discussion so far has been concentrated on North America, but I would like
|
|||
|
to maken another point. In the USA a lot of BBS are censored. But because all
|
|||
|
those networks are interconnected and the NSF is an American organisation the
|
|||
|
'American' problem is exported, the values and American way of life are
|
|||
|
exported. It isn't simply owning the computers or networks or not.
|
|||
|
|
|||
|
It isn't possible for me as a European to download X rated pictures. from
|
|||
|
European sites. Everybody must be able to get access to information,
|
|||
|
uncensored. I don't like that people with other ideas are modifying my
|
|||
|
information. No access to X rated pictures? So what?... But what is next ....
|
|||
|
You can point out that it is only a technical problem. simply ignored.
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
some messages from ip sites in finland.
|
|||
|
|
|||
|
-=-=-=-JYU.FI -=-=-=-
|
|||
|
|
|||
|
Sorry, we had to remove the gifs.
|
|||
|
NSFnet people complained that this activity is overloading the
|
|||
|
NA <-> Scandinavia line.
|
|||
|
|
|||
|
I'll check if it is possible to make GIFs available for scandinavian sites
|
|||
|
or just for Finnish sites.
|
|||
|
|
|||
|
-jme
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=- JYU.FI =-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
The average usage of the Finland/Sweden 64kb line has lately been over 70% --
|
|||
|
this means that it will have to be upgraded to a 2M line (costing over k$25
|
|||
|
per month) very shortly. Even one ftp connection will eat up the available
|
|||
|
bandwidth very effectively.
|
|||
|
|
|||
|
Finland is supposedly the only Scandinavian country with more stuff being
|
|||
|
sent out than being pumped in. A recent traffic study of the Australia-USA
|
|||
|
line showed that a major portion of the traffic was actually ftps to a big
|
|||
|
GIF site in Finland !
|
|||
|
|
|||
|
Of course, one can argue that this is the American's problem, why did they
|
|||
|
have to go and censor all their GIF sites, forcing everyone from the rest of
|
|||
|
the world to crowd here to get their pictures ?
|
|||
|
|
|||
|
The people at NSFNet have informed us in no uncertain terms that if we don't
|
|||
|
do anything about it, they will pull our plug -- permanently. With these kinds
|
|||
|
of terrorist tactics, we have no choice but to close the GIF archives...
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-= LUT.FI =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
I have been TOLD to remove all GIF pictures on LUT.FI and have also done that.
|
|||
|
This is all due to overload on our local line from Lappeenranta to Espoo and
|
|||
|
from thereon to the States and Australia.
|
|||
|
|
|||
|
Please, DO NOT upload pictures here any more. All pictures will be removed as
|
|||
|
soon as they are found.
|
|||
|
|
|||
|
Kimmo Suominen
|
|||
|
System Manager
|
|||
|
E-mail: Kimmo.Suominen@lut.fi
|
|||
|
(end of mail messages/end of file)
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: "The Butler"
|
|||
|
Subject: The Piratical Dilemma
|
|||
|
Date: Thu, 01 Nov 90 18:59 CST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #2.10: File 6 of 9: The Piratical Dilemma ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
LEGAL ISSUE
|
|||
|
|
|||
|
With new laws concerning computer software being changed on a regular basis to
|
|||
|
keep users from making copies and "PIRATING" programs I am starting to feel
|
|||
|
guilty every time I make a backup of something. It is so easy to just make a
|
|||
|
copy of a program and give it to a friend or to just buy one copy of something
|
|||
|
and install it on two computers.
|
|||
|
|
|||
|
I am between a rock and a hard place. My situation is that I work for a fairly
|
|||
|
good size law firm that has several PCs. Well the practice of this particular
|
|||
|
law firm is to buy three or four copies of a software package and ask me to
|
|||
|
install it on 75 machines. Well I don't quite agree with this but, I also don't
|
|||
|
agree with the prices we have to pay for some software.
|
|||
|
|
|||
|
My dilemma and worry is that if this firm is ever caught and prosecuted can I be
|
|||
|
held responsible for doing something I was told to do???
|
|||
|
|
|||
|
I also have to wonder what kind of society this is when people who practice LAW
|
|||
|
don't even abide by it. What is the point of me obeying the law if, FOR GOD'S
|
|||
|
SAKE, my lawyer doesn't?
|
|||
|
|
|||
|
Someone should check into the firm that is prosecuting Len Rose and any other
|
|||
|
hacker for that matter and see if they have purchased every copy of software
|
|||
|
installed in their offices. I bet we could get several cases dropped!!!
|
|||
|
|
|||
|
The Butler....
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Anonymous
|
|||
|
Subject: Obtaining Identification Cards
|
|||
|
Date: Fri, 02 Nov 90 15:43 CST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #2.10: File 7 of 9: Obtaining "Identification Cards" ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
%An anonymous poster sent this in from the nets. He did not know
|
|||
|
the original poster--moderators%.
|
|||
|
|
|||
|
This from the Federal Register published 11-28-73, amended to 4-29-86:
|
|||
|
|
|||
|
"Section 16.32, Procedure to obtain an identification record.
|
|||
|
|
|||
|
The subject of an identification record may obtain a copy thereof by
|
|||
|
submitting a written request via the U.S. mails directly to the FBI,
|
|||
|
Identification Division, Washington, D.C. 20537-9700, or may present his/her
|
|||
|
written request in person during regular business hours to the FBI
|
|||
|
Identification Division, Room 11262, J. Edgar Hoover FBI Building, Tenth
|
|||
|
Street and Pennsylvania Avenue, NW., Washington, DC. Such request must be
|
|||
|
accompanied by satisfactory proof of identity, which shall consist of name,
|
|||
|
date and place of birth and a set of rolled-inked fingerprint impressions
|
|||
|
placed upon fingerprint cards or forms commonly utilized for applicant or law
|
|||
|
enforcement purposes by law enforcement agencies."
|
|||
|
|
|||
|
"An FBI identification record, often referred to as a "rap sheet", is a
|
|||
|
listing of certain information taken from fingerprint cards submitted to and
|
|||
|
retained by the FBI in connection with arrests and in some instances,
|
|||
|
includes information taken from fingerprint cards submitted in connection with
|
|||
|
Federal employment, naturalization, or military service..."
|
|||
|
|
|||
|
The fee for this exercise was, in 1986, $14.00; payable in the form a
|
|||
|
certified check or money order to the Treasury of the United States. A
|
|||
|
provision for waiver of this fee is available on proof of indigency. The
|
|||
|
report and the submitted fingerprint card are returned to the requestor by
|
|||
|
regular mail in approximately two weeks after receipt.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: fitz@WANG.COM(Tom Fitzgerald)
|
|||
|
Subject: Logisticon vs. Revlon
|
|||
|
Date: Thu, 1 Nov 90 11:01:59 EST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #2.10: File 8 of 9: Logisticon vs. Revlon ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Hello, I got this forwarded to me from DEC's Vogon news service. If
|
|||
|
Logisticon gets away with this, it's going to put some real knots in any
|
|||
|
future anti-hacking statutes.
|
|||
|
|
|||
|
<><><><><><><> T h e V O G O N N e w s S e r v i c e <><><><><><><>
|
|||
|
|
|||
|
Edition : 2182 Friday 26-Oct-1990 Circulation : 8434
|
|||
|
|
|||
|
Logisticon - Repossesses some programs electronically over payment dispute
|
|||
|
|
|||
|
%The Wall Street Journal, 25-Oct-90, p. A5%
|
|||
|
|
|||
|
Logisticon, a tiny Silicon Valley software maker has lent new meaning to the
|
|||
|
term repossession, using phone lines to tap into Revlon Inc. computers and
|
|||
|
disable programs that the software company claims Revlon didn't properly [sic
|
|||
|
- pay (?) TT] for properly. Revlon sued Logisticon in a California state
|
|||
|
court Monday, charging that Revlon suffered financial loss when two warehouses
|
|||
|
couldn't ship products because of the disabled software. A Revlon spokesman
|
|||
|
said the company withheld payment from Logisticon because the software had
|
|||
|
bugs and didn't perform as promised. Logisticon president Don Gallagher calls
|
|||
|
his company's action "repossession." Revlon, in its suit, calls it "an
|
|||
|
extortion attempt." The software spat, first reported in the San Jose Mercury
|
|||
|
News, illustrates a new use of the controversial practice of "hacking," in
|
|||
|
which computer sleuths use phone lines to enter computers with the knowledge
|
|||
|
of the computers' owner. It also shows the lengths to which a software company
|
|||
|
may have to go to protect what it sees as its intellectual property rights.
|
|||
|
"Software companies have to protect themselves," said Mr. Gallagher.
|
|||
|
|
|||
|
Logisticon sells inventory-management software around the world to such
|
|||
|
companies as Ford Motor Co., Federal Express and Abbott Laboratories. Mr.
|
|||
|
Gallagher said he received a letter Oct. 15 from Revlon saying that it
|
|||
|
wouldn't pay $180,000 remaining on a $1.2 million contract to supply
|
|||
|
warehouse-management software for Revlon warehouses in Phoenix, Ariz., and
|
|||
|
Edison, N.J.. Revlon also canceled a $500,000 second phase, he said. As a
|
|||
|
condition for payment of the $180,000, Revlon demanded that Logisticon give
|
|||
|
Revlon free access to the basic software called source code, Mr. Gallagher
|
|||
|
said. That would have allowed Revlon to freely duplicate Logisticon software
|
|||
|
that would normally sell for millions of dollars, he said. The bugs in the
|
|||
|
software were "minimal" and didn't hamper the operation of the system, he
|
|||
|
maintained. When Revlon refused to settle the issue, Mr. Gallagher said, he
|
|||
|
had employees use phone lines on Oct. 15 to disable Logisticon's software in
|
|||
|
the Revlon warehouses "in such a way to render the total system inoperable,"
|
|||
|
without harming Revlon's data. "We determined we had no recourse remaining,"
|
|||
|
he said. Logisticon switched the software back on three days later. Revlon, in
|
|||
|
its suit, charges that it wasn't able to ship products between Oct. 16 and
|
|||
|
Oct. 19 while the system was off. Logisticon, Revlon said, used its
|
|||
|
"familiarity with Revlon's system to commit ... extortionate acts." Logisticon
|
|||
|
planted viruses in the program that it later activated, the suit claims.
|
|||
|
|
|||
|
> <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
|
|||
|
> Please send subscription and back issue requests to CASEE::VNS
|
|||
|
>
|
|||
|
> Permission to copy material from this VNS is granted (per DIGITAL PP&P)
|
|||
|
> provided that the message header for the issue and credit lines for the
|
|||
|
> VNS correspondent and original source are retained in the copy.
|
|||
|
>
|
|||
|
> <><><><><><> VNS Edition : 2182 Friday 26-Oct-1990 <><><><><><><>
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Dark Adept (Ripco BBS)
|
|||
|
Subject: In-House Security Problems
|
|||
|
Date: Thu, 1 Nov 90 01:37 CST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #2.10: File 9 of 9: In-House Security Problems ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Crossing the barriers of the Underground....
|
|||
|
|
|||
|
In-House Security Problems
|
|||
|
by
|
|||
|
The Dark Adept
|
|||
|
|
|||
|
While the current anti-hacker fervor causes many people to think that hackers
|
|||
|
are the number one intruders into computer systems, this isn't the case. The
|
|||
|
foremost security problem is with employees. Many companies overlook what the
|
|||
|
possible consequences are for giving an employee computer access. Often times
|
|||
|
employees are given too much trust. This leads to problems in the long run.
|
|||
|
This article will attempt to entreat the common mistakes made by companies
|
|||
|
when dealing with their employees.
|
|||
|
|
|||
|
Employee Carelessness and Laziness
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Most people are lax when it comes to protecting something that is not their
|
|||
|
own. The system operator assumes that an employee will diligently memorize
|
|||
|
his ID and password and throw the paper away. This is usually not the case.
|
|||
|
Most people, being too lazy to memorize the password (or, after changing it,
|
|||
|
to memorize the new one), will keep a written copy of their password
|
|||
|
somewhere. If a fellow employee finds it, he is given the opportunity to
|
|||
|
cause untraceable havoc. Since the owner of the password knows nothing about
|
|||
|
these actions, the system operator will often assume that it's a hacker
|
|||
|
causing the trouble when it's not.
|
|||
|
|
|||
|
Another problem that employees create is not disposing of garbage properly. A
|
|||
|
hacker who goes trashing (digging through your garbage to find items of value)
|
|||
|
can find many printouts, manuals, and even passwords that employees have
|
|||
|
indiscriminately thrown away without censoring. The best practice is to shred
|
|||
|
all documents relating to computer transactions and send the shreddings to a
|
|||
|
recycling center. This helps the community and secures the information.
|
|||
|
Locked trash receptacles may be picked and/or broken into, and hackers have
|
|||
|
been known to go to the dump/processing center to grab trash. Even the most
|
|||
|
innocent printout should be destroyed. For example, a core dump off of an IBM
|
|||
|
360/370 architecture mainframe will give a hacker the following information:
|
|||
|
System name Type of Operating System
|
|||
|
Node name Various file/dataset names
|
|||
|
User ID Printer ID's
|
|||
|
JCL version etc., etc., etc.
|
|||
|
Volume names
|
|||
|
Unit names
|
|||
|
Type of system
|
|||
|
|
|||
|
That's a lot of information to hand out free to the "enemy"! Of course, a
|
|||
|
core dump is an extreme example, but any information regarding your system may
|
|||
|
be used by a hacker to his benefit. If he knows that you are running Unix (Tm
|
|||
|
AT&T), he can tailor his tactics to fit that type of system. If you are
|
|||
|
running MUSIC (Tm McGraw-Hill) he can adjust to that.
|
|||
|
|
|||
|
Some operators require employees to change their passwords at least every six
|
|||
|
months or so. This effort should be applauded. But what they don't realize
|
|||
|
is that many employees change them for a couple of days, and then they change
|
|||
|
them back because they are too lazy to memorize a new one. A hacker, if he
|
|||
|
has access to an account and the password changes, will almost always wait for
|
|||
|
the password to change back, and it usually does. System operators should
|
|||
|
have a utility to check and see if the password is changed and remains
|
|||
|
changed.
|
|||
|
|
|||
|
B
|
|||
|
Systems Operators
|
|||
|
-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
While a system operator has many responsibilities, the most important is
|
|||
|
account maintainance. When an employee is terminated, his account should be
|
|||
|
revoked IMMEDIATELY! Whether his termination was voluntary, requested, or
|
|||
|
involuntary, the account should be done away with instantaneously. If you
|
|||
|
don't, the results could be catastrophic. It would be comparable to firing
|
|||
|
someone but letting him keep a key to the store. He could walk in at any time
|
|||
|
and destroy files. If the system operator himself is terminated, the new
|
|||
|
system operator should go through the system with a fine-toothed comb. He
|
|||
|
must look for any method the ex-operator has of getting into his old account.
|
|||
|
Often times system operators either let the account self-destruct from lack of
|
|||
|
use, or they allow the termination notices to pile up in anticipation of doing
|
|||
|
one large purge at the end of the month. Obviously 30 days is more than
|
|||
|
enough time to destroy and/or copy a large portion of files.
|
|||
|
|
|||
|
For any employee, all his programs and files must be searched for trap doors,
|
|||
|
viruses, etc. Anything that could be used to gain entrance to the system must
|
|||
|
be destroyed. And, again, if he has a fellow employee's password, then there
|
|||
|
will be much trouble.
|
|||
|
|
|||
|
The system operator should also keep an eye on the log files and note attempts
|
|||
|
at unauthorized access by employees. Once on the inside, an unscrupulous
|
|||
|
person can cause more trouble than a run-of-the-mill hacker. Having access to
|
|||
|
any account is more than halfway to gaining access to the operator level.
|
|||
|
Most of the time employees are just poking around to see what's on the system
|
|||
|
(not much different from what hackers do!), and they won't cause any harm.
|
|||
|
But when there is a pattern of attempts to access something by a single
|
|||
|
employee, you can bet your bottom dollar that he is up to no good.
|
|||
|
|
|||
|
Social Engineering
|
|||
|
-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
One term that often appears in hacking papers is "social engineering". What
|
|||
|
this is, basically, is bullshipping your way into a computer system. It is
|
|||
|
easier done than explained. All one has to do is find someone who loves his
|
|||
|
work. Pretend there is a business called BusinessCoInc. It hires a system
|
|||
|
operator whose life is computers. The SysOp lives, eats, sleeps, breathes
|
|||
|
computers (gee, sounds like a hacker so far!). Well, say he goes to a
|
|||
|
computer conference. Now this chump is sitting at a conference, and some guy
|
|||
|
next to him starts talking about security. WOW! This idiot gets all excited
|
|||
|
and starts blabbing "Yeah! That's cool, but I have a Shayes callback modem
|
|||
|
hooked up to a Eunichs system running Try2HackMe security software. The only
|
|||
|
problem we had was...." The pinhead in question just told the guy how to get
|
|||
|
into his system. What's really funny is that the SysOp was just talking about
|
|||
|
something he loved. He got all excited to find someone else that shared the
|
|||
|
same interests that he lost his head and blabbed.
|
|||
|
|
|||
|
One of my buddies whom I've known since grade school currently attends Notre
|
|||
|
Dame University and is a business major. During summer break, he related to
|
|||
|
me a bit of advice one of his finance professors gave the class. He said,
|
|||
|
"Boys, the most important thing you'll learn in college is how to drink. More
|
|||
|
business deals have been made and more idiots taken advantage of over drinks
|
|||
|
than on the 18th hole. If you can't hold your liquor, sooner or later someone
|
|||
|
will take advantage of you." Now some people don't even need alcohol to get
|
|||
|
talking, but this is another aspect of social engineering. Basically, all
|
|||
|
social engineering is can be summed up as "Loose lips sink ships". And most
|
|||
|
businesses are half-submerged if this is true.
|
|||
|
|
|||
|
Another problem that relates to social engineering involves choosing
|
|||
|
passwords. Employees often choose passwords such as their wife's maiden name.
|
|||
|
A friend of an employee who does this has a greater chance of figuring out
|
|||
|
their password since they know something about the employee. Even if a word
|
|||
|
is chosen at random, a hacker can write a program that tries every word in his
|
|||
|
word processor's dictionary file until it finds the proper one. There is a
|
|||
|
greater chance of picking out "battle" using this type of program than
|
|||
|
"98^Y&$" using a sequential test program (one that tries every possible
|
|||
|
permutation of, say, a 10 character or less field from 512 possible
|
|||
|
characters).
|
|||
|
|
|||
|
To sum up, the most dangerous chinks in system security armor do not exist in
|
|||
|
the security system itself, but in the people who use the system. Laziness
|
|||
|
and carelessness of employees cause most security breeches, and most system
|
|||
|
breeches are inside jobs. The myth of the evil hacker sitting there
|
|||
|
destroying files is just that: a myth. The real problem is not the hackers;
|
|||
|
the real problem is the people who use the system.
|
|||
|
|
|||
|
Written 10/31/90 in Chicago, IL -- The Dark Adept
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
**END OF CuD #2.10**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|