882 lines
42 KiB
Plaintext
882 lines
42 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Volume 3, Issue #3.00 (January 6, 1991) **
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|||
|
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
|
|||
|
BYTEMASTER: Brendan Kehoe
|
|||
|
|
|||
|
USENET readers can currently receive CuD as alt.society.cu-digest.
|
|||
|
Anonymous ftp sites: (1) ftp.cs.widener.edu (2) cudarch@chsun1.uchicago.edu
|
|||
|
E-mail server: archive-server@chsun1.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source is
|
|||
|
cited. Some authors, however, do copyright their material, and those
|
|||
|
authors should be contacted for reprint permission.
|
|||
|
It is assumed that non-personal mail to the moderators may be reprinted
|
|||
|
unless otherwise specified. Readers are encouraged to submit reasoned
|
|||
|
articles relating to the Computer Underground.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent the
|
|||
|
views of the moderators. Contributors assume all responsibility
|
|||
|
for assuring that articles submitted do not violate copyright
|
|||
|
protections.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
CONTENTS:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: From the Mailbag
|
|||
|
File 3: Gender-Neutral Language
|
|||
|
File 4: Sexism and the CU
|
|||
|
File 5: Security on the Net
|
|||
|
File 6: The CU in the News
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.00: File 1 of 6: Moderator's corner ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: Moderators' Corner
|
|||
|
Date: January 6, 1991
|
|||
|
|
|||
|
++++++++++
|
|||
|
In this file:
|
|||
|
1. VOLUME 3 BEGINS WITH THIS ISSUE
|
|||
|
2. SEXISM AND CuD
|
|||
|
++++++++++
|
|||
|
|
|||
|
+++++++++++
|
|||
|
Volume 3 Starts Here
|
|||
|
+++++++++++
|
|||
|
|
|||
|
Volume 1, with issues #1.00 thru 1.29 and Volume 2, issues 2.00 thru 2.19,
|
|||
|
complete the first year of CuD. With the new year we start a new volume,
|
|||
|
and it will remain Volume #3 thru 1991. We'll spare readers self-indulgent
|
|||
|
reflections on the first year, but we're amazed that what began as a
|
|||
|
temporary outlet with Pat Townson's support and help back in March seems to
|
|||
|
have become at least semi-permanent. Following Craig Neidorf's victory, we
|
|||
|
thought there would be little else to write about, but the articles,
|
|||
|
comments, and responses keep coming, so we'll keep publishing as long as
|
|||
|
they do. The ftp sites have expanded and contain a variety of papers and
|
|||
|
documents related to the CU. We *STRONGLY ENCOURAGE* researchers, attorneys
|
|||
|
and law students to send quality papers over to us for the archives. We
|
|||
|
also thank all those who send in news blurbs--keep them coming.
|
|||
|
|
|||
|
+++++++++++
|
|||
|
CuD and Sexism
|
|||
|
++++++++++++
|
|||
|
|
|||
|
In a file below, the writer takes the moderators to task for not taking a
|
|||
|
stand on sexist language. We agree that writing should be as gender free as
|
|||
|
possible, but we don't change articles (except for formatting, spelling,
|
|||
|
and deleting long sigs). Authors have their own style, and while we object
|
|||
|
to sexist language (or any other action that reinforces the cultural power
|
|||
|
of one group over another), we cannot edit it out. An author's style is a
|
|||
|
valid index of cultural influences, and therefore it remains an open
|
|||
|
archive to be decoded as window into the world of, in this case, the CU. We
|
|||
|
*STRONGLY* encourage articles on the isms (ageism, sexism, racism) and the
|
|||
|
CU.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Various
|
|||
|
Subject: From the Mailbag
|
|||
|
Date: January 6, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.00: File 2 of 6: From the Mailbag ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: wayner@SVAX.CS.CORNELL.EDU(Peter Wayner)
|
|||
|
Subject: Re: Cu Digest, #2.19
|
|||
|
Date: Thu, 3 Jan 91 14:27:26 -0500
|
|||
|
|
|||
|
This is in reply to John Debert's note in CuDigest #2.19:
|
|||
|
|
|||
|
He writes:
|
|||
|
"Now, suppose that someone has used this method to encrypt files on his/her
|
|||
|
system and then suppose that Big Brother comes waltzing in with a seizure
|
|||
|
warrant, taking the system along with all the files but does not take the
|
|||
|
code keys with them. Knowing Big Brother, he will really be determined to
|
|||
|
find evidence of a crime and is not necessarily beneath (or above) fudging
|
|||
|
just a bit to get that evidence. What's to keep him from fabricating such
|
|||
|
evidence by creating code keys that produce precisely the resultsthat they
|
|||
|
want-evidence of a crime? Would it not be a relatively simple procedure to
|
|||
|
create false evidence by creating a new key using the encrypted files and a
|
|||
|
plaintext file that says what they want it to? Using that new key, they
|
|||
|
could, in court, decrypt the files and produce the desired result, however
|
|||
|
false it may be. How can one defend oneself against such a thing? By
|
|||
|
producing the original keys? Whom do you think a court would believe in
|
|||
|
such a case?
|
|||
|
|
|||
|
One should have little trouble seeing the risks posed by encryption."
|
|||
|
|
|||
|
This is really unlikely, because in practice most people only use one-time
|
|||
|
pads for communication. They are not in any way practical for on-site
|
|||
|
encryption. Imagine you have 40 megabytes of data. If you want to encrypt
|
|||
|
it with a one-time pad, you need 40 megabytes of key. If you did this,
|
|||
|
it would be very secure because there exists a perfectly plausible 40 Meg key
|
|||
|
for each possible 40 meg message.
|
|||
|
|
|||
|
But, if you were going to keep the 40 megs of encrypted data handy, you
|
|||
|
would need to keep the 40 megs of key just as handy. When the government
|
|||
|
came to call, they would get the key as well. That is why it is only
|
|||
|
practical to use systems like DES and easy to remember, relatively short
|
|||
|
keys to do the encryption. That way there is nothing to seize but your
|
|||
|
brain.
|
|||
|
|
|||
|
---Peter Wayner
|
|||
|
Dept. of Computer Science, Cornell Univ.
|
|||
|
(wayner@cs.cornell.edu)
|
|||
|
|
|||
|
++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: CuD Dump Account <works!cud@UUNET.UU.NET>
|
|||
|
Subject: BBSs as Business Phones?
|
|||
|
Date: Thu, 03 Jan 91 15:57:49 EDT
|
|||
|
|
|||
|
Ok this is just a quick question.
|
|||
|
|
|||
|
How can it be legal to make BBS' operators shell out extra money for a
|
|||
|
hobby, answering machines aren't something people have to pay extra for,
|
|||
|
and in some cases thats what BBS's are used for. If its a public BBS, it is
|
|||
|
receiving no true income from its users, unless they pay a standard,
|
|||
|
billable time, (ie. A commercial BBS) What gives them the right to charge
|
|||
|
us now? They don't force you to pay for special business class lines/fiber
|
|||
|
optic lines to call lond distance do they? No its by choice. Most SysOps
|
|||
|
buy the cheapest line available which is usually local only, no dial out,
|
|||
|
etc. SysOp's in the long run absorb most, if not all the costs of running a
|
|||
|
BBS, that means power, servicing, and the phone. The phone line at minimum,
|
|||
|
is going to cost at least a hundred or so per year. Then power, its absurd.
|
|||
|
In my case, I run a BBS to share information, and I allow everyone on for
|
|||
|
free. I've seen the old FCC proposals to have people using modems pay
|
|||
|
more, but I don't rightly see why. If I am not mistaken this is bordering
|
|||
|
on their greed to make more money for the growing modem populous.
|
|||
|
|
|||
|
Do they have a right to charge us? are they providing any type of special
|
|||
|
service because we have a modem on the line, instead of an answering
|
|||
|
machine, FAX, phone, or other? we are private citizens, it should be up to
|
|||
|
us how we use the phones. TelCo's still a monopoly
|
|||
|
|
|||
|
There are a lot of rumours about this type of thing, only I've never seen
|
|||
|
it actually put into action.
|
|||
|
|
|||
|
+++++++++++++++++++++++++
|
|||
|
|
|||
|
From: Paul Cook <0003288544@MCIMAIL.COM>
|
|||
|
Suject: Response to "Hackers as a software development tool"
|
|||
|
Date: Fri, 4 Jan 91 06:44 GMT
|
|||
|
|
|||
|
%Andy Jacobson <IZZYAS1@UCLAMVS.BITNET> writes:%
|
|||
|
>
|
|||
|
>I received one of those packs of postcards you get with comp. subscription
|
|||
|
>magazines (Communications Week) that had an unbelievable claim in one of
|
|||
|
>the ads. I quote from the advertisement, but I in no way promote,
|
|||
|
>recommend, or endorse this.
|
|||
|
>
|
|||
|
>"GET DEFENSIVE!
|
|||
|
>YOU CAN'S SEE THEM BUT YOU KNOW THEY'RE THERE.
|
|||
|
>Hackers pose an invisible but serious threat to your information system.
|
|||
|
>Let LeeMah DataCom protect your data with the only data security system
|
|||
|
>proven impenetrable by over 10,000 hackers in LeeMah Hacker Challenges I
|
|||
|
>and II. For more information on how to secure your dial-up networks send
|
|||
|
>this card or call, today!" (Phone number and address deleted.)
|
|||
|
>
|
|||
|
>So it seems they're claiming that 10,000 hackers (assuming there are that
|
|||
|
>many!) have hacked their system and failed. Somehow I doubt it. Maybe they
|
|||
|
>got 10,000 attempts by a team of dedicated hackers, (perhaps employees?)
|
|||
|
>but has anyone out there heard of the LeeMah Hacker Challenges I and II?
|
|||
|
|
|||
|
Yes, Lee Mah is for real. They make a some nice computer security
|
|||
|
equipment to stop folks from trying to gain access to your dialup modems.
|
|||
|
|
|||
|
The "Hacker Challenge" is for real too. They publicized it for a long
|
|||
|
time, and I recall reading about it in PC Week, Byte, and possibly
|
|||
|
InfoWorld. I don't know how accurate the "10,000" hackers is (maybe it was
|
|||
|
10,000 call attempts?) but they ran a couple of contests where they gave a
|
|||
|
phone number of one of their devices, and offered some kind of a prize to
|
|||
|
anyone who could figure out how to get in. I have seen the Lee Mah
|
|||
|
catalog, and I don't recall how they provide security, but I think some of
|
|||
|
their gear uses dialback modems that call pre-programmed user numbers when
|
|||
|
the right code is entered.
|
|||
|
|
|||
|
++++++++++++++++++++++
|
|||
|
|
|||
|
From: stanley@PHOENIX.COM(John Stanley)
|
|||
|
Subject: Re: a.k.a. freedom of expression
|
|||
|
Date: Fri, 04 Jan 91 23:45:31 EST
|
|||
|
|
|||
|
In CuD 2.19, balkan!dogface!bei@CS.UTEXAS.EDU(Bob Izenberg) writes:
|
|||
|
|
|||
|
> I read this in issue 2.16 of the Computer Underground Digest:
|
|||
|
>
|
|||
|
> [ quoted text follows ]
|
|||
|
>
|
|||
|
> ADAM E. GRANT, a/k/a The :
|
|||
|
> Urvile, and a/k/a Necron 99, :
|
|||
|
> FRANKLIN E. DARDEN, JR., a/k/a :
|
|||
|
> The Leftist, and :
|
|||
|
> ROBERT J. RIGGS, a/k/a :
|
|||
|
> The Prophet :
|
|||
|
> [ quoted text ends ]
|
|||
|
>
|
|||
|
> The assumption here, that an alias employed in computer communications is
|
|||
|
> the same as an alias used to avoid identification or prosecution, doesn't
|
|||
|
> reflect an awareness of the context within which such communications
|
|||
|
> exist.
|
|||
|
|
|||
|
The only reason "The Prophet" was used was to avoid identification.
|
|||
|
But, that doesn't really matter. The reason it was included in the
|
|||
|
Government doohicky was to identify the one legal name and alternates
|
|||
|
chosen by the defendant used by him as his sole identification at specific
|
|||
|
times.
|
|||
|
|
|||
|
> The very nature of some computer operating systems demands some
|
|||
|
> form of alias from their users. Management policy also affects how you
|
|||
|
> can identify yourself to a computer, and to anyone who interacts with you
|
|||
|
> through that computer.
|
|||
|
|
|||
|
How you identify yourself in communications is entirely up to you. You
|
|||
|
do not need to use your computer User ID as your sole identity. Note that
|
|||
|
the From: line of your original post identified you, as does mine. If I
|
|||
|
add a .sig that identifies me as "Draken, Lord of Trysdil", and remove the
|
|||
|
From: comment name, then you know me as Draken, and bingo, I have an a.k.a.
|
|||
|
Am I doing it to commit a crime? Probably not. It doesn't really matter.
|
|||
|
|
|||
|
> If we strip the implication from those three letters
|
|||
|
> that the party of the leftmost part is calling themselves the party of the
|
|||
|
> rightmost part to avoid getting nabbed with the goods, what's left?
|
|||
|
|
|||
|
You are left with the fact that they are also known as ..., which is
|
|||
|
just what the a.k.a stands for. It does NOT stand for Alias for Kriminal
|
|||
|
Activity, as you seem to think it does. The "implication" you speak of is
|
|||
|
an incorrect inferance on your part. Guilty conscience?
|
|||
|
|
|||
|
> In using a computer communications medium, particularly an informal one
|
|||
|
> like a BBS, the name you choose can set the tone for the aspect of your
|
|||
|
> personality that you're going to present (or exaggerate.)
|
|||
|
|
|||
|
You mean, like, the name you chose is how you will be known? Like, you
|
|||
|
will be known to some as "Bob Izenberg", but on the BBS you will be also
|
|||
|
known as "Krupkin the Gatherer"? Like a.k.a.?
|
|||
|
|
|||
|
> Are radio
|
|||
|
> announcers using their "air names" to avoid the law? How about people with
|
|||
|
> CB handles? Movie actors and crew members? Fashion designers? Society
|
|||
|
> contains enough instances of people who, for creative reasons, choose
|
|||
|
> another name by which they're known to the public.
|
|||
|
|
|||
|
And if any of them go to court, they will have a.k.a., too. There will
|
|||
|
be their legal name, followed by the a.k.a. There is no implication of
|
|||
|
criminal activity from just having an a/k/a, just the indication that the
|
|||
|
prosecution wants to make sure the defendants are identified. "Him. That
|
|||
|
one, right there. His legal name is X, but he is also known as Y and Z. All
|
|||
|
the evidence that says that Y did something is refering to him, X, because
|
|||
|
the witness knows him by that."
|
|||
|
|
|||
|
> Whenever somebody uses a.k.a., correct them%!
|
|||
|
|
|||
|
Ok, consider this a correction, at your own demand.
|
|||
|
|
|||
|
+++++++++++++++++++++++
|
|||
|
|
|||
|
From: 6600mld@UCSBUXA.BITNET
|
|||
|
Subject: Response to Encryption dangers in seizures
|
|||
|
Date: Sat, 5 Jan 91 14:19:07 PST
|
|||
|
|
|||
|
>Subject: Encryption dangers in Seizures
|
|||
|
>Date: Sat, 29 Dec 90 11:20 PST
|
|||
|
|
|||
|
[misc background on encryption and its use to thwart Big Brother deleted.]
|
|||
|
|
|||
|
>Now, suppose that someone has used this method to encrypt files on his/her
|
|||
|
>system and then suppose that Big Brother comes waltzing in with a seizure
|
|||
|
>warrant, taking the system along with all the files but does not take the
|
|||
|
>code keys with them. Knowing Big Brother, he will really be determined to
|
|||
|
>find evidence of a crime and is not necessarily beneath (or above) fudging
|
|||
|
>just a bit to get that evidence. What's to keep him from fabricating such
|
|||
|
>evidence by creating code keys that produce precisely the results that they
|
|||
|
>want-evidence of a crime? Would it not be a relatively simple procedure to
|
|||
|
>create false evidence by creating a new key using the encrypted files and a
|
|||
|
>plaintext file that says what they want it to? Using that new key, they
|
|||
|
>could, in court, decrypt the files and produce the desired result, however
|
|||
|
>false it may be. How can one defend oneself against such a thing? By
|
|||
|
>producing the original keys? Whom do you think a court would believe in
|
|||
|
>such a case? > >One should have little trouble seeing the risks posed by
|
|||
|
encryption.
|
|||
|
|
|||
|
I think it unlikely that if the Feds wanted to frame you or fabricate
|
|||
|
evidence that they would bother to use the encrypted data found at your
|
|||
|
site. Instead, I think, they would fabricate the whole wad -- plaintext,
|
|||
|
key, and ciphertext. For this reason, it is not only one-time key
|
|||
|
encryption that is threatened, but iterative algorithms as well.
|
|||
|
|
|||
|
So, if I have data encrypted, and the feds are going to "fix" it, why is
|
|||
|
this any more dangerous than having NO DATA? If they want to frame me,
|
|||
|
they're going to (try), regardless of whether they found encrypted data or
|
|||
|
not! Thus, I see encryption as preventing the feds from really KNOWING
|
|||
|
what you do and do not have. This is very valuable. I think that even in
|
|||
|
our mostly corrupt government that it would be difficult to fabricate
|
|||
|
evidence to the tune of posession of AT&T source code.
|
|||
|
|
|||
|
Similar tactics can be applied JUST AS EASILY to physical crimes. The
|
|||
|
crime lab finds a dead guy with a .44 slug in him. The suspect owns a .44,
|
|||
|
but not the one used in the shooting. What is to prevent the (now seized)
|
|||
|
.44 of the suspect to be fired and the slug swapped for the slug discovered
|
|||
|
in the body? This is trivial to accomplish, assuming the poeple involved
|
|||
|
are sufficiently crooked.
|
|||
|
|
|||
|
Now, I'm not saying that the Feds don't fabricate evidence. But I do not
|
|||
|
think that encrypting one's data makes one a more vulnerable target to such
|
|||
|
injustice.
|
|||
|
|
|||
|
>jd / onymouse@netcom.UUCP netcom!onymouse@apple.com
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: "Brenda J. Allen (303) 492-0273" <ALLEN_B@CUBLDR.COLORADO.EDU>
|
|||
|
Subject: Gender-Neutral Language
|
|||
|
Date: Wed, 2 Jan 1991 14:03 MST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.00: File 3 of 6: Gender-Neutral Language ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
The Dark Adept's article (CuD #2.10, File 9) on In-House Security Problems
|
|||
|
was informative and insightful. However, I was appalled by the author's
|
|||
|
consistent and flagrant use of masculine pronouns and sex-linked nouns to
|
|||
|
refer to persons (hackers, system operators, employees) who could be either
|
|||
|
male or female. Although hackers and system operators traditionally have
|
|||
|
been men, women also are assuming those roles. Moreover, employees who use
|
|||
|
computers certainly comprise both genders. Therefore, references to users
|
|||
|
as males (e.g., "employees often choose passwords such as their wife's
|
|||
|
maiden name") are particularly inappropriate and sexist.
|
|||
|
|
|||
|
I am not accusing the author of intentional discrimination against females.
|
|||
|
Rather, I believe that he or she may not be aware of the implications and
|
|||
|
ramifications of gender-biased language. Language has the power to shape
|
|||
|
thought, reinforce biases, and perpetuate stereotypes. Consequently,
|
|||
|
omitting mention of females in a discussion about computer-related
|
|||
|
activities may help to sustain the impression of male domination of that
|
|||
|
area of our lives. Moreover, such oversights may send the covert message
|
|||
|
that some persons wish to maintain such an image, to discount contributions
|
|||
|
by women, and/or to discourage female participation.
|
|||
|
|
|||
|
Therefore, I encourage everyone to become more thoughtful of their choice
|
|||
|
of words and more sensitive to issues regarding gender. This seems
|
|||
|
particularly crucial in the contemporary forum of electronic discourse. As
|
|||
|
we pave new paths, we must assume responsibility for changing old language
|
|||
|
habits. Also, we should strive to avoid sending implicit and explicit
|
|||
|
messages regarding females and their roles in computer science and related
|
|||
|
fields.
|
|||
|
|
|||
|
On a positive note, I've observed such awareness in other CuD files. For
|
|||
|
instance, job announcements usually cite both genders, and Alan Wexelblat
|
|||
|
recently qualified a reference to philosophers as males by noting that
|
|||
|
women had been systematically excluded from that area of study.
|
|||
|
|
|||
|
Guidelines for avoiding the use of male-only pronouns include the
|
|||
|
following: reword sentences to eliminate unnecessary gender pronouns;
|
|||
|
alternate the use of female and male pronouns and nouns; recase sentences
|
|||
|
into plural forms (e.g., "they" or "we"); use neutral terms like "one,"
|
|||
|
"you," "an individual," etc. instead of "he" or "she." Another way to
|
|||
|
avoid subtle sexism is to substitute asexual words and phrases for
|
|||
|
man-words (e.g., "spouse's name" instead of "wife's maiden name").
|
|||
|
|
|||
|
Although applying these and other guidelines may be challenging and
|
|||
|
somewhat time-consuming, it is imperative that we make the effort to
|
|||
|
acknowledge the changing shape of our society as women continue to occupy
|
|||
|
positions previously reserved for men.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Liz E. Borden
|
|||
|
Subject: Sexism and the CU
|
|||
|
Date: Mon, 31 Dec 90 12:52 PST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.00: File 4 of 6: Sexism and the CU ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Why, you ask, do I think the CU is sexist? Carol Gilligan wrote that women
|
|||
|
speak in "a different voice" from men, one grounded more in nurturing,
|
|||
|
dialogue, negotiation and control-fee language. The voice of the computer
|
|||
|
world reflects a male voice and recreates the subtle patriarchy of the
|
|||
|
broader society through the so-called neutrality of "objective" science and
|
|||
|
the ways of speaking and behaving that, when translated into the
|
|||
|
two-dimensional world of electronic communications, tend to silence women.
|
|||
|
|
|||
|
Computer underground Digest, like the CU in general, is a male bastion.
|
|||
|
Sexist language, male metaphors, and if I'm counting correctly, not a
|
|||
|
single self-announced female contributor (although it is possible that some
|
|||
|
of the pseudonyms and anonymous writers were women). In fairness, I judge
|
|||
|
that the editors of CuD attempt to be sensitive to the concerns of
|
|||
|
feminists, and have noticed that articles under their name do not contain
|
|||
|
sexist language and tend toward what's been called "androgenous discourse."
|
|||
|
But, they have have not used their position to translate concerns for
|
|||
|
social justice into practice by removing sexist language (or even posting a
|
|||
|
policy preference), by encouraging women, or by soliciting articles on
|
|||
|
minorities, women, and other groups that are invisible and silent.
|
|||
|
|
|||
|
Let's look at just a few areas where cybersexism creeps in. First, The CU
|
|||
|
is made up mostly of males. I'm told by friends, and the facts are
|
|||
|
consistent with those given to me by one CuD moderator, that at a maximum,
|
|||
|
less that five percent of pirates are female, and probably less than one
|
|||
|
percent are phreaks or hackers. This skewed participation transports the
|
|||
|
male culture of values, language, concerns, and actions, into a new world
|
|||
|
and creates models that women must conform to or be excluded from full
|
|||
|
membership. Like the Europeans, CUites move into a new territory and stake
|
|||
|
out their cultural claim committing a form of cultural genocide against
|
|||
|
those with different cultural backgrounds. Isn't it ironic that in a new
|
|||
|
world where "a million flowers bloom" and a variety of subcultures emerge,
|
|||
|
that they are for all practical purposes male?
|
|||
|
|
|||
|
Second, BBSs, especially those catering to adolescents and college
|
|||
|
students, are frightening in their mysogeny. I have commonly seen in
|
|||
|
general posts on large boards on college towns discussion of women in the
|
|||
|
basest of terms (but never comparable discussions of men), use of such
|
|||
|
terms as broads, bitches, cunts, and others as synonomous with the term
|
|||
|
"woman" in general conversation, and generalized hostile and angry
|
|||
|
responses against women as a class. These are not isolated, but even if we
|
|||
|
were to concede that they are not typical of all users on a board, such
|
|||
|
language use is rarely challenged and the issues the language implies are
|
|||
|
not addressed.
|
|||
|
|
|||
|
Third, sexism is rampant on the nets. The alt.sex (bondage, gifs,
|
|||
|
what-have-you) appeal to male fantasies of a type that degrades women. No,
|
|||
|
I don't believe in censorship, but I do believe we can raise the gender
|
|||
|
implications of these news groups just as we would if a controversial
|
|||
|
speaker came to a campus. Most posts that refer to a generic category tend
|
|||
|
to use male specific pronouns that presume masculinity (the generic "he")
|
|||
|
or terms such as "policeman" or "chairman" instead of "chair" or "police
|
|||
|
officer."
|
|||
|
|
|||
|
At the two universities I attended, both with excellent computer science
|
|||
|
departments, women comprised about half of the undergraduate majors. This
|
|||
|
shifted dramatically in grad school, and the male professors were generally
|
|||
|
well-meaning, but most were not sensitive to the difficulties of women in a
|
|||
|
male-dominated career. Yes, of course it's possible for women to succeed
|
|||
|
and be taken seriously in the computer world, to advance, to earn high
|
|||
|
salaries. But this isn't the point. The peripheral treatment in which we
|
|||
|
are still treated like second class citizens exists. The jokes, the
|
|||
|
language, the subtle behaviors that remind us that we are women first and
|
|||
|
professionals second, and all the other problems of sexism are carried over
|
|||
|
into the computer world. Why don't we think about and discuss some of
|
|||
|
this, and why isn't CuD taking the lead?!
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Name withheld
|
|||
|
Subject: Security on the Net
|
|||
|
Date: Sun, 23 Dec 90 17:04:49 -0500
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.00: File 5 of 6: Security on the Net ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
COPS is a unix security package that runs through a checklist of sorts
|
|||
|
looking for common flaws in system security.
|
|||
|
|
|||
|
I polled a security mailing list and got about 40 responses to a selected
|
|||
|
number of questions dealing with security; it might be useful for inclusion
|
|||
|
on how the net (at least some of the security minded ones) view security.
|
|||
|
The answers to these questions shaped some of the philosophies of COPS and
|
|||
|
might be indicative of the type of security tools to be developed in the
|
|||
|
future. My questions start with a number and a ")".
|
|||
|
|
|||
|
1) What kinds of problems should a software security system (SSS)
|
|||
|
such as COPS check for? (Mention specific examples, if you can.)
|
|||
|
|
|||
|
Just about everyone agreed that the more things checked, the better. Some
|
|||
|
specific wants of items I didn't mention, more or less in the order of # of
|
|||
|
requests:
|
|||
|
|
|||
|
Some kind of _secure_ checksum method for checking up on binary files.
|
|||
|
|
|||
|
Checking binaries for known security problems - sendmail, fingerd, ftpd,
|
|||
|
ect.
|
|||
|
|
|||
|
Checking the validity of the _format_ of key files rather than merely
|
|||
|
checking if they are writable.
|
|||
|
|
|||
|
Checking for potential trojan horses; files such as "ls" in a users
|
|||
|
account.
|
|||
|
|
|||
|
Finding things hidden under mount points.
|
|||
|
|
|||
|
Keeping track of accounts in a seperate file from /etc/passwd and run
|
|||
|
periodic checks to see if any accounts have been added by any unauthorized
|
|||
|
user.
|
|||
|
|
|||
|
Report unusual system activity, such as burning lots of CPU time.
|
|||
|
|
|||
|
Record unsuccessful login attempts and su's to root, when and by whom if
|
|||
|
possible.
|
|||
|
|
|||
|
2) Are there any security problems too sensitive to be checked
|
|||
|
by a SSS? That is, what things should *not* be built into a SSS?
|
|||
|
|
|||
|
Boy, this was a landslide. Over 90% said NO, and not only no, but
|
|||
|
basically "Hell No". The only concerns I got were against password
|
|||
|
cracking and problems that could not be easily fixed. There was also a
|
|||
|
small amount of concern about limiting access to root, but most realized
|
|||
|
that no matter what, the benifits would outweigh any losses if the programs
|
|||
|
were put out.
|
|||
|
|
|||
|
3) What should the primary goal of a SSS be -- discovering as many
|
|||
|
security holes as possible in a given system (including bugs or
|
|||
|
design flaws that may not be easily fixed -- especially without
|
|||
|
source code), or merely uncovering correctable errors (due to
|
|||
|
ignorance, carelessness, etc)?
|
|||
|
|
|||
|
Another landslide. Of all the responses, only one person objected to
|
|||
|
finding all holes, although a few did say that finding the fixable holes
|
|||
|
was top priority.
|
|||
|
|
|||
|
One view:
|
|||
|
|
|||
|
My use for an SSS is as a system monitor, not as a diagnostic tool. I
|
|||
|
suppose the diagnostic version also has its uses, but writing and
|
|||
|
distributing such a program is asking for trouble. I don't see anything
|
|||
|
wrong with writing it and distributing only the binaries.
|
|||
|
|
|||
|
4) Do you feel that SSS are a security threat themselves?
|
|||
|
|
|||
|
Some dissent begins to show.... It was almost even here, with the no's
|
|||
|
beating out the yes's by a single vote. However, 2/3 of the yes votes
|
|||
|
qualified there answer by stating something like "a tool can be misused"
|
|||
|
and whatnot. Here are some typical responses:
|
|||
|
|
|||
|
Of course. They point to way for bad guys. Such is life. They are a
|
|||
|
tool. They have the potential for anything. The security threat lies in
|
|||
|
how they are used....
|
|||
|
|
|||
|
No, as long as they don't breed complacency. Just by running a SSS each
|
|||
|
night should not make you thinks your systems are secure.
|
|||
|
|
|||
|
Fire is also dangerous but VERY useful.
|
|||
|
|
|||
|
|
|||
|
5) Do you think that the SSS should be restricted to be used only
|
|||
|
by system administrators (or other people in charge), or should
|
|||
|
they be accessible to all?
|
|||
|
|
|||
|
Here's where the problems start :-) Everyone wants as many features as
|
|||
|
possible, but quite a few of you don't want anyone else to have it. Hmm...
|
|||
|
Out of 35 responses on this question:
|
|||
|
|
|||
|
12 - Yes, only SA's.
|
|||
|
10 - No.
|
|||
|
6 - It would be nice to have it restricted, but... How?
|
|||
|
5 - Have two versions; one restricted, one not. Needless to say,
|
|||
|
the dangerous stuff should go in the first.
|
|||
|
1 - Restrict only parts that detect bugs/whatever that cannot be
|
|||
|
repaired.
|
|||
|
1 - Argh! Help!
|
|||
|
|
|||
|
Some quotable quotes:
|
|||
|
|
|||
|
I don't see how it could be restricted.
|
|||
|
|
|||
|
Admins, etc only. (possibly said because I'm an admin. From an intellectual
|
|||
|
standpoint, I would want to know about this stuff even if I was just a
|
|||
|
user)
|
|||
|
|
|||
|
I think the SSS should be restricted to system administrators with the
|
|||
|
realisation that others can probably get their hands on the code if they
|
|||
|
want to.
|
|||
|
|
|||
|
Definitely available to all, SA's can be as lazy as anyone and should not
|
|||
|
be allowed to hide behind a veil of secrecy if, in doing so, they expose
|
|||
|
the systems they administer.
|
|||
|
|
|||
|
It seems to me that only an "administrator type" will have sufficient
|
|||
|
privilege levels to make _effective_ use of such a tool. Ordinary users
|
|||
|
may be able to garner _some_ benefit though, if run on their own files. If
|
|||
|
possible, can there be an "administrator" mode and a (restriced/limited)
|
|||
|
"user" mode?
|
|||
|
|
|||
|
(and finally, my personal favorite...)
|
|||
|
|
|||
|
I think that a check for a hole that can't be closed shouldn't be a part of
|
|||
|
the check, if that hole is widespread. I have no examples of any such
|
|||
|
hole, but a weak spot that can't be closed and has no workaround is one of
|
|||
|
the few candidates for the security by secrecy concept. I have mixed
|
|||
|
feelings about this, but if I can't fix the hole, I'd rather not have it's
|
|||
|
existence be "public" knowledge. A freely available routine to locate the
|
|||
|
hole would spread it's existence far and wide.....(?) But, if I didn't know
|
|||
|
about it beforehand then it would be good to have a tool to tell me it
|
|||
|
existed. Gads, I hate moral conflicts!
|
|||
|
|
|||
|
6) When a SSS finds a security flaw in a system, do you want it to
|
|||
|
indicate how they flaw could be used to compromise your system, or
|
|||
|
would you just accept the conclusion and apply a fix?
|
|||
|
|
|||
|
This question was ill worded and gramatically incorrect, but still managed
|
|||
|
to conjure up a lot of comments. Some thought it was asking if the system
|
|||
|
should apply a fix. In any case, almost 3/4 said Yes, indicate exactly how
|
|||
|
to exploit any potential hole. As usual, there were a few with
|
|||
|
reservations about the info getting out, but....
|
|||
|
|
|||
|
Here are some of the more interesting comments:
|
|||
|
|
|||
|
(Think about this one!)
|
|||
|
*I* would like to know to futher my knowledge of Unix, but more importantly
|
|||
|
to make sure that the version I have was not modified by a cracker to put
|
|||
|
security holes *into* a system. (That'd be sneaky :-)
|
|||
|
|
|||
|
Security by obfuscation doesn't work.
|
|||
|
|
|||
|
By definition, a SSS is a software system, and therefore has bugs in it.
|
|||
|
If it reported a problem which would cause quite a bit of inconvenience if
|
|||
|
fixed, or would be difficult to fix, then I would be much more apt to make
|
|||
|
the fix if I knew how the problem could be exploited. This is important,
|
|||
|
because many, if not most, sites require only a moderate level of security,
|
|||
|
and many security holes are fiendishly difficult to exploit.
|
|||
|
|
|||
|
We cannot assume that end-purchasers of a system can be as aware of the
|
|||
|
internal workings of a system as the designers of the system (or SSS) are.
|
|||
|
If a security flaw is discovered, the administrators need to be informed
|
|||
|
about what changes are necessary to remove that flaw, and what
|
|||
|
repercussions they may have.
|
|||
|
|
|||
|
Imagine a SSS that knew sendmail(8) was a security flaw allowing a worm to
|
|||
|
enter systems. It would report that sendmail is a security flaw, please
|
|||
|
disable it like.... If the vendor had released a patch, and the SSS didn't
|
|||
|
know how it, the administrator (in blind faith to this SSS program) might
|
|||
|
disable a *very* useful program unnecessarily.
|
|||
|
|
|||
|
7) Do you think that there is too much, not enough, or just about
|
|||
|
the right amount of concern over computer security? How about at
|
|||
|
your computer site? At other sites?
|
|||
|
|
|||
|
The "not enough"s won, but not by much. I thought that given the paranoia
|
|||
|
of a security group, this would be a larger victory. Lots of people said
|
|||
|
it depends -- on the type of facility, the size, etc. Large sites seem to
|
|||
|
have a healthier view of security (paranoia :-)) than
|
|||
|
smaller/non-governmental. Only 4 or 5 said there was enough concern. A
|
|||
|
couple of people mentioned _The Cuckoo's Egg_ as suggested reading (I
|
|||
|
heartily agree.)
|
|||
|
|
|||
|
More quotes:
|
|||
|
|
|||
|
(I don't know if the next answer is true, but I like it anyway!)
|
|||
|
|
|||
|
This is really a deep philosophical question---something to talk about over
|
|||
|
a few beers at the bar, but not here.
|
|||
|
|
|||
|
I think it's a site dependent problem, and all the above are true: too
|
|||
|
much, too little, and just right. Computer is not a "one size fits all"
|
|||
|
situation. Having offered that opinion, I think an assessment of my site or
|
|||
|
other sites is extraneous, and I will reserve that opinion.
|
|||
|
|
|||
|
... more attention to unauthorized use of the networks.
|
|||
|
|
|||
|
8) Do you think that there should be a ruling body that governs
|
|||
|
and enforces rules and regulations of the net -- sort of a net.police?
|
|||
|
|
|||
|
Some of you wondered what this had to do with software security, but just
|
|||
|
about everyone answered anyway. This one scared me! The "No's" only beat
|
|||
|
out the "yes's" by one vote. Yikes! Maybe I'm from the old school of
|
|||
|
thought, but.... Several people said that it couldn't be done anyway; a
|
|||
|
couple mentioned they a CERT-like agency to help out, but not control, and
|
|||
|
finally two said that the laws and government were already there to do
|
|||
|
this.
|
|||
|
|
|||
|
It's there, defacto. The free market is working pretty well.
|
|||
|
|
|||
|
Absolutely. I quarrel with the "net.police" designation, per se, of course,
|
|||
|
as do many others. But perhaps something more like a recognized trade
|
|||
|
association, and providing similar services. Also, it is time that the
|
|||
|
basic duties which must be reasonably performed by a site in order for it
|
|||
|
to remain on the net should become a requirement rather than a matter of
|
|||
|
individual whim.
|
|||
|
|
|||
|
Yuck! This is very distasteful to me. It will probably be necessary
|
|||
|
though as more and more people participate in the net. Enforcement will
|
|||
|
have to be judicious until secure networking is developed and implemented
|
|||
|
generally.
|
|||
|
|
|||
|
No. Aside from the fact that it'd never work, I like Usenet as an anarchy.
|
|||
|
It has some rough edges, but for the most part it works. What does this
|
|||
|
question have to do with SSS-type programs?
|
|||
|
|
|||
|
Enforcement will be tough and may hold back legitimate users. But we have
|
|||
|
to start somewhere. So I suppose that I agree with having net.police, as
|
|||
|
long as they don't turn things into a police.state.net.
|
|||
|
|
|||
|
9) Do you believe that breaking into other people's systems should
|
|||
|
continue to be against the law?
|
|||
|
|
|||
|
Only one said "no", and s/he had a smiley following the answer. But there
|
|||
|
were some of you who voiced concern that it wasn't really against the law
|
|||
|
to begin with. In _The Cuckoo's Nest_, Cliff Stoll talked about a
|
|||
|
(Canadian, I think) case that the only reason the cracker was prosecuted
|
|||
|
was for stealing electricity! Less than a watt or something. A few of you
|
|||
|
mentioned denial of services as being a just reason, but what if they break
|
|||
|
in only at night, when no one else is on, and they really don't take
|
|||
|
anything at all? Should that be less punishable than someone who sucks
|
|||
|
away user CPU/disk/whatever?
|
|||
|
|
|||
|
Breakins should be encouraged and rewarded (1/2 :-).
|
|||
|
|
|||
|
Yes. Unquestionably. However, those laws should not attempt to regulate
|
|||
|
inter-system traffic to cause these things to happen.
|
|||
|
|
|||
|
Yes - and as a felony in all cases, without exception.
|
|||
|
|
|||
|
Yes but murder, rape, robbery... are more important and laws and sentencing
|
|||
|
should reflect this. There are some around who want to treat cracking as a
|
|||
|
capital crime!
|
|||
|
|
|||
|
Yes, from the denial of services standpoint. I pay $XXX,XXX.XX for a
|
|||
|
system, and joe blow slides in and sucks away at those resources, there
|
|||
|
should be a nontrivial penalty for getting caught. Don't behead the guy,
|
|||
|
but monetary fines or community service would be just fine.
|
|||
|
|
|||
|
I don't know. I'm not a philosopher. Certainly causing damage to others
|
|||
|
is wrong, including denial of service, compromising sensitive info, or
|
|||
|
whatever. I'm concerned though that clamping down on young kids will
|
|||
|
discourage them from becoming computer geeks. I think we need to encourage
|
|||
|
our young people to become technically literate. If we don't become a more
|
|||
|
expert society we can kiss it goodbye; all we'll have left is our military
|
|||
|
solutions, like some brainless jock bully...
|
|||
|
|
|||
|
I'm not sure that it is everywhere - but: Yes. Should attempting to break
|
|||
|
in be against the law: No. Is this vague: Yes.
|
|||
|
|
|||
|
I did not know that it was. The laws about it have not been tested and are
|
|||
|
vague and unclear. You need to be very clear about what the laws are going
|
|||
|
to do.
|
|||
|
|
|||
|
**HELL FUCKING YES** Those of us who started in UNIX years ago have for the
|
|||
|
most part *always* respected others!! This I can't stress strong enough.
|
|||
|
|
|||
|
10) Is your site academic, government, or commercial in nature?
|
|||
|
|
|||
|
Just over 1/2 of those that answered claimed university ties, with about
|
|||
|
1/4 being commercial, 1/6 government, a few research sites, and a couple
|
|||
|
that were a mixture. Sites included Sun, AT&T, SCO (Xenix), the DoD, and
|
|||
|
the Army, among others.
|
|||
|
|
|||
|
(Guess where this one came from :-)
|
|||
|
|
|||
|
Research. We invented Unix.
|
|||
|
|
|||
|
Academic with commercial applications.
|
|||
|
|
|||
|
Primarily academic, but we are part of the government.
|
|||
|
|
|||
|
Academic, except when collecting student fees *) *)
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Various
|
|||
|
Subject: The CU in the News
|
|||
|
Date: January 6, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.00: File 6 of 6: The CU in the News ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: portal!cup.portal.com!ZEL@SUN.COM
|
|||
|
Subject: Kevin Mitnick ejected from DEC Meeting
|
|||
|
Date: Wed, 2 Jan 91 19:30:48 PST
|
|||
|
|
|||
|
The December 24 edition of COMMUNICATIONS WEEK has an interesting article
|
|||
|
on page 18 by Anne Knowles. Quickly . . . DEC caught a fellow by the name
|
|||
|
of Kevin Mitnick trying to register to attend their DECUS user group
|
|||
|
meeting in Las Vegas. According to the article he (Mitnick) is a well
|
|||
|
known hacker who is currently on probation after having been found guilty
|
|||
|
of breaking into Easynet. Apparently someone recognized him while he was
|
|||
|
registering. They apparently barred him from the meeting and DEC is now
|
|||
|
figuring out how to address any future attempts by "hackers" to get into
|
|||
|
their meetings. The article said they threw someone out of a meeting a
|
|||
|
couple of years ago for hacking during the meeting. One wonders exactly
|
|||
|
what was being hacked during a training meeting! The article says DEC
|
|||
|
supplies networked terminals for for use by attendee's.
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: Rambo Pacifist
|
|||
|
Subject: Another Naperville Story
|
|||
|
Date: Sat, 5 Jan 91 05:09:22 CST
|
|||
|
|
|||
|
"Naperville man pleads innocent"
|
|||
|
From: CHICAGO TRIBUNE, Jan. 4, 1991, sect II p. 3
|
|||
|
By Joseph Sjostrom
|
|||
|
|
|||
|
A former employee of Spiegel Inc. pleaded innocent Thursday to computer
|
|||
|
fraud and other charges in connection with the alleged theft of thousands of
|
|||
|
dollars worth of cash and credits from the company.
|
|||
|
|
|||
|
Michael H. Ferrell, 34, of Naperville, entered the plea before Du Page
|
|||
|
County Associate Judge Brian F. Telander, who set the next hearing for Jan.
|
|||
|
31.
|
|||
|
|
|||
|
Ferrell was indicted on Dec. 10 by the Du Page County grand jury on four
|
|||
|
counts of computer fraud, three counts of theft and three counts of
|
|||
|
forgery. The computer fraud indictments charge him with using computerized
|
|||
|
cash registers in Spiegel stores on four occasions between November 1989,
|
|||
|
and September 1990, to issue $5,451.41 in credits to his Mastercard,
|
|||
|
American Express and Spiegel's charge cards.
|
|||
|
|
|||
|
The theft and forgery indictments charge that he took $22,673 in cash from
|
|||
|
the company. He allegedly generated vouchers and other forms, some of them
|
|||
|
at the Downers Grove and Villa Park stores, that described services
|
|||
|
performed for Spiegel by equipment renters and printers. However, those
|
|||
|
services had never actually been performed, and Ferell pocketed the money
|
|||
|
that Spiegel payed for the services, according to the indictments.
|
|||
|
|
|||
|
Ferrell worked for Spiegel from 1981 until he was fired last Oct. 24, said
|
|||
|
a company spokesman. Ferrell was a support services manager for the
|
|||
|
company's catalog and outlet store operations, the spokesman said.
|
|||
|
|
|||
|
Ferrell was the second person charged in December by the Du Page County
|
|||
|
state's attorney's office with the illegal use of a computer. The other
|
|||
|
defendant was charged with computer tampering for allegedly gaining access
|
|||
|
to computer programs in a Naperville software firm where he worked,
|
|||
|
although he was not charged with profiting financially from the alleged
|
|||
|
intrusion.
|
|||
|
|
|||
|
(end article)
|
|||
|
|
|||
|
********************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
**END OF CuD #3.00**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|
|||
|
|