983 lines
46 KiB
Plaintext
983 lines
46 KiB
Plaintext
|
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
>C O M P U T E R U N D E R G R O U N D<
|
|||
|
>D I G E S T<
|
|||
|
*** Volume 3, Issue #3.03 (January 22, 1991) **
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|||
|
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
|
|||
|
RESIDENT SYSTEM CRASH VICTIM:: Brendan Kehoe
|
|||
|
|
|||
|
USENET readers can currently receive CuD as alt.society.cu-digest.
|
|||
|
Back issues are also available on Compuserve, PC-EXEC BBS, and
|
|||
|
at 1:100/345 for those on FIDOnet.
|
|||
|
Anonymous ftp sites: (1) ftp.cs.widener.edu (2) cudarch@chsun1.uchicago.edu
|
|||
|
E-mail server: archive-server@chsun1.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source is
|
|||
|
cited. Some authors, however, do copyright their material, and those
|
|||
|
authors should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles relating to
|
|||
|
the Computer Underground. Articles are preferred to short responses.
|
|||
|
Please avoid quoting previous posts unless absolutely necessary.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent the
|
|||
|
views of the moderators. Contributors assume all responsibility
|
|||
|
for assuring that articles submitted do not violate copyright
|
|||
|
protections.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
CONTENTS THIS ISSUE:
|
|||
|
File 1: Moderators' Corner
|
|||
|
File 2: From the Mailbag
|
|||
|
File 3: More CU News Articles
|
|||
|
File 4: The CU in the News
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.03: File 1 of 4: Moderator's corner ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: Moderators
|
|||
|
Subject: Moderators' Corner
|
|||
|
Date: January 22, 1991
|
|||
|
|
|||
|
++++++++++
|
|||
|
In this file:
|
|||
|
1. INFORMANTS AND OTHER ISSUES
|
|||
|
2. ARTICLE FORMAT
|
|||
|
3. HACK-TIC MAGAZINE
|
|||
|
4. FTP INFO
|
|||
|
5. FIDO-NET AND CuD BACK-ISSUES
|
|||
|
++++++++++
|
|||
|
|
|||
|
++++++++++++++
|
|||
|
Informants, etc
|
|||
|
++++++++++++++
|
|||
|
|
|||
|
There will be more information on the Secret Service's use of informants
|
|||
|
and the extent to which they were employed in forth-coming issues. CuD will
|
|||
|
be making several FOIA requests in an attempt to gather more information.
|
|||
|
A future issue will be devoted to how individuals can help in protecting
|
|||
|
Constitutional freedoms related to computer communication.
|
|||
|
|
|||
|
++++++++++++++++++++
|
|||
|
Article Format
|
|||
|
++++++++++++++++++++
|
|||
|
|
|||
|
We've been receiving an increasing number responses using software that
|
|||
|
auto-cites. *PLEASE* don't quote long lines of texts if they are not
|
|||
|
relevant to your article. Also, make sure that that attribution of
|
|||
|
authorship goes to the proper person (as in "josie blowsie writes:") rather
|
|||
|
than to the CuD editors (unless we in fact wrote it). Most editors are
|
|||
|
picking up the "jut2" line, especially in the mailbag file. In long
|
|||
|
articles, it helps to have a blank space between each paragraph and to
|
|||
|
avoid odd or unprintable characters which some systems have difficulty
|
|||
|
reading.
|
|||
|
|
|||
|
++++++++++++++++
|
|||
|
HACK-TIC Magazine
|
|||
|
++++++++++++++++
|
|||
|
|
|||
|
We received our first copy of HACK-TIC, a CU periodical from Amsterdam. We
|
|||
|
don't read Dutch, so we tried to wing it from German. The size and layout
|
|||
|
are similar to 2600. We received Issue 11-12 (47 pages), which contains
|
|||
|
technical information, articles on the E911/PHRACK trial, Milnet, Cartoons,
|
|||
|
and other news from Europe. There is enough substance that one need not
|
|||
|
speak Dutch to get a decent value from picking up the stray bits in English
|
|||
|
(such as a decoder program for Wordperfect files).
|
|||
|
|
|||
|
For those wanting more information, write to:
|
|||
|
HACK-TIC
|
|||
|
pb 22953
|
|||
|
1100 DL Amsterdam
|
|||
|
The Netherlands
|
|||
|
UUCP = ropg@ooc.uva.nl
|
|||
|
|
|||
|
Individuals issues cost about $2.30 each, (4 G) and a subscription of
|
|||
|
10 issues costs about $21.75 (37.5 G).
|
|||
|
|
|||
|
CuD (and other text files) are available on FIDOnet through Mike Bateman's
|
|||
|
system:
|
|||
|
|
|||
|
1:100/345 for those on FIDOnet
|
|||
|
8:921/910 for those on RBBSnet
|
|||
|
65:221/4 for those on OURnet
|
|||
|
43:555/203 for those on V-NET
|
|||
|
|
|||
|
To access various files, simply send a file request to Mike's system for the
|
|||
|
magic filename CUD. This will send out the current listing of archive
|
|||
|
files held here. From there it's up to callers to request what they
|
|||
|
want.
|
|||
|
|
|||
|
The system is available 24hours a day, IS PCP Pursuitable (even though the
|
|||
|
list doesn't reflect that yet due to his area code being very new).
|
|||
|
For questions or problems, drop a note to:
|
|||
|
SMBATEM@UMSLVMA.bitnet
|
|||
|
|
|||
|
PC Pusuitable at MOSLO, and supports 1200, 2400 9600, and 14400 connects,
|
|||
|
both HST and v32.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Various
|
|||
|
Subject: From the Mailbag
|
|||
|
Date: 22 January, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.03: File 2 of 4: From the Mailbag ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: UK05744@UKPR.UKY.EDU
|
|||
|
Subject: tap news
|
|||
|
Date: Sun, 06 Jan 91 23:45:04 EST
|
|||
|
|
|||
|
In a recent issue of CuD, the moderators wrote:
|
|||
|
|
|||
|
>TAP is alive and well. In addition to a newsletter, they also have a BBS for
|
|||
|
>exchange of information and news. TAP is available for the price of a
|
|||
|
>postage stamp for each issue by writing:
|
|||
|
>
|
|||
|
> TAP
|
|||
|
> PO Box 20264
|
|||
|
> Louisville, KY 40250
|
|||
|
|
|||
|
Greetings!
|
|||
|
|
|||
|
I wanted to help clear up any misconceptions some people might have regarding
|
|||
|
TAP Magazine. The first point is that I am no longer editor. After Craig
|
|||
|
Neidorf got molested, I decided do let go of TAP and concentrate on more
|
|||
|
important things. Therefore, I handed editorship to Predat0r. Since then, I
|
|||
|
have had NOTHING to do with TAP Magazine. The second point is the details of
|
|||
|
the subscription. I am not totally sure of this but it is what I hear. TAP
|
|||
|
is not free anymore (I don't know why. I put it out for free), it is now $2
|
|||
|
for a SAMPLE issue. The yearly rates are $10 for ten issues. If anyone has
|
|||
|
any questions regarding TAP, don't mail me. Mail them to Predat0r at the
|
|||
|
above address.
|
|||
|
|
|||
|
If anyone wants to correspond with ME, you can mail me at
|
|||
|
UK05744@UKPR.UKY.EDU. OR UK05744@UKPR.BITNET.
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: eric@EGSNER.CIRR.COM(Eric Schnoebelen)
|
|||
|
Subject: Re: CU Digest #3.00
|
|||
|
Date: Sun, 6 Jan 91 14:44:05 CST
|
|||
|
|
|||
|
In a recent issue of CuD, works!cud@UUNET.UU.NET writes:
|
|||
|
|
|||
|
- How can it be legal to make BBS' operators shell out extra money for a
|
|||
|
- hobby, answering machines aren't something people have to pay extra for,
|
|||
|
- and in some cases thats what BBS's are used for. If its a public BBS, it is
|
|||
|
- receiving no true income from its users, unless they pay a standard,
|
|||
|
- billable time, (ie. A commercial BBS) What gives them the right to charge
|
|||
|
- us now?
|
|||
|
- Do they have a right to charge us? are they providing any type of special
|
|||
|
- service because we have a modem on the line, instead of an answering
|
|||
|
- machine, FAX, phone, or other? we are private citizens, it should be up to
|
|||
|
- us how we use the phones. TelCo's still a monopoly
|
|||
|
|
|||
|
The "monopolies" have only the powers to charge for the services that are
|
|||
|
tariffed by the local and state public utilities commissions for intrastate
|
|||
|
services, and the Federal Communication Commission on the interstate
|
|||
|
services.
|
|||
|
|
|||
|
The charges for local service come under the jurisdiction of the PUC's, and
|
|||
|
not the FCC. If the operating company can convince the local PUC that a
|
|||
|
BBS is business, then they will be able to "legally" charge business rates
|
|||
|
for connections that are used for BBS's.
|
|||
|
|
|||
|
Keep in mind that telephone service is not a guaranteed right. The low
|
|||
|
residential service rates are due to a state and federal government policy
|
|||
|
dating from early in the century, which was aimed at providing universal
|
|||
|
telephone service, much in the same way that the government have provided
|
|||
|
roads to encourage the mobility of the automobile.
|
|||
|
|
|||
|
A case could easily be made that more than one line to a
|
|||
|
residence/household is a luxury, and all additional lines should be billed
|
|||
|
at a higher rate. Fortunately, generally the telephone companies have not
|
|||
|
tried for this, but instead have limited the attempts to charge business
|
|||
|
rates to BBS's solely to BBS's that could be viewed as businesses, such as
|
|||
|
ones that charge for access.
|
|||
|
|
|||
|
Businesses are charged more for their service because they are expected to
|
|||
|
make more use of the telephone system, and thus cause greater wear on the
|
|||
|
system. BBS's, like teenagers, blow that equation all out of the water.
|
|||
|
|
|||
|
- There are a lot of rumours about this type of thing, only I've never seen
|
|||
|
- it actually put into action.
|
|||
|
|
|||
|
Southwestern Bell, in Houston, Tx, attempted to define all BBS's with more
|
|||
|
than one phone line as businesses, for the purposes of billing, whether
|
|||
|
they charged a fee for not. As part of this, they also claimed that BBS's
|
|||
|
that had a mandatory upload's for access were also businesses, since the
|
|||
|
user was required to provide something in order to gain access. [I may not
|
|||
|
have all of the above 100% correct, but that seems to be the gist of it]
|
|||
|
|
|||
|
I have also heard that GTE in Indiana has tariffed that all BBS's that
|
|||
|
charge for access get business rates. At least GTE went through the PUC in
|
|||
|
getting that one through, unlike SWBT.
|
|||
|
|
|||
|
And in response, at least in the case of the SWBT action, a group of BBS
|
|||
|
operators in Texas (and Oklahoma) fought the action. For the most part, I
|
|||
|
gather that they have succeeded, but not completely.
|
|||
|
|
|||
|
I doubt that I have made anyone happy by reading the above, but hopefully,
|
|||
|
I have made people more informed.
|
|||
|
|
|||
|
***********************
|
|||
|
In CuD 3.00, file 4, Liz E. Borden Writes:
|
|||
|
|
|||
|
- Why, you ask, do I think the CU is sexist?
|
|||
|
|
|||
|
I will agree that there is a very strong male bias in the entire computing
|
|||
|
industry, and probably even more so in the underground. Why? I have no
|
|||
|
real idea, although a guess that pops to mind is (Gross Generalizations
|
|||
|
here!) many women would rather do things more secure and "safe" than play
|
|||
|
on the edges in the underground. How true that is, I don't know. I would
|
|||
|
say that is a stereotypical perception that is not well held up by the
|
|||
|
women I know.
|
|||
|
|
|||
|
- Second, BBSs, especially those catering to adolescents and college
|
|||
|
- students, are frightening in their mysogeny. I have commonly seen in
|
|||
|
- general posts on large boards on college towns discussion of women in the
|
|||
|
- basest of terms (but never comparable discussions of men), use of such
|
|||
|
- terms as broads, bitches, cunts, and others as synonymous with the term
|
|||
|
- "woman" in general conversation, and generalized hostile and angry
|
|||
|
- responses against women as a class.
|
|||
|
|
|||
|
This, unfortunately, does exist, even in what are supposed to be some of our
|
|||
|
most enlightened environments, the university campus. But keep in mind, this is
|
|||
|
also how they were taught by the outside society before entering the
|
|||
|
enlightening halls of the university, and they should be exposed to ideals
|
|||
|
that indicate that their actions and beliefs may be flawed, or even incorrect.
|
|||
|
It does nothing to complain about these people, they need to be exposed to a
|
|||
|
greater, less biased world than the one from which they came.
|
|||
|
|
|||
|
Some will reject it, because it will suddenly devalue their self worth, or the
|
|||
|
views/beliefs they held upon entering are to strong, but after time (perhaps
|
|||
|
generations) they will be in the definite minority, and perhaps even extinct.
|
|||
|
|
|||
|
- Third, sexism is rampant on the nets. The alt.sex (bondage, gifs,
|
|||
|
- what-have-you) appeal to male fantasies of a type that degrades women. No,
|
|||
|
- I don't believe in censorship, but I do believe we can raise the gender
|
|||
|
- implications of these news groups just as we would if a controversial
|
|||
|
- speaker came to a campus. Most posts that refer to a generic category tend
|
|||
|
- to use male specific pronouns that presume masculinity (the generic "he")
|
|||
|
- or terms such as "policeman" or "chairman" instead of "chair" or "police
|
|||
|
- officer."
|
|||
|
|
|||
|
It is my belief that many people consider "chairman" and "policeman" to be
|
|||
|
generic terms for "chair" and "police officer" I have heard my youngest
|
|||
|
sister refer to herself as a "policeman" on several occasions, although she
|
|||
|
does tend to use "police officer" a bit more often.
|
|||
|
|
|||
|
As to rampant sexism on the "nets", I cannot say. I only frequent USENET
|
|||
|
and internet mailing lists for my net based reading. What it is like on
|
|||
|
the Fido echo's etc, I do not know. In general, most of the postings I see
|
|||
|
on USENET are of very open, somewhat liberal, attitude. I suppose that the
|
|||
|
alt.sex hierarchy could be considered degrading, but I am unsure how. What
|
|||
|
I see in those groups that I read there are generally open, fairly well
|
|||
|
reasoned discussions of items of a sexual nature, as well as some
|
|||
|
discussions attempting to show some users the error of their ways of
|
|||
|
belief. Those do degenerate in to some impressive flame wars, but there
|
|||
|
has been little I could see as being viewed as degrading/demeaning.
|
|||
|
|
|||
|
-Why don't we think about and discuss some of
|
|||
|
- this, and why isn't CuD taking the lead?!
|
|||
|
|
|||
|
Good question. If the computer underground is truly on the cutting edge of
|
|||
|
future society, then lets take the chance to rework our (and the rest of
|
|||
|
the nations/worlds) views on sexism, racism, and all the other -ism's out
|
|||
|
there. These sorts of actions start at home!
|
|||
|
|
|||
|
And in doing so, we shouldn't flame those who hold opposing opinions,
|
|||
|
rather we should listen to them, and reason with them. Find out why they
|
|||
|
hold the beliefs they do, and politely attempt to enlighten them.
|
|||
|
|
|||
|
All in all, I would say that Ms. Borden makes some very good points,
|
|||
|
points we all could do well to consider, and act upon. The computer
|
|||
|
industry needs to make a more intense effort to draw women into the
|
|||
|
industry, and we of the computer underground need to draw them into the
|
|||
|
mainstream of the underground.
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: snowgoose!dave@UUNET.UU.NET
|
|||
|
Subject: No Room for Dinosaurs
|
|||
|
Date: Mon, 14 Jan 91 08:21:22 -0500
|
|||
|
|
|||
|
Over the past year, I have been reading about three subjects which have
|
|||
|
converged in my twisted mind to create an apprehension. AT first
|
|||
|
realization, I actually felt a little paranoid, but quickly realized
|
|||
|
that no conspiracy was taking place. That left me with apprehension of
|
|||
|
something it took me awhile to understand, though dimly still.
|
|||
|
|
|||
|
The three subjects about which I have been reading, actually tracking,
|
|||
|
are (1) the quickening use of law and enforcement to control certain
|
|||
|
elements of the computer literate in society, (2) the efforts on the
|
|||
|
part of telecom companies to charge business rates for BBS phone
|
|||
|
service, and (3) the mass marketing of computer information services
|
|||
|
such as GENIE, COMPUSERVE, and (the worst or the best) PRODIGY.
|
|||
|
|
|||
|
In that instant of paranoia, I asked myself whether these three forces
|
|||
|
were conspiring to squeeze me (and people like me) into conformity or
|
|||
|
extinction. When the paranoia passed, leaving me with an uncomfortable
|
|||
|
apprehension, I knew it was no conspiracy, just powerful forces moving
|
|||
|
in a like direction; all three forces a reaction to the permeation of
|
|||
|
computers throughout all facets of our society.
|
|||
|
|
|||
|
I support law and enforcement, an our responsibility to control the
|
|||
|
excesses of those who govern us. I support a free market economy in
|
|||
|
which telecom companies and computer services companies make a buck. I
|
|||
|
understand the position PRODIGY takes; that they are a publisher who
|
|||
|
will exercise editorial control (in response to advertisers
|
|||
|
sensitivities.) Still, though, something uneasy lingers in my soul.
|
|||
|
|
|||
|
The recent contributions to CUD about sexism in the CU sharpened the
|
|||
|
focus of my apprehension.
|
|||
|
|
|||
|
I earned my first job as a systems programmer by penetrating a security
|
|||
|
hole in the university's mainframes. I like to refer to my sailboat as
|
|||
|
"she". I am going to sail around the world someday soon. And, I'm
|
|||
|
still looking for opportunities to achieve technical feats for the
|
|||
|
simple pleasure of doing it. Oh yes, I smoke a pipe, too. I'm a
|
|||
|
dinosaur.
|
|||
|
|
|||
|
When I earned my first systems programmer job, there wasn't a computer
|
|||
|
underground. We were the elite, and held in awe for our abilities. We
|
|||
|
were pretty responsible too.
|
|||
|
|
|||
|
I am wondering whether there is much of a computer underground now. When
|
|||
|
issues of sexism or equal access to computers by the handicapped
|
|||
|
permeate the computer underground, it won't be an underground anymore.
|
|||
|
(I bet that one will get a few flames. I'm handicapped, and I have felt
|
|||
|
discrimination, but CUD isn't the forum for discussing it.) Anyway, to
|
|||
|
the point, soon, I fear, the hackers, and others on the frontier of
|
|||
|
computing, who seek to express their individualism, will go the way of
|
|||
|
the dinosaur. I finally realized my apprehension for what it was; the
|
|||
|
fear of dying, of being %passed by' by forces too powerful to resist,
|
|||
|
too conformist to join.
|
|||
|
|
|||
|
Actually, I do join those forces. Life is full of compromise. The
|
|||
|
joining is a form of dying in itself. Better than dying from
|
|||
|
starvation, I guess.
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: scubed!gnh-igloo.cts.com!penguin%das@HARVUNXW.BITNET(Mark Steiger)
|
|||
|
Subject: Re: Reward for Hacking
|
|||
|
Date: Fri Jan 4 91 at 15:59:51 (CST)
|
|||
|
|
|||
|
In CUD 2.19 it was mentioned about "10,000 hackers couldn't break into our
|
|||
|
system". It is True. Our computer club received a mailer offering $5,000
|
|||
|
to anyone who could break in if they told them how they did it. It looked
|
|||
|
like a interesting offer. They gave a bunch of phone numbers that their
|
|||
|
computer was on. I don't have the flyer anymore. Got it late spring/early
|
|||
|
summer 1990.
|
|||
|
|
|||
|
Mark Steiger, Sysop, The Igloo BBS 218/262-3142 300-19.2K Baud
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: worley@COMPASS.COM(Dale Worley)
|
|||
|
Subject: C.U.D. vol. 2 is. 2.19,
|
|||
|
Date: Tue, 8 Jan 91 16:37:50 EST
|
|||
|
|
|||
|
In CuD 2.19 (File #3) <riddle@CRCHPUX.UNL.EDU> writes:
|
|||
|
|
|||
|
> Our response is that there is little, if any, added expense to
|
|||
|
> telecom operations whether a phone is used for 20 minutes or 20
|
|||
|
> hours during a given day.
|
|||
|
|
|||
|
Regardless of the other issues at stake here, the surprising fact is that
|
|||
|
the above statement is completely false -- the costs of a connected line
|
|||
|
are much higher than those of an unconnected line.
|
|||
|
|
|||
|
The costs associated with a local phone call fall into three categories:
|
|||
|
|
|||
|
the cost of having the line installed
|
|||
|
the cost of setting up and taking down the call
|
|||
|
the cost of maintaining the signal path while the call is in progress
|
|||
|
|
|||
|
Since traditional phone lines have been used for only a tiny fraction of
|
|||
|
the day, the phone companies have spent much money and cleverness at
|
|||
|
reducing the "fixed cost" of an installed phone line. It is much harder to
|
|||
|
reduce the cost of maintaining a signal path -- the number of switching
|
|||
|
elements in the central office must be sufficient to handle the number of
|
|||
|
calls likely to be in progress at any moment, which is presumed to be far
|
|||
|
smaller than the number of phone lines. In practice, the total costs of
|
|||
|
maintaining the signal paths are considerably higher than the fixed costs
|
|||
|
of the installed lines. The net result is that a line which is connected
|
|||
|
24 hours a day costs the phone co. far more than a line which is used very
|
|||
|
little, because it is the connections which consume the expensive
|
|||
|
resources.
|
|||
|
|
|||
|
That is why a leased line costs much more than basic message unit service.
|
|||
|
|
|||
|
(If you don't believe me, check any book on the design of telephone
|
|||
|
systems.)
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: wichers@HUSC9.HARVARD.EDU(John Wichers)
|
|||
|
Subject: Re: Cu Digest, #2.19
|
|||
|
Date: Sun, 6 Jan 91 16:56:55 -0500
|
|||
|
|
|||
|
In article <1770@chinacat.Unicom.COM> Andy Jacobson <IZZYAS1@UCLAMVS.BITNET>
|
|||
|
writes:
|
|||
|
>Subject: Hackers as a software development tool
|
|||
|
|
|||
|
>"GET DEFENSIVE!
|
|||
|
>YOU CAN'S SEE THEM BUT YOU KNOW THEY'RE THERE.
|
|||
|
>Hackers pose an invisible but serious threat to your information system.
|
|||
|
>Let LeeMah DataCom protect your data with the only data security system
|
|||
|
>proven impenetrable by over 10,000 hackers in LeeMah Hacker Challenges I
|
|||
|
>and II. For more information on how to secure your dial-up networks send
|
|||
|
>this card or call, today!" (Phone number and address deleted.)
|
|||
|
|
|||
|
>So it seems they're claiming that 10,000 hackers (assuming there are that
|
|||
|
>many!) have hacked their system and failed. Somehow I doubt it. Maybe they
|
|||
|
>got 10,000 attempts by a team of dedicated hackers, (perhaps employees?)
|
|||
|
>but has anyone out there heard of the LeeMah Hacker Challenges I and II?
|
|||
|
|
|||
|
If I remember correctly, they market some sort of a callback modem. What
|
|||
|
they then did was issue an open challenge to all hackers to call a system
|
|||
|
through their modem and get a text file or something similar in the system.
|
|||
|
The first time they had the "LeeMah Hacker Challenge", there were 8000+
|
|||
|
attempts by hackers, none successful. The second time there were only 2000+
|
|||
|
attempts, apparently because many hackers thought it was a new attempt by
|
|||
|
Big Brother to identify them.
|
|||
|
|
|||
|
Note: although there were more than 10,000 *attempts* to get by their
|
|||
|
product, LeeMah cannot justify saying that means that 10,000 hackers tried,
|
|||
|
unless each hacker tried only once. Somehow I doubt that.
|
|||
|
|
|||
|
Disclaimer: I have nothing to do with LeeMah, nor did I take part in either
|
|||
|
of their "Challenges". I just recall reading about it.
|
|||
|
|
|||
|
--jjw (aka narcoleptic)
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: claris!netcom!onymouse@AMES.ARC.NASA.GOV(John Debert)
|
|||
|
Subject: Re: Cu Digest, #2.19 (Gail Thakeray's comments, etc.)
|
|||
|
Date: 7 Jan 91 01:35:15 GMT
|
|||
|
|
|||
|
In CuD 2.19 (File 5), jwarren@well.sf.ca.us writes:
|
|||
|
|
|||
|
> For those who don't know of Ms. Thackeray, she is an Assistant State
|
|||
|
> Attorney General for the State of Arizona, active in pursuing computer
|
|||
|
> crime, and controversial for some of her public statements and/or
|
|||
|
> statements that.some press *allege* she said. In some cases, she may have
|
|||
|
> been as misleadingly quoted-out-of-context -- or flat-out abusively
|
|||
|
> misquoted -- as has been the case with some reports about Mitch Kapor, John
|
|||
|
> Perry Barlow and the Electronic Frontier Foundation.
|
|||
|
> --Jim Warren [permission herewith granted to circulate this-in-full]
|
|||
|
|
|||
|
Gail Thakeray has in fact made either untrue, half-true or misleading
|
|||
|
statements to the press and public at large. I heard her discussing the
|
|||
|
"hacker" problem last year live on-air on radio and she did in make such
|
|||
|
statements to support her position against certain, not-necessarily-criminal
|
|||
|
computer experts. She is supposed to know the law and specialize in computer
|
|||
|
crime but she made herself out to be against anyone who not only may have
|
|||
|
committed computer crime but also those who may be potentially capable
|
|||
|
(whatever that means, either possessed of the moral or technological
|
|||
|
capability, or whatever) to commit a crime. The sum of the position stated
|
|||
|
was that nothing would be allowed to get in her way to seek out and
|
|||
|
prosecute alleged computer criminals.
|
|||
|
|
|||
|
She seems inconsistent in her position and her department's policy and I,
|
|||
|
for one, see no reason therefore to trust anything she may say.
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: Maelstrom <BEHA@LCC.EDU>
|
|||
|
Subject: Correction - Michigan Bell vs BBS's
|
|||
|
Date: Mon, 7 Jan 91 19:05 EST
|
|||
|
|
|||
|
A bit out of CuD #2.19 to refresh everyone's memories:
|
|||
|
|
|||
|
>...an administrative hearing will be held before the
|
|||
|
>Michigan Public Service Commission to discuss a complaint filed against
|
|||
|
>Michigan Bell Telephone Company.
|
|||
|
|
|||
|
>Early this year, a private bulletin board in Grosse Point, called the
|
|||
|
>Variety and Spice BBS, was ordered to pay an increased charge for phone
|
|||
|
>service because it was discovered he was accepting donations for use of his
|
|||
|
>BBS.
|
|||
|
|
|||
|
>Michigan Bell claims that placing any condition on the use of a BBS
|
|||
|
>constitutes a business, and that the sysop must pay a business rate for his
|
|||
|
>phone line, plus pay a $100 deposit for EACH LINE in use. This means the
|
|||
|
>Variety and Spice sysop would have to pay a $1600 deposit, plus about $50
|
|||
|
>additional each month if he wanted to continue his BBS.
|
|||
|
|
|||
|
>Your help is urgently needed!! Please try to attend this hearing. It will
|
|||
|
>be held at the Public Service Building, 6545 Merchant Way, Lansing,
|
|||
|
>Michigan. The date is January 15. I do not have the exact time but I
|
|||
|
>assume this hearing will last most of the day. You do not have to testify,
|
|||
|
>but it would really be helpful if you can attend as a show of support. The
|
|||
|
>MPSC does not think the Michigan public even cares about BBS's. But we can
|
|||
|
>certainly jar their thinking if we can pack the room with sysops and users!
|
|||
|
|
|||
|
>For more information, please contact Jerry Cross at 313-736-4544 (voice) or
|
|||
|
>313-736-3920 (bbs). You can also contact the sysop of the Variety & Spice
|
|||
|
>BBS at 313-885-8377.
|
|||
|
|
|||
|
>Please! We need your support.
|
|||
|
|
|||
|
I just got off the phone with Jerry Cross, and it appears there has
|
|||
|
been a mistake in date and time for the hearing. The correct dates are
|
|||
|
January 29 and 30, at 9:00am on both days. The hearing should last for
|
|||
|
most of both days, depending on how many people testify. It is important
|
|||
|
that as many of us as possible attend as a show of support! There is
|
|||
|
power in numbers.
|
|||
|
Subject: The Consequence of a Philosophy: Response to Dark Adept
|
|||
|
From: polari!tronix@SUMAX.SEATTLEU.EDU(David Daniel)
|
|||
|
Date: Fri, 11 Jan 91 17:26:25 PST
|
|||
|
|
|||
|
The Consequences of a Philosophy
|
|||
|
by David Daniel
|
|||
|
|
|||
|
|
|||
|
I am moved to write this piece primarily by the Dark Adept's essay which
|
|||
|
appeared in CUD 2.18. He brought up many aspects of the 'hacker mentality'
|
|||
|
which have served and are serving to produce concern within the business
|
|||
|
and law enforcement community.
|
|||
|
|
|||
|
Unfortunately, many of his assertions are based on common misconceptions
|
|||
|
about how businesses operate. Mr. Adept presented a distorted view of the
|
|||
|
'capitalist mentality'. I hope to correct these misconceptions based on my
|
|||
|
experience in both computer and non-computer related businesses.
|
|||
|
|
|||
|
Mr. Adept mentioned the restrictive aspects of patents and copyrights but
|
|||
|
offered no proof to support his claim. He also misstated the scope of a
|
|||
|
patent right. A patent only covers the method by with an invention performs
|
|||
|
its task. For example, I could invent a new form of sewing machine with
|
|||
|
only three moving parts and a revolutionary means of fixing various
|
|||
|
materials together. My patent would cover the means by which my devise
|
|||
|
achieves its purpose. Further, my patent would free me to release my
|
|||
|
invention to the world and to invite any and all those interested to study
|
|||
|
it. It's likely that Singer would be quite impressed and I could rest
|
|||
|
assured that I would receive due compensation if Singer decided to
|
|||
|
manufacture and/or market it. Mr. Adept expressed his belief that a user
|
|||
|
interface was generic. I'm sure we could find many hard working programmers
|
|||
|
who would heartily disagree as well as corporate executives who have
|
|||
|
overseen the expenditure of many thousands or man-hours and dollars in the
|
|||
|
developement of a unique software product. Don't they deserve a return on
|
|||
|
their investment? Mr. Adept denies the existence of license agreements when
|
|||
|
he asserts that an inefficient company can tie up a good interface by tying
|
|||
|
it to a bad program. He also denies the idea of a joint marketing venture
|
|||
|
by two or more companies which combine their strongest products.
|
|||
|
|
|||
|
Mr. Adept wrote about the danger of protecting algorithms since they are
|
|||
|
merely mathematical models. Should we consider DOS and BIOS in the same
|
|||
|
category? Should these proprietary packages be freely circulated without
|
|||
|
compensation? It might be an attractive utopian concept but not workable
|
|||
|
within our present system.
|
|||
|
|
|||
|
I see the issue ultimately as one of philosophical ethics. It pits the
|
|||
|
hacker/cracker/phreaker community with their latter-day Robin Hood persona
|
|||
|
against the free enterprise business community with their 'what's mine is
|
|||
|
mine' attitude. The struggle has been going on for years and will likely
|
|||
|
continue. There is a phrase, "putting a head on a pike". It arose from an
|
|||
|
ancient custom of removing the head of an enemy and placing it on a long
|
|||
|
pole anchored in the ground for all to see. It served to warn off other
|
|||
|
would-be attackers and it sometimes worked. I see many of the recent
|
|||
|
hacker/cracker prosecutions as just such a piking of heads. It is the price
|
|||
|
that certain members of the computer underground have paid for the exorcise
|
|||
|
of their philosophy. As to whether or not it's working only time will tell.
|
|||
|
I'm sure that some have been deterred while others have been moved to act.
|
|||
|
I'd like to see the two divergent mentalities reach a compromise. I truly
|
|||
|
believe a compromise possible. Even though it won't be easy it's a valuable
|
|||
|
goal that should be worked toward. The alternatives are more of what we've
|
|||
|
been seeing over the last few years: More prosecutions, more paranoia
|
|||
|
within the business community and more invasive behavior on the part of the
|
|||
|
federal government. None of us want this regardless of which side of the
|
|||
|
proverbial fence we reside. Lets all become part of the solution rather
|
|||
|
than adding to the problem.
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: Dan Farmer <df@CERT.SEI.CMU.EDU>
|
|||
|
Subject: re: COPS, Cud 3.00 (file 5)
|
|||
|
Date: Wed, 09 Jan 91 11:57:18 EST
|
|||
|
|
|||
|
Hello, Gentlemen! I just read your latest CuD, and would like to take
|
|||
|
exception with your "File 5 of 6: Security on the Net" section. I wrote
|
|||
|
that, and it is included with, every copy of COPS that gets put out.
|
|||
|
However, the way you posted it, it is unclear that this is the case;
|
|||
|
indeed, people are asking me why I would post such a thing anonymously to
|
|||
|
your journal, apparently unaware that it is included as part of my package
|
|||
|
(the first person is used, so it would be a poor subterfuge :-)). If you
|
|||
|
would just mention something to the effect that I didn't send that to you,
|
|||
|
I'd appreciate that -- I certainly stand by all the words that I wrote, but
|
|||
|
it just seems a bit odd the way it is presented there, without the full
|
|||
|
background. If I send something to your fine journal, I'll certainly
|
|||
|
include my own name.
|
|||
|
|
|||
|
Thanks!
|
|||
|
|
|||
|
-- dan
|
|||
|
|
|||
|
%Moderator's comment: We apologize to Dan for not giving credit to him as
|
|||
|
the original author. The person who sent us the article assumed we would
|
|||
|
recognize the original author, which we did not. The error was ours, and
|
|||
|
we thank all those who wrote.
|
|||
|
|
|||
|
Jim
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: KRAUSER@SNYSYRV1.BITNET
|
|||
|
Subject: More CU News Articles
|
|||
|
Date: Wed, 02 Jan 91 20:27 CST
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.03: File 3 of 4: CU-Related Bibliography ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|
|||
|
Computer Hackers News Articles Part II
|
|||
|
|
|||
|
The following is a list of articles that I have found concerning the
|
|||
|
computer underground in various magazines and news-papers. The list is in
|
|||
|
chronological order. If you know of an article that should be included in
|
|||
|
this list or correction, send me the information and I will add it to the
|
|||
|
listing.
|
|||
|
|
|||
|
Dec 13 '90 New law aims to curb computer crime
|
|||
|
Financial Times pg.36
|
|||
|
Dec 10 '90 NASA refutes hacker break-in story
|
|||
|
Computerworld pg.10
|
|||
|
Dec 6 '90 Experts Call For Better Computer Security
|
|||
|
Los Angeles Times Part A pg.29
|
|||
|
Dec 6 '90 Computer Security Risks Feared
|
|||
|
Newsday pg.15
|
|||
|
Dec 6 '90 Phone Theft At NASA
|
|||
|
The New York Times Section D; Pg.2
|
|||
|
Dec 6 '90 Computer 'will replace bomb as terror weapon'
|
|||
|
The Daily Telegraph pg.8
|
|||
|
Dec 6 '90 Sacking Of Employee Hacker Was Justified
|
|||
|
The Daily Telegraph pg.8
|
|||
|
Dec 6 '90 Computers Vulnerable, Panel Warns; Networks Susceptible To
|
|||
|
Hackers and Accidents
|
|||
|
The Washington Post
|
|||
|
Dec 6 '90 Hackers Can Cause Catastrophe, National Research Council Warns
|
|||
|
The Washington Times pg.C3
|
|||
|
Dec 3 '90 Hackers Humbled
|
|||
|
Information Week pg.14
|
|||
|
Dec 1 '90 Espionage fears mounting as hackers tap into faxes
|
|||
|
The Daily Telegraph pg.23
|
|||
|
Nov 26 '90 Morris Appeals
|
|||
|
Information Week pg.16
|
|||
|
Nov 26 '90 Hackers draw stiff sentences;
|
|||
|
Computerworld pg.1
|
|||
|
Nov 19 '90 Judge Sentences 3 Hackers For BellSouth Breakin
|
|||
|
Wall Street Journal Section C pg.15
|
|||
|
Nov 17 '90 Security Tightened As Hackers Get Jail
|
|||
|
Newsday pg.9
|
|||
|
Nov 16 '90 Companies on alert for 'hackers'
|
|||
|
The Boston Globe pg.72
|
|||
|
Nov 16 '90 Phone Firms On Alert For Hackers
|
|||
|
Los Angeles Times Part D; Pg.2
|
|||
|
Nov 12 '90 Finger hackers' charged with voice-mail crime
|
|||
|
Computerworld pg.18
|
|||
|
Nov 11 '90 Phreaks Sabotage Phone Mail
|
|||
|
Information Week pg.14
|
|||
|
Nov 8 '90 Hacker doing time answering telephones
|
|||
|
The Washington Times pg.A6
|
|||
|
Nov 5 '90 CERTs unite to combat viruses, deter hackers
|
|||
|
Computerworld pg.4
|
|||
|
Oct 29 '90 BT Suspends Phone Data In Hacker Scare
|
|||
|
The Daily Telegraph pg.2
|
|||
|
Oct 22 '90 When A Hacker Cracks The Code
|
|||
|
The Daily Telegraph pg.31
|
|||
|
Oct 21 '90 Charges Against Hacker Dropped
|
|||
|
The Independent pg.3
|
|||
|
Oct 21 '90 The Challenge Of Computer Crime
|
|||
|
The Independent pg.12
|
|||
|
Oct 19 '90 Cops Say Hacker, 17, 'Stole' Phone Service
|
|||
|
Newsday pg.2
|
|||
|
Oct 16 '90 Computer Blackmail Reported At Five Leading British Banks
|
|||
|
American Banker pg.27
|
|||
|
Oct 15 '90 Attempt Made By Hackers To 'Blackmail' Banks
|
|||
|
The Times
|
|||
|
Oct 14 '90 Hackers blackmail five banks; Mysterious computer experts demand
|
|||
|
money to reveal how they penetrated sophisticated security
|
|||
|
The Independent pg.1
|
|||
|
Oct 14 '90 Five banks blackmailed
|
|||
|
The Sunday Times
|
|||
|
Oct 4 '90 Cracking Down On Hackers
|
|||
|
Financial Times pg.30
|
|||
|
Oct 1990 More on Operation Sun Devil & the Electronic Frontier Foundation
|
|||
|
Boardwatch (a monthly for BBS sysops) pp. 14-15
|
|||
|
Sept 3 '90 March To A Different Drummer
|
|||
|
Information Week pg.55
|
|||
|
Sept 3 '90 IS security exec tells of risks, strategies
|
|||
|
Network World pp. 21, 24, & 25
|
|||
|
Fall 1990 Crime and Puzzlement (by John Perry Barlow)
|
|||
|
Whole Earth Review pp 44-57
|
|||
|
Aug 6 '90 Presumed Innocent/Phrack Hacker Case
|
|||
|
Information Week pg.15
|
|||
|
Aug 20 '90 Executive Summary
|
|||
|
Information Week pg.10
|
|||
|
Aug 27 '90 Neidorf Vindicated
|
|||
|
Information Week pg.2
|
|||
|
July 16 '90 Outlaws or Pioneers?
|
|||
|
Information Week pg.12
|
|||
|
June 4 '90 Power Seekers
|
|||
|
Information Week pg.2
|
|||
|
June 4 '90 Defining A Crime
|
|||
|
Information Week pg.81
|
|||
|
June 4 '90 My Business
|
|||
|
Information Week pg.2
|
|||
|
June 4 '90 Fragile Egos
|
|||
|
Information Week pg.81
|
|||
|
May 7 '90 Hackers: Whacker Vs. Backer
|
|||
|
Information Week pg.72
|
|||
|
May 7 '90 Hacker Tracker: Be Eternally Vigilant
|
|||
|
Information Week pg.58
|
|||
|
May 7 '90 Judgement Day
|
|||
|
Information Week pg.57
|
|||
|
Apr 9 '90 Computer Crooks
|
|||
|
Information Week pg.16
|
|||
|
Mar 26 '90 Hacker Attack Is Back
|
|||
|
Information Week pg.26
|
|||
|
Feb 12 '90 Guarding Against Hackers
|
|||
|
Information Week pg.5
|
|||
|
Jan 29 '90 Morris Guilty
|
|||
|
Information Week pg.16
|
|||
|
Jan 15 '90 Computer Crime: An Inside Job
|
|||
|
Information Week pg.26
|
|||
|
Jan 8 '90 Private Eyes Stalk Computer Criminals
|
|||
|
Information Week pg.36
|
|||
|
|
|||
|
********************************************************************
|
|||
|
>> END OF THIS FILE <<
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: Various
|
|||
|
Subject: The CU in the News
|
|||
|
Date: January 22, 1991
|
|||
|
|
|||
|
********************************************************************
|
|||
|
*** CuD #3.03: File 4 of 4: The CU in the News ***
|
|||
|
********************************************************************
|
|||
|
|
|||
|
From: Anonymous
|
|||
|
Subject: Bulgaria and Computer Viruses
|
|||
|
Date: 12-20-90 2253EST
|
|||
|
|
|||
|
"BULGARIA'S LEADING HIGH-TECH EXPORT APPEARS TO BE COMPUTER VIRUSES"
|
|||
|
From the New York Times, by Chuck Sudetic
|
|||
|
|
|||
|
SOFIA, Bulgaria -- Bulgaria has become the breeding ground of some of the
|
|||
|
world's most lethal computer viruses, programs that are maliciously
|
|||
|
designed to spread through computer memories and networks and at times
|
|||
|
destroy valuable stored information like bank and medical records.
|
|||
|
|
|||
|
"We've counted about 300 viruses written for the IBM personal computer; of
|
|||
|
these, 80 or 90 originated in Bulgaria," said Morton Swimmer of Hamburg
|
|||
|
University's Virus Test Center, who specializes in diagnosing and curing
|
|||
|
Eastern European computer viruses.
|
|||
|
|
|||
|
"Not only do the Bulgarians produce the most computer viruses, they produce
|
|||
|
the best."
|
|||
|
|
|||
|
One Bulgarian virus, Dark Avenger, has infected American military
|
|||
|
computers, said John McAfee, who runs the Computer Virus Industry
|
|||
|
Association, which is based in Santa Clara, Calif., and tracks viruses for
|
|||
|
computer hardware and software companies.
|
|||
|
|
|||
|
"I'm not saying that any super-secure computers have been infected," he
|
|||
|
said. "But the U.S. Defense Department has about 400,000 personal
|
|||
|
computers, and anyone who has that many machines has a 100 percent
|
|||
|
probability of being hit."
|
|||
|
|
|||
|
"It is causing some people in sensitive places a lot of problems," a
|
|||
|
Western diplomat here said, "and they are very reluctant to admit they have
|
|||
|
them."
|
|||
|
|
|||
|
"I would say that 10 percent of the 60 calls we receive each week are for
|
|||
|
Bulgarian viruses, and 99 percent of these are for Dark Avenger," McAfee
|
|||
|
said, adding the virus has also attacked computers belonging to banks,
|
|||
|
insurance and accounting companies, telecommunications companies and
|
|||
|
medical offices.
|
|||
|
|
|||
|
"I've had a lot of calls from Frankfurt," Swimmer said. "One bank was very
|
|||
|
nervous about it, but I can't reveal its name for obvious reasons."
|
|||
|
|
|||
|
Several experts say the spread of the Bulgarian viruses is less the result
|
|||
|
of activities by the secret police than it is the consequence of having
|
|||
|
developed a generation of young Bulgarians whose programming skills found
|
|||
|
few outlets beyond hacking interventions.
|
|||
|
|
|||
|
A decade ago, this country's Communist leaders decided to make Bulgaria an
|
|||
|
Eastern-bloc Silicon Valley, Vesselin Bontchev, a Bulgarian computer
|
|||
|
specialist, said. Bulgarian factories began turning out computers, and the
|
|||
|
|
|||
|
government introduced them into workshops, schools and institutes. Many
|
|||
|
computers, however, stood idle because people did not know how to apply
|
|||
|
them or lacked an economic interest in doing so.
|
|||
|
|
|||
|
"People took office computers home, and their children began playing on
|
|||
|
them," he said, adding that buying a private computer was almost
|
|||
|
impossible.
|
|||
|
|
|||
|
These children quickly acquired software-writing skills, but had little or
|
|||
|
no chance to apply them constructively, he said.
|
|||
|
|
|||
|
They began bootlegging copyrighted Western software, especially computer
|
|||
|
games, by overriding devices written into the software to prevent it from
|
|||
|
being copied. Then they started altering the operating systems that drive
|
|||
|
the computer itself.
|
|||
|
|
|||
|
"From there it was one small step to creating viruses that attack files
|
|||
|
when they are acted on by the operating system," he said.
|
|||
|
|
|||
|
Bontchev estimated there are only about a dozen young Bulgarian computer
|
|||
|
programmers who have written the viruses that have caused all the trouble.
|
|||
|
|
|||
|
"Computer hackers here write viruses to show who is who in computer science
|
|||
|
in Bulgaria, to find a place in the sun," said Slav Ivanov, editor of a
|
|||
|
Bulgarian computer magazine. "The young computer people just don't rank in
|
|||
|
our society. They don't receive enough money."
|
|||
|
|
|||
|
The average wage of a software writer in Bulgaria is about $30 a month,
|
|||
|
Bontchev said.
|
|||
|
|
|||
|
One virus designer, however, acknowledged that revenge was also a factor.
|
|||
|
|
|||
|
"I designed my first computer virus for revenge against people at work,"
|
|||
|
said Lubomir Mateev, who helped write a non-destructive virus known as
|
|||
|
Murphy, which shares many of Dark Avenger's tricks. "Our first virus made
|
|||
|
all the computers at work send out a noise when they were switched on."
|
|||
|
|
|||
|
Mateev, 23, said he collaborated with Dark Avenger's designer last spring
|
|||
|
on a new virus that is harder to diagnose and cure because it is
|
|||
|
self-mutating.
|
|||
|
|
|||
|
"Dark Avenger's designer told me he would take a job as a janitor in a
|
|||
|
Western software firm just to get out of Bulgaria," he said. Attempts
|
|||
|
during several months to get in touch with Dark Avenger's creator proved
|
|||
|
fruitless.
|
|||
|
|
|||
|
For now, Bulgaria's computer virus designers can act with complete legal
|
|||
|
immunity.
|
|||
|
|
|||
|
"We have no law on computer crime," said Ivanov, whose magazine offers free
|
|||
|
programs that cure known Bulgarian viruses. "The police are only
|
|||
|
superficially interested in this matter."
|
|||
|
|
|||
|
Bulgaria's secret-police computers have also been infected, said a
|
|||
|
well-placed Bulgarian computer expert, who spoke on condition of anonymity
|
|||
|
and refused to elaborate.
|
|||
|
|
|||
|
Dark Avenger has also spread to the Soviet Union, Britain, Czechoslovakia,
|
|||
|
Poland and Hungary, Bontchev said, adding, "I've even had one report that
|
|||
|
it has popped up in Mongolia."
|
|||
|
|
|||
|
"The Dark Avenger is the work of a Sofia-based programmer who is known to
|
|||
|
have devised 13 different viruses with a host of different versions,"
|
|||
|
Bontchev said. "He is a maniac."
|
|||
|
|
|||
|
Bontchev said he was almost certain Bulgaria's government was not involved
|
|||
|
with Dark Avenger.
|
|||
|
|
|||
|
"A computer virus cannot be used as a weapon because it cannot be aimed
|
|||
|
accurately and can return like a boomerang to damage programs belonging to
|
|||
|
the creator himself," he said. "It can be used only to cause random damage,
|
|||
|
like a terrorist bomb."
|
|||
|
|
|||
|
Unlike less infectious viruses, Dark Avenger attacks computer data and
|
|||
|
programs when they are copied, printed or acted on in other ways by a
|
|||
|
computer's operating system, Bontchev said. The virus destroys information
|
|||
|
every 16th time an infected program is run.
|
|||
|
|
|||
|
A virus can spread from one computer to another either on floppy disks or
|
|||
|
through computer modems or computer networks, he said. Many viruses are
|
|||
|
spread at computer fairs and through computer bulletin-board systems where
|
|||
|
enthusiasts exchange information over the telephone.
|
|||
|
|
|||
|
Legislation on computer crime will be introduced in Parliament once a
|
|||
|
criminal code is adopted, said Ilko Eskanazi, a parliamentary
|
|||
|
representative who has taken an interest in the virus issue.
|
|||
|
|
|||
|
"We are now seeing viruses emerging on entirely new ground in Eastern
|
|||
|
Europe," Bontchev said.
|
|||
|
|
|||
|
"Things may get much worse before they improve," he warned. "The first law
|
|||
|
of computer viruses is that if a virus can be made, it will be. The second
|
|||
|
law is that if a computer virus cannot be made, it will be anyway."
|
|||
|
|
|||
|
+++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
From: portal!cup.portal.com!ZEL@UNKNOWN.DOMAIN
|
|||
|
Subject: Mitnick and DEC Conference
|
|||
|
Date: Thu, 3 Jan 91 20:00:43 PST
|
|||
|
|
|||
|
DECUS Bars Hacker: Meeting attendees focus on security
|
|||
|
by Anne Knowles
|
|||
|
FROM: From Communications Week December 24, 1990.
|
|||
|
|
|||
|
Las Vegas-While attendees of the DECUS user group meeting were busy
|
|||
|
learning about DEC security, an infamous computer hacker was trying to
|
|||
|
register for the Digital Equipment Computer User Society's Fall 90
|
|||
|
Symposium.
|
|||
|
|
|||
|
Luckily for DECUS, the hacker was recognized by show personnel, who
|
|||
|
refused him admittance. DECUS contacted its lawyers and is now developing
|
|||
|
a policy for dealing with such situations in the future, said bill
|
|||
|
Brindley, president of the 30-year old user group. In the interim, the
|
|||
|
hacker was barred from the meeting.
|
|||
|
|
|||
|
DECUS is the organization for users of Digital Equipment Corp. systems and
|
|||
|
ne tworks. With 120,000 members worldwide, it is the largest user group of
|
|||
|
its kind. the group holds seminannual symposiums, week-long events of
|
|||
|
daily seminars and hourly sessions on mostly technical topics concerning
|
|||
|
its membership.
|
|||
|
|
|||
|
DECUS had never before been confronted by a hacker attempting to register
|
|||
|
for one of its symposiums, Brindley said , though an attendee was evicted
|
|||
|
from the show two years ago when he was discovered hacking. DEC identified
|
|||
|
this year's hacker as Kevin Mitnick, who is well-known to both DECUS and
|
|||
|
DEC. He is currently on probation after having been found guilty in
|
|||
|
federal court of breaking into Easynet, DEC's internal computer network.
|
|||
|
His probation stipulates that he not enter a networked system or one with a
|
|||
|
modem, Brindley said. During its symposiums, DECUS supplies networked
|
|||
|
terminnals for attendee's use. "It would have been logistically impossible
|
|||
|
to restrict anyone [who had gained admittance to the show] from the
|
|||
|
systems," Brindley said.
|
|||
|
|
|||
|
The article goes on to other items from this point, but this is the part
|
|||
|
that deals directly with hacking.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
**END OF CuD #3.03**
|
|||
|
********************************************************************
|
|||
|
|
|||
|
|
|||
|
|