811 lines
41 KiB
Plaintext
811 lines
41 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer Underground Digest--Fri, Oct 4, 1991 (Vol #3.35)
|
|||
|
|
|||
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
|
|||
|
CONTENTS, #3.35 ( October 4, 1991)
|
|||
|
Subject: File 1--Moderators' Corner
|
|||
|
Subject: File 2--Cyperpunk Author Responds to Mitnick Charges
|
|||
|
Subject: File 3--Computer Security Basics review
|
|||
|
Subject: File 4--Steam age cyberpunk
|
|||
|
Subject: File 5--Errata to "Practical Unix Security"
|
|||
|
Subject: File 6--Living with the Law -- A view from Finland
|
|||
|
Subject: File 7--Let's Get It Right.
|
|||
|
Subject: File 8--"Phone Gall" (AT&T sues users)(Infoworld reprint)
|
|||
|
Subject: File 9--Announcement
|
|||
|
Subject: File 10--Cyberspace Conference in Montreal
|
|||
|
Subject: File 11--Conference Info and Press Releases
|
|||
|
|
|||
|
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
|||
|
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
|||
|
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
|||
|
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
|
|||
|
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
|
|||
|
Chicago email server, send mail with the subject "help" (without the
|
|||
|
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source
|
|||
|
is cited. Some authors do copyright their material, and they should
|
|||
|
be contacted for reprint permission. It is assumed that non-personal
|
|||
|
mail to the moderators may be reprinted unless otherwise specified.
|
|||
|
Readers are encouraged to submit reasoned articles relating to the
|
|||
|
Computer Underground. Articles are preferred to short responses.
|
|||
|
Please avoid quoting previous posts unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: 4 Oct 91 11:21:19 CDT
|
|||
|
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 1--Moderators' Corner
|
|||
|
|
|||
|
++++++++++++++++++++++
|
|||
|
WIDENER FTP SITE ADDRESS INFO
|
|||
|
++++++++++++++++++++++
|
|||
|
|
|||
|
The latest change for the WIDENER FTP SITE: The IP for
|
|||
|
ftp.cs.widener.edu will continue to be the address 147.31.254.132 (not
|
|||
|
147.31.254.20). Since it probably wasn't mentioned, the official
|
|||
|
transition is now 192.55.239.132 -> 147.31.254.132.
|
|||
|
|
|||
|
++++++++++++++++++
|
|||
|
'ZINE ALERT
|
|||
|
++++++++++++++++++
|
|||
|
|
|||
|
2600: THE HACKER QUARTERLY (summer, '91) is out and contains the the
|
|||
|
usual collection of excellent articles. Two of them are especially
|
|||
|
worth the sub price. "Where Have all the Hackers Gone," an editorial,
|
|||
|
argues that there are as many hackers around as ever, but are becoming
|
|||
|
invisible because of the abuse of law enforcement hysteria. A second
|
|||
|
piece, a letter by Kevin Mitnick, complains that Hafner and Markoff's
|
|||
|
_Cyberpunk_ was slanted against Mitnick because of his "refusal" to
|
|||
|
cooperate (see NEWSBYTE reprint this issue). Information on 2600 can
|
|||
|
be obtained from emmanuel@well.sf.ca.us or by writing to: 2600
|
|||
|
Magazine; PO Box 752; Middle Island, NY 11953.
|
|||
|
|
|||
|
+++++++++++
|
|||
|
BOARDWATCH
|
|||
|
+++++++++++
|
|||
|
|
|||
|
We continue to be impressed with BOARDWATCH. Although not CU, it is
|
|||
|
the best BBS 'zine out, and the current issue (Sept '91) includes some
|
|||
|
first-rate articles on the international BBS scene, featuring boards
|
|||
|
in Mexico and an interview with Pete Perkins of JANUS BBS in Tokyo.
|
|||
|
There's also a nice piece on how to run a BBS for profit, along with
|
|||
|
the usual general news and blurbs of the "straight" BBS scene
|
|||
|
nationwide. $36 a year brings 12 issues, and you can sub by writing:
|
|||
|
Boardwatch Magazine; 5970 S. Vivian Street; Littleton, CO 80127. Or,
|
|||
|
drop a note to the editor, Jack Rickard at jack.rickard@csn.org
|
|||
|
|
|||
|
+++++++++++++++++++
|
|||
|
GERALDO AND THE CU
|
|||
|
+++++++++++++++++++
|
|||
|
|
|||
|
We've received a number of blurbs about the Geraldo schtick last week.
|
|||
|
Guests included Craig Neidorf, Emmanuel Goldsten (2600), Don Ingraham
|
|||
|
(Marin County, Calif, prosecutor), and, of course, Geraldo himself.
|
|||
|
CuD will run a special issue in a few weeks, but it sounds, from the
|
|||
|
reports we've received, like the usual Jerry Rivers sensationalism.
|
|||
|
We're told that Jerry/Geraldo referred to Craig as the "most notorious
|
|||
|
hacker in America," that Ingraham made remarks bordering on slander
|
|||
|
(of Craig), and that Craig's primary flaw was that he tried to be
|
|||
|
reasonable and display some class in what some described as a "swine
|
|||
|
pit of muck and lies." We'll try to extract the transcripts in CuD
|
|||
|
3.36.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 1 Oct 91 23:09 EST
|
|||
|
From: "NEWSBYTES" <mcmullen@well.sf.ca.us>
|
|||
|
Subject: File 2--Cyperpunk Author Responds to Mitnick Charges
|
|||
|
|
|||
|
JEFFERSON VALLEY, NEW YORK, U.S.A., 1991 OCT 1 (NB) -- Cyberpunk
|
|||
|
co-author Katie Hafner, in an interview with Newsbytes, has responded
|
|||
|
to allegations of fabrication raised by Kevin Mitnick, one of the main
|
|||
|
subjects of the book.
|
|||
|
|
|||
|
Cyberpunk: Outlaws and Hackers on the Computer Frontier (Katie Hafner
|
|||
|
and John Markoff; Simon & Schuster, 1991 - $22.95) devotes the first
|
|||
|
section of the book called "Kevin: The Dark Side Hacker" to the
|
|||
|
activities of Mitnick and his associates, Lenny DiCicco, "Susan
|
|||
|
Thunder" and "Roscoe" (the last two names are pseudonyms; the persons
|
|||
|
would be interviewed only under the protection of anonymity). Mitnick,
|
|||
|
who served a prison term related to his intrusions into Digital
|
|||
|
Equipment Corporation's systems, says in a letter to the Summer 1991
|
|||
|
issue of 2600: The Hacker Quarterly that the section concerning him
|
|||
|
"is 20% fabricated and libelous."
|
|||
|
|
|||
|
Mitnick, in the letter, suggests that the authors had motivation for
|
|||
|
the alleged unfairness. He said "It seems that the authors acted with
|
|||
|
malice to cause me harm after my refusal to cooperate. Interestingly,
|
|||
|
I did offer to participate as a factual information source if I was
|
|||
|
compensated for my time, but the authors refused, claiming it would
|
|||
|
taint my objectivity. So, consequently, I declined to cooperate."
|
|||
|
|
|||
|
Hafner confirmed that Mitnick had refused cooperation after his offer
|
|||
|
to meet for pay was rejected but denied that his action caused any
|
|||
|
malicious or unfair behavior. She said "I feel that the payment of
|
|||
|
interview subjects is completely unethical and I have never been
|
|||
|
involved in such a thing and did not intend to start then. We
|
|||
|
mentioned in the book that Kevin had refused to cooperate but did not
|
|||
|
reveal that he had asked for payment. Since he has not brought the
|
|||
|
subject up, both in a call to the Tom Snyder radio show when I was on
|
|||
|
and in the 2600 letter, I will confirm the fact that his
|
|||
|
non-cooperation was due to our refusal to pay."
|
|||
|
|
|||
|
Hafner continued "Mitnick's lack of cooperation certainly did not lead
|
|||
|
to any malice or bias directed toward him. Everything in the book is,
|
|||
|
to the best of my knowledge, factual and we did everything possible to
|
|||
|
insure its accuracy. We attempted to get a confirming source for
|
|||
|
everything we were told and interviewed dozens of persons for the Dark
|
|||
|
Hacker section alone."
|
|||
|
|
|||
|
'Kevin's lack of cooperation did make the job more difficult and, may
|
|||
|
have possibly hurt him. If he had been willing to talk, he would have
|
|||
|
had an opportunity to respond to other people's statements about him
|
|||
|
but, even though we sent him numerous "return receipt" and overnight
|
|||
|
letters asking him to meet with us, he refused. Two cases in point: in
|
|||
|
the 2600 letter, he says that we described him as always eating in a
|
|||
|
computer room while talking on the telephone to Bonnie, his future
|
|||
|
wife. He denies this and says that I was trying to 'paint an unsavory
|
|||
|
picture'. It was Bonnie who told us that he was always eating while he
|
|||
|
was talking -- we didn't make it up -- and without the ability to
|
|||
|
speak to him, we had to choose to go on."
|
|||
|
|
|||
|
Hafner went on: "The second example is his statement that we said that
|
|||
|
he taunted USC's Mark Brown when, in fact, he 'never spoke with Mark
|
|||
|
Brown'. Brown says that he has definitely spoken to Mitnick and that he
|
|||
|
remembers the calls well and can call to mind details from them. If we
|
|||
|
had spoken to Mitnick, he would have had a chance to dispute such
|
|||
|
statements.
|
|||
|
|
|||
|
In response to Mitnick's object to the authors' changing of items that
|
|||
|
would possibly identify DiCicco as an unemployment cheat, Hafner said
|
|||
|
"That was my call. We tried to protect identities wherever it was
|
|||
|
desired. Lenny asked us to change the name and we did just as we
|
|||
|
also used public aliases for 'Roscoe' and 'Susan Thunder' at their
|
|||
|
request. Contrary to Kevin's statement, Lenny has not been travelling
|
|||
|
around with us promoting the book and has received no benefit from it
|
|||
|
other than the ability to tell his story as he understands it."
|
|||
|
|
|||
|
(Barbara E. McMullen & John F. McMullen/19911001)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 17 Sep 91 11:24:04 CDT
|
|||
|
From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
|
|||
|
Subject: File 3--Computer Security Basics --Review
|
|||
|
|
|||
|
Just looking at the cover of Computer Security Basics (by Deborah
|
|||
|
Russell and G.T. Gangemi, Sr., published by O'Reilly & Associates,
|
|||
|
Inc.) tells you that something has changed at the publisher of the
|
|||
|
former Nutshell Handbook series. The traditional ORA mascot on the
|
|||
|
cover is replaced by an antique key. While such obvious symbolism can
|
|||
|
be forgiven, a book about security needs an animal on the cover...
|
|||
|
Something ferocious or watchful. Maybe a Doberman. Alas, this book
|
|||
|
should only get Spuds McKenzie. Spuds, as you recall, had even less
|
|||
|
claim to being a party animal humping a Budweiser Babe's leg. Spuds
|
|||
|
was in drag, a female dog labeled as a frat rat. Quel scandal!
|
|||
|
|
|||
|
O'Reilly has become known for its how-to books for Unix programmers
|
|||
|
and programmer wannabees. Their choice of topics has been aimed at
|
|||
|
beginning to intermediate Unix users, with occasional surprises such
|
|||
|
as the book on Larry Wall's perl language. It's the past grounding in
|
|||
|
the practical workings of Unix's many moving parts that makes Computer
|
|||
|
Security Basics seem like such a leap into the troposphere. The
|
|||
|
intended audience seems to be not the user of small-to-medium Unix
|
|||
|
systems, but novices interested in a primer on U.S. Government
|
|||
|
security standards. It is a good enough buzzword lexicon to get
|
|||
|
somebody started on finding out more if the subject interests them.
|
|||
|
|
|||
|
There are some things that should be taken with a grain of salt in the
|
|||
|
book, however. In the book's discussion of DES, for example, the
|
|||
|
authors downplay the concern over the NSA's limiting of the algorithm
|
|||
|
to 56 bit encoding by assuring us that no less august a scientific
|
|||
|
body than the U.S. Senate has "upheld the integrity of the DES." I
|
|||
|
don't mean to come down on one side of the DES standard issue or the
|
|||
|
other, and neither do the authors, apparently. The ambiguity that the
|
|||
|
reader might sense, in reading of the Senate's approval on one page
|
|||
|
and the NSA and ISO failure to adopt the standard on the next, will
|
|||
|
hopefully be a spur to do more reading on the subject. It skips
|
|||
|
lightly over the RSA algorithm, which is perhaps understandable if the
|
|||
|
patent-holders were in court when the book went to press. It also
|
|||
|
advocates use of Halon as a fire extinguishing gas, mentioning its
|
|||
|
toxicity to people but not its environmental effects. In short, it
|
|||
|
reads like a book written after a week spent at a security trade show.
|
|||
|
Hey, I've been there... After too many hospitality suites and
|
|||
|
pheromone-laced glossy brochures, a pencil sharpener driven by a
|
|||
|
Briggs and Stratton engine seems like it might just save the world.
|
|||
|
To those whose breathing becomes heavy just at the sight of numbered
|
|||
|
paragraphs or RFPs, these will seem to be empty quibbles.
|
|||
|
|
|||
|
In sum, the book is a start for someone who needs to get the mindset
|
|||
|
of government-compliant security standards. For the faithful reader
|
|||
|
of other O'Reilly books, it may be akin to a Boston Marathon t-shirt
|
|||
|
on a flounder.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 28 May 91 23:09 EST
|
|||
|
From: "Michael E. Marotta" <MERCURY@LCC.EDU>
|
|||
|
Subject: File 4--Steam age cyberpunk
|
|||
|
|
|||
|
DIFFERENCE ENGINE, the May 1991 "steam punk" novel by William Gibson
|
|||
|
and Bruce Sterling, is a humorous and chilling historical fantasy. In
|
|||
|
this Britain of 1855 Charles Babbage's successful invention has made
|
|||
|
him a lord. Industries and individuals are controlled by ubiquitous
|
|||
|
engines. The best programmers call themselves "clackers" and the best
|
|||
|
clackers do graphics.
|
|||
|
|
|||
|
Accelerated into explosive decline by exponential industrialization,
|
|||
|
London's ecology collapses in the Great Stink. There are subtler
|
|||
|
problems, too, and Lady Ada's mania for gambling is only one of them.
|
|||
|
|
|||
|
The paleontologist spars with a copper: "If I model a phenomenon, does
|
|||
|
that mean I understand it? Or might it be simple coincidence, or an
|
|||
|
artifact of the technique? Of course, as an ardent simulationist, I
|
|||
|
put much faith in Engine-modeling. But the doctrine can be questioned,
|
|||
|
no doubt of it. Deep waters, Fraser! The sort of thing that Hume and
|
|||
|
Bishop Berkeley used to thrive on." Sterling and Gibson have modeled
|
|||
|
a cybernetic revolution.
|
|||
|
|
|||
|
The steam-driven engines of Criminal Anthropometry, a section of the
|
|||
|
Bureau of Central Statistics, tag everyone in Britain --except for
|
|||
|
those people whose records have been expunged on secret orders,
|
|||
|
perhaps from Prime Minister Byron himself. More, clackers can, of
|
|||
|
course, be bribed, though it is far easier to _get_ information than
|
|||
|
to erase it.
|
|||
|
|
|||
|
And yet, informatics and paleontology are not the whole of science.
|
|||
|
One character suffers from tertiary syphilis while his chiropractor
|
|||
|
treats him for "railway spine." Parents buy microscopes that allow
|
|||
|
clever children to see animicules even though this is considered of no
|
|||
|
practical use. While some newer lodgings have crappers, most people
|
|||
|
use chamber pots.
|
|||
|
|
|||
|
The story's commoners wear fabrics with patterns created by engines --
|
|||
|
complex, perhaps proto-fractal, some tagged with Lady Ada's name. Like
|
|||
|
those weaves, DIFFERENCE ENGINE, provides a woof and warp about life
|
|||
|
as it might have been. And yet, all stories are about Today.
|
|||
|
(Shakespeare's Julius Caesar was about his England and it will remain
|
|||
|
a popular story as long as there is government.) DIFFERENCE ENGINE
|
|||
|
reflects the sensibilities of our time. The patterns that evolve from
|
|||
|
this story include dark threads and bright. Criminals act as agents
|
|||
|
of the legislature and arcane programs crash mighty computers and
|
|||
|
radicals become the establishment.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 28 Sep 91 20:52:41 EST
|
|||
|
From: Gene Spafford <spaf@CS.PURDUE.EDU>
|
|||
|
Subject: File 5--Errata to "Practical Unix Security"
|
|||
|
|
|||
|
(See CUD 3.30 and 3.33 for reviews of this book, and comments.)
|
|||
|
|
|||
|
O'Reilly & Associates has discovered that in the first printing of
|
|||
|
_Practical_UNIX_Security_ by Simson Garfinkel and Gene Spafford (June,
|
|||
|
1991) a formatting error caused the grave quotes (%) in the shell
|
|||
|
scripts in our final PostScript files to be printed as forward quotes
|
|||
|
('). Of course, this breaks the scripts and is certainly not what the
|
|||
|
authors, editor, or publisher intended.
|
|||
|
|
|||
|
An errata sheet is available from the publisher that corrects the
|
|||
|
shell script examples and other minor technical errors found in the
|
|||
|
first printing. Please call O'Reilly & Associates at 1-800-338-6887
|
|||
|
to obtain a copy of this sheet. Alternatively, you may send email to
|
|||
|
steph@ora.com, to request a copy of the errata sheet -- be sure to
|
|||
|
include your surface mail address.
|
|||
|
|
|||
|
We apologize for any difficulties these errors may have caused.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 14 Sep 1991 09:11:06 +0300
|
|||
|
From: Jyrki Kuoppala <jkp@CS.HUT.FI>
|
|||
|
Subject: File 6--Living with the Law -- A view from Finland
|
|||
|
|
|||
|
We live in a crazy society - every citizen is required to know the law
|
|||
|
and do nothing against the law, and simultaneously it's illegal for
|
|||
|
all practical purposes for citizens to copy the law without paying
|
|||
|
royalties to some organizations. This makes it very difficult to make
|
|||
|
free dissemination of the law via electronic media possible.
|
|||
|
|
|||
|
In Finland, the law is published as collections of new laws given out
|
|||
|
by the government. I think this is the only official version of the
|
|||
|
law. The publications are printed by a company called The State
|
|||
|
Printing Center, which is a normal business-oriented company although
|
|||
|
owned by the government. The text of the law holds no copyright at
|
|||
|
this phase; I'm not sure if the Printing Center claims copyright to
|
|||
|
the format of the text.
|
|||
|
|
|||
|
The trouble with these collections (Suomen S%%d|skokoelma), varying
|
|||
|
from a few pages to perhaps dozens of pages is that they're often
|
|||
|
%patches' to existing laws which state which paragraphs and sentences
|
|||
|
to be changed in a previous version of the law and so it's very
|
|||
|
difficult in practice to read the current law based on these. For
|
|||
|
example, to get the current patent law you need something like eight
|
|||
|
of these collections.
|
|||
|
|
|||
|
The State Printing Center also publishes other documents. For
|
|||
|
example, to get the Finnish copyright law you can buy a book
|
|||
|
containing the current copyright law (and IC circuit model protection
|
|||
|
law). This book has all the patches collected into one document. But
|
|||
|
now, as the Printing Center is a business and the Finnish law has a
|
|||
|
%collection copyright', it is not legal to copy this book without the
|
|||
|
permission of the Printing Center. They claim copyright for the
|
|||
|
collection and perhaps also the layout/appearance of the book. From
|
|||
|
their point of view, this is understandable because they don't want
|
|||
|
anyone else to begin copying and selling the book - this would deprive
|
|||
|
them of some of their income.
|
|||
|
|
|||
|
There's also another organization publishing the Finnish Law, %Suomen
|
|||
|
Lakimiesliitto', Finnish Lawyers' Union. Every two years, they
|
|||
|
publish a collection of all the laws. Now, they also want to make
|
|||
|
money and so claim copyright for their publication.
|
|||
|
|
|||
|
I've been doing some investigations on getting the law on-line (for
|
|||
|
example to put it available via anonymous ftp) so everyone would get
|
|||
|
easy access to it. Now, the State Printing Center has the source for
|
|||
|
their publications on-line, and they are even willing to distribute
|
|||
|
the source, costing something like $15 / 1000 characters (just an
|
|||
|
estimate), covering the costs of processing of the text or something
|
|||
|
like that, with extra charges if extra work needs to be done (like for
|
|||
|
the patent law, for which they don't have a collection readily done
|
|||
|
but several different documents which need to be combined).
|
|||
|
|
|||
|
The problem with this is that even if I buy the machine-readable text
|
|||
|
to the law, I'm not allowed to distribute it without permission from
|
|||
|
the Printing Center as they claim collection copyright (also copyright
|
|||
|
to the indices and such, but those are not essential). It's possible
|
|||
|
that I could get a permission for non-commercial distribution, but
|
|||
|
that's problematic - for example, is it then allowed to be put on a
|
|||
|
BBS which charges $10 / year as a membership fee? Or a BBS which
|
|||
|
charges $1/hour for connect time?
|
|||
|
|
|||
|
As for the Finnish Lawyers Union, I inquired them about the
|
|||
|
availability of all of the law. This was my first phone call to them,
|
|||
|
and the person said that they will take appropriate action (I
|
|||
|
interpreted that to mean they will sue me ;-) if I distribute the
|
|||
|
publication (I talked about OCRing the book and taking only the
|
|||
|
portions that contain the law, not any others possibly written by the
|
|||
|
Union).
|
|||
|
|
|||
|
Now, in principle there's no problem with this - all legal and clear,
|
|||
|
and I can of course OCR the official version of the law and apply the
|
|||
|
patches myself and put it up for anonymous ftp, but that'd be a hell
|
|||
|
of a lot of work. I suppose I could even get the text
|
|||
|
machine-readable for the processing fees from the Printing Center.
|
|||
|
But in practice, this would require a lot of work and then I could
|
|||
|
claim copyright for the collection and require licenses for everyone
|
|||
|
who uses this - one could argue I'd need to do that in order to get
|
|||
|
the money needed for all the work.
|
|||
|
|
|||
|
The situation also raises some responsibility issues - as the official
|
|||
|
law is pretty much unusable, the law enforcement and the government
|
|||
|
probably uses the other publications from the State Printing Center
|
|||
|
and the Layers' Union. What if there's a misprint in one of these?
|
|||
|
What if someone deliberately changes something in the unofficial
|
|||
|
versions?
|
|||
|
|
|||
|
Perhaps we should start lobbying a law to make the copyright for the
|
|||
|
law to be something like the GNU copyleft.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 29 Sep 91 22:21:38 PDT
|
|||
|
From: halcyon!walter@SUMAX.SEATTLEU.EDU
|
|||
|
Subject: File 7--Let's Get It Right.
|
|||
|
|
|||
|
((Moderators' Note--Walter Scott is SysOp of a small semi-public BBS
|
|||
|
in Seattle called Writers Happy Hours. Writers Happy Hours is
|
|||
|
dedicated to serving literary writers and others with related
|
|||
|
interests)).
|
|||
|
|
|||
|
Now that the dust has settled [just a bit] in the infamous "download
|
|||
|
tax" controversy coming out of New York state, it's time to take stock
|
|||
|
-- to analyze where we're at and what has happened. This is important
|
|||
|
for at least a couple of reasons. (1) Mistakes were made in this
|
|||
|
episode of telecomputing history. We must learn from them and not make
|
|||
|
them again. (2) We must sort out the real dangers from paranoia.
|
|||
|
|
|||
|
In 1987, the telecomputing community rose up in an unprecedented
|
|||
|
manner to fight a proposed rulemaking which would remove a
|
|||
|
communications surcharge exemption for certain electronic data
|
|||
|
services. This would have ultimately made it more expensive for people
|
|||
|
to access ESP [ENHANCED SERVICE PROVIDER] electronic data services, of
|
|||
|
certain types, available by modem. At the time, CompuServe was at the
|
|||
|
center of activism -- mostly because CompuServe had a serious stake in
|
|||
|
the outcome of the NPRM [NOTICE FOR PROPOSED RULEMAKING] from the FCC.
|
|||
|
The NPRM would have implemented a surcharge on various ESPs (including
|
|||
|
CompuServe) if the rulemaking went unchallenged.
|
|||
|
|
|||
|
Modem enthusiasts rallied in opposition to the surcharge from across
|
|||
|
the country. Their comments and actions played an important role in
|
|||
|
the eventual tabling of the NPRM by the FCC. After the surcharge
|
|||
|
incident, people who operate and/or use electronic bulletin board
|
|||
|
systems have become hyper-sensitive to any and all references made to
|
|||
|
modem-based telecommunications by government infrastructures or
|
|||
|
telephone companies. Unfortunately, that hyper-sensitivity has a
|
|||
|
disastrous downside.
|
|||
|
|
|||
|
In the past 3 years, there have been recurring instances where the old
|
|||
|
surcharge case is somehow resurrected as though the FCC was "at it
|
|||
|
again". The same messages and references appear repeatedly. People
|
|||
|
like Jim Eason (cited as a source of information at KGO radio in San
|
|||
|
Francisco in many bogus alert files) are likely to be sick of the
|
|||
|
constant phone calls asking about a surcharge which Eason or his staff
|
|||
|
must explain is a matter of PAST history as looming threats go. Even
|
|||
|
the FCC has found it necessary to run ads in major daily newspapers to
|
|||
|
dispel rumor and/or innuendo. Also, some members of Congress probably
|
|||
|
receive mail on the surcharge in the present, and may receive mail on
|
|||
|
it in the future.
|
|||
|
|
|||
|
As was in evidence through material appearing in CuD 3.34, it seems
|
|||
|
the New York state sales tax on prewritten software is yet another
|
|||
|
case where the fight/flight syndrome kicks in too easily. There is
|
|||
|
clear indication that many ASSUMPTIONS were made as opposed to very
|
|||
|
little careful verification of the facts. What makes this worse is
|
|||
|
that an ostensibly reputable SysOps organization in New York brought
|
|||
|
this matter into prominent exposure without properly investigating the
|
|||
|
facts. People panicked, and bureaucrats were besieged with phone calls
|
|||
|
from modemers and SsyOps who launched into tirades over a tax on
|
|||
|
things that were not and are not taxed in New York state. Legislators
|
|||
|
received the same kind of phone calls and mail. Their staff went to
|
|||
|
the trouble of contacting bureaucrats and verifying information passed
|
|||
|
on to them by irate modem users. Such activity will continue while
|
|||
|
messages and text files containing inaccurate information continue to
|
|||
|
proliferate.
|
|||
|
|
|||
|
All this turns out to be as embarrassing as, if not more than, the
|
|||
|
recurring surcharge rumors. These incidents generate credibility
|
|||
|
issues. It was pointed out to me, by James Morris at the New York
|
|||
|
state Department of Taxation & Finance, that we, who use modems and
|
|||
|
run bulletin board systems, have a tremendous information network by
|
|||
|
which we keep each other informed and initiate action. No greater
|
|||
|
compliment can be paid to us as modem users and SysOps.
|
|||
|
|
|||
|
We, as modem users and SysOps, have tremendous power due to the nature
|
|||
|
of the very medium we work and play in. Along with that power comes
|
|||
|
an equally awesome responsibility. Responsibility, thy name is
|
|||
|
"CREDIBILITY". We *MUST* be credible. We can collectively cry wolf so
|
|||
|
many times before those in the position to change things
|
|||
|
--politicians, judges, and bureaucrats -- will ignore us. If we're
|
|||
|
gonna do it, let's do it right.
|
|||
|
|
|||
|
Let's be certain we have the FACTS before we sound the battle claxons.
|
|||
|
Let's empower each other with information that allows us to easily
|
|||
|
contact key sources of information to verify that information. Let's
|
|||
|
make certain that provided information is as accurate as possible when
|
|||
|
WE are the providers -- straight "from the horse's mouth", as it were.
|
|||
|
When it comes to empowering your fellow modem user with critical
|
|||
|
information requiring a pointed response in venues not limited to but
|
|||
|
generally separate from cyberspace itself, you should put on your
|
|||
|
JOURNALIST'S cap and wear it well. Ask and ask again? Verify and
|
|||
|
REverify. Whether our tremendous ability to network will be of any
|
|||
|
use to us depends on how credible we're assessed to be by those who
|
|||
|
generally don't hangout in cyberspace.
|
|||
|
|
|||
|
Now, on to the second point. The same material in CuD gives us some
|
|||
|
gems in-the-rough. They're difficult to see since they're mixed in
|
|||
|
with misinformation and associated emotionally oriented calls for
|
|||
|
action. One of the dangers in situations, such as the software sales
|
|||
|
tax debacle, are tendencies to glide past issues that may be core
|
|||
|
issues but require CAREFUL THOUGHT AND ANALYSIS before one can
|
|||
|
conceptualize the importance of the issue. This seems to be happening
|
|||
|
in the New York state software sales tax debacle. Even though several
|
|||
|
people have pointed out a significant truth, which begs for action
|
|||
|
every bit as much as the purported "download tax", the BBS community
|
|||
|
of New York and the U.S. is not reacting with the tenacity it invoked
|
|||
|
over the possibility of taxation on systems supporting upload/download
|
|||
|
ratios. Thus, if this had been an attempt to use smoke and mirrors to
|
|||
|
deflect people from the REAL issues, it would have worked very nicely.
|
|||
|
|
|||
|
As you may recall, the New York state Department of Taxation & Finance
|
|||
|
has asserted, without contradiction, that there is a longstanding
|
|||
|
sales tax on information services. This tax can be, has been, and
|
|||
|
probably will be, applied to electronic bulletin board systems in New
|
|||
|
York state. NYS T&F also does not claim that upload/download ratios
|
|||
|
won't be considered a taxable event IN THE FUTURE. NYS T&F
|
|||
|
Regulations Specialist James Morris went to greats pains in
|
|||
|
illustrating to me that standing tax codes certainly support such a
|
|||
|
FUTURE interpretation. Ergo, the sword precariously swings. Until
|
|||
|
modem users and SysOps of New York went into action, NYS T&F knew
|
|||
|
little or nothing of the BBS community. They are now ACUTELY aware of
|
|||
|
the BBS community and how it functions.
|
|||
|
|
|||
|
NYS T&F can be likened to the giant in "Jack & The Beanstalk". For a
|
|||
|
time, the giant went unaware of Jack's presence. But when he finally
|
|||
|
became aware.... Well, we must remember that New York state is
|
|||
|
desperate for revenue. Will bulletin board systems become a means to
|
|||
|
help fill in financial gaps? To what extent? Should protective
|
|||
|
legislation be initiated? Should tax codes be more specific about who
|
|||
|
can be taxed and under what circumstances? What about the relationship
|
|||
|
of free speech via the various functions of bulletin board systems --
|
|||
|
including file exchange of newsletters containing important
|
|||
|
information? [Note that CuD makes its way into a lot of download
|
|||
|
directories on bulletin board systems across the U.S.] Has anyone
|
|||
|
checked statutes in their own state to see if there might be a
|
|||
|
sleeping giant about to wake?
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 27 Aug 91 21:36 EDT
|
|||
|
From: "Silicon Surfer" <unixville@news.group.com>
|
|||
|
Subject: File 8--"Phone Gall" (AT&T sues users)(Infoworld reprint)
|
|||
|
|
|||
|
Phone Gall
|
|||
|
InformationWeek, Aug. 26, 1991, pp.12-13
|
|||
|
(By Mary E. Thyfault with Diane Medina and Bob Violino)
|
|||
|
|
|||
|
AT&T has sued nearly 20 of its large business users for refusing to pay
|
|||
|
for calls made by hackers through their corporate telephone In recent
|
|||
|
months, the question of whether businesses victimized by phone hackers
|
|||
|
should be forced to pay for such calls has stirred acrimonious debate
|
|||
|
and prompted numerous actions before the Federal Communications
|
|||
|
Commission. Estimates of the corporate monies lost annually to phone
|
|||
|
hackers begin at $500 million and go into the billions.
|
|||
|
|
|||
|
Now an InformationWeek investigation reveals a broad effort by AT&T to
|
|||
|
shift this debate to the courts. Among the corporations AT&T has quietly
|
|||
|
sued are Avis Rent-A-Car System Inc., FMC Corp., Citgo Petroleum Corp.,
|
|||
|
Procter & Gamble Co., and Perkin-Elmer Corp. (see below). In the largest
|
|||
|
such lawsuit uncovered by IW, the United Nations was the victim of
|
|||
|
nearly $1 million in unauthorized calls.
|
|||
|
|
|||
|
While the existence of these lawsuits remains unknown to most large
|
|||
|
users, AT&T has been playing legal hardball with corporate customers for
|
|||
|
at least a year, in most cases collecting fees in confidential,
|
|||
|
out-of-court settlements. It appears no case has yet reached the trial
|
|||
|
stage.
|
|||
|
|
|||
|
The fact that users back down is no surprise; AT&T is a $36.11 billion
|
|||
|
behemoth with a crack legal staff. The mere threat of a lawsuit is
|
|||
|
enough to force most firms to pull out their checkbooks.
|
|||
|
|
|||
|
"Who can afford to go to court with the phone company?" asks Roger
|
|||
|
Longtin, counsel for electronics component distributor Avnet Inc. in
|
|||
|
Great Neck, N.Y. , which is currently negotiating with AT&T over nearly
|
|||
|
$1 million in disputed charges.
|
|||
|
|
|||
|
AT&T's long-distance rivals MCI Communications Corp. and US Sprint
|
|||
|
Communications Co. say they have not sued any users over this issue, and
|
|||
|
IW could find no evidence of any legal actions. Such a suit, explains a
|
|||
|
spokesman for MCI, "is a good way to lose a customer".
|
|||
|
|
|||
|
One analyst argues, however, that MCI and Sprint can't afford to be nice
|
|||
|
guys much longer. "I'd be surprised if MCI and Sprint didn't file suits
|
|||
|
- uncollectibles have been a horrendous problem in the long-distance
|
|||
|
business," says John Bain, senior VP at Raymond James & Associates Inc.
|
|||
|
in St. Petersburg, Fla. One lawyer who has represented corporate victims
|
|||
|
of toll fraud says the out-of-court settlements always involve some
|
|||
|
payments by customers. AT&T typically starts negotiations by knocking
|
|||
|
15% off the user's bill, he says; that's about the break-even point for
|
|||
|
AT&T's profit on long-distance calls, according to analysts. AT&T does
|
|||
|
not discuss litigation, a spokesman says.
|
|||
|
|
|||
|
Some customers are enraged at AT&T and the telecom industry over this
|
|||
|
issue. They argue that the carriers and PBX vendors are not providing
|
|||
|
enough warning, training, or support. "The carriers should do away with
|
|||
|
the attitude of 'The customer should've known,'" charges Tim Honaker CFO
|
|||
|
for Dearborn Financial Publishing lnc. in Chicago, which has been hacked
|
|||
|
for $65,000. The telcom suppliers "come in with these great technologies
|
|||
|
and then say, 'By the way, you gotta figure out how to manage this thing
|
|||
|
on your own.' Well, we're not in that business." Suppliers should at
|
|||
|
least share in the responsibility and liability for phone fraud charges,
|
|||
|
according to victims.
|
|||
|
|
|||
|
Vendors respond that telecom managers can virtually end fraud by
|
|||
|
properly managing their phone systems, particularly remote access
|
|||
|
features. Some users agree. Says Jay Silverberg, president of the
|
|||
|
National Rolm Users Group, "Although from a technical perspective the
|
|||
|
vendor has the responsibility to provide the ability to make a system
|
|||
|
secure, it's the user's responsibility to manage it."
|
|||
|
|
|||
|
The software to monitor such systems isn't cheap, however-about $120,000
|
|||
|
on average-and "it can only cut down the hemorrhaging, not eliminate
|
|||
|
hacking," says James Ross of Ross Engineering Inc., a software
|
|||
|
engineering firm in Sterling, Va. Most victims argue that carriers have
|
|||
|
the technology to detect hacking at their fingertips.
|
|||
|
|
|||
|
While the victims' attorneys say AT&T hasn't improved its security
|
|||
|
measures, all the carriers and the major PBX vendors-Northern Telecom,
|
|||
|
Rolm Co., and the business telephone unit of AT&T-say they are putting
|
|||
|
increasing emphasis on helping users fight phone hacking. AT&T offers
|
|||
|
seminars at every user group meeting, for example, and Rolm announced in
|
|||
|
April it would begin assigning a security coordinator in each of its 31
|
|||
|
branch locations.
|
|||
|
|
|||
|
Currently, AT&T has seven fulltime staffers charged with educating
|
|||
|
customers and investigating fraud cases. Users claim that number is
|
|||
|
woefully low. (Meanwhile, the number of AT&T lawyers pursuing litigation
|
|||
|
in this area is, an AT&T spokesman admits, "probably in the tens.") AT&T
|
|||
|
has 40,000 PBX installations and 4 million business long-distance
|
|||
|
customers. "If they really want to protect the public, they need to hire
|
|||
|
more like 700 people," says Charles Helein, a Washington attorney who
|
|||
|
has represented several toll fraud victims. AT&T says it will add three
|
|||
|
more staffers next month. Some users even claim AT&T is not devoting
|
|||
|
more resources to ending toll fraud because it is making too much money
|
|||
|
on such calls-a charge AT&T vehemently denies.
|
|||
|
|
|||
|
"If you significantly cut phone fraud, you have to wonder what kind of
|
|||
|
impact it would have on their revenue," says Thomas Crowe, attorney for
|
|||
|
Chartways Technologies Inc. in Rockville, Md., which suffered $81,789 in
|
|||
|
unauthorized calls.
|
|||
|
|
|||
|
"That's ludicrous," says an AT&T spokesman. "AT&T devotes enormous
|
|||
|
resources to this." The company argues that it is doing more than
|
|||
|
required. On a weekly basis, AT&T monitors the three area codes in South
|
|||
|
America and Central America that receive the most illegal calls. When a
|
|||
|
sudden increase in volume is noted, AT&T tries to notify customers,
|
|||
|
reaching about 25%, of them before they themselves notice the break-in.
|
|||
|
|
|||
|
"I can't tell you that every week we get to everyone, but we attempt to
|
|||
|
based on our resources," says Robert Carman, head of AT&T's corporate
|
|||
|
security division. Still, the FCC says all complaints filed to date by
|
|||
|
users over this issue have involved AT&T.
|
|||
|
|
|||
|
Frank Chrz, VP of office services at ITT Consumer Financial Corp. in
|
|||
|
Minneapolis, says AT&T "was very responsive" in helping him detect and
|
|||
|
stop the hackers that penetrated his company's Rolm PBX, racking up
|
|||
|
$100,000 in charges. But that cooperation ended when the bill came due
|
|||
|
and ITT refused to pay. AT&T sued ITT, which promptly sued both Rolm and
|
|||
|
Rolm's PBX distributor. All four settled out of court. At least two
|
|||
|
other users have sued their PBX vendors after being sued by AT&T: New
|
|||
|
York City Human Resources Administration sued Northern Telecom Inc., and
|
|||
|
Western Diversified Life Insurance Co. in Deerfield, Ill., countersued
|
|||
|
AT&T as both its PBX supplier and long-distance carrier.
|
|||
|
|
|||
|
In another twist, two corporations sued AT&T before AT&T could sue them:
|
|||
|
Mitsubishi International Corp. in New York (IW, June 24,p.14) and John
|
|||
|
D. Hollingsworth On Wheels Inc. in Greenville, S.C.
|
|||
|
|
|||
|
Despite all the complex legal maneuvering, every case eventually comes
|
|||
|
down to finger-pointing. No one wants to accept responsibility for toll
|
|||
|
fraud. Until now, the FCC has typically ruled against users, but
|
|||
|
mounting corporate anger may mean the commission will impose some sort
|
|||
|
of liability ceiling. What is clear is that users and vendors will have
|
|||
|
to work together to solve the problem.
|
|||
|
|
|||
|
"In no way are we inferring we can catch everything," says Bob Fox,
|
|||
|
Sprint's assistant VP of corporate security. "The majority of the time
|
|||
|
we're getting to the customer before he knows what's going on. But we're
|
|||
|
not going to catch everything every time. It takes teamwork.
|
|||
|
|
|||
|
"The customer is going to get hurt if we do our thing but he doesn't do
|
|||
|
his, or vice versa." -Mary E. Thyfault with Diane Medina and Bob Violino
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 3 Oct 91 11:10:04 EDT
|
|||
|
From: server@STORMKING.COM(Storm King ListServ Account)
|
|||
|
Subject: File 9--Announcement
|
|||
|
|
|||
|
NIA & Phrack Inc present:
|
|||
|
|
|||
|
"It is useless to resist us."
|
|||
|
|
|||
|
The second annual,
|
|||
|
X M A S C O N '91
|
|||
|
|
|||
|
Where: Houston, TX
|
|||
|
When: December 27th-29th 1991
|
|||
|
|
|||
|
Who: All Hackers, Journalists, Security Personnel and Federal Agents
|
|||
|
|
|||
|
Well, it's getting closer.. HoHoCon is coming up and we plan on having
|
|||
|
the biggest gathering of Hackers ever!
|
|||
|
|
|||
|
This event is going to be public. Sponsors include members of NIA
|
|||
|
Magazine, Phrack Inc, dFx/Neon Knights and cDc.
|
|||
|
|
|||
|
Hotel and reservation information will be announced at a later date.
|
|||
|
Anyone is welcome to attend, and we encourage you to be there.
|
|||
|
|
|||
|
Keep the Faith & cya' at HoHoCon!
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 21 Sep 91 18:52:56 EDT
|
|||
|
From: "Anonymous" <anonymous@noaddress.etc>
|
|||
|
Subject: File 10--Cyberspace Conference in Montreal
|
|||
|
|
|||
|
THE THIRD INTERNATIONAL CONFERENCE ON CYBERSPACE
|
|||
|
MONTREAL, QUEBEC
|
|||
|
MAY 22-23, 1992
|
|||
|
|
|||
|
Sponsored and hosted by
|
|||
|
DEPARTMENT OF COMPARATIVE LITERATURE, UNIVERSITY OF MONTREAL and
|
|||
|
GROUP FOR THE STUDY OF VIRTUAL SYSTEMS, U.California, Santa Cruz
|
|||
|
|
|||
|
ANNOUNCEMENT AND CALL FOR PAPERS
|
|||
|
|
|||
|
The Third International Conference on Cyberspace will be held May
|
|||
|
22--23 1992 at the University of Montreal. This is a call for
|
|||
|
abstracts, approximately fifteen of which will be selected for
|
|||
|
development and presentation at the Conference. All papers, and a
|
|||
|
number of selected abstracts, will be published in Proceedings,
|
|||
|
available late 1992.
|
|||
|
|
|||
|
Abstracts should be between 600 and 1000 words, and are due by
|
|||
|
December 15, 1991. Submission of an abstract indicates the
|
|||
|
submitter's intention and capability to write and present the
|
|||
|
corresponding, full length paper, if chosen.
|
|||
|
|
|||
|
Participation in the Conference is limited to 140 people in the
|
|||
|
following categories:
|
|||
|
|
|||
|
1. Participants who have been invited to present papers based on
|
|||
|
their abstracts. (Limit 15)
|
|||
|
|
|||
|
2. Participants who have submitted abstracts judged by the Program
|
|||
|
Committee to be of particular interest. (Limit 35)
|
|||
|
|
|||
|
3. Participants with creative and clearly stated interests in the
|
|||
|
topic who are involved with work on cyberspace in any capacity.
|
|||
|
(Limit 60)
|
|||
|
|
|||
|
4. Visitors & observers, who are not actively working in the field at
|
|||
|
this time but who have expressed interest in the subject. (Limit 30)
|
|||
|
|
|||
|
Like the First Conference at Austin in 1990, and the Second
|
|||
|
International Conference in Santa Cruz in 1991, the Third
|
|||
|
International Conference on Cyberspace is not only about the enabling
|
|||
|
technology of virtual reality, 3-D user interfaces, networking, data
|
|||
|
visualization, or high speed computer graphics, but also the nature
|
|||
|
of cyberspace as such, conceived of as an independent realm, a shared
|
|||
|
virtual environment whose inhabitants, objects and spaces are data,
|
|||
|
but data which is visualized, heard and (perhaps) touched. It seeks
|
|||
|
to reach an understanding of how the components of cyberspace already
|
|||
|
"under construction" in the development and design of graphic user
|
|||
|
interfaces, scientific visualization techniques, video games, CAD,
|
|||
|
abstract architecture and architectural design theory, knowledge
|
|||
|
navigation, "cyberpunk" discourse, cultural studies, film and
|
|||
|
narrative theory, virtual and artificial reality systems, MUDs,
|
|||
|
INTERNET, USENET and other networks, groupware, and hypermedia might
|
|||
|
someday function together to create a true, public cyberspace, as
|
|||
|
well as private, special-purpose cyberspaces.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 26 Sep 91 00:25:50 MDT
|
|||
|
From: mbarry@ISIS.CS.DU.EDU(Marshall Barry)
|
|||
|
Subject: File 11--Conference Info and Press Releases
|
|||
|
|
|||
|
Contact: Terry Travis or Michelle Weisblat
|
|||
|
Telephone: (303) 426-1847
|
|||
|
|
|||
|
IBECC, a non-profit educational, literary and scientific society,
|
|||
|
is sponsoring the 1992 International BBSing and Electronic Commu-
|
|||
|
nications Conference to be held August 13-16, 1992 in Denver,
|
|||
|
Colorado. The theme of IBECC '92 will be "Socially Responsible
|
|||
|
Computing."
|
|||
|
|
|||
|
There will be panels on such diverse topics as "Safe Computing" [How
|
|||
|
to Prevent the Spread of Computer Infection], "Why Kelly CAN Read"
|
|||
|
[Exploring Computers, BBSing, and Education], and "Staying Alive"
|
|||
|
[Computing and the Physically Challenged and Homebound].
|
|||
|
|
|||
|
Membership in IBECC, including the 1992 annual conference, is $80.00
|
|||
|
(US) through September, 1991 and $125.00 from October 1, 1991 through
|
|||
|
May, 1992. Membership also includes the IBECC Newsletter, access to
|
|||
|
the IBECC Electronic Bulletin Board, and discounts on several
|
|||
|
services.
|
|||
|
|
|||
|
The conference will be held at the Sheraton Denver West Hotel and
|
|||
|
Conference Center, Lakewood, Colorado. Room rates start at $62.00
|
|||
|
(US + tax) per night; contact the hotel at 1-800-LAKEWOOD, or (303)
|
|||
|
987-2000, for reservations.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #3.35
|
|||
|
************************************
|
|||
|
|
|||
|
|