782 lines
39 KiB
Plaintext
782 lines
39 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Sun, Oct 27, 1991 Volume 3 : Issue 38
|
|||
|
|
|||
|
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
|
|||
|
CONTENTS, #3.38 ( October 27, 1991)
|
|||
|
File 1: Geraldo's _Now it can be Told_ Revisited
|
|||
|
File 2: Comment on the Geraldo Show
|
|||
|
File 3: A Guest's-eye view of the Geraldo Show
|
|||
|
File 4: Second Thoughts about the "Ingraham Massacre"
|
|||
|
File 5: Response to CuD #3.37's "Mad Hacker" Issue
|
|||
|
File 6: Release of Informatik #1
|
|||
|
File 7: Second Annual XMASCON
|
|||
|
|
|||
|
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
|||
|
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
|||
|
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
|||
|
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
|
|||
|
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
|
|||
|
Chicago email server, send mail with the subject "help" (without the
|
|||
|
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source
|
|||
|
is cited. Some authors do copyright their material, and they should
|
|||
|
be contacted for reprint permission. It is assumed that non-personal
|
|||
|
mail to the moderators may be reprinted unless otherwise specified.
|
|||
|
Readers are encouraged to submit reasoned articles relating to the
|
|||
|
Computer Underground. Articles are preferred to short responses.
|
|||
|
Please avoid quoting previous posts unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: 25 Oct 91 12:19:22 CDT
|
|||
|
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 1--Geraldo's _Now it can be Told_ Revisited
|
|||
|
|
|||
|
The fallout from the Geraldo show (see CuD #3.37) that we've received
|
|||
|
has focused on Alameda County (Calif) Assistant District Attorney Don
|
|||
|
Ingraham for the reckless manner in which he treated "truth" and Craig
|
|||
|
Neidorf. Craig provides an insider's view, and the moderators offer a
|
|||
|
review of Ingraham's made-for-tv performance below.
|
|||
|
|
|||
|
Krista Bradford, Senior Reporter for NICBT, provides a helpful glimpse
|
|||
|
into production of the show that explains some of the dynamics behind
|
|||
|
framing topics. Krista also adds a thoughtful commentary on educating
|
|||
|
the media to the issues of cyberspace. Her lesson is: There is no
|
|||
|
"media," but rather reporters who do media work. These workers don't
|
|||
|
"get educated" by some mystical process. Instead, those of us who
|
|||
|
complain about media misrepresentation have to obligation to find
|
|||
|
constructive ways to deliver our message to individuals writing on the
|
|||
|
topic. It is our obligation, she argues, to contact individual
|
|||
|
reporters, to sign them up on various systems, and to bring the
|
|||
|
message to them rather than assume they can, on their own, go out and
|
|||
|
find it.
|
|||
|
|
|||
|
For those interested, Craig is still in debt to Katten, Muchin, &
|
|||
|
Zavis for close to $50,000.00. Any contributions to his defense fund
|
|||
|
would be greatly appreciated. Please send a check or money order to:
|
|||
|
|
|||
|
Sheldon Zenner
|
|||
|
Katten, Muchin, & Zavis
|
|||
|
525 West Monroe Street
|
|||
|
Suite 1600
|
|||
|
Chicago, Illinois 60606-3693
|
|||
|
|
|||
|
The checks must be made out to Katten, Muchin, and Zavis and you must
|
|||
|
put his name on the memo section somewhere or else they will not
|
|||
|
credit the money to his account.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 19 Oct 91 20:42:40 CDT (Sat)
|
|||
|
From: peter@TARONGA.COM(Peter da Silva)
|
|||
|
Subject: File 2--Comment on the Geraldo Show
|
|||
|
|
|||
|
My reaction to Rivera's show was simply that it glorified all the
|
|||
|
negative connotations of the word "Hacker". It put an obvious bozo up
|
|||
|
against Neidorf who simply made the government look bad. It also made
|
|||
|
Neidorf look bad by linking him to things he never did, nor that any
|
|||
|
other "hacker" ever did (the 911 paper in question was public
|
|||
|
information, for heavens' sake, and they didn't say that once!). It
|
|||
|
was a complete loss for everyone except Rivera and the foreign hackers
|
|||
|
out of reach of Sun-Devil hysteria.
|
|||
|
|
|||
|
No matter what side of the subject you're on... if you live in the
|
|||
|
U.S. this show hurt you whether you know it or not.
|
|||
|
|
|||
|
Which is typical of Geraldo's flaming. The best part was Cliff Stoll,
|
|||
|
but of course he never got a chance to refute Goldstein's dismissal of
|
|||
|
his point about breaking and entering... which is quite valid. If you
|
|||
|
want to be pedantic, phreak-style crackers are like joy-riding kids.
|
|||
|
Joy-riding is, rightly, illegal. And so it should be. Of course, you
|
|||
|
don't get thousands of dollars worth of equipment confiscated and jail
|
|||
|
terms for joy-riding. The government *and* the apologists for these
|
|||
|
soi-disant hackers are *both* wrong, and attempting to trivialize
|
|||
|
*either* side's grievances is counterproductive.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 22 Oct 1991 01:05:07 -0400
|
|||
|
From: Craig Neidorf <knight@stormking.com>
|
|||
|
Subject: File 3--A Guest's-eye view of the Geraldo Show
|
|||
|
|
|||
|
Same Story, New Court Room
|
|||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|||
|
|
|||
|
"I guess they figured I needed to be tried twice."
|
|||
|
|
|||
|
Now It Can Really Be Told...
|
|||
|
|
|||
|
It was Monday, March 25, 1991 and I was sitting in a conference room
|
|||
|
at the SFO Marriott Hotel in Burlingame, California. I was attending
|
|||
|
a tutorial session called "How Computer Crime is Investigated" hosted
|
|||
|
by Don Ingraham at the First Conference on Computers, Freedom, and
|
|||
|
Privacy.
|
|||
|
|
|||
|
Don Ingraham, an Assistant District Attorney in Alameda County,
|
|||
|
California was already a nationally-known computer crime prosecutor
|
|||
|
and I was Craig Neidorf, political science/pre-law student from St.
|
|||
|
Louis, already nationally-known for being Knight Lightning, editor of
|
|||
|
Phrack... the guy who published the 911 text file and more.
|
|||
|
|
|||
|
What began as a tutorial and learning session about the use of search
|
|||
|
warrants on electronically stored evidence changed into a heated
|
|||
|
debate with Ingraham on one side with some supporters and me on the
|
|||
|
other side allied with Sheldon Zenner, Mike Godwin, and Sharon
|
|||
|
Beckman. It was interesting and quite a few constitutional and ethical
|
|||
|
issues were raised. However, when it was all over, I left with a
|
|||
|
feeling of respect for Mr. Ingraham even if I disagreed with his
|
|||
|
views.
|
|||
|
|
|||
|
As the conference continued over the next few days, I found that where
|
|||
|
I had expected clashes I found conversations. The law enforcement
|
|||
|
officers and prosecutors were not bad people when you got them in a
|
|||
|
small group away from the reporters. As odd as this may sound, a
|
|||
|
whole bunch of them (joined by people like Bruce Sterling and John
|
|||
|
Perry Barlow) were seated in the lounge when I showed up late one
|
|||
|
evening and they had been speaking about my future. They had decided
|
|||
|
that should I choose a career path in law enforcement after I finished
|
|||
|
law school, they would all be out of work as I became the most feared
|
|||
|
prosecutor among the entire hacker community and many others. In one
|
|||
|
sense it was very flattering. Among these prosecutors was Don
|
|||
|
Ingraham and he was very supportive of the idea of me becoming a
|
|||
|
prosecutor.
|
|||
|
|
|||
|
In late July 1991, I was just finishing up my last semester at the
|
|||
|
University of Missouri-Columbia. I had been forced to take a full
|
|||
|
12-hour summer school load of classes in order to make the August
|
|||
|
commencement. I was running a litte behind after William Cook made
|
|||
|
sure that I could not complete the Spring semester of 1990. As it
|
|||
|
turns out, the CFP folks had predicted my future rather accurately, I
|
|||
|
was working for law enforcement. As part of my undergraduate
|
|||
|
requirements I had to take an internship with some branch of state
|
|||
|
government. A strong grade point average and critical writing skills
|
|||
|
had earned me a prestigious position with the Missouri Attorney
|
|||
|
General's Office in their Public Protection Division (the department
|
|||
|
that handles consumer fraud).
|
|||
|
|
|||
|
One evening I received a call from Phyllis Zimmerman who represented
|
|||
|
"Now It Can Be Told." She explained who she was and what their
|
|||
|
program was all about. "We're going to show how the hackers are
|
|||
|
really the good guys who are exposing the flaws so the criminals can't
|
|||
|
exploit them." It sounded like she had been brainwashed by Emmanuel
|
|||
|
Goldstein of 2600 Magazine to me, but what the hell. I told her that
|
|||
|
I might be interested, but I could not do anything with her until
|
|||
|
after August 3rd since I had to finish school and I had some finals
|
|||
|
coming up for my remaining classes.
|
|||
|
|
|||
|
I didn't hear from the NOW people again until the second week of
|
|||
|
September. This time I was contacted by Cindy Frei. They didn't want
|
|||
|
to interview me in a segment anymore, instead they wanted me to take
|
|||
|
part in sort of a discussion after the main part of the show. She
|
|||
|
told me that William Cook might be there, as well as Donald Delaney,
|
|||
|
Wynn Schwartaw[sic], and Chris Goggans. I knew Cook would never show
|
|||
|
up and hanging out in New York with Bloodaxe (Goggans) sounded like it
|
|||
|
might be cool since we had so much fun the previous summer at
|
|||
|
CyberView in St. Louis. So we made plans for me to fly up to New York
|
|||
|
on Wednesday, September 25th. On Tuesday, I learned that Chris
|
|||
|
Goggans and Donald Delaney had been cancelled and Don Ingraham had
|
|||
|
been substituted in as a replacement. I also began to learn a little
|
|||
|
more about the show.
|
|||
|
|
|||
|
Scenes of Dutch hackers breaking into systems and more. I was
|
|||
|
concerned that instead of the viewers getting impressions of good guy
|
|||
|
hackers, the Department of Defense would go on alert and press
|
|||
|
Congress for stronger legislation against computer hackers. Frei said
|
|||
|
I was supposed to sort of give my impressions of what I saw, a
|
|||
|
hacker's viewpoint. I explained that I wasn't a hacker in the sense
|
|||
|
she was looking for, but this did not present a problem for her. She
|
|||
|
didn't want me to get into a discussion about the difference of
|
|||
|
opinion on the use of the word hacker. I began to have second
|
|||
|
thoughts about doing the show, but I decided that I was probably best
|
|||
|
suited to try and dispel some of the hacker hysteria that might
|
|||
|
arise. I was wrong.
|
|||
|
|
|||
|
I arrived in a cold, rainy, unfamiliar and unfriendly metropolis --
|
|||
|
New York City. No car waiting or anything special like that. Frei
|
|||
|
said I should take a cab and just save all the receipts, they would
|
|||
|
reimburse me. It took seemingly forever, but I arrived at the hotel
|
|||
|
Empire (Radison). It was a dump. The hallways and rooms looked like
|
|||
|
they hadn't been remodeled in at least a decade and to make matters
|
|||
|
worse, there was a mouse loose in my room.
|
|||
|
|
|||
|
The next morning I took a cab to CBS Studios on West 57th street where
|
|||
|
Now It Can Be Told is shot. They ran me through a little preping and
|
|||
|
a little makeup. They wanted me to be confrontational with Don
|
|||
|
Ingraham. This was not on my agenda. I expected we would talk about
|
|||
|
electronic search and seizure and the dilemmas that computer crime
|
|||
|
investigation presents to law enforcement. I was not looking for a
|
|||
|
fight with this man, I thought he was a friend.
|
|||
|
|
|||
|
The studio for Geraldo is actually very tiny despite how the cameras
|
|||
|
make it look like a large room. I met Geraldo who found it
|
|||
|
interesting that I was a political science major in school and not
|
|||
|
computer science. I was told that Geraldo wanted to use my scrapbook
|
|||
|
in the show to flip to a few of the headlines in the articles...
|
|||
|
instead he used it to sensationalize.
|
|||
|
|
|||
|
We had to shoot the intro segment at least eight times before there
|
|||
|
was one they finally liked. Each time Geraldo threw a different
|
|||
|
question at me. It was funny in a way when they would screw up and
|
|||
|
Geraldo started cursing a little. Everything was going fine until Don
|
|||
|
Ingraham came on camera.
|
|||
|
|
|||
|
Ingraham's comparison of hackers to rapists almost made me physically
|
|||
|
ill. How can a reasonable person draw an analogy between these two
|
|||
|
types of activity? Ok, sure, if a person's computer is accessed
|
|||
|
without authorization, there very well might be a feeling of being
|
|||
|
violated, of vulnerability, but the physical and emotional damage of a
|
|||
|
rape is almost immeasurable. Although I'm not an expert on
|
|||
|
psychology, I do know a little about the long-term psychological
|
|||
|
damage a rape can do to a woman, the fear of ever being intimate
|
|||
|
again, of going outside, the inability to have a relationship with a
|
|||
|
man, the constant questions; "Is it my fault?" "Did I encourage
|
|||
|
this?" How can a man as intelligent as Don Ingraham stoop to such
|
|||
|
blatant disregard for a true representation of the facts? Of course,
|
|||
|
I was not given a chance to respond to those remarks. We cut right to
|
|||
|
a commercial and when we came back, I was busy trying to find a way to
|
|||
|
respond to Ingraham's other uncalled for remarks.
|
|||
|
|
|||
|
Ingraham called me lucky to have not gotten convicted and he is right.
|
|||
|
I am lucky that I had a brilliant attorney and a decent judge who made
|
|||
|
the justice system work despite the efforts of a malicious
|
|||
|
media-hungry prosecutor. However, he neglected to point out that the
|
|||
|
government voluntarily dropped the case because there was no case. I
|
|||
|
hadn't done anything wrong. Furthermore, it was unknown to him that
|
|||
|
Federal District Court Judge Bua issued a court order to the Secret
|
|||
|
Service, FBI, and U.S. Marshalls several months ago to expunge all of
|
|||
|
my arrest records and have them destroyed. And there is a lot more to
|
|||
|
it than the fact that BellCore published 911 documents.
|
|||
|
|
|||
|
As for the 911 information being public, there have been indepth
|
|||
|
articles on 911 in magazines like CO, Teleconnect, and Telephone
|
|||
|
Engineering & Management. Not to mention the fact that the 911
|
|||
|
information itself was just a bunch of bureaucratic nonsense. Scott
|
|||
|
Ticer of BellSouth doesn't know what he's talking about.
|
|||
|
|
|||
|
Ingraham also claims that the Federal Court said that the Pentagon
|
|||
|
Papers (New York Times Co. v. United States, 403 U.S. 713, 1971) case
|
|||
|
did not apply to me. This is not exactly true. The Court decided
|
|||
|
that if someone is committing a fraud and using a publication to
|
|||
|
commit that fraud, then that activity is not protected by the First
|
|||
|
Amendment. At the time, the U.S. Attorney's office was alleging that
|
|||
|
Phrack Newsletter in and of itself from day one was a fraud to begin
|
|||
|
with. Because of that allegation (which fell completely apart at
|
|||
|
trial), the Court could not dismiss based on the First Amendment.
|
|||
|
|
|||
|
The main problem here is that I was taken completely by surprise.
|
|||
|
Frei had promised that this show was not about my case and more than
|
|||
|
that, I thought I knew Ingraham. I never even considered the
|
|||
|
possibility of such an attack from him. It was clear that they had
|
|||
|
set me up for an ambush. Why was Ingraham discussing my case anyway?
|
|||
|
The case has been over for a long time and he never had anything to do
|
|||
|
with it. Perhaps if he did have something to do with it, he would
|
|||
|
have known that the government did not charge me with a conspiracy,
|
|||
|
did not prove a conspiracy, and in fact my co-defendant Robert Riggs
|
|||
|
had testified that I had never asked him to break into any computer or
|
|||
|
copy any document, let alone a Bell South computer or a 911 document.
|
|||
|
No, Ingraham did not know much about my case and this ignorance was
|
|||
|
used to my disadvantage.
|
|||
|
|
|||
|
I haven't complained too much about Geraldo here and basically it
|
|||
|
isn't that Geraldo isn't deserving of a lot of criticism, but unlike
|
|||
|
Ingraham, he didn't know any better or at least I would not have
|
|||
|
expected him to know any better.
|
|||
|
|
|||
|
Before I knew what had happened, the show was over. I never had the
|
|||
|
opportunity to raise ANY civil liberties concerns and I felt like I
|
|||
|
had just gotten the stuffing beaten out of me on national television.
|
|||
|
My friends told me not to feel too bad, after all I'm just a guy
|
|||
|
barely out of college and Ingraham is a prosecutor with over a dozen
|
|||
|
years of experience. How could I have hoped to prevail against him in
|
|||
|
this type of confrontation, especially with Geraldo feeding on the
|
|||
|
allegations like a blood-sucking leech. I didn't come to New York to
|
|||
|
fight with Don Ingraham, I guess he had a different idea.
|
|||
|
|
|||
|
I didn't feel like hanging out in New York any longer, so I got to the
|
|||
|
airport and a flight home as soon as possible.
|
|||
|
|
|||
|
Frei and the other staff at NOW did not even have the decency to send
|
|||
|
me a copy of the show on a videotape and to this day, I have not been
|
|||
|
reimbursed for the cab fare money that they promised me. This amounts
|
|||
|
to about $45.00.
|
|||
|
|
|||
|
And that is my story...
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 27 Oct 91 7:43:01 CDT
|
|||
|
From: Jim Thomas <jthomas@well.sf.ca.us>
|
|||
|
Subject: File 4--Second Thoughts about the "Ingraham Massacre"
|
|||
|
|
|||
|
Craig Neidorf has yet to receive an apology from Bill Cook. Or Tim
|
|||
|
Foley. Or the BellSouth crowd. They had no case, yet they nearly
|
|||
|
ruined his life. Even though the case was dropped, prosecutors still
|
|||
|
seem intent on prosecuting--and convicting--him in the media on the
|
|||
|
same half-truths and fabrications.
|
|||
|
|
|||
|
This time, Don Ingraham owes Craig Neidorf an apology.
|
|||
|
|
|||
|
But, Don Ingraham, Alameda County Ass't DA, apparently feels no need
|
|||
|
to apologize to Craig Neidorf. At least, he hasn't to date. But,
|
|||
|
then, why should the powerful worry about such trivia, even when they
|
|||
|
distort facts, betray trust, and act unethically in their hatchet job?
|
|||
|
Ingraham betrayed Craig's trust that no cheap-shots would be taken; He
|
|||
|
betrayed Craig's trust by bringing in an agenda of his own when Craig
|
|||
|
expected a legitimate discusion; and he betrayed the public's trust by
|
|||
|
playing fast and loose with facts.
|
|||
|
|
|||
|
The transcript of the Sept 30 Geraldo show makes Don Ingraham seem
|
|||
|
less than honorable in the shameless way he exploited Craig for his
|
|||
|
own ends.
|
|||
|
|
|||
|
>Geraldo: . . . .Don, do you think Craig's lucky that he's
|
|||
|
>not behind bars right now?
|
|||
|
>
|
|||
|
>Don: Yes, I think he's extraordinarily lucky. He was part
|
|||
|
>of a conspiracy, in my opinion, to take property that wasn't
|
|||
|
>his and share it with others. They charged him with
|
|||
|
>interstate transport of stolen property - couldn't make the
|
|||
|
>threshold -and it came out that it had been compromised by,
|
|||
|
>unfortunately, released by another BellCore subsidiary. But
|
|||
|
>was certainly not through any doing of HIS that he is a free
|
|||
|
>man.
|
|||
|
|
|||
|
Normally, the courts--not publicity-seeking Assistant DAs trying to
|
|||
|
make a splash on national television--try suspects. There was no
|
|||
|
evidence that Craig was involved in a conspiracy to "take property
|
|||
|
that wasn't his." The evidence showed that the E911 documents in
|
|||
|
question were stolen long before being published in PHRACK, and that
|
|||
|
Craig had no role in their acquisition. Ingraham used his skills as
|
|||
|
a glib rhetorician to distort reality in ways that may make good
|
|||
|
theater, but lousy justice.
|
|||
|
|
|||
|
Ingraham is right about one thing: It wasn't Craig's doing that forced
|
|||
|
the government to drop the charges. It was a six-figure attorney fee
|
|||
|
and the volunteer help of John Nagel, Dorothy Denning, the EFF, and
|
|||
|
others who devastated the government's case. However, it was not on
|
|||
|
some "threshold" technicality that the case was dropped, as Ingraham
|
|||
|
implies. The case against Craig was dropped because the government had
|
|||
|
no case.
|
|||
|
|
|||
|
Craig suggested an analogy between the issues the PHRACK case raised
|
|||
|
and Daniel Ellsberg and the Pentagon Papers. Rather than accept the
|
|||
|
analogy as a departure point for discussion, Prosecutor Ingraham
|
|||
|
preferred to hurl a few sleaze-balls:
|
|||
|
|
|||
|
>Geraldo: Do you figure it that way Don? Is he like Daniel
|
|||
|
>Ellsberg?
|
|||
|
>
|
|||
|
>Don: No, Ellsberg went to court to deal with it. Daniel
|
|||
|
>Ellsberg's release of the Pentagon Papers is the subject of
|
|||
|
>a published court decision to point out it was a matter of
|
|||
|
>national security and national interest. The E911 codes,
|
|||
|
>which is the citizen's link to the police department are not
|
|||
|
>a matter of national security. They're a matter of the
|
|||
|
>central service to the community.......
|
|||
|
>
|
|||
|
>Geraldo: You broke into the 911 system? He broke into the
|
|||
|
>911 system!
|
|||
|
>
|
|||
|
>KL: No, that's not correct. I never entered any 911
|
|||
|
>telephone system.
|
|||
|
>
|
|||
|
>Don: I didn't say he entered into it. What I said was that
|
|||
|
>he and Riggs conspired together to take a code that they
|
|||
|
>knew was necessary to 911 and to take it apart to see how it
|
|||
|
>worked. They never had the owner's permission, they never
|
|||
|
>asked for it.
|
|||
|
|
|||
|
Ingraham first implies that Craig broke into the E911 system, then we
|
|||
|
waffles back and claims he merely conspired to take code. He is
|
|||
|
fabricating a role for Craig despite evidence to the contrary, he
|
|||
|
grossly misrepresents the E911 documents in question, which were text
|
|||
|
files rather than a "program," and he imputes to Craig motives (taking
|
|||
|
apart the code) which are not true.
|
|||
|
|
|||
|
Sitting in the presumably quiet confines of his office, Ingraham
|
|||
|
apparently judges it fully acceptable to besmirch the reputation and
|
|||
|
feelings of a victim of malicious prosecution. Why? What would
|
|||
|
possess a normal adult to play the bully-role on national television?
|
|||
|
And, what would he do with hackers given the chance? Why, what
|
|||
|
else? Toss 'em in jail--"HARD TIME!"
|
|||
|
|
|||
|
>Don: I don't think they're being punished very much at all.
|
|||
|
>We're having trouble even taking away their gear. I don't
|
|||
|
>know one of them has done hard time in a prison. The book,
|
|||
|
>Hafner's book on _Cyberpunk_, points out that even Mitnick
|
|||
|
>who is a real electronic Hannibal Lecter ... did not get
|
|||
|
>near any of the punishment that what he was doing entitled
|
|||
|
>him to.
|
|||
|
|
|||
|
Isn't Ingraham aware of the hackers who've been sent to prison? What
|
|||
|
does he mean by "hard time?" Doesn't he think that the devastating
|
|||
|
consequences of separation of family that Len Rose is experiencing is
|
|||
|
"hard time?" Nah, better we lop of a hand for the first offense, pluck
|
|||
|
out the eyes for a second. And, as a commentator observed last issue,
|
|||
|
it's really a drag that due process gets in the way when Ingraham and
|
|||
|
his brownshirts try to grab suspects' equipment. Damn! They even had
|
|||
|
to give Steve Jackson's back. Too bad Doc Ripco and others haven't
|
|||
|
been as lucky.
|
|||
|
|
|||
|
It is apparent that Ingraham is not on the show to discuss issues,
|
|||
|
but to perform. Craig is a convenient prop for an anti-hacker
|
|||
|
soliloquy:
|
|||
|
|
|||
|
>Don: If they stopped at voyeurism they would be basically
|
|||
|
>sociopathic, but not doing near the harm they do now. But
|
|||
|
>they don't stop at looking, that's the point. They take
|
|||
|
>things out and share them with others, and they are not
|
|||
|
>being accountable and being responsible as to whom they are
|
|||
|
>sharing this information. That is the risk.
|
|||
|
|
|||
|
(. . .)
|
|||
|
|
|||
|
>Don: What do I think of Craig? I have a lot of respect for
|
|||
|
>Craig, I think he's probably going to be an outstanding
|
|||
|
>lawyer someday. But he is contributing to a disease, and a
|
|||
|
>lack of understanding ethically, that is causing a lot of
|
|||
|
>trouble.
|
|||
|
|
|||
|
Craig Neidorf, for better or worse, believed he was walking into a
|
|||
|
discussion of issues. Don Ingraham had a somewhat different agenda,
|
|||
|
and used his experience to promote it, and allowed "truth" to fall
|
|||
|
where it may.
|
|||
|
|
|||
|
Don Ingraham may be an adept prosecutor, he may feed the pigeons, and
|
|||
|
some claim that, on occasion, he even displays concern for civil
|
|||
|
liberties. But, Don Ingraham's comments do not reflect his own
|
|||
|
accountability to truth, and he seemed to make up facts to fit his
|
|||
|
claims. Actually, it is *he* who "is contributing to a disease, and a lack
|
|||
|
of understanding ethically, that is causing a lot of trouble."
|
|||
|
|
|||
|
Ingraham did a number on Craig that served no purpose. Unfortunately,
|
|||
|
Ingraham may be one of those who fails to recognize that brutality
|
|||
|
comes in many forms, and his own sanctimonious bullying of a
|
|||
|
near-defenseless youth is inexcusable. If Geraldo had been thinking
|
|||
|
more quickly, he might have toyed with Ingraham's hyperbolic analogy
|
|||
|
to rape by alluding to a few other examples of older men who've done
|
|||
|
hatchet jobs on young males. Like John Gacy and Jeffrey Dahmer. They,
|
|||
|
too, felt no need to apologize to their victims.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 21 Oct 91 22:15:15 EDT
|
|||
|
From: Krista Bradford <76436.3200@COMPUSERVE.COM>
|
|||
|
Subject: File 5--Response to CuD #3.37's "Mad Hacker" Issue
|
|||
|
|
|||
|
I briefly will address a few points discussed by critics of the show,
|
|||
|
and then will address what may ultimately be more helpful and
|
|||
|
productive.
|
|||
|
|
|||
|
<In response to the moderators criticism of>:
|
|||
|
>"Skillfully juxtaposed film images of terrorism and military
|
|||
|
>violence with discussions and images of hackers".
|
|||
|
|
|||
|
The first story was dedicated to the hackers in Amsterdam making their
|
|||
|
way into a US army computer. We aired video of the hackers which
|
|||
|
Emmanuel Goldstein was so kind to provide, and attempted to explain in
|
|||
|
layman's terms exactly how they made their way in. I felt that was
|
|||
|
necessarily to lay to rest any misconceptions about what it is that
|
|||
|
hackers do. In addition, one of the documents found in the Army
|
|||
|
computer related to the war with Iraq, and so we used footage from the
|
|||
|
war.
|
|||
|
|
|||
|
I then intentionally separated the first story from the second with a
|
|||
|
commercial break...so their would be no confusing hackers with
|
|||
|
terrorists. The second piece related to computer terrorism. In it we
|
|||
|
showed footage of Die Hard 2, which was viewed at a congressional
|
|||
|
hearing as an example of how vulnerable we are, and how what happened
|
|||
|
in that movie could happen in real life.
|
|||
|
|
|||
|
In both pieces I attempted to show a balance of viewpoints.
|
|||
|
|
|||
|
I strenuously objected to the use of the term Mad Hacker, and to the
|
|||
|
title "Mad Hackers' Key Party" - which I found out about after the
|
|||
|
stories aired. (They weren't mad, but are now - and it wasn't a
|
|||
|
"party" but rather a breech of security.) I'm afraid that was not of
|
|||
|
my doing, but rather of one of our show's producers. I find the term
|
|||
|
objectionable and offensive and insulting. I do not believe in name
|
|||
|
calling, yet that is what occurred, and for that I offer my apologies
|
|||
|
to Emmanuel Goldstein and to anyone else who took offense. You can be
|
|||
|
assured that I have addressed the issue internally.
|
|||
|
|
|||
|
As for the comment that we put at least one military computer at risk.
|
|||
|
We didn't. The military has known of its bug for years, but hasn't
|
|||
|
fixed it. In addition, we volunteered to show the videotape to the
|
|||
|
Army for further explanation and protection, but it didn't take us up
|
|||
|
on the offer. It was well aware of the problem, you can be sure by
|
|||
|
the number of calls we made to attempt to get an interview. Also, I
|
|||
|
checked and was told that that particular army computer no longer
|
|||
|
resides at that address. I realized I might be criticized for
|
|||
|
actually showing how to hack. We did not show each and every step, but
|
|||
|
we wanted to show just how easy it was. And I think it was valuable
|
|||
|
to demystify hacking.
|
|||
|
|
|||
|
As for the alleged hatchet job on Craig - I believe it was less of
|
|||
|
Geraldo's doing and more of an imbalance between a prosecutor
|
|||
|
well-versed in expressing himself, and someone who was not as capable.
|
|||
|
That is what happens when interviews are taped as live - one cannot
|
|||
|
insert a balance (a little less of the prosecutor, a little more of
|
|||
|
Craig).
|
|||
|
|
|||
|
While you can criticize Geraldo for his heavy-handedness and
|
|||
|
sensational style - some credit is due him for giving me the freedom
|
|||
|
to pursue this story, the funding to produce the pieces and the
|
|||
|
extraordinary amount of airtime. We spent several months researching
|
|||
|
and taping the stories. Also, while it is may be hard to imagine -
|
|||
|
there are many shows that would shy away from such a topic because it
|
|||
|
was "technical" or "boring" or because the shows didn't understand or
|
|||
|
don't want to understand computers. The latter still tends to be the
|
|||
|
norm. While most newsrooms are computerized - most reporters have not
|
|||
|
turned to computer assisted journalism. But this is a growing area of
|
|||
|
interest. You can easily tap into computer-literate journalists
|
|||
|
through the Center for Computer-Assisted Reporting at the University
|
|||
|
of Missouri Columbia (Professor Elliot Jaspin-reachable on CIS) and
|
|||
|
the National Institute for Advanced Reporting at the University of
|
|||
|
Indiana (Scott Abel).
|
|||
|
|
|||
|
How can the media be made more aware of the nuances of the topics? By
|
|||
|
using computers themselves. Sign your favorite reporter up to
|
|||
|
Compuserve, and then leave them flattering E-mail. Invite them to
|
|||
|
call a local BBS. Have sources leave them tips for stories on the
|
|||
|
BBS, instead of calling. Having running threads giving them feedback
|
|||
|
on their stories. A reporter really won't understand the nuances
|
|||
|
unless he gives virtual space a try...sort of like the difference
|
|||
|
between being a passenger and being in the driver's seat.
|
|||
|
|
|||
|
As for media distortions. They are inevitable. I guess I would go for
|
|||
|
quantity as well as quality - establish relationships with reporters
|
|||
|
who will become more educated about hackers/computer issues the more
|
|||
|
stories they do. Realize the media does uses headlines to capture the
|
|||
|
rather short attention spans of viewers and readers, so a headline may
|
|||
|
distort, but the story which follows may clarify.
|
|||
|
|
|||
|
As for an informed public dialog emerging...I believe that Operation
|
|||
|
Sun Devil is old news. What I care about is what is happening today
|
|||
|
and tomorrow to hackers and their civil rights, to their computer
|
|||
|
equipment. What is happening to computer security? Just how safe are
|
|||
|
we? Find the most compelling examples of your point of view (i.e- a
|
|||
|
teenage hacker who just had all of his computer equipment, clock radio
|
|||
|
and VCR seized with no charges filed.) Let me know. Let other
|
|||
|
reporters know. Let us meet new people, new sources to report on the
|
|||
|
evolving history of this issue. We can discuss the ethics within the
|
|||
|
context of each additional story. And as the stories are told,
|
|||
|
perhaps legislators will hear and think and be more inclined to draft
|
|||
|
more constructive legislation.
|
|||
|
|
|||
|
And one special note of interest...I am looking for government
|
|||
|
databases I can obtain by asking or by using the Freedom of
|
|||
|
Information Act. I then crunch the databases myself and determine
|
|||
|
whether said Department is enforcing its own laws or regulations...and
|
|||
|
whether it is misrepresenting its data, cooking the books. If anyone
|
|||
|
knows of any gov't databases out there that would be worthy of
|
|||
|
consideration - drop me a line via E-Mail. In addition, story
|
|||
|
suggestions and tips are always welcome.
|
|||
|
|
|||
|
Cordially, Krista Bradford, Senior Reporter, Now It Can Be Told, CIS
|
|||
|
76436,3200 or call (212) 373-6200.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 6 Oct 91 17:58:45 CDT
|
|||
|
From: duane@SHAKE.TAMU.EDU(Duane)
|
|||
|
Subject: File 6--Release of Informatik #1
|
|||
|
|
|||
|
I would like to announce the release of the first issue of 'Informatik'.
|
|||
|
Informatik #1 is available by anonymous ftp at uunet.uu.net under:
|
|||
|
tmp/inform1.Z
|
|||
|
tmp/inform1.txt
|
|||
|
|
|||
|
Below is an excerpt from the issue's header:
|
|||
|
|
|||
|
|
|||
|
** Introduction **
|
|||
|
By the Informatik staff
|
|||
|
|
|||
|
Welcome to the inaugural issue of Informatik, an electronic
|
|||
|
periodical devoted to the distribution of information not readily
|
|||
|
available to the public, with a particular emphasis on technology and
|
|||
|
the computing world. First and foremost, this publication is
|
|||
|
dedicated to the freedom of information. This journal is made
|
|||
|
possible by The First Amendment of the U.S. Constitution which states:
|
|||
|
|
|||
|
Congress shall make no law respecting an establishment of
|
|||
|
religion, or prohibiting the free exercise thereof; OR ABRIDGING
|
|||
|
THE FREEDOM OF SPEECH OR OF THE PRESS; or the right of the
|
|||
|
people peaceably to assemble, and to petition the Government for
|
|||
|
redress of grievances.
|
|||
|
|
|||
|
In this and coming issues, we plan to exercise our First Amendment
|
|||
|
rights to the best of our ability. We will print feature articles on
|
|||
|
hacking, phreaking, and various other illicit activities. We also
|
|||
|
plan on bringing you recent news and gossip from the underground,
|
|||
|
anything news of interest to hackers, phreakers, grifters,
|
|||
|
cyber-punks, and the like. Informatik will also provide a plethora of
|
|||
|
information on the inner workings of corporate America and the U.S.
|
|||
|
Government.
|
|||
|
|
|||
|
DO distribute this freely! Remember this is not illegal, this is
|
|||
|
information.
|
|||
|
|
|||
|
*Please send submissions and comments to duane@shake.tamu.edu. (for
|
|||
|
now)*
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 13 Oct 91 18:50 CDT
|
|||
|
From: ulowell!nuchat.sccsi.com!samp%harvard@HARVUNXW.BITNET
|
|||
|
Subject: File 7--Second Annual XMASCON
|
|||
|
|
|||
|
NIA & Phrack Magazine, & dFx International Digest Are Proud To Present:
|
|||
|
|
|||
|
|
|||
|
The Second Annual
|
|||
|
|
|||
|
X M A S C O N
|
|||
|
|
|||
|
|
|||
|
Who: All Hackers, Journalists, Security Personnel, Federal Agents, Lawyers,
|
|||
|
Authors and Other Interested Parties.
|
|||
|
|
|||
|
Where: Houston Airport Hilton Inn
|
|||
|
500 North Belt East
|
|||
|
Houston, Texas 77060
|
|||
|
U.S.A.
|
|||
|
Tel: (713) 931-0101
|
|||
|
Fax: (713) 931-3523
|
|||
|
|
|||
|
When: Friday December 27 through Sunday December 29, 1991
|
|||
|
|
|||
|
|
|||
|
Yes, ladies and gentlemen, you read it right... Xmascon has returned!
|
|||
|
This will undoubtedly be the telecom event of the year. Unlike certain
|
|||
|
conferences in the past, Xmascon 91 has a devoted and dedicated staff
|
|||
|
who are putting in an unmentionable amount of time to ensure a large,
|
|||
|
vast and organized collection of some of the most diversified people
|
|||
|
in the telecommunications world. The event will be open to the public
|
|||
|
so that anyone may attend and learn more about the different aspects
|
|||
|
of computer security.
|
|||
|
|
|||
|
|
|||
|
Hotel Information
|
|||
|
-----------------
|
|||
|
|
|||
|
The Houston Airport Hilton Inn is located about 6 miles from
|
|||
|
Intercontinental Airport. The Xmascon group room rates are $49.00 plus
|
|||
|
tax (15%) per night, your choice of either single or double. There are
|
|||
|
also 7 suites available, the prices of which vary from $140 to $250.
|
|||
|
You can call the hotel to find out the differences and availability of
|
|||
|
the suites, and you will also NEED to tell them you are with the
|
|||
|
Xmascon Conference to receive the reduced room rate, otherwise, you
|
|||
|
will be paying $69.00. There is no charge for children, regardless of
|
|||
|
age, when they occupy the same room as their parents. Specially
|
|||
|
designed rooms for the handicapped are available. The hotel provides
|
|||
|
free transportation to and from the airport, as well as neighbouring
|
|||
|
Greenspoint Mall, every 30 minutes on the hour, and on call, if
|
|||
|
needed. There are 2 restaurants in the hotel. The Wicker Works is open
|
|||
|
until 11:00 pm, and The Forty Love is open 24 Hours. There will also
|
|||
|
be breakfast, lunch and dinner buffets each day. There is a piano bar,
|
|||
|
The Cycle Club, as well as a sports bar, Chaps, which features
|
|||
|
numerous table games, large screen tv, and a disco with a DJ. Within
|
|||
|
the hotel compound, there are 3 pools, 2 of which are indoors, a
|
|||
|
jacuzzi, a miniature golf course, and a fully equipped health club
|
|||
|
which features universal weights, a whirlpool and sauna. A car rental
|
|||
|
agency is located in the hotel lobby, and you can arrange to pick your
|
|||
|
car up at either the airport or the hotel. Xmascon attendees are
|
|||
|
entitled to a discounted rate. Contact the hotel for more information.
|
|||
|
|
|||
|
Xmascon will last 3 days, with the main conference being held on
|
|||
|
Saturday, December 28, in the Osage meeting room, starting at 12:00
|
|||
|
p.m. and continuing on throughout the evening. This year, we have our
|
|||
|
own complete wing of the hotel, which is housed around a 3,000 square
|
|||
|
foot atrium ballroom. The wing is completely separated from the rest
|
|||
|
of the hotel, so we are strongly encouraging people to make their
|
|||
|
reservations as far in advance as possible to ensure themselves a room
|
|||
|
within our area.
|
|||
|
|
|||
|
We are hoping to have a number of people speak on a varied assortment
|
|||
|
of topics. If you would like to speak, please contact us as soon as
|
|||
|
possible and let us know who you are, who you represent (if anyone),
|
|||
|
the topic you wish to speak on, a rough estimate of how long you will
|
|||
|
need, and whether or not you will be needing any audio-visual aids.
|
|||
|
|
|||
|
There will be a display case inside the meeting room which will hold
|
|||
|
items of telecom interest. Specific items that will be available, or
|
|||
|
that we hope to have, include the first issues of 2600, Tap, Mondo
|
|||
|
2000, and other magazines, non-computer related magazines that feature
|
|||
|
articles of interest, a wide array of boxes, the Quaker Oats 2600 mhz
|
|||
|
whistle, The Metal AE, etc. We will also have a VCR and monitor set
|
|||
|
up, so if you have any interesting videos (such as the Unsolved
|
|||
|
Mysteries show featuring Kevin Poulsen), or if you have anything you
|
|||
|
think people would enjoy having the chance to see, please let us know
|
|||
|
ahead of time, and tell us if you will need any help getting it to the
|
|||
|
conference. If all else fails, just bring it to the con and give it to
|
|||
|
us when you arrive.
|
|||
|
|
|||
|
Media support has been very strong so far. Publications that have
|
|||
|
agreed to print pre-conference announcements and stories include
|
|||
|
Computer World, Info World, New York Times, San Francisco Chronicle,
|
|||
|
Austin Chronicle, Houston Chronicle, Independent Journal, Mondo 2000,
|
|||
|
CuD, Informatik, a leading Japanese computer magazine, NME,
|
|||
|
Regeneration (Germany), and a few other European based magazines. PBS
|
|||
|
stations WHNY, WNET, and KQED, as well as the stations that carry
|
|||
|
their syndicated shows, will be mentioning the conference also. If you
|
|||
|
are a journalist and would like to do a story on Xmascon 91, or know
|
|||
|
someone who would, contact us with any questions you may have, or feel
|
|||
|
free to use and reprint any information in this file.
|
|||
|
|
|||
|
If anyone requires any additional information, needs to ask any
|
|||
|
questions, wants to RSVP, or would like to be added to the mailing
|
|||
|
list to receive the Xmascon updates, you may write to either myself
|
|||
|
(Drunkfux), Judge Dredd, or Lord Macduff via Internet at:
|
|||
|
|
|||
|
nia@nuchat.sccsi.com
|
|||
|
|
|||
|
Or via US Mail at:
|
|||
|
|
|||
|
Hard Data Corporation
|
|||
|
ATTN: HoHo
|
|||
|
P.O. Box 60695
|
|||
|
Houston, Texas
|
|||
|
77205-9998
|
|||
|
U.S.A.
|
|||
|
|
|||
|
|
|||
|
We will hopefully have an 800 mailbox before the next update is sent
|
|||
|
out. If someone cares to donate a decent one, that will stay up
|
|||
|
throughout the end of the year, please let us know. We should also be
|
|||
|
listing a few systems as an alternative form of reaching us.
|
|||
|
|
|||
|
|
|||
|
Xmascon 91 will be a priceless learning experience for professionals,
|
|||
|
and gives journalists a chance to gather information and ideas direct
|
|||
|
from the source. It is also one of the very few times when all the
|
|||
|
members of the computer underground can come together for a realistic
|
|||
|
purpose. We urge people not to miss out on an event of this caliber,
|
|||
|
which doesn't happen very often. If you've ever wanted to meet some of
|
|||
|
the most famous people from the hacking community, this may be your
|
|||
|
one and only chance. Don't wait to read about it in all the magazines,
|
|||
|
and then wish you had attended, make your plans to be there now! Be a
|
|||
|
part of our largest and greatest conference ever.
|
|||
|
|
|||
|
Remember, to make your reservations, call (713) 931-0101 and tell them
|
|||
|
you're with Xmascon.
|
|||
|
|
|||
|
In closing... if you miss this one, you're only cheating yourself.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #3.38
|
|||
|
************************************
|
|||
|
|
|||
|
|