880 lines
48 KiB
Plaintext
880 lines
48 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Sun May 17, 1992 Volume 4 : Issue 22
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Associate Editor: Etaion Shrdlu, Jr.
|
|||
|
Arcmeisters: Brendan Kehoe and Bob Kusumoto
|
|||
|
|
|||
|
CONTENTS, #4.22 (May 17, 1992)
|
|||
|
File 1--Some Corrections to '90 Bust Story in CuD 4.21
|
|||
|
File 2--The Defense of Entrapment (Reprint)
|
|||
|
File 3--COCOTS and the Salvation Army (Follow-up)
|
|||
|
File 4--Chaos Computer Club France's hackers bibliography
|
|||
|
|
|||
|
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
|||
|
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
|||
|
and DL0 and DL12 of TELECOM, on Genie in the PF*NPC RT libraries, on
|
|||
|
the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from
|
|||
|
ftp.eff.org (192.88.144.4), chsun1.spc.uchicago.edu, and
|
|||
|
ftp.ee.mu.oz.au. To use the U. of Chicago email server, send mail
|
|||
|
with the subject "help" (without the quotes) to
|
|||
|
archive-server@chsun1.spc.uchicago.edu. European distributor: ComNet
|
|||
|
in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted as long as the source
|
|||
|
is cited. Some authors do copyright their material, and they should
|
|||
|
be contacted for reprint permission. It is assumed that non-personal
|
|||
|
mail to the moderators may be reprinted unless otherwise specified.
|
|||
|
Readers are encouraged to submit reasoned articles relating to
|
|||
|
computer culture and communication. Articles are preferred to short
|
|||
|
responses. Please avoid quoting previous posts unless absolutely
|
|||
|
necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Tue, 12 May 92 01:14:12 CST
|
|||
|
From: anonymous@anon.edu
|
|||
|
Subject: File 1--Some Corrections to '90 Bust Story in CuD 4.21
|
|||
|
|
|||
|
The following clarifications should be noted in reference to the
|
|||
|
article in Cu Digest, #4.21, in the Steve Jackson Games section:
|
|||
|
|
|||
|
>In July of 1989, Secret Service agents were examining electronic
|
|||
|
>mail records of a privately-owned computer system in Illinois
|
|||
|
>owned by Rich Andrews. Those records, which contained the
|
|||
|
>computer equivalent of a list of all mail sent through a
|
|||
|
>particular post office, showed that a copy of a newsletter called
|
|||
|
>"Phrack" had been sent to Loyd Blankenship, the managing editor
|
|||
|
>at Steve Jackson Games, Loyd Blankenship, in late February of
|
|||
|
>1989.
|
|||
|
|
|||
|
Actually, the records showed that Loyd Blankenship *sent* a copy of
|
|||
|
Phrack 24 to someone on Jolnet. He received his own copy directly
|
|||
|
from Craig. The source was not Jolnet.
|
|||
|
|
|||
|
>1/90: Bell Communications Research security manager Henry M.
|
|||
|
>Kluepfel dials into Loyd Blankenship's home BBS, the Phoenix
|
|||
|
>Project, under his real name.
|
|||
|
|
|||
|
Mr. Kluepfel was never on Phoenix Project under his real name,
|
|||
|
according to userlogs from the day the system was taken down. He
|
|||
|
certainly would have been *welcome* on -- The Phoenix Project had
|
|||
|
several phone security officers and law enforcement agents already.
|
|||
|
CuD moderators reportedly possess userlogs from TPP during its
|
|||
|
history and can verify that there is no "Kluepfel" among the users on
|
|||
|
any of those logs.
|
|||
|
|
|||
|
>2/90: Search warrants are given for the residences of Bob Izenberg
|
|||
|
>(2/20), Loyd Blankenship (2/28) and Chris Goggans (2/28), and at
|
|||
|
>the office of Steve Jackson Games (2/28). The SJG warrant is
|
|||
|
>unsigned; the other warrants are signed by U.S. Magistrate
|
|||
|
>Stephen H. Capelle on the day that they're served.
|
|||
|
|
|||
|
Bob Izenberg was raided in 2/90. Goggans, Loyd Blankenship and SJG
|
|||
|
were raided in 3/90. The warrant for Loyd was also unsigned, as was
|
|||
|
(if previous reports are correct) the warrant for Chris.
|
|||
|
|
|||
|
>Three hours after the raid at another, Secret Service agents have
|
|||
|
>called Austin computer store owner Rick Wallingford at home, to
|
|||
|
>verify that he sold a pinball machine to one of the warrant
|
|||
|
>subjects.
|
|||
|
|
|||
|
It was a PacMan machine.
|
|||
|
|
|||
|
>CHRIS GOGGANS: Former employee of Steve Jackson Games.
|
|||
|
>Unavailable for comment.
|
|||
|
|
|||
|
Chris Goggans was never an employee of Steve Jackson Games.
|
|||
|
|
|||
|
These may seem trivial corrections, but because of the rumors and
|
|||
|
inaccurate information about the case and its particulars, we should
|
|||
|
assure that even minor details are correct.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 10 May 92 20:48:10 EDT
|
|||
|
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
|||
|
Subject: File 2--The Defense of Entrapment (Reprint)
|
|||
|
|
|||
|
The Defense of Entrapment
|
|||
|
As it Applies to Bulletin Board System Operators
|
|||
|
|
|||
|
By Randy B. Singer, Esq.
|
|||
|
|
|||
|
For now, it is unclear how the law applies to protect speech
|
|||
|
communicated through electronic bulletin boards. There are hundreds,
|
|||
|
maybe thousands, of enthusiast-run bulletin boards across the country
|
|||
|
provided for the free use of the public to exchange ideas and publicly
|
|||
|
distributable software. The system operators of these bulletin boards
|
|||
|
are providing a wonderful public service, out of the goodness of their
|
|||
|
hearts, usually for no monetary gain (in fact, often at a considerable
|
|||
|
loss). These sysops cannot afford to fall into a gray area of the law
|
|||
|
and find themselves having to defend an expensive criminal suit or
|
|||
|
having to do without their computer equipment because it has been
|
|||
|
confiscated by the police as evidence.
|
|||
|
|
|||
|
Running a public bulletin board can expose a system operator (sysop)
|
|||
|
to all sorts of legal problems that have yet to be adequately defined.
|
|||
|
For instance: What happens if one user posts slanderous/libelous
|
|||
|
information about another user? Is the sysop liable? Is a bulletin
|
|||
|
board more like a newspaper in this regard or is it more like a
|
|||
|
meeting hall? What happens if a user uploads something clearly
|
|||
|
illegal, like child pornography, which other users download before the
|
|||
|
sysop has a chance to review the material? Is the sysop liable? What
|
|||
|
is the liability of the sysop if he runs a bulletin board in his/her
|
|||
|
back room and he/she almost never monitors the activity on it? Is the
|
|||
|
sysop required to constantly monitor the goings-on on their board to
|
|||
|
prevent illegal activity?
|
|||
|
|
|||
|
It is therefore understandable that sysops have tried to protect
|
|||
|
themselves legally the best that they have known how. Unfortunately,
|
|||
|
there has been a lot of misinformation spread about what the law is
|
|||
|
and how it pertains to the community of bulletin board users and
|
|||
|
operators. Hopefully this text file will clear up one of the most
|
|||
|
common legal misconceptions that is going around.
|
|||
|
|
|||
|
I have often seen posts that evidence a complete misunderstanding of
|
|||
|
what constitutes the defense of entrapment. As an attorney I would
|
|||
|
like to explain this law and its application, especially as it
|
|||
|
pertains to electronic bulletin board operators.
|
|||
|
|
|||
|
Entrapment is a complete defense to a crime that a person has been
|
|||
|
charged with. It varies in how it is interpreted in each state, and on
|
|||
|
the federal level, but generally it is as I have defined it here.
|
|||
|
|
|||
|
Entrapment only exists when the crime involved is the creative product
|
|||
|
of the police. (That is, the idea to commit this crime came from a
|
|||
|
police officer, or an agent of the police. The alleged criminal never
|
|||
|
would have thought of committing this crime if it hadn't been
|
|||
|
suggested to him by the police, or if the means to commit the crime
|
|||
|
had not been offered to the alleged criminal by the police.) AND the
|
|||
|
accused was not otherwise predisposed to commit the crime involved.
|
|||
|
(That is, the accused probably wouldn't have committed this or any
|
|||
|
other similar crime if the police had never been involved.) BOTH
|
|||
|
elements must exist for the defense of entrapment to apply.
|
|||
|
|
|||
|
For instance: When John DeLorean, owner of the (then about to fail)
|
|||
|
DeLorean Motor Company, was arrested and tried for selling cocaine, he
|
|||
|
was found not guilty by reason of the defense of entrapment because,
|
|||
|
the jury determined, the police took advantage of the fact that his
|
|||
|
failing company made him a desperate individual. The police sent in an
|
|||
|
undercover officer to offer him a bag of cocaine to sell to raise
|
|||
|
money to save his company. The entire idea for the crime came from the
|
|||
|
police; they provided the instrumentality (the coke); and John
|
|||
|
DeLorean probably would never in his life have sold drugs to anybody
|
|||
|
if the police hadn't shown up to offer him the drugs to sell at the
|
|||
|
exact right time.
|
|||
|
|
|||
|
The reason for the law is obvious: we don't want the police setting up
|
|||
|
desperate people to get busted just because those people are
|
|||
|
unfortunate enough to find themselves in desperate situations. In
|
|||
|
fact, we don't want the cops to set up any law abiding citizens, even
|
|||
|
if they are not desperate. Tempting people who would not ordinarily
|
|||
|
commit a crime is not what we want police officers to do.
|
|||
|
|
|||
|
Now that you have the definition of entrapment, let's talk about what
|
|||
|
entrapment is NOT. I've read a lot of posts from people on boards who
|
|||
|
think that entrapment exists when a police officer goes undercover and
|
|||
|
does not reveal his true identity when asked. This is NOT covered by
|
|||
|
the defense of entrapment per se. The defense of entrapment does NOT
|
|||
|
require a police officer to reveal himself when asked. Going
|
|||
|
undercover is something that the police do all the time, and there is
|
|||
|
nothing that prohibits them from doing so.
|
|||
|
|
|||
|
If you are predisposed to commit a crime (e.g., you are already
|
|||
|
engaged in illegal activity before an undercover police officer comes
|
|||
|
on the scene), and an undercover police officer simply gathers
|
|||
|
evidence to convict you, the defense of entrapment does not apply.
|
|||
|
|
|||
|
So, for instance, if an undercover police officer logs onto a bulletin
|
|||
|
board and lies and says that he/she is not a police officer when
|
|||
|
asked, and he/she finds illegal material or goings-on on this bulletin
|
|||
|
board, then whatever he/she collects and produces against the system
|
|||
|
operator as evidence towards a criminal conviction is not precluded
|
|||
|
from being used against the sysop in court. At least it is not
|
|||
|
excluded by the defense of entrapment, because in this instance the
|
|||
|
defense of entrapment does not apply. The police officer is allowed to
|
|||
|
act undercover, and the illegal acts were not the creative product of
|
|||
|
the police.
|
|||
|
|
|||
|
Also remember that the defense of entrapment is a COMPLETE defense.
|
|||
|
So it does not act to exclude evidence, but rather it acts towards one
|
|||
|
of three things: having a grand jury find that there is not sufficient
|
|||
|
evidence that a conviction could be obtained to proceed to a criminal
|
|||
|
trial against the sysop; having the case dismissed before trial; or a
|
|||
|
finding of 'not guilty' after a criminal trial.
|
|||
|
|
|||
|
The defense of entrapment also doesn't necessarily apply if the police
|
|||
|
officer simply asks the system operator to do something illegal and he
|
|||
|
does it. In this case the district attorney would argue that the sysop
|
|||
|
was predisposed to commit the illegal act, especially if the illegal
|
|||
|
act was already going on in one form or another on the board. For
|
|||
|
instance, if the police officer asks the sysop to download to him some
|
|||
|
commercial software, the defense of entrapment will not apply if there
|
|||
|
is already commercial software available in the files section of the
|
|||
|
bulletin board.
|
|||
|
|
|||
|
What would probably be required for the defense of entrapment to apply
|
|||
|
would be for the police officer to have enticed or misled the system
|
|||
|
operator into doing the illegal act, and it would have had to have
|
|||
|
been an illegal act that wasn't already going on on this bulletin
|
|||
|
board. This MAY allow the use of the defense of entrapment. I say
|
|||
|
"may" because it depends on the facts in each individual situation to
|
|||
|
see how closely they meet the requirements for the defense of
|
|||
|
entrapment to apply. You may surmise from my reticence to commit to
|
|||
|
saying that the defense of entrapment definitely WOULD apply that the
|
|||
|
defense of entrapment is not a defense that I recommend that you rely
|
|||
|
on.
|
|||
|
|
|||
|
I've seen some bulletin boards say something to this effect in their
|
|||
|
logon screen: "Access restricted. Police officers must identify
|
|||
|
themselves, and are forbidden from gaining entry to this bulletin
|
|||
|
board." This type of message not only does not protect a bulletin
|
|||
|
board from the police (assuming that there is something that might be
|
|||
|
interpreted as illegal going on on this board), but it actually alerts
|
|||
|
any police officer who may casually log on to this board to
|
|||
|
immediately suspect the worst about this board and its system
|
|||
|
operator. There is nothing that I know of that would keep an agent of
|
|||
|
the police from lying about his/her status and logging on as a new
|
|||
|
user and gathering evidence to use against the sysop. In fact, I'm
|
|||
|
not sure, but I would not be surprised to find in the current legal
|
|||
|
climate that such a logon message is enough evidence to get a search
|
|||
|
warrant to seize the computer equipment of the system operator of this
|
|||
|
bulletin board to search for evidence of illegal activity!
|
|||
|
|
|||
|
At some future date I hope to write a file that will detail how sysops
|
|||
|
can protect themselves from legal liability. (That is, by avoiding
|
|||
|
participating in arguably illegal activity, and by avoiding liability
|
|||
|
for the uncontrollable illegal acts of others. I have no interest in
|
|||
|
telling sysops how to engage in illegal acts and not get caught.) But
|
|||
|
for now, I hope that this file will give sysops a better understanding
|
|||
|
of the law and how one aspect of it applies to them.
|
|||
|
|
|||
|
Disclaimer: The information provided in this document is not to be
|
|||
|
considered legal advice that you can rely upon. This information is
|
|||
|
provided solely for the purpose of making you aware of the issues and
|
|||
|
should be utilized solely as a starting point to decide which issues
|
|||
|
you must research to determine your particular legal status, exposure,
|
|||
|
and requirements, and to help you to intelligently consult with an
|
|||
|
attorney. No warrantees, express or implied, are provided in
|
|||
|
connection with the information provided in this document. This
|
|||
|
document is provided as is, and the reader uses the information
|
|||
|
provided here at their own risk.
|
|||
|
|
|||
|
(Sorry for the necessity of covering my behind! Just remember, you get
|
|||
|
what you pay for, so I cannot guarantee anything I have written here.
|
|||
|
If you want legal advice that you can take to the bank, you should
|
|||
|
hire an attorney. Besides, just like everyone these days, we need the
|
|||
|
work!)
|
|||
|
|
|||
|
About the Author:
|
|||
|
Randy B. Singer is an attorney in the San Francisco bay area. He does
|
|||
|
business law, personal injury, computer law, and Macintosh consulting. He
|
|||
|
also gives seminars at the Apple offices in downtown San Francisco for
|
|||
|
attorneys and others who are interested in learning about the Macintosh
|
|||
|
computer. He can be reached at 788-21st Avenue, San Francisco, CA 94121;
|
|||
|
(415) 668-5445.
|
|||
|
|
|||
|
Copyright (C) 1992 Randy B. Singer. All rights reserved. This document
|
|||
|
may be freely distributed as long as it is not for monetary gain or as
|
|||
|
part of any package for sale. This work may not be modified in any way,
|
|||
|
condensed, quoted, abstracted or incorporated into any other work, without
|
|||
|
the author's express written permission.
|
|||
|
|
|||
|
This reprint taken from ST Report #8.19, used with permission
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 15 May 92 16:41:38 CST
|
|||
|
From: moderators <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 3--COCOTS and the Salvation Army (Follow-up)
|
|||
|
|
|||
|
In Cu Digest 4.20, we related the problems of a COCOT (Coin-operated,
|
|||
|
Customer-owned Telephone) installed at the Salvation Army Freedom
|
|||
|
Center in Chicago. In brief, The SAFC, a community release center for
|
|||
|
recently-released state and federal prisoners, had installed COCOTS
|
|||
|
that were charging prisoners, who generally come from low-income
|
|||
|
populations, significantly higher rates than conventional carriers.
|
|||
|
The COCOTS utilize long distance carriers that are demonstrably not in
|
|||
|
compliance with federal law (PL 101-435). In the next issue, we will
|
|||
|
provide a follow-up to the lack of responsiveness of the carriers
|
|||
|
(U.S. Long Distance) and the billing agents (Zeroplus Dialing and
|
|||
|
GTE). This note summarizes the response of the Salvation Army, which
|
|||
|
was the only organization that took the problem seriously and acted
|
|||
|
upon it.
|
|||
|
|
|||
|
When we summarized events in 4.20, we had been unable to obtain
|
|||
|
consistent information from the telecos because of multiple layers of
|
|||
|
billing accountability and significant contradictions in information
|
|||
|
that we were given. We were also, at that time, unable to reach
|
|||
|
anybody at the SAFC who could provide us with information. So, we
|
|||
|
expressed our frustration by raising questions that we would have
|
|||
|
asked SAFC officials. Since then, we have talked with several SAFC
|
|||
|
personnel, and without exception they were deeply concerned about the
|
|||
|
problem. They had received numerous complaints from ex-offender
|
|||
|
customers about the technical service of the COCOTS, but they were not
|
|||
|
aware of the long distance tolls until we brought it to their
|
|||
|
attention. They emphasized that it was neither their intent nor their
|
|||
|
practice to profit from telephone services. The information they
|
|||
|
provided supports their community reputation as a viable and dedicated
|
|||
|
organization committed to helping ex-offenders return to the
|
|||
|
community. In response to our questions, we were told the following:
|
|||
|
|
|||
|
The SAFC *does not* itself own the COCOTS, and the COCOTS there are
|
|||
|
fairly new. The Salvation Army recently signed a contract with a
|
|||
|
company that promised to deliver services identical to the previous
|
|||
|
system, Illinois Bell, at no extra cost to the users. The SAFC signed
|
|||
|
a contract when told they would receive a better commission with equal
|
|||
|
service and no increased rates. Some sources indicated that the COCOT
|
|||
|
phones did not, in fact, provide better service, and there was some
|
|||
|
concern expressed by ex-offenders and others that the COCOT was, in
|
|||
|
fact, *more expensive* for users than the previous carrier. Our own
|
|||
|
experience suggested that, for long distance rates at least, this
|
|||
|
complaint has substance.
|
|||
|
|
|||
|
The SAFC center does receive a monetary return from COCOT use. The
|
|||
|
return is accumulated for the residents' benefit fund. This fund is
|
|||
|
used to replace equipment, provide amenities (such as tv sets),
|
|||
|
defray costs for special events such as the annual Christas part, and
|
|||
|
provide modest resources for indigent prisoners in emergencies. The
|
|||
|
profits from the COCOT are ultimately returned directly to the
|
|||
|
prisoners, and the SAFC itself does not profit.
|
|||
|
|
|||
|
SAFC personell emphasized that there are still alternative (RBOC)
|
|||
|
telephones available, and at least one telephone is available at no
|
|||
|
charge for important calls such as obtaining job interviews.
|
|||
|
|
|||
|
Because the SAFC is bound by contract to their current COCOT owner,
|
|||
|
they are not sure of their options for the long run. Over the short
|
|||
|
run, however, they indicated that they will address the problem in two
|
|||
|
ways. First, they will discuss the problems with the owner and attempt
|
|||
|
to assure that the terms of the contract--equal service at no higher
|
|||
|
costs--are met. Second, they will emphasize "consumer literacy" and
|
|||
|
assure that their clients are aware of the differences in especially
|
|||
|
long distance rates between the various long distance service
|
|||
|
providers and explain that users are legally entitled to place calls
|
|||
|
to alternative carriers if the one to which they initially connect is
|
|||
|
not to their liking. We have sent them a copy of PL 101-435 to assist
|
|||
|
them in their discussions with the COCOT owner and to provide their
|
|||
|
consumers with adequate information.
|
|||
|
|
|||
|
We commend the SAFC for its handling of the situation. Salvation Army
|
|||
|
officials were concerned that our previous post would communicate
|
|||
|
erroneous information about the nature of the SAFC and its operation.
|
|||
|
Both they, and others, affirmed that the SAFC is a successful,
|
|||
|
exceptionally beneficial, and highly reputable program with only one
|
|||
|
end in mind: To help ex-offenders. If our previous remarks were
|
|||
|
excessively strident, we apologize. They have displayed both honor
|
|||
|
and initiative in protecting prisoners from exploitation, and we thank
|
|||
|
them for their concern. It is unfortunate that GTE, USLD, and Zeroplus
|
|||
|
cannot follow their example.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 6 May 92 07:27 GMT
|
|||
|
From: Jean-Bernard Condat <0005013469@MCIMAIL.COM>
|
|||
|
Subject: File 4--Chaos Computer Club France's hackers bibliography
|
|||
|
|
|||
|
Enclosed one bibliography that all the CCCF's members read all the
|
|||
|
time in France...
|
|||
|
|
|||
|
Sincerely yours,
|
|||
|
|
|||
|
Jean-Bernard Condat
|
|||
|
Chaos Computer Club France [CCCF]
|
|||
|
B.P. 8005
|
|||
|
69351 Lyon Cedex 08, France
|
|||
|
Phone: +33 1 47 87 40 83, Fax.: +33 1 47 87 70 70.
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
File x: Chaos Computer Club France's hackers bibliography
|
|||
|
|
|||
|
Nelson, B. [Univ. of Southern California, Los Angeles, CA, USA]:
|
|||
|
"Straining the capacity of the law: the idea of computer crime in
|
|||
|
the age of the computer worm
|
|||
|
In: Computer/Law Journal (April 1991) vol.11, no.2, pp.299-321
|
|||
|
Considers whether traditional justifications for the
|
|||
|
criminalization of conduct are adequate to encompass new forms of
|
|||
|
'criminal' behavior arising out of advanced computer technology.
|
|||
|
Describes the reactions of legislator, computer designers and
|
|||
|
users, and members of the general public who have opposed Robert
|
|||
|
Tappan Morris's trial a nd conviction. Two prominent and
|
|||
|
competing theories, retribution and utilitarianism,are useful in
|
|||
|
helping understand the conflict between two sets of social values:
|
|||
|
those we seek to protect by means of a criminal justice system and
|
|||
|
those associated with the basic principles of freedom. Nonetheless,
|
|||
|
neither traditional retributive nor utilitarian theory provides a
|
|||
|
clear justification for the imposition of
|
|||
|
criminal punishment in the case of the 'crime' that Morris committed when
|
|||
|
he introduced the Internet worm. (61 Refs)
|
|||
|
|
|||
|
|
|||
|
Spafford, E.H.[Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN,
|
|||
|
USA]: "Are computer hacker break-ins ethical?"
|
|||
|
In: Journal of Systems and Software (Jan. 1992) vol.17, no.1; pp.41-7
|
|||
|
Recent incidents of unauthorized computer intrusion have brought about
|
|||
|
discussion of the ethics of breaking into computers. Some individuals have
|
|||
|
argued that as long as no significant damage results, break-ins may serve a
|
|||
|
useful purpose. Others counter that the break-ins are almost always harmful
|
|||
|
and wrong. This article lists and refutes many of the reasons given to
|
|||
|
justify computer intrusions. It is the author's contention that break-ins
|
|||
|
are ethical only in extreme situations, such as a life-critical emergency.
|
|||
|
The article also discusses why no break-in is 'harmless'. (17 Refs)
|
|||
|
|
|||
|
|
|||
|
Kluepfel, H.M.: "In search of the cuckoo's nest-an auditing framework for
|
|||
|
evaluating the security of open networks"
|
|||
|
In: EDP Auditor Journal (1991) vol.3; pp.36-48
|
|||
|
In Clifford Stoll's best-selling book "The Cuckoo's Egg" he describes the
|
|||
|
pursuit of a computer hacker who, like the cuckoo, left something in the
|
|||
|
computing nests of other users. The paper provides a perspective on
|
|||
|
auditing networked systems to find the nest which may have an extra 'egg'
|
|||
|
in it or is inviting one because of a breakdown in security design or
|
|||
|
practice. It focuses on: the security implications for an increasingly
|
|||
|
open network architecture; the lessons learned from performing intrusion
|
|||
|
post-mortems; the need for architecture plans and systems engineering
|
|||
|
for security; an audit framework for evaluating security. (26 Refs)
|
|||
|
|
|||
|
|
|||
|
Raymond, E.S.: "New Hacker's dictionary"
|
|||
|
Publisher: MIT Press, London, UK (1991); xx+433 pp.
|
|||
|
From ack to zorch (and with hundreds of other entries in between) The New
|
|||
|
acker's Dictionary is a compendium of the remarkable slang used by today's
|
|||
|
computer hackers. Although it is organized in reference form, it is not
|
|||
|
a mere technical dictionary or a dry handbook of terms; rather, it offers
|
|||
|
the reader a tour of hackerdom's myths, heroes, folk epics, in-jokes
|
|||
|
taboos, and dreams-an unveiling of the continent-spanning electronic
|
|||
|
communities that knit hackers together.Appendixes include a selection of
|
|||
|
classic items of hacker folklore and humor, a composite portrait of 'J.
|
|||
|
Random Hacker' assembled from the comments of over one hundred respondents,
|
|||
|
and a bibliography of nontechnical works that have either influenced
|
|||
|
or described the hacker culture. (12 Refs)
|
|||
|
|
|||
|
|
|||
|
Arnold, A.G.; Roe, R.A.[Dept. of Philosophy & Tech. Social Sci., Delft Univ
|
|||
|
of Technol., Netherlands]: "Action facilitation; a theoretical concept and
|
|||
|
its use in user interface design"
|
|||
|
In: Work With Computers: Organizational, Management, Stress and Health
|
|||
|
Aspects. Proceedings of the Third Conference on Human-Computer Interaction.
|
|||
|
Vol.1, pp.191-9
|
|||
|
Editor(s): Smith, M.J.; Salvendy, G.; Elsevier, Amsterdam; xii+698 pp.
|
|||
|
The concept of action facilitation, derived from Hacker's theory of
|
|||
|
goal-directed action, can be defined as an improvement or maintenance
|
|||
|
of performance under conditions of decreasing mental and/or physical
|
|||
|
effort. This concept applies to any kind of work, including work with
|
|||
|
computers. A method for operationalizing this concept in the context of
|
|||
|
human-computer interaction is discussed, and it is shown how this method
|
|||
|
can be applied to the evaluation and design of user interfaces for office
|
|||
|
systems. (20 Refs)
|
|||
|
|
|||
|
|
|||
|
Menkus, B.: "'Hackers': know the adversary"
|
|||
|
In: Computers & Security (Aug. 1991) vol.10, no.5; pp.405-9
|
|||
|
Abstract: Confusion appears to continue among many of those concerned
|
|||
|
about computer security about who hackers are, what they do and why they
|
|||
|
are doing it. The author clarifies some of the terms, concepts, and motives
|
|||
|
involved in the hacker phenomenon. The author discusses the hackers'
|
|||
|
objectives and their methods. He discusses some of the problems that need
|
|||
|
to be resolved to in order to tackle hackers' activities. Implementing an
|
|||
|
effective counter hacker strategy rests on the recognition that access to
|
|||
|
information is only granted to aid in tasks of value to the organizatio
|
|||
|
and that an organizatio does have the right to own and use legitimate
|
|||
|
information. He concludes that three tactics should be employed: initiation
|
|||
|
of active lobbying by the targets of hacker activity; improved personnel
|
|||
|
attribute verification on access; and tracing system use activity on a
|
|||
|
real-time basis. (3 Refs)
|
|||
|
|
|||
|
|
|||
|
Cook, W.J.: "Costly callers: prosecuting voice mail fraud"
|
|||
|
In: Security Management (July 1991) vol.35, no.7; pp.40-5
|
|||
|
Abstract: On August 17, 1990, Leslie Lynne Doucette was sentenced to 27
|
|||
|
months in prison. Her sentence, one of the most severe ever given to a
|
|||
|
computer hacker in the United States, was based on her role as the head of
|
|||
|
a nationwide voice mail computer fraud scheme and her unauthorized
|
|||
|
possession of 481 access codes as part of that scheme. Evidence developed
|
|||
|
during the investigation and disclosed in pretrial proceedings, revealed
|
|||
|
that the case was part of a broader trend toward voice mail computer abuse
|
|||
|
by hackers. This article examines the telecommunication technology involved
|
|||
|
and the ways computer hackers use and abuse that technology, and it
|
|||
|
summarizes the investigation that led to Doucette's conviction and the
|
|||
|
convictions of other hackers in her group.
|
|||
|
|
|||
|
|
|||
|
Myong, A.M.; Forcht, K.A.[James Madison Univ., Harrisonburg, VA, USA]: "The
|
|||
|
computer hacker: friend or foe?"
|
|||
|
In: Journal of Computer Information Systems (Winter 1990-1991) vol.31,
|
|||
|
no.2; pp.47-9
|
|||
|
Abstract: To most people, the hacker seems somewhat harmless but the
|
|||
|
reality is quite the contrary. Quite often, extremely sensitive data is
|
|||
|
accessed by hackers and tampering of any kind can cause irreversible
|
|||
|
damage. Although this situation is causing great concern, the hacker is not
|
|||
|
seen as the hardened criminal, and laws dealing with this kind of
|
|||
|
'technological trespass' poses the question: 'is the hacker a friend or
|
|||
|
foe?' Obviously, these hackers violate the security and privacy of many
|
|||
|
individuals, but by doing so, vulnerabilities in the systems are showcased,
|
|||
|
alerting the need for increased security. Paradoxically, by committing
|
|||
|
computer crimes, these 'hackers' could be doing society an indirect favor.
|
|||
|
The authors give a profile of a hacker and explain how some users and
|
|||
|
systems make it easy for one to break into their system. Various actual
|
|||
|
hacks are also presented. (13 Refs)
|
|||
|
|
|||
|
|
|||
|
Koseki, J.: "Security measures for information and communication networks"
|
|||
|
In: Data Communication and Processing, (1991) vol.22, no.4; pp.38-46
|
|||
|
Abstract: The causes of interruptions of the information/communication
|
|||
|
system can be classified roughly into accidents and crime. The factors of
|
|||
|
disturbing system operations include reduction of system functions due to
|
|||
|
traffic congestion. While accidents occur due to unexpected natural
|
|||
|
phenomena or human errors, crimes are failures based on intentional human
|
|||
|
behavior, unjust utilization and destruction of the system involving the
|
|||
|
hacker and computer virus. In order to complete the security for
|
|||
|
information and communication networks and eliminate the risk of accidents
|
|||
|
and crime, it is necessary to improve system functions and take harmonious
|
|||
|
measures viewed from human and legal factors as well as a technological
|
|||
|
standpoint.
|
|||
|
|
|||
|
|
|||
|
Zajac, B.P., Jr.[ABC Rail Corp. Chicago, IL, USA]: "Interview with Clifford
|
|||
|
Stoll (computer crime)"
|
|||
|
In: Computers & Security (Nov. 1990) vol.9, no.7; pp.601-3
|
|||
|
Abstract: Concerns the trials of Clifford Stoll, tracking a hacker that
|
|||
|
was looking for US military information and then trying to convince the
|
|||
|
Federal Bureau of Investigation that he had an international computer spy
|
|||
|
on his hands. As the system manager, he was to track down a $0.75
|
|||
|
discrepancy in one of the accounting systems. In his quest Stoll discovered
|
|||
|
that this was not the simple theft of some computer time but was something
|
|||
|
far greater-international computer espionage aimed at US military
|
|||
|
computers.
|
|||
|
|
|||
|
|
|||
|
"IT security"
|
|||
|
In: Wharton Report (Aug. 1990) no.144; pp.1-8
|
|||
|
Abstract: As our reliance on computer systems increases so too does the
|
|||
|
risk of data loss. A computer can be insecure in many ways: a clever
|
|||
|
hacker, a virus, a careless employee or a vandal can steal, destroy, alter
|
|||
|
or read data with relative ease. In addition to this, the proliferation of
|
|||
|
networks and the increasing number of tasks given over to a company's
|
|||
|
central computer have, while helping us achieve higher degrees of output,
|
|||
|
made our data even more insecure. The trend towards open systems will also
|
|||
|
bring us security problems.
|
|||
|
|
|||
|
|
|||
|
Schneider, E.W.[Peacham Pedagogics, Madison, NJ, USA]: "Progress and the
|
|||
|
hacker ethic (in educational computing)"
|
|||
|
In: Educational Technology (Aug. 1990) vol.30, no.8; pp.52-6
|
|||
|
Abstract: A hacker is someone who writes clever code on a small machine
|
|||
|
in something very close to machine language so that the small machine does
|
|||
|
things that would be impressive on a big time-sharing machine.
|
|||
|
Microcomputers were introduced into schools by teachers who were also
|
|||
|
electronic hobbyists. Some of these teachers went on to learn programming,
|
|||
|
becoming true hackers. Due to unprecedented demand from industry, true
|
|||
|
hackers in education are an extinct species. Other teachers developed
|
|||
|
skills in keeping the machine running, and ordering the latest and
|
|||
|
greatest; they form a group that is peculiar to education: the
|
|||
|
pseudo-hackers. Most computer applications in higher education have adopted
|
|||
|
a hacker ethic. They act as if educational research and medical research
|
|||
|
used the same way of determining needs, funding, and performing research,
|
|||
|
and disseminating the results. They expect teachers to be as motivated as
|
|||
|
doctors, learning about the latest techniques and adopting them as quickly
|
|||
|
as possible. That may well be the way it ought to be, but that certainly
|
|||
|
isn't the way that it is.
|
|||
|
|
|||
|
|
|||
|
Cook, W.J.: Uncovering the mystery of Shadowhawk
|
|||
|
In: Security Management (May 1990) vol.34, no.5; pp.26-32
|
|||
|
Abstract: How can a juvenile infiltrate some of the country's most
|
|||
|
classified and secured datafiles? Easy-with his home PC. On February 14,
|
|||
|
1989, a hacker was sentenced to nine months in prison, to be followed by
|
|||
|
two and a half years' probation, and was ordered to pay restitution
|
|||
|
totaling $10000. On February 28, 1989, he started serving his prison term
|
|||
|
in a prison in South Dakota. If the hacker had been 18 when he committed
|
|||
|
these crimes, he would have faced a possible 13-year prison sentence and
|
|||
|
fines totaling $800000. Facts developed during a one-week trial established
|
|||
|
that between July and September 1987, the hacker, under the code name
|
|||
|
Shadowhawk, used a modem on his home computer to gain unauthorized remote
|
|||
|
access to AT&T computers in Illinois, New Jersey, North Carolina, and
|
|||
|
Georgia and stole copies of copyrighted AT&T source code worth over
|
|||
|
$1,120,000. (7 Refs)
|
|||
|
|
|||
|
|
|||
|
Greenleaf, G.: "Computers and crime-the hacker's new rules"
|
|||
|
In: Computer Law and Security Report (July-Aug. 1990) vol.6, no.2; p.21-2
|
|||
|
Abstract: The author reflects on the international response to the case
|
|||
|
of Robert Morris, a US hacker. He looks at recent Australian legislation on
|
|||
|
computer crime and some legal definitions from England.
|
|||
|
|
|||
|
|
|||
|
Kluepfel, H.M. [Bellcore, Morristown, NJ, USA]: Foiling the wily hacker:
|
|||
|
more than analysis and containment
|
|||
|
Conference Title: Proceedings. 3-5 Oct. 1989 International Carnahan Conf.
|
|||
|
Security Technology; pp.15-21
|
|||
|
Publisher: ETH Zentrum-KT, Zurich, Switzerland; 1989; 316 pp.
|
|||
|
Abstract: The author looks at the methods and tools used by system
|
|||
|
intruders. He analyzes the development of the hacker, his motivation, his
|
|||
|
environment, and the tools used for system intrusion. He probes the nature
|
|||
|
of the vulnerable networking environments that are the target of
|
|||
|
intrusions. The author addresses how to turn the tables on these intruders
|
|||
|
with their own tools and techniques. He points out that there are many
|
|||
|
opportunities to learn from the intruders and design that knowledge into
|
|||
|
defensive solutions for securing computer-based systems. The author then
|
|||
|
presents a strategy to defend and thwart such intrusions. (16 Refs)
|
|||
|
|
|||
|
|
|||
|
Dehnad, K. [Columbia Univ., New York, NY, USA] : "A simple way of improving
|
|||
|
the login security"
|
|||
|
In: Computers & Security (Nov. 1989) vol.8, no.7; pp.607-11
|
|||
|
Abstract: The login procedure is formulated as a test of hypothesis. The
|
|||
|
formulation is used to show that the commonly used procedure provides
|
|||
|
valuable information to a hacker which enables him to use trial and error
|
|||
|
to gain access to a computer system. A general method for reducing this
|
|||
|
information is described and its properties studied. The method introduces
|
|||
|
randomness into the procedure, thus denying a hacker the luxury of trial
|
|||
|
and error. (6 Refs)
|
|||
|
|
|||
|
|
|||
|
Earley, J.: "Supplier's view-considering dial-up (hacker prevention)"
|
|||
|
In: Computer Fraud & Security Bull. (Oct. 1989) vol.11, no.12; pp.15-18
|
|||
|
Abstract: Discusses the practicalities of hacker prevention. Password
|
|||
|
protection, data encryption algorithms and the combination of data
|
|||
|
encryption and access control are briefly considered. The Horatius access
|
|||
|
control system and Challenge Personal Authenticator are discussed.
|
|||
|
|
|||
|
|
|||
|
Lubich, H.P.: "Computer viruses, worms, and other animals: truth & fiction"
|
|||
|
In: Output (5 April 1989) vol.18, no.4; pp.31-4
|
|||
|
Abstract: Computer viruses can be classified according to
|
|||
|
characteristics, especially their effects and their propagation mechanisms.
|
|||
|
Harmless and destructive viruses and their propagation in computer systems
|
|||
|
are discussed. Related definitions of virus, worm, mole, Trojan horse,
|
|||
|
trapdoor, logic bomb, time bomb, sleeper, hole, security gap, leak, hacker,
|
|||
|
and cracker are explained. System penetration by hackers or viruses has
|
|||
|
been aided by lack of system security consciousness, and by security
|
|||
|
deficiencies in hardware and software supplied by manufacturers.
|
|||
|
Countermeasures discussed include care in software purchase, use of test
|
|||
|
programs, use of special security measures, and recourse to legislation.
|
|||
|
|
|||
|
|
|||
|
Brunnstein, K.: "Hackers in the shadow of the KGB"
|
|||
|
In: Chip (May 1989) no.5; pp.14-19
|
|||
|
Abstract: The author examines the question of whether hackers are
|
|||
|
criminals or idealists. He sketches a profile of a typical hacker (which
|
|||
|
turns out to be similar to that of a professional programmer) and looks at
|
|||
|
hackers' work methods, clubs and motives. He outlines some of their more
|
|||
|
wellknown cases (e.g. the Chaos club, the Hannover hacker, the involvement
|
|||
|
of Russia in buying stolen technical secrets) and comments on the measures
|
|||
|
being taken to prevent hackers getting in and to make computer systems
|
|||
|
'secure'.
|
|||
|
|
|||
|
|
|||
|
Campbell, D.E. [PSI Int., Fairfax, VA, USA]: "The intelligent threat
|
|||
|
(computer security)"
|
|||
|
In: Security Management (Feb. 1989) vol.33, no.2; pp.19A-22
|
|||
|
Abstract: This article is about the hacker as an external threat, a
|
|||
|
terrorist, a person who destroys information for spite, revenge, some
|
|||
|
get-rich-quick scheme, or some ideological reason-but always with physical
|
|||
|
or electronic destruction or modification of data as a possible end result.
|
|||
|
The hacker as a destructive force is the external threat all information
|
|||
|
systems are faced with, and as a manager of these systems, your job may
|
|||
|
depend on how well you defend your data against such a force.
|
|||
|
|
|||
|
|
|||
|
Samid, G.: "Taking uncommon-but effective-steps for computer security"
|
|||
|
In: Computers in Banking (March 1989) vol.6, no.3; pp.22, 61-2
|
|||
|
Abstract: System managers and security officials should take the time to
|
|||
|
familiarize themselves with the hackers job. Only then will they develop a
|
|||
|
sense of their system's vulnerability. Such awareness is a prerequisite for
|
|||
|
installation of a heavy-duty defense. No computer system is break-safe.
|
|||
|
Therefore computer security starts with identifying who will benefit the
|
|||
|
most from breaking in. Then the analysis should assess the value of
|
|||
|
breaking in for the intruder. That value should be less than the effort or
|
|||
|
cost of accomplishing the intrusion. As long as the balance cost/benefit is
|
|||
|
kept unfavorable to the would-be intruder, the system is virtually
|
|||
|
break-safe.
|
|||
|
|
|||
|
|
|||
|
Wilding, E.: "Security services shaken by UK hacker's claims"
|
|||
|
In: Computer Fraud & Security Bulletin; (Jan. 1989) vol.11, no.3; pp.1-5
|
|||
|
Abstract: Discusses the case of Edward Austin Singh, the UK hacker
|
|||
|
reported in October to have accessed some 250 academic, commercial,
|
|||
|
government and military networks worldwide. This case serves as a useful
|
|||
|
framework for discussing legal issues related to computer hacking in the
|
|||
|
UK.
|
|||
|
|
|||
|
|
|||
|
Gliss, H.: "US research systems attacked by German student"
|
|||
|
In: Computer Fraud & Security Bulletin (July 1988) vol.10, no.9; pp.1-3
|
|||
|
Abstract: A researcher with 'a hacker's mentality' caught a German
|
|||
|
computer science student from Hanover. The researcher, Clifford Stoll from
|
|||
|
Lawrence Berkeley Laboratory (LBL), trapped the student by a trace
|
|||
|
connection over the US data networks into Bremen University (West Germany)
|
|||
|
and from there through DATEX-P to the individual telephone from which the
|
|||
|
hacker did his job. The author gives a comprehensive overview about Stoll's
|
|||
|
successful approach, and the lessons which LBL management drew from the
|
|||
|
case.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Beale, I.: Computer eavesdropping-fact or fantasy
|
|||
|
In: EDP Auditor Journal (1988) vol.3; pp.39-42
|
|||
|
Abstract: Equipped with a black and white television set, an antenna and
|
|||
|
a small amount of electronics equipment it is possible to display the
|
|||
|
information from the screen of a terminal located in a building over 300
|
|||
|
metres away. This shows how easy eavesdropping can be, how inexpensive the
|
|||
|
necessary equipment is and how readable the data received is. Clearly then,
|
|||
|
senior management within many companies should be concerned about the
|
|||
|
vulnerability of their systems and the information contained within them. A
|
|||
|
broad range of information currently processed on computer systems is of a
|
|||
|
confidential nature and needs to be stored and processed within a secure
|
|||
|
environment. This type of information includes financial data, financial
|
|||
|
projections, design data for new products, personnel records, bank
|
|||
|
accounts, sensitive correspondence and competitive contract bids. Any of
|
|||
|
this information may be valuable to eavesdroppers either for their own use,
|
|||
|
or so that they can sell it to a third party. Another interested party in
|
|||
|
this technology is the would-be hacker. By using eavesdropping techniques,
|
|||
|
the hacker will be able to readily identify user ids and passwords which
|
|||
|
are valid on client computer systems. This will be much more efficient than
|
|||
|
the techniques currently used by hackers to identify valid user id and
|
|||
|
password combinations.
|
|||
|
|
|||
|
|
|||
|
Stoll, C.: "Stalking the wily hacker"
|
|||
|
In: Communications of the ACM (May 1988) vol.31, no.5; pp.484-97
|
|||
|
Abstract: In August 1986 a persistent computer intruder attacked the
|
|||
|
Lawrence Berkeley Laboratory (LBL). Instead of trying to keep the intruder
|
|||
|
out, LBL took the novel approach of allowing him access while they printed
|
|||
|
out his activities and traced him to his source. This trace back was harder
|
|||
|
than expected, requiring nearly a year of work and the cooperation of many
|
|||
|
organizations. This article tells the story of the break-ins and the trace,
|
|||
|
and sums up what was learned. (49 Refs)
|
|||
|
|
|||
|
|
|||
|
Schechter, H.: "Dial-up network management-more than just security!"
|
|||
|
Conference Title: SECURICOM 86. 4th Worldwide Congress on Computer and
|
|||
|
Communications Security and Protection; pp.173-8
|
|||
|
Publisher: SEDEP, Paris, France; Date: 1986; 476 pp; Date: 4-6 March 1986
|
|||
|
Abstract: During the last few years, worldwide data communications
|
|||
|
networks have been besieged by terrorist attacks, the personal computer
|
|||
|
hacker. As businesses have aggressively pursued the use of the PC and
|
|||
|
dial-up services, they have found that they must guard their networks and
|
|||
|
data, and at the same time manage this dial-up network like they manage
|
|||
|
leased line networks. The paper analyzes the needs and components of
|
|||
|
dial-up network management and security.
|
|||
|
|
|||
|
|
|||
|
Troy, E.F.: "Security for dial-up lines"
|
|||
|
Issued by: Nat. Bur. Stand., Washington, DC, USA; May 1986; vi+60 pp.
|
|||
|
Abstract: This publication describes the problem of intrusion into
|
|||
|
government and private computers via dial-up telephone lines, the so-called
|
|||
|
'hacker problem'. There is a set of minimum protection techniques against
|
|||
|
these people and more nefarious intruders which should be used in all
|
|||
|
systems which have dial-up communications. These techniques can be provided
|
|||
|
by a computer's operating system, in the best case. If the computer does
|
|||
|
not have the capability to give adequate protection against dialup
|
|||
|
intruders, then other means should be used to shore up the system's access
|
|||
|
control security. There are a number of hardware devices which can be
|
|||
|
fitted to computers or used with their dial-up terminals and which provide
|
|||
|
additional communications protection for nonclassified computer systems.
|
|||
|
This publication organizes these devices into two primary categories and
|
|||
|
six subcategories in order to describe their characteristics and the ways
|
|||
|
in which they can be used effectively in dial-up computer communications. A
|
|||
|
set of evaluative questions and guidelines is provided for system managers
|
|||
|
to use in selecting the devices which best fit the need. A set of four
|
|||
|
tables is included which lists all known devices in the four primary
|
|||
|
categories, along with vendor contact information. No attempt is made to
|
|||
|
perform any qualitative evaluation of the devices individually. (41 Refs)
|
|||
|
|
|||
|
|
|||
|
Roberts, W. [Dept. of Comput. Sci., Queen Mary Coll., London, UK]: "'Re-
|
|||
|
member to lock the door': MMI and the hacker"
|
|||
|
Conference Title: System Security: Confidentiality, Integrity,
|
|||
|
Continuity. Proceedings of the International Conference; pp.107-14
|
|||
|
Publisher: Online Publications, Pinner, UK; Date: 1986; xii+232 pp.
|
|||
|
Conference Date: Oct. 1986; London, UK
|
|||
|
Abstract: Increasing emphasis is being placed on the importance of man
|
|||
|
machine interface (MMI) issues in modern computer systems. This paper
|
|||
|
considers the ways in which common MMI features can help intruders to
|
|||
|
breach the security of a system, and suggests methods for enhancing system
|
|||
|
security and data integrity by careful MMI design, aiding both the user and
|
|||
|
the system administrator.
|
|||
|
|
|||
|
|
|||
|
Murphy, I. [Secure Data Syst., Philadelphia, PA, USA]: "Aspects of hacker
|
|||
|
crime: high-technology tomfoolery or theft?"
|
|||
|
In: Information Age (April 1986) vol.8, no.2; pp.69-73
|
|||
|
Abstract: Computer crime is an increasingly common problem worldwide.
|
|||
|
Perpetrated by a growing band of people known as hackers, it is exacerbated
|
|||
|
by the ease with which hackers communicate over clandestine bulletin
|
|||
|
boards. The types of information contained in these boards is reviewed, and
|
|||
|
a parallel is drawn with the problem of telephone fraud also rampant in the
|
|||
|
USA. The author looks at the problem of unauthorized access to telephone
|
|||
|
lines and personal data. (1 Ref)
|
|||
|
|
|||
|
|
|||
|
Shain, M.: "Software protection-myth or reality?"
|
|||
|
Conference Title: Protecting and Licensing Software and Semiconductor
|
|||
|
Chips in Europe; 30 pp.
|
|||
|
Publisher: Eur. Study Conferences, Uppingham, Rutland, UK; 1985; 273 pp.
|
|||
|
Conference Date: 7-8 Nov. 1985; Amsterdam, Netherlands
|
|||
|
Abstract: The article reviews the motives people have for copying
|
|||
|
software and estimates the size of the revenue loss due to this. Commercial
|
|||
|
software protection schemes are reviewed and an account of microcomputer
|
|||
|
fundamentals is given for those with no prior knowledge. The techniques
|
|||
|
used by the software hacker are analyzed and a view is taken as to whether
|
|||
|
software protection is a myth or reality.
|
|||
|
|
|||
|
|
|||
|
Mullen, J.B.: "Online system reviews: controls and management concerns"
|
|||
|
In: Internal Auditor (Oct. 1985) vol.42, no.5; pp.77-82
|
|||
|
Abstract: The generally accepted controls for online systems can be
|
|||
|
divided into three categories: preventive; detective; and corrective. The
|
|||
|
preventive controls include sign-on key and passwords. The periodic
|
|||
|
changing of these controls and other preventive access controls may prevent
|
|||
|
a hacker from learning the access system via observation. The detective
|
|||
|
controls include: line protocol, which defines the method of data
|
|||
|
transmission; front-end edits, routines within the online-application
|
|||
|
programs to detect errors in critical fields; and authorization files,
|
|||
|
online files containing user passwords. Corrective controls include:
|
|||
|
transaction logging; online training, security software; audit caveats;
|
|||
|
audit procedures and effectiveness.
|
|||
|
|
|||
|
|
|||
|
Rous, C.C. [Cerberus Comput. Security Inc., Toronto, Ont., Canada]: "What
|
|||
|
makes hackers tick? A computer owner's guide"
|
|||
|
In: CIPS Review (July-Aug. 1985) vol.9, no.4; pp.14-15
|
|||
|
Abstract: Harmless pranksters or malicious wrongdoers? A computer
|
|||
|
security expert points out the differences and similarities-and offers
|
|||
|
preventative tips. A major concern of most data processors today is the
|
|||
|
threat of 'The Hacker'. This article attempts to de-mystify the breed by
|
|||
|
examining hacker psychology. The focus is on the distinction between
|
|||
|
frivolous and serious, or benign and malicious, hackers. While the
|
|||
|
distinction is valid, it is equally important to recognize the fundamental
|
|||
|
similarities between the two. In addition, no matter how benign the hacker
|
|||
|
who penetrates a system, if he or she has done so a more malicious one
|
|||
|
presumably could too. The author goes on to list the different types of
|
|||
|
hacker and provides a detailed analysis of each one. Finally, some lessons
|
|||
|
for owners and operators of computer systems are offered.
|
|||
|
|
|||
|
|
|||
|
Haight, R.C.: "My life as a hacker" Conference Title: ACC '84. Proceedings
|
|||
|
of the Australian Computer Conference; pp.205-12 Editor(s): Clarke, R.
|
|||
|
Publisher: Austr. Comput. Soc, Sydney, NSW, Australia; 1984; xx+672 pp.
|
|||
|
Conference Date: 4-9 Nov. 1984; Location: Sydney, NSW, Australia Abstract:
|
|||
|
The author has been programming and supervising programmers since 1961.
|
|||
|
His experiences and personal viewpoint are described.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.22
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|