884 lines
41 KiB
Plaintext
884 lines
41 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Thu Jan 28, 1993 Volume 5 : Issue 08
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Copy Editor: Etaion Shrdlu, Junoir
|
|||
|
|
|||
|
CONTENTS, #5.08 (Jan 28, 1993)
|
|||
|
File 1--Response to "Resistance at Shopping Mall" (CuD 5.07)
|
|||
|
File 2--Offworld BBS Raided (StLPD
|
|||
|
File 3--Colonel Guilty of Sending Computer Porn
|
|||
|
File 4--ISPTS Organizing Information
|
|||
|
File 5--New case for EFF, ACLU, and CPSR
|
|||
|
File 6--Public Service for Cornell Hackers
|
|||
|
File 7--CFP Special Issue on Security [Change in Due Date]
|
|||
|
File 8--Talking with the Underground
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
|
|||
|
at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
|
|||
|
466893; and using anonymous FTP on the Internet from ftp.eff.org
|
|||
|
(192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
|
|||
|
/cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
|
|||
|
ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
|
|||
|
Back issues also may be obtained from the mail server at
|
|||
|
mailserv@batpad.lgb.ca.us.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Wed, 27 Jan 93 16:59:26 EST
|
|||
|
From: ims@beach.kalamazoo.mi.us
|
|||
|
Subject: File 1--Response to "Resistance at Shopping Mall" (CuD 5.07)
|
|||
|
|
|||
|
Overall, this was a well-written and accurate article. As Ron stated,
|
|||
|
his article gives suggestions on how to deal with private individuals;
|
|||
|
my stance will be on how to deal with gov't agents. I promise to keep
|
|||
|
the quoting to a minimum.
|
|||
|
|
|||
|
>You may be able to fight city hall and win, but fighting with people
|
|||
|
>in uniforms (even on a verbal level) is almost always a disaster.
|
|||
|
|
|||
|
This is 100% true. Gov't cannot break the law, by definition, for in
|
|||
|
Brookfield Co. v Stuart, 234 F. Supp. 94, it was recognized that
|
|||
|
"an...officer who acts in violation of the Constitution ceases to
|
|||
|
represent the government." However, individual representatives of
|
|||
|
gov't can and do break the laws pertaining to them, which is nothing
|
|||
|
less than treason, being a violation of their oath of office.
|
|||
|
Remember, though, as Mr. Carolina has stated, that this applies to
|
|||
|
gov't, and not to anyone else. If at all possible, you should always
|
|||
|
avoid confrontations with officers low on the totem pole.
|
|||
|
|
|||
|
>...guards, cops, and other "uniforms" get really nervous around
|
|||
|
>organized groups. The more inexperienced the uniform, the more
|
|||
|
>nervous they get. Second, when a uniformed person starts a
|
|||
|
>confrontation with anyone, he or she is trained to assert control
|
|||
|
>over the situation as quickly as possible. Any perceived challenge
|
|||
|
>to his authority, including "mouthing off", will produce a harmonic
|
|||
|
>disturbance at least double in intensity to the perceived
|
|||
|
>non-acquiescence.
|
|||
|
|
|||
|
That's why we have the three rules for dealing with gov't officials:
|
|||
|
Don't say anything, be quiet, and SHUT UP! There's plenty of time to
|
|||
|
talk later in court, where it counts.
|
|||
|
|
|||
|
>Money awarded by a court is a poor substitute for missing teeth.
|
|||
|
|
|||
|
Perhaps, but it may be the only substitute possible in some cases.
|
|||
|
Ideally, we would never be assaulted by gov't. But when we are, it is
|
|||
|
our right and duty to extract compensation for damages.
|
|||
|
|
|||
|
>Third, recognize that a mall IS private property and the mall
|
|||
|
>operators can throw you out for little or no reason.
|
|||
|
|
|||
|
To be totally accurate, they can throw you out for NO REASON AT ALL.
|
|||
|
It may sound cruel and unfair, but without the concept of private
|
|||
|
property, we'd still be scratching in the dirt just worrying about
|
|||
|
bare survival. If you really want to have a secure meeting, order
|
|||
|
takeout and meet at someone's house -- which is also private property,
|
|||
|
and cannot be lawfully entered without a valid 4th Amendment warrant.
|
|||
|
|
|||
|
Now when a gov't agent violates your rights, he loses his immunity
|
|||
|
from prosecution -- IF IT'S HANDLED CORRECTLY. Of course, you have to
|
|||
|
know what those rights are, or you'll never know if they're being
|
|||
|
violated.
|
|||
|
|
|||
|
When a gov't agent is stepping outside the bounds wherein he would be
|
|||
|
protected by "sovereign immunity", and he is violating your right, you
|
|||
|
ARE REQUIRED to tell him, to give him "constructive notice" of his
|
|||
|
violation of law, just as he would inform YOU of some of your rights
|
|||
|
if he were to arrest YOU. If you don't do that, the courts will not
|
|||
|
entertain your lawsuit for damages later. You have to tell him what
|
|||
|
rights he is violating, what laws he is breaking, what the penalties
|
|||
|
are that he is risking, and what action is open to him so that he
|
|||
|
doesn't break the law. If on giving him notice, he corrects his
|
|||
|
error, then there is no need to take him to court over any damages.
|
|||
|
We all are required to behave so as to minimize damages to ANYONE,
|
|||
|
including ourselves.
|
|||
|
|
|||
|
>Fourth, mall cops are not gov't agents, and as such, their
|
|||
|
>conduct is (mostly) not governed by the Constitution.
|
|||
|
|
|||
|
Their conduct is not governed AT ALL by the Constitution, since it only
|
|||
|
applies to the gov't and its agents.
|
|||
|
|
|||
|
>If you are confronted by a group of threatening looking mall cops and
|
|||
|
>they hassle you, ask if you are being ejected from the mall.
|
|||
|
|
|||
|
When dealing with gov't agents, NEVER ask, "Am I under arrest?".
|
|||
|
Rather, ask, "Am I free to go?".
|
|||
|
|
|||
|
>If the mall cop tries to detain you, ask if you are under arrest.
|
|||
|
|
|||
|
See above. This is a preferable strategy no matter who you are dealing
|
|||
|
with.
|
|||
|
|
|||
|
>If you are physically blocked from leaving (no scuffles please), OR if
|
|||
|
>they have the guts to claim that you are under arrest, then YOU ask for
|
|||
|
>the police on the grounds that you wish to file a criminal complaint
|
|||
|
>for wrongful imprisonment. The strategy here is to escalate by
|
|||
|
>demanding the presence of lawful authority.
|
|||
|
|
|||
|
Again, this is the preferable method of handling gov't officials as
|
|||
|
well. The lower an officer is in the hierarchy, the more likely he is
|
|||
|
to violate the laws which restrain him from rights violations, usually
|
|||
|
because he is more likely to be ignorant of them. It's always a good
|
|||
|
idea to politely request that he call for a superior officer, and not
|
|||
|
bother trying to explain yourself until the superior arrives.
|
|||
|
|
|||
|
>if the real cops actually do show up, you are once again fully
|
|||
|
>protected by the Constitution. For this reason, real cops tend to be
|
|||
|
>a little more cautious in these encounters and can often defuse
|
|||
|
>problems like this.
|
|||
|
|
|||
|
Even "real cops" are usually ignorant of the laws which govern their
|
|||
|
conduct. You may be "protected by the Constitution", but that won't do
|
|||
|
you any good if you're not willing to fight to the last to defend those
|
|||
|
rights. You are the only one who can protect your rights, in the end.
|
|||
|
See my comments below regarding lawyers.
|
|||
|
|
|||
|
>If the mall cops look like they might get physical, tell them that
|
|||
|
>anything silly on their part will draw a complaint of criminal assault,
|
|||
|
>and will force your father, the lawyer, to sue everyone in sight.
|
|||
|
|
|||
|
The minute you rely on a lawyer, you've pissed away your rights. You
|
|||
|
lose your powers as a sovereign over government. You can't claim all
|
|||
|
rights at all times. For example, a lawyer cannot claim your right to
|
|||
|
remain silent:
|
|||
|
|
|||
|
"The right of a person under the 5th Amendment to refuse to incriminate
|
|||
|
himself is purely a personal privilege of the witness. It was never
|
|||
|
intended to permit him to plead the fact that some third person might
|
|||
|
be incriminated by his tesimony, even though he were the agent of
|
|||
|
such person." Hale v. Henkel, 201 U.S. 43.
|
|||
|
|
|||
|
Not only that, but if you allow anyone to "represent you", instead of
|
|||
|
being "the belligerent claimant in person" (Hale v Henkel, i.s.c.), you
|
|||
|
become a "ward of the court". Why? Because obviously, if someone else
|
|||
|
has to defend your rights for you, you must be incompetent! Clients are
|
|||
|
called "wards" of the court in regard to their relationship with their
|
|||
|
attorneys. See a copy of "Regarding Lawyer Discipline & Other Rules",
|
|||
|
as well as Canons 1 through 9.
|
|||
|
|
|||
|
Also, see Corpus Juris Secundum (CJS), Volume 7, Section 4, Attorney
|
|||
|
& client: "The attorney's first duty is to the courts and the public,
|
|||
|
NOT TO THE CLIENT, and wherever the duties to his client conflict with
|
|||
|
those he owes as an officer of the court in the administration of
|
|||
|
justice, THE FORMER MUST YIELD TO THE LATTER." (emphasis mine) I trust
|
|||
|
this needs no further explanation.
|
|||
|
|
|||
|
Corpus Juris Secundum assumes courts will operate in a lawful manner. If
|
|||
|
you make this assumption, you may learn, to your detriment, through
|
|||
|
experience, that certain questions of law, including the question of
|
|||
|
personal jurisdiction, may never be raised and addressed, especially if
|
|||
|
you are represented by the bar. (Sometimes "licensed counsel" appears to
|
|||
|
take on the characteristics of a fox guarding the hen house. Send me
|
|||
|
e-mail if you would like more info regarding "licenses to practice
|
|||
|
law".)
|
|||
|
|
|||
|
Lawyers will NEVER do the necessary things before arraignment to get a
|
|||
|
case dismissed. They will guarantee that you are locked into a criminal
|
|||
|
proceeding from the start by entering a "not-guilty" plea for you, and
|
|||
|
will give the government all the time it needs to win the case by
|
|||
|
waiving the speedy-trial time limits. With a lawyer as a friend, you
|
|||
|
don't need any enemies!
|
|||
|
|
|||
|
>first make it clear that you protest the action, and then let them
|
|||
|
>take it from you. The trick here is to make sure that you have not
|
|||
|
>"consented" to the search -- however, you must give in to a claim of
|
|||
|
>authority from a police officer.
|
|||
|
|
|||
|
An officer has no authority until he proves it. If you let this strange
|
|||
|
person do whatever they want without having determined their lawful
|
|||
|
authority and their true identity, you have "consented", no matter how
|
|||
|
much you may verbally protest.
|
|||
|
|
|||
|
>(And no, you do not get to argue the Fourth Amendment search and
|
|||
|
>seizure issue right there on the spot. Your lawyer will do that later
|
|||
|
>at your criminal trial...
|
|||
|
|
|||
|
No lawyers, unless you want to lose.
|
|||
|
|
|||
|
>A really smart cop might say to the guard, "I will not make the search,
|
|||
|
>but I won't stop you if you search." Stand your ground at this point.
|
|||
|
>Tell the real cop that you REFUSE to allow the search unless the real
|
|||
|
>cop orders the search to take place.
|
|||
|
|
|||
|
Excellent suggestion, but be sure to take the above precautions
|
|||
|
regarding true identity and lawful authority before you think about
|
|||
|
"consenting".
|
|||
|
|
|||
|
>The only words you should utter after being arrested are "I want to
|
|||
|
>speak with a lawyer."
|
|||
|
|
|||
|
Change this to, "I demand counsel of my choice." The 6th Amendment
|
|||
|
is your authority. If the court tries to force you to use a "licensed
|
|||
|
lawyer" or a "public defender", it is not counsel of your choice.
|
|||
|
|
|||
|
>ROBERT A. CAROLINA
|
|||
|
>Member, Illinois State Bar Association
|
|||
|
|
|||
|
Your advice is surprisingly good, for a member of the bar. :-) Not all
|
|||
|
lawyers are ignorant and lawless, but the 99% that are give the other
|
|||
|
1% a bad name. I'm glad to see we have a few of the good ones reading
|
|||
|
CuD.
|
|||
|
|
|||
|
Finally, let me leave you with one of the most eloquent statements
|
|||
|
ever by the Supreme Court:
|
|||
|
|
|||
|
"Decency, security and liberty alike demand that government officials
|
|||
|
shall be subjected to the same rules of conduct that are commands to
|
|||
|
the citizen. In a government of laws, existence of the government will
|
|||
|
be imperiled if it fails to observe the law scrupulously. Our
|
|||
|
government is the potent, the omnipresent teacher. For good or for ill,
|
|||
|
it teaches the whole people by its example. If the government becomes a
|
|||
|
lawbreaker, it breeds contempt for the law; it invites every man to
|
|||
|
become a law unto himself; it invites anarchy. To declare that in the
|
|||
|
administration of the criminal law the end justifies the means...would
|
|||
|
bring terrible retribution...[and] against that pernicious doctrine,
|
|||
|
this court should resolutely set its face."
|
|||
|
Olmstead v U.S., 277 U.S. 348 (1928)
|
|||
|
Justice Brandeis, dissenting
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 20 Jan 93 16:31:22 GMT
|
|||
|
From: mc/G=Brad/S=Hicks/OU=0205925@MHS.ATTMAIL.COM
|
|||
|
Subject: File 2--Offworld BBS Raided (StLPD
|
|||
|
|
|||
|
St. Louis Post-Dispatch
|
|||
|
Tuesday, January 19, 1993
|
|||
|
Pages 1A, 10A
|
|||
|
|
|||
|
COMPUTER OPERATOR DENIES PORN MENU
|
|||
|
By Christine Bertelson
|
|||
|
Of the Post-Dispatch Staff
|
|||
|
|
|||
|
The owner of a St. Louis computer bulletin board that was shut down
|
|||
|
by the FBI last week denied Monday that he is responsible for the
|
|||
|
pornographic images seen by some users.
|
|||
|
|
|||
|
On Friday night, the FBI confiscated more than $40,000 worth of
|
|||
|
computer equipment at Offworld, a computer company owned and operated
|
|||
|
by Joey Jay. Jay, 28, ran the business from his residence in the
|
|||
|
basement of his father's house on Tecumseh Drive in Chesterfield.
|
|||
|
|
|||
|
Jay was not arrested, and no charges have been filed against him.
|
|||
|
Jay said his father threw him out of the house after the raid.
|
|||
|
|
|||
|
"Everyone assumes we are some kiddie porn ring," Jay said. "We are
|
|||
|
not. We are a nonprofit community service."
|
|||
|
|
|||
|
A spokesman for the FBI said that someone had reported that Offworld
|
|||
|
had images available showing bestiality, as well as child pornography.
|
|||
|
It is a federal offense to have child pornography, and any property
|
|||
|
used to promote it is subject to being seized and forfeited to law
|
|||
|
enforcement authorities, an FBI spokesman said.
|
|||
|
|
|||
|
"We get all kinds of files across the system, and one or two at most
|
|||
|
showed up in terms of a private conversation," Jay said. "When I
|
|||
|
found them, I deleted them immediately."
|
|||
|
|
|||
|
Offworld began operating in St. Louis last June, and is free to its
|
|||
|
4,300 users. Jay said it cost him $1,800 a month to operate the
|
|||
|
system, using money from family inheritance.
|
|||
|
|
|||
|
About 100 people showed up Monday morning in Chesterfield at a rally
|
|||
|
in support of Offworld, Jay said. He said he was soliciting
|
|||
|
contributions of computer hardware, or cash, to get his system up and
|
|||
|
running again.
|
|||
|
|
|||
|
Computer bulletin board systems, or BBSs, as they are known, allow
|
|||
|
users to chat electronically, and share information on a variety of
|
|||
|
subjects. Offworld has bulletin boards that feature job listings,
|
|||
|
book and movie reviews, restaurants and clubs, and discussion groups
|
|||
|
for people with "diverse lifestyles."
|
|||
|
|
|||
|
Jay said that any time illegal material appears on a bulletin board
|
|||
|
--whether it is child pornography, offers of sex for sale, or drugs
|
|||
|
--it is purged and the people who posted such messages are kicked off
|
|||
|
the system.
|
|||
|
|
|||
|
"Unfortunately, that doesn't prevent them from coming back and using
|
|||
|
another fictitious name," Jay said.
|
|||
|
|
|||
|
FBI seizures of electronic bulletin board systems are "quite common,"
|
|||
|
said Mike Godwin, a lawyer at the Electronic Frontier Foundation. The
|
|||
|
foundation is a civil liberties group based in Washington for those in
|
|||
|
computer communications.
|
|||
|
|
|||
|
Godwin said that pornography is widely available on the thousands of
|
|||
|
electronic bulletin boards in use across the country. New computer
|
|||
|
users often use their scanners to recreate sexy pictures, much the
|
|||
|
same as children who delight in using a newly acquired dirty word.
|
|||
|
|
|||
|
"Usually the novelty wears off," Godwin said.
|
|||
|
|
|||
|
Child pornography is relatively rare, Godwin said. When it shows up,
|
|||
|
the operator of the system is faced with a choice: delete it
|
|||
|
immediately, or keep it on the system and report it to the police.
|
|||
|
|
|||
|
The FBI finds raids effective because they are punitive in and of
|
|||
|
themselves, whether or not a computer systems operator is ever charged
|
|||
|
with a crime.
|
|||
|
|
|||
|
But even the most conscientious systems operator cannot keep all
|
|||
|
pornography off a bulletin board, Godwin agreed.
|
|||
|
|
|||
|
Jay had previous conversations with the St. Louis County Police about
|
|||
|
his system, he said.
|
|||
|
|
|||
|
"I told them I would simply try to use responsibility and common
|
|||
|
sense and ... keep the system legal," Jay said. "I extend the First
|
|||
|
Amendment right to all aspects of the system, unless it violates the
|
|||
|
law."
|
|||
|
|
|||
|
Jay said he was seeking legal advice to help him get his computer
|
|||
|
equipment back.
|
|||
|
|
|||
|
+++++++++++++++
|
|||
|
|
|||
|
St. Louis Post-Dispatch
|
|||
|
Tuesday, January 19, 1993
|
|||
|
Page 10A
|
|||
|
|
|||
|
GIF GETS BULLETIN BOARD IN A JIFF
|
|||
|
'We Celebrate Human As Art Forum,' One Manager Says of Nude Issue
|
|||
|
By Daniel R. Browning (Of the Post-Dispatch Staff)
|
|||
|
|
|||
|
Dirty pictures transmitted over the telephone to your home computer?
|
|||
|
It had to happen.
|
|||
|
|
|||
|
Computer bulletin board systems, called BBSs, proliferate not only
|
|||
|
locally, but nationally and internationally. The biggest ones call
|
|||
|
themselves "information services," and the granddaddy is CompuServe.
|
|||
|
It has nearly 1.2 million members from China to Chile.
|
|||
|
|
|||
|
St. Louis Computing, a free monthly computing newspaper, publishes a
|
|||
|
list of local bulletin boards and their phone numbers.
|
|||
|
|
|||
|
Within these bulletin boards people interested in particular topics
|
|||
|
go to chat, share information, and yes, show their favorite slides.
|
|||
|
The pictures are transmitted in a special computer code called GIF
|
|||
|
(pronounced jif), which is short for Graphics Interchange Format. To
|
|||
|
see them, you need the special "viewers" included in some
|
|||
|
communications software.
|
|||
|
|
|||
|
To capture an image, you have your computer's modem dial the bulletin
|
|||
|
board, then search for whatever you find interesting.
|
|||
|
|
|||
|
In the giant databases, that means logging on to a special-interest
|
|||
|
section within the information service or bulletin board. CompuServe
|
|||
|
calls these "forums."
|
|||
|
|
|||
|
A forum exists for just about any professional interest or hobby.
|
|||
|
Journalists, lawyers, doctors, aerospace workers, artists,
|
|||
|
photographers, beer and wine enthusiasts, automobile buffs -- you'll
|
|||
|
find them all in the forums.
|
|||
|
|
|||
|
Within these, you can find thousands of pictures ranging from NASA
|
|||
|
space shots, to great works of art, to travel photos, to The Girl (or
|
|||
|
Boy) Next Door in a birthday suit.
|
|||
|
|
|||
|
A wary technician overseeing the forum warns members that they had to
|
|||
|
be older than 18 to get nude images.
|
|||
|
|
|||
|
But practically speaking, there's no way to prevent a minor from
|
|||
|
capturing a nude photo on CompuServe, said Dave Kishler, a company
|
|||
|
spokesman. The Federal Communications Commission does not regulate
|
|||
|
BBSs, he said. So the BBSs have worked up their own sets of rules and
|
|||
|
regulations.
|
|||
|
|
|||
|
Dave Shaver, operations manager of CompuServe's Fine Arts Forum, said
|
|||
|
all the images are screened for content before they are made available
|
|||
|
to the members. That's why you'll find hundreds of nudes under a
|
|||
|
category called "Plain Brown Wrapper," but no XXX-rated pictures, he
|
|||
|
said. "We celebrate the human as an art form."
|
|||
|
|
|||
|
Some bulletin boards are free. The big ones charge a flat monthly
|
|||
|
fee of $5 to $8. Certain activities within the databases may also
|
|||
|
include hourly surcharges, which vary in price to about $15 an hour.
|
|||
|
Joining a special interest forum and capturing pictures would fit in
|
|||
|
that category on most information services.
|
|||
|
|
|||
|
That cost -- and the requirement that members have a credit card or a
|
|||
|
checking account -- helps limit memberships to adults, Shaver said.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 27 Jan 1993 00:32:04 -0600 (CST)
|
|||
|
From: joe@DOGFACE.AUSTIN.TX.US(Joe Zitt)
|
|||
|
Subject: File 3--Colonel Guilty of Sending Computer Porn
|
|||
|
|
|||
|
Colonel guilty of sending porn over computer
|
|||
|
|
|||
|
Associated Press
|
|||
|
|
|||
|
SAN ANGELO -- The former commander of Goodfellow Air Force Base was
|
|||
|
convicted in a court martial Monday of sending obscene material via
|
|||
|
his home computer.
|
|||
|
|
|||
|
A jury of four men and one woman, all Air Force colonels, deliberated
|
|||
|
about two hours before returning guilty verdicts on all counts again
|
|||
|
Col. James Maxwell.
|
|||
|
|
|||
|
He was convicted of transmitting obscene material via home computer,
|
|||
|
of transmitting child pornography through his computer and using
|
|||
|
indecent language with a junior Air Force officer.
|
|||
|
|
|||
|
Maxwell, a 26-year Air Force veteran, now faces a possible 16-year
|
|||
|
prison sentence and loss of his military retirement benefits.
|
|||
|
|
|||
|
Charges were filed against Maxwell after the FBI found his name among
|
|||
|
users of an on-line computer network who accessed computer-generated
|
|||
|
pornographic images of children.
|
|||
|
|
|||
|
Maxwell also was said to have used the computer network to inquire
|
|||
|
about the location of homosexual meeting places.
|
|||
|
|
|||
|
Maxwell's attorney had sought to have the charges dropped on grounds
|
|||
|
his transmissions on the computer from the privacy of his home were
|
|||
|
protected under the constitution.
|
|||
|
|
|||
|
But the trial judge, Col. Donald Weir of Randolph Air Force Base,
|
|||
|
allowed the charges to stand last week, ruling that freedom of speech
|
|||
|
can be limited when it involves conduct unbecoming an officer.
|
|||
|
|
|||
|
"That the writings were private between consenting adults, that they
|
|||
|
may have been welcome doesn't place them under the judicial umbrella
|
|||
|
of a constitutional protected condition," Weir had ruled.
|
|||
|
|
|||
|
Weir dismissed a count alleging Maxwell had disgraced the Air Force by
|
|||
|
allegedly using electronic mail to ask about homosexual bars and child
|
|||
|
pornography.
|
|||
|
|
|||
|
Maxwell, 48, was removed from command at the Goodfellow Air Force Base
|
|||
|
training center last summer after the charges were filed.
|
|||
|
|
|||
|
+++++++++++++++++++++
|
|||
|
|
|||
|
COMMENT: Looks to me like this thing is full of red flags. Isn't it
|
|||
|
coincidental that the story breaks just as there's a flap over gays in
|
|||
|
the military?!
|
|||
|
|
|||
|
And where it says "the FBI found his name among users of an on-line
|
|||
|
computer network who accessed computer-generated pornographic images
|
|||
|
of children", one might ask what network? what was the FBI doing
|
|||
|
there? how did the images get there? how did the FBI think to track
|
|||
|
them? who else is getting snared? civilians? were the images really
|
|||
|
"computer-generated" or just scanned?
|
|||
|
|
|||
|
It's enough to restore one's healthy paranoia...
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 13 Jan 93 21:09:00 -0600
|
|||
|
From: cylinder@news.weeg.uiowa.edu (Cylinder)
|
|||
|
Subject: File 4--ISPTS Organizing Information
|
|||
|
|
|||
|
The International Society for the Philosophy of Tools & Space
|
|||
|
|
|||
|
We are an interdisciplinary organization, small but growing, dedicated
|
|||
|
to thoughtful discussion about and research into issues concerning
|
|||
|
tools and space. Currently, we maintain a membership list and
|
|||
|
circulate a short newsletter. Our future plans call for expansion - a
|
|||
|
regular journal and a number of conferences are possible in the coming
|
|||
|
year.
|
|||
|
|
|||
|
Our membership list includes philosophers, artists, computer
|
|||
|
programmers, scientists, graphic designers, architects, teachers - as
|
|||
|
well as those whose professions are still unnamed. We are not a
|
|||
|
school or a sect or party because we are not in agreement over
|
|||
|
particular doctrines. Our society is bound by an implicit faith in
|
|||
|
the silent potency of tools, space, meaning and metaphor, in a wide
|
|||
|
range of seemingly unrelated fields. Within the scope of our talks to
|
|||
|
date, members have raised diverse and fascinating issues for
|
|||
|
consideration:
|
|||
|
|
|||
|
- A phenomenology of humor, tools and toys
|
|||
|
- Space and the banality of cause and effect
|
|||
|
- Rhetoric and metaphor: language as tool/toy
|
|||
|
- The iconology of computers
|
|||
|
- Speed and annihilation
|
|||
|
- Victimless crimes and crimes of trespass
|
|||
|
- The mechanics of the dreamwork in psycho-analysis
|
|||
|
- Architectural theory and practice
|
|||
|
- Political theories of reterritorialization
|
|||
|
- Viruses: information systems and genetic engineering
|
|||
|
- Media theory
|
|||
|
- Virtual Reality: the emergence of simulacra in social space
|
|||
|
- Transit technology and urban planning
|
|||
|
- Infrastructure catastrophes
|
|||
|
|
|||
|
The thematic study of tools and space forces us to reconsider and
|
|||
|
sharpen the boundaries separating the various specialties of our
|
|||
|
members. Many of us are involved in concrete and ongoing projects
|
|||
|
which undo customary lines of inquiry and uncover fruitful new
|
|||
|
questions in what was formerly considered "obvious" and explained. We
|
|||
|
seek to move beyond conventional genres without abandoning meaning and
|
|||
|
beauty for the sake of novelty.
|
|||
|
|
|||
|
For more information about Cylinder, including membership materials,
|
|||
|
please write us with your name and address.
|
|||
|
|
|||
|
|
|||
|
CYLINDER
|
|||
|
c/o Graham Harman, Secretary
|
|||
|
Philosophy Dept., DePaul University
|
|||
|
Chicago, IL 60614 USA
|
|||
|
email: cylinder@uiowa.edu
|
|||
|
|
|||
|
(If you have already written to Cylinder, please refrain from doing so
|
|||
|
a second time. Your name and address have been added to our mailing
|
|||
|
list and you should be expecting membership materials in the coming
|
|||
|
months.)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 22 Jan 1993 13:52:48 -0500
|
|||
|
From: Shari Steele <ssteele@EFF.ORG>
|
|||
|
Subject: File 5--New case for EFF, ACLU, and CPSR
|
|||
|
|
|||
|
On the evening of November 6, 1992, approximately 30 computer
|
|||
|
enthusiasts, who had gathered for a meeting of 2600 magazine readers
|
|||
|
at the food court at Pentagon City Mall in Arlington, VA, were
|
|||
|
detained and searched and had some of their possessions seized by
|
|||
|
about half a dozen mall security guards acting under the direction of
|
|||
|
the Secret Service. Somewhere between two and five officers from the
|
|||
|
Arlington County Police were there, as well, having responded to a
|
|||
|
call about fraud.
|
|||
|
|
|||
|
Several of the attendees are interested in suing the mall, police and
|
|||
|
Secret Service, and EFF and CPSR have done some preliminary research
|
|||
|
into the case to determine what, if any, civil liberties violations
|
|||
|
were involved. After interviewing about a dozen people who were
|
|||
|
there, we have determined that the Secret Service does seem to have
|
|||
|
been involved (a county police officer on the scene confirmed that),
|
|||
|
and we are ready to proceed with the case.
|
|||
|
|
|||
|
We contacted the Virginia ACLU, which has found a litigator in
|
|||
|
Northern Virginia who wants to litigate the case. EFF, the ACLU and
|
|||
|
CPSR are currently doing research on the legal theories we will need
|
|||
|
to pursue. EFF is very committed to standing up for the civil
|
|||
|
liberties of those who attended this open, publicized and
|
|||
|
nondisruptive meeting.
|
|||
|
|
|||
|
Shari Steele, Staff Attorney, Electronic Frontier Foundation
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 14 Jan 93 22:19:52 PST
|
|||
|
From: Kpro-Madness <unknown@domain>
|
|||
|
Subject: File 6--Public Service for Cornell Hackers
|
|||
|
|
|||
|
The following should be of interest to CuD readers. It originally
|
|||
|
appeared in RISKS Digest ( V. 14 #27).
|
|||
|
++++
|
|||
|
|
|||
|
Date--Wed, 13 Jan 93 09:56:50 -0700
|
|||
|
From--dclawson@clipr.colorado.edu
|
|||
|
Subject--Public Service for Cornell Hackers
|
|||
|
|
|||
|
"Public Service for Hackers" by John Marcham
|
|||
|
_Cornell_Alumni_News_ magazine
|
|||
|
|
|||
|
Two former [Cornell] students will develop a computer program to make
|
|||
|
it easier for a quadraplegic man in Tennessee to use a computer he
|
|||
|
owns, as part of their punishment for launching a computer virus that
|
|||
|
damaged programs and caused hard drive crashes last February.
|
|||
|
|
|||
|
David Blumenthal '96 and Mark A. Pilgrim '94 were sentenced by a
|
|||
|
Tompkins County Court judge to pay restitution to users whose
|
|||
|
computers were jammed by the men's virus, at and near Stanford
|
|||
|
University and in Japan, and to perform ten hours of community service
|
|||
|
per week for a year.
|
|||
|
|
|||
|
A computer buff who knew the quadraplegic and heard of the Cornell
|
|||
|
virus case wrote the judge in Ithaca, and asked if the students'
|
|||
|
public service could be worked off developing a less expensive and
|
|||
|
cumbersome program for the disabled man, who uses a mouthstick and
|
|||
|
outdated software to operate his McIntosh computer.
|
|||
|
|
|||
|
The judge and the former students agreed to the proposal: the students
|
|||
|
start work in November. A third former student, found guilty of a
|
|||
|
lesser infraction, was asked by not required to do public service, and
|
|||
|
declined.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 18 Jan 93 08:04:30 -0500
|
|||
|
From: Matt Bishop <bishop@WINDSOR.DARTMOUTH.EDU>
|
|||
|
Subject: File 7--CFP Special Issue on Security [Change in Due Date]
|
|||
|
|
|||
|
[NOTE CHANGE IN SUBMISSIONS DUE DATE: IT IS NOW JUNE 1, 1993]
|
|||
|
|
|||
|
Matt Bishop will be Guest Editor of a special issue of the journal
|
|||
|
"Computing Systems" to be published in 1993. The issue will be
|
|||
|
devoted to "Security and Integrity of Open Systems." Papers on all
|
|||
|
aspects of policy, issues, theory, design, implementation, and
|
|||
|
experiences with security and integrity in open systems are solicited
|
|||
|
for the issue. The deadline for submissions is June 1, 1993; papers
|
|||
|
submitted after this deadline will not be considered. Prospective
|
|||
|
authors should send five copies of their papers to:
|
|||
|
|
|||
|
Professor Matt Bishop
|
|||
|
Mathematics and Computer Science
|
|||
|
Dartmouth College
|
|||
|
6188 Bradley Hall
|
|||
|
Hanover, NH 03755-3551
|
|||
|
(603) 646-3267
|
|||
|
Matt.Bishop@dartmouth.edu
|
|||
|
|
|||
|
Submissions should not have appeared in other archival publications
|
|||
|
prior to their submission. Papers developed from earlier conference,
|
|||
|
symposia and workshop presentations are welcome.
|
|||
|
|
|||
|
"Computing Systems" is a journal dedicated to the analysis and
|
|||
|
understanding of the theory, design, art, engineering and
|
|||
|
implementation of advanced computing systems, with an emphasis on
|
|||
|
systems inspired or influenced by the UNIX tradition. The journal's
|
|||
|
content includes coverage of topics in operating systems,
|
|||
|
architecture, networking, interfaces, programming languages, and
|
|||
|
sophisticated applications.
|
|||
|
|
|||
|
"Computing Systems" (ISSN 0895-6340) is a refereed, quarterly journal
|
|||
|
published by the University of California Press for the USENIX
|
|||
|
Association. Usenix is a professional and technical association of
|
|||
|
individuals and institutions concerned with breeding innovation in the
|
|||
|
UNIX tradition.
|
|||
|
|
|||
|
Now in its fifth year of publication, "Computing Systems" is regularly
|
|||
|
distributed to 4900 individual subscribers and over 600 institutional
|
|||
|
subscribers (libraries, research labs, etc.) around the world. Some
|
|||
|
special-topic issues are often distributed more widely.
|
|||
|
|
|||
|
The editor-in-chief of "Computing Systems" is Mike O'Dell of Bellcore.
|
|||
|
Gene Spafford of Purdue University is Associate Editor, and Peter
|
|||
|
Salus of the Sun User Group is the Managing Editor.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 23 Jan 1993 16:14:31 -0700 (MST)
|
|||
|
From: <KAPLAN%UABPA@ARIZVMS.BITNET>
|
|||
|
Subject: File 8--Talking with the Underground
|
|||
|
|
|||
|
(Previously published in the Computer Security Institute's newsletter
|
|||
|
- The Alert - and the French Chaos Computer Club's Chaos Digest)
|
|||
|
|
|||
|
Talking with the underground
|
|||
|
by Ray Kaplan and Joe Kovara
|
|||
|
|
|||
|
Information about system and network vulnerabilities is sparse, not
|
|||
|
readily available and carefully guarded by those segments of the
|
|||
|
security community that collect and control it. Given that the
|
|||
|
legitimate security community won't share information about
|
|||
|
vulnerabilities with us, isn't it logical that we include outsiders
|
|||
|
(the computer underground or ex-computer criminals) in these
|
|||
|
discussions. Amid criticism, we decided to let the community ask the
|
|||
|
advice of experts the crackers who have successfully cracked computer
|
|||
|
networks.
|
|||
|
|
|||
|
Exploring the details of vulnerabilities
|
|||
|
|
|||
|
Over 300 participants at 25 sites in US, Canada, Europe and Mexico
|
|||
|
joined law enforcement, members of the security community, and former
|
|||
|
members of the computer underground as we explored these questions in
|
|||
|
the November 24, 1992, audio teleconference entitled System and
|
|||
|
Network Security: How You Will Be Attacked and What to do About It.
|
|||
|
|
|||
|
Our guests included Kevin Mitnick and Lenny DiCicco, who successfully
|
|||
|
penetrated a range of networks and telephone systems. They were both
|
|||
|
sentenced in federal court after successfully penetrating Digital
|
|||
|
Equipment Corporation's computer network in 1988. They stole the
|
|||
|
source code to VMS, Digital's widely used operating system. Their
|
|||
|
exploits were profiled in the book Cyberpunk: Outlaws and Hackers on
|
|||
|
the Computer Frontier, by Katie Hafner and John Markoff (1991, Simon
|
|||
|
and Schuster).
|
|||
|
|
|||
|
Our panelists included Hal Hendershot, head of the FBI Computer Crime
|
|||
|
Unit in Washington D.C.; Don Delaney, Senior Investigator with the New
|
|||
|
York State Police; Computer security consultant Dave Johnson of Talon
|
|||
|
Systems (Los Alto, CA); Robert Clyde, V.P. of the Security Products
|
|||
|
Group, RAXCO, Inc.; and Lew, the organizational director of automation
|
|||
|
for a medium size company a former cracker.
|
|||
|
|
|||
|
The panelists shared their considerable experience and discussed
|
|||
|
techniques used to break in to computer networks. Among the
|
|||
|
penetration techniques discussed were the uses of psychological
|
|||
|
subversion, telecommunications monitoring techniques, and the
|
|||
|
exploitation of known system and network bugs. Despite the popularity
|
|||
|
of these attack techniques, they are little known outside of the
|
|||
|
computer underground and the computer security community.
|
|||
|
|
|||
|
Panelists issue stern warnings about telecommunications security
|
|||
|
|
|||
|
Don Delaney stated that tremendous loss of money from both toll and
|
|||
|
Private Branch eXchange (PBX) fraud is whats happening in the telecom
|
|||
|
area. Since the security of a PBX is the responsibility of its owner,
|
|||
|
such losses are not being absorbed by the telephone companies
|
|||
|
involved. These losses have been known to force the owners of
|
|||
|
compromised PBXs into bankruptcy. Delaney joins us in saying that its
|
|||
|
not a matter of if you will be hit, but when.
|
|||
|
|
|||
|
According to DiCicco, compromising the telephone system gave he and
|
|||
|
Kevin the ability to attack systems without the fear of discovery -
|
|||
|
telco tracebacks were simply ineffective. They could attack networks
|
|||
|
at many different points of entry all over the country. This is why
|
|||
|
no one could keep them out, even though their victims knew their
|
|||
|
systems and networks had been compromised. If all of this does not
|
|||
|
scare you, consider Lenny's admission that at one point he and Kevin
|
|||
|
had compromised over 50 telco switches in the United States, including
|
|||
|
all of California, parts of New Jersey, New York and New Hampshire.
|
|||
|
At one point they even controlled all three of the switches that
|
|||
|
provided phone service to Manhattan.
|
|||
|
|
|||
|
Yes, the law is ready to help - but the threat is a tough,
|
|||
|
sophisticated, international one.
|
|||
|
|
|||
|
Threats from abroad? Yes, the threat does exist according to Hal
|
|||
|
Hendershot of the FBI. Robert Clyde reports getting many calls from
|
|||
|
people trying to solve security problems. In keeping with what we
|
|||
|
know of reported computer crimes, most sites see problems from
|
|||
|
insiders: employees, consultants and vendors. Robert reports that
|
|||
|
two companies publicly spoke of being approached by former East German
|
|||
|
agents for hire for as little as $10,000 at a September conference in
|
|||
|
Sweden where he spoke in 1992. We appear to be seeing the
|
|||
|
criminalization of hacker activity that many have long feared: hackers
|
|||
|
and ex-foreign intelligence agents for hire.
|
|||
|
|
|||
|
James Bond is alive and well, thank you
|
|||
|
|
|||
|
In late 1992 Don Delaney reported the first case he's seen of James
|
|||
|
Bond techniques. Remote surveillance can be done by intercepting,
|
|||
|
decoding and displaying the Radio Frequency (RF) emanations of various
|
|||
|
computing devices such as terminals and network cabling. Delaney
|
|||
|
reports that in late 1992, an antenna was put up on the balcony of a
|
|||
|
19th floor room in New York's Helmsley building pointing at Chemical
|
|||
|
Bank. He indicated that it was being very carefully adjusted before
|
|||
|
being locked into position. By the time they were able to
|
|||
|
investigate, the antenna and its manipulator had vanished - presumably
|
|||
|
having successfully gathered the intelligence that they were after.
|
|||
|
This is no longer gee, we knew it was possible, but holy shit, it's
|
|||
|
happening now. Imagine someone reading your terminal screen from
|
|||
|
across the street.
|
|||
|
|
|||
|
Management's show me attitude
|
|||
|
|
|||
|
Dave Johnson insists that his biggest problem when he was at Lockheed
|
|||
|
was getting corporate management to understand that there is a
|
|||
|
problem. One of the areas in which this type of conference can really
|
|||
|
help is understanding the enemy. Management simply doesn't understand
|
|||
|
the thinking of hackers. Since it makes no sense to them, they tend
|
|||
|
to deny its existence until theres proof. Of course, the proof is
|
|||
|
usually very expensive: once a system has been compromised the work of
|
|||
|
cleaning it up is a long, hard and complicated. A well-connected
|
|||
|
system or network makes an excellent platform from which to launch
|
|||
|
attacks on other hosts or on other networks.
|
|||
|
|
|||
|
A major problem for Digital in securing their network against Kevin
|
|||
|
Mitnick and Lenny DiCicco was that only one vulnerable system on
|
|||
|
Digitals EASYnet was needed. From there, they were able to penetrate
|
|||
|
other systems. Even nodes that were known to have been penetrated and
|
|||
|
were secured were penetrated repeatedly by using other vulnerable
|
|||
|
nodes to monitor either users or network traffic accessing the secured
|
|||
|
nodes. While at Lockheed, Dave Johnson implemented policies,
|
|||
|
awareness training and widescale authentication for all external
|
|||
|
access, including dialup lines and telnet connections using
|
|||
|
challenge-response tokens or smart cards. He does not trust the phone
|
|||
|
system and assumes that it has been compromised. Kevin Mitnick and
|
|||
|
Lenny DiCicco illustrated just how vulnerable the phone system was in
|
|||
|
1988 and the MOD bust in July 1992 shows that things have not
|
|||
|
improved. Kevin reminds us that you must assume the telephone system
|
|||
|
is insecure: even robust challenge-response systems can be compromised.
|
|||
|
You simply have to play the telecommunications game for real. Kevin
|
|||
|
reminds us that unless you use encryption, all bets are off. As an
|
|||
|
example of how deep, long lived and dedicated a serious attack can be,
|
|||
|
consider that Kevin and Lenny were in DEC's network for years. They
|
|||
|
knew exactly what DEC and telco security were doing in their efforts
|
|||
|
to catch them since they were reading the security personnel's email.
|
|||
|
They evaded the security forces for over 12 months and they had a
|
|||
|
pervasive, all powerful, privileged presence on DEC's internal
|
|||
|
network. I've seen the enemy and them is us (this is a quote from
|
|||
|
Pogo).
|
|||
|
|
|||
|
Mitnick insists that people are the weakest link. According to his
|
|||
|
considerable experience, you don't even need to penetrate a system if
|
|||
|
you can talk someone on the inside into doing it for you. Why bother
|
|||
|
breaking in to a computer system if you can talk someone in accounts
|
|||
|
payable into cutting you a check? Using the finely tuned tools of
|
|||
|
psychological subversion, practiced social manipulators can get most
|
|||
|
anything that they want from the ranks of the generally unsuspecting
|
|||
|
(uncaring?) employees that inhabit most of our organizations today.
|
|||
|
The only cure is a massive and complete educational program that
|
|||
|
fosters loyalty, awareness and proper skepticism in every employee.
|
|||
|
|
|||
|
In the end
|
|||
|
|
|||
|
Perhaps the strongest message from everyone was that you can't trust
|
|||
|
the phone system. Telephone companies have been, and continue to be,
|
|||
|
compromised. While Mitnick & DiCicco's penetration of DEC's internal
|
|||
|
network happened in 1988, the 1992 MOD bust showed us that the same
|
|||
|
techniques are still being used successfully today. Data and voice,
|
|||
|
including FAX transmissions, are subject to eavesdropping and
|
|||
|
spoofing. Encryption is absolutely required for secure, trustworthy
|
|||
|
communications.
|
|||
|
|
|||
|
The coupling of social engineering and technical skills is a potent
|
|||
|
threat. Most sites that have addressed technical security are still
|
|||
|
wide open to penetration from people who have well-practiced social
|
|||
|
engineering skills. However, in all, you don't even need social
|
|||
|
engineering skills to get into most systems.
|
|||
|
|
|||
|
Are your systems and networks secure? Are your systems and networks
|
|||
|
at risk? What will you do if you are attacked? Although the
|
|||
|
questions seem simple, they are not. Future teleconferences will
|
|||
|
explore both the questions and the answers in more detail.
|
|||
|
|
|||
|
++++
|
|||
|
|
|||
|
Ray Kaplan and Joe Kovara have been independent computer consultants
|
|||
|
for more than a decade. They specialize in operating systems, networks
|
|||
|
and solving system and network security problems. Ray Kaplan is also
|
|||
|
a well known writer and lecturer. He is a regular contributor to
|
|||
|
Digital News and Review and other computer trade publications.
|
|||
|
|
|||
|
Tapes and handout materials for the System and Network Security
|
|||
|
teleconference series are available from Ray Kaplan, P.O. Box 42650,
|
|||
|
Tucson, AZ USA 85733 FAX (602) 791-3325 Phone (602) 323-4606.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.08
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|