720 lines
33 KiB
Plaintext
720 lines
33 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Sun Apr 4 1993 Volume 5 : Issue 25
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Copp Editor: Etaoin Shrdlu, Senior
|
|||
|
|
|||
|
CONTENTS, #5.25 (Apr 4 1993)
|
|||
|
File 1--CPSR Wins SSN Privacy Case
|
|||
|
File 2--Re: Debating the Virus contest - 1 (#5.23)
|
|||
|
File 3--Re: Debating the Virus contest - 2 (#5.23)
|
|||
|
File 4--Re: Debating the Virus contest - 3 (#5.23)
|
|||
|
File 5--USPS Freedom of Information Act Requests
|
|||
|
File 6--Collecting Cu Files (From "LOD")
|
|||
|
File 7--CU in the news
|
|||
|
File 8--Comments on SJG Decision (GRID News)
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210;
|
|||
|
in Europe from the ComNet in Luxembourg BBS (++352) 466893;
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
Back issues also may be obtained through mailservers at:
|
|||
|
mailserv@batpad.lgb.ca.us or server@blackwlf.mese.com
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Fri, 26 Mar 1993 17:03:43 EST
|
|||
|
From: Marc Rotenberg <Marc_Rotenberg@WASHOFC.CPSR.ORG>
|
|||
|
Subject: File 1--CPSR Wins SSN Privacy Case
|
|||
|
|
|||
|
CPSR Wins SSN Privacy Case
|
|||
|
|
|||
|
PRESS RELEASE
|
|||
|
|
|||
|
March 26, 1993
|
|||
|
|
|||
|
"FEDERAL APPEALS COURT UPHOLDS PRIVACY:
|
|||
|
USE OF SOCIAL SECURITY NUMBER LIMITED
|
|||
|
- - - -
|
|||
|
CPSR Expresses Support for Decision"
|
|||
|
|
|||
|
A federal court of appeals has ruled that Virginia's divulgence of the
|
|||
|
Social Security numbers of registered voters violates the
|
|||
|
Constitution. The Court said that Virginia's registration scheme
|
|||
|
places an "intolerable burden" on the right to vote.
|
|||
|
|
|||
|
The result comes nearly two years after Marc Greidinger, a
|
|||
|
resident of Falmouth, Virginia, first tried to register to vote. Mr.
|
|||
|
Greidinger said that he found it nearly impossible to obtain a
|
|||
|
driver's license, open accounts with local utilities or even rent a
|
|||
|
video without encountering demands for his Social Security number.
|
|||
|
|
|||
|
Mr. Greidinger told the New York Times this week that when the
|
|||
|
State of Virginia refused to register him as a voter unless he
|
|||
|
provided his Social Security number he decided to take action. He
|
|||
|
brought suit against the state, and argued that Virginia should stop
|
|||
|
publishing the Social Security numbers of voters.
|
|||
|
|
|||
|
This week a federal appeals court in Richmond, Virginia ruled
|
|||
|
that the state's practice constituted "a profound invasion of privacy"
|
|||
|
and emphasized the "egregiousness of the harm" that could result from
|
|||
|
dissemination of an individual's SSN.
|
|||
|
|
|||
|
Computer Professionals for Social Responsibility (CPSR), a
|
|||
|
national membership organization of professionals in the computing
|
|||
|
field, joined with Mr. Greidinger in the effort to change the Virginia
|
|||
|
system. CPSR, which had testified before the U.S. Congress and the
|
|||
|
state legislature in Virginia about growing problems with the misuse
|
|||
|
of the SSN, provided both technical and legal support to Mr.
|
|||
|
Greidinger. CPSR also worked with Paul Wolfson of the Public Citizen
|
|||
|
Litigation Group, who argued the case for Mr. Greidinger.
|
|||
|
|
|||
|
In an amicus brief filed with the court, CPSR noted the
|
|||
|
long-standing interest of the computing profession in the design of
|
|||
|
safe information systems and the particular concerns about the misuse
|
|||
|
of the SSN. The CPSR brief traced the history of the SSN provisions
|
|||
|
in the 1974 Privacy Act. The brief also described how the widespread
|
|||
|
use of SSNs had led to a proliferation of banking and credit crime and
|
|||
|
how SSNs were used to fraudulently obtain credit records and federal
|
|||
|
benefits.
|
|||
|
|
|||
|
CPSR argued that the privacy risk created by Virginia's
|
|||
|
collection and disclosure of Social Security numbers was unnecessary
|
|||
|
and that other procedures could address the State's concerns about
|
|||
|
records management.
|
|||
|
|
|||
|
This week the court of appeals ruled that the state of
|
|||
|
Virginia must discontinue the publication of the Social Security
|
|||
|
numbers of registered voters. The
|
|||
|
court noted that when Congress passed the Privacy Act of 1974 to
|
|||
|
restrict the use of the Social Security number, the misuse of the SSN
|
|||
|
was "one of the most serious manifestations of privacy concerns in the
|
|||
|
Nation."
|
|||
|
|
|||
|
The Court then said that since 1974, concerns about SSN
|
|||
|
confidentiality have "become significantly more compelling. For
|
|||
|
example, armed with one's SSN, an unscrupulous individual could obtain
|
|||
|
a person's welfare benefits, or Social Security benefits, order new
|
|||
|
checks at a new address, obtain credit cards, or even obtain the
|
|||
|
person's paycheck."
|
|||
|
|
|||
|
The Court said that Virginia's voter registration scheme would
|
|||
|
"compel a would-be voter in Virginia to consent to the possibility of
|
|||
|
a profound invasion of privacy when exercising the fundamental right
|
|||
|
to vote."
|
|||
|
|
|||
|
The Court held that Virginia must either stop collecting the
|
|||
|
SSN or stop publicly disclosing it.
|
|||
|
|
|||
|
Marc Rotenberg, director of the CPSR Washington office said,
|
|||
|
"We are extremely pleased with the Court's decision. It is a
|
|||
|
remarkable case, and a real tribute to Marc Greidinger's efforts.
|
|||
|
Still, there are many concerns remaining about the misuse of the
|
|||
|
Social Security number. We would like to see public and private
|
|||
|
organizations find other forms of identification for their computing
|
|||
|
systems. As the federal court made clear, there are real risks in the
|
|||
|
misuse of the Social Security number."
|
|||
|
|
|||
|
Mr. Rotenberg also said that he hoped the White House task
|
|||
|
force currently studying plans for a national health care claims
|
|||
|
payment system would develop an identification scheme that did not
|
|||
|
rely on the Social Security Number. "The privacy concerns with
|
|||
|
medical records are particularly acute. It would be a serious design
|
|||
|
error to use the SSN," said Mr. Rotenberg.
|
|||
|
|
|||
|
Cable News Network (CNN) will run a special segment on the
|
|||
|
Social Security number and the significance of the Greidinger case on
|
|||
|
Sunday evening, March 28, 1993. The Court's opinion is available from
|
|||
|
the CPSR Internet Library via Gopher/ftp/WAIS. The file name is
|
|||
|
"cpsr/ssn/greidinger_opinion.txt". The CPSR amicus brief is available
|
|||
|
as "cpsr/ssn/greidinger_brief.txt".
|
|||
|
|
|||
|
CPSR is a national membership organization, based in Palo
|
|||
|
Alto, California. CPSR conducts many activities to protect privacy
|
|||
|
and civil liberties. Membership is open to the public and support is
|
|||
|
welcome. For more information about CPSR, please contact, CPSR, P.O.
|
|||
|
Box 717, Palo Alto, CA 94302, call 415/322-3778 or email
|
|||
|
cpsr@csli.stanford.edu.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 29 Mar 1993 13:29:18 -0500 (CST)
|
|||
|
From: THe ADvocate <anon@unix.ville.geo>
|
|||
|
Subject: File 2--Re: Debating the Virus contest - 1 (#5.23)
|
|||
|
|
|||
|
In CuD #5.23, roy%burnflag.ati.com@HARVUNXW.BITNET(Roy) writes:
|
|||
|
|
|||
|
> Let's just say I decided to have a bomb making contest. This is for
|
|||
|
> the purely scientific purpose of studying how bombs work, and allowing
|
|||
|
> people to study different ways to defuse bombs. I am going to award
|
|||
|
> some cash to the winner and publish the plans for making the bomb in
|
|||
|
> my soon-to-be-released book called "The Little Black Book of Bomb
|
|||
|
> Making Techniques".
|
|||
|
|
|||
|
This man has obviously never heard of the Anarchists cookbook.
|
|||
|
The poor Mans James Bond or even Army Pub NN-XX Unconventional Munitions.
|
|||
|
All available at a bookstore near you:-)
|
|||
|
|
|||
|
> So, the book gets published and sells lots of copies. Mark Ludwig
|
|||
|
> arrives home one day to find that his place of residence has been
|
|||
|
> destroyed by a huge bomb. It just so happens that the type of bomb
|
|||
|
> used is the same award winning explosive device as I published in my
|
|||
|
> book.
|
|||
|
|
|||
|
Kinda like the peoples whose homes get blown up by White supremacists
|
|||
|
or clinics bombed by anti-abortion fanatics?
|
|||
|
|
|||
|
> Surely, Mr. Ludwig would not hold me responsible for the destruction
|
|||
|
> of his home caused by someone who decided to implement the plans I
|
|||
|
> presented purely for "scientific research purposes".
|
|||
|
|
|||
|
Too date, no case has been carried against a publisher for this
|
|||
|
kind of material. Soldier of fortune magazine was struck in a
|
|||
|
case for libel regarding publishing an ad for Murder for Hire
|
|||
|
services. I am not sure of the status of the case.
|
|||
|
|
|||
|
> Roy Batchelor / Burn This Flag BBS / San Jose, CA / 408-363-9766 /
|
|||
|
|
|||
|
Apparently mr Batchelor is not aware of the first amendment of this
|
|||
|
country. Publishing of ideas, is encouraged, even when they can lead to
|
|||
|
harmful activities. After all the founding fathers were
|
|||
|
publishing materials on how to overturn an empire and slaughter
|
|||
|
Government soldiers.
|
|||
|
|
|||
|
Todays revolutionary is often times tomorrows government leader. Look
|
|||
|
at Begin in Israel or Mandela in South Africa. Our own government
|
|||
|
gets plenty cozy with numerous Armed revolutionaries.
|
|||
|
|
|||
|
If something is a crime, the justice system will cope. And if it
|
|||
|
can't why am I paying taxes? Men like mr Batchelor would like to
|
|||
|
destroy the first amendment on the basis of protecting society.
|
|||
|
|
|||
|
Drugs are a serious problem. Mnay of them are easily synthesized.
|
|||
|
Would you prohibit publication of books that show how to synthesize
|
|||
|
organic molecules because someone might make some drugs that some
|
|||
|
addict may get hooked on and later burglarize your home looking for
|
|||
|
cash?
|
|||
|
|
|||
|
Solid police work and solid education are the methods of a civilized
|
|||
|
society. Not puritanical methods.
|
|||
|
|
|||
|
THe ADvocate.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 29 Mar 93 11:15:00 PST
|
|||
|
From: erikn@BOA.MITRON.TEK.COM(Erik Nilsson)
|
|||
|
Subject: File 3--Re: Debating the Virus contest - 2 (#5.23)
|
|||
|
|
|||
|
Roy Batchelor Writes:
|
|||
|
|
|||
|
> Surely, Mr. Ludwig would not hold me responsible for the
|
|||
|
> destruction of his home caused by someone who decided to implement
|
|||
|
> the plans I presented purely for "scientific research purposes".
|
|||
|
|
|||
|
And Mr. Ludwig would be right. In fact, there are lots of Little
|
|||
|
Black Books of Bomb Making Techniques in existence, and a News
|
|||
|
conference (Alt.rec.fireworks) that could also fairly be named
|
|||
|
Alt.rec.explosives.manufacture or Alt.rec.bombs. Yes, people do blow
|
|||
|
things up for the fun of it, and it turns out that we live in some
|
|||
|
facsimile of a free society where you can say and think a pretty wide
|
|||
|
range of things, and even do a pretty wide range of things, without
|
|||
|
much more than applying for a permit without drooling on yourself.
|
|||
|
|
|||
|
If I write a book on gravity, and someone tries to drop a piano on
|
|||
|
you, do you think you have a case for some reason?
|
|||
|
|
|||
|
For me, the analogy with viri is imperfect, because I can't imagine
|
|||
|
why someone would waste their time writing one. Of course, people
|
|||
|
could fairly wonder why I get several dozen of my friends together at
|
|||
|
least once a year to burn, detonate, and obliterate objects of varying
|
|||
|
artistic value.
|
|||
|
|
|||
|
In any case, I consider credit databases, CNID, and the FBI wiretap
|
|||
|
proposal far more dangerous to my way of life than computer viri.
|
|||
|
|
|||
|
Oh yes, here's a simple bomb:
|
|||
|
|
|||
|
1. Apply for an explosives handling permit from your state Fire
|
|||
|
Marshall. Tell them you have a few stumps that you need to get rid
|
|||
|
of.
|
|||
|
|
|||
|
2. Take the permit and your driver's license to your local farm supply
|
|||
|
store, and buy the following:
|
|||
|
- Explosive of your choice. Dynamite has a quaint charm, but the
|
|||
|
plastic stuff is better.
|
|||
|
- A blasting cap.
|
|||
|
- A firing kit.
|
|||
|
- Several pounds of concrete anchors.
|
|||
|
- A roll of duct tape.
|
|||
|
|
|||
|
3. If it isn't obvious what to do from here, you shouldn't be making
|
|||
|
bombs.
|
|||
|
|
|||
|
4. Modern explosives are probably a lot more powerful than you think.
|
|||
|
Start with small amounts, a LONG WAYS away from where you are.
|
|||
|
Wear ear and eye protection. Be careful, etc, etc.
|
|||
|
|
|||
|
A friendly warning: this is not a good way to make a bomb that is
|
|||
|
really going to upset anyone, since commercial explosives are widely
|
|||
|
reputed to have impurities imbedded in them for tracing.
|
|||
|
|
|||
|
|
|||
|
Here's the infamous "Dry Ice Bomb," this version off of
|
|||
|
Alt.Rec.Fireworks (posted by Eric Donaldson):
|
|||
|
|
|||
|
- dry ice
|
|||
|
- water
|
|||
|
- container
|
|||
|
- a cap that fits tightly on the container
|
|||
|
|
|||
|
- Mix in an open environment.
|
|||
|
- [apply the cap & run like hell (always "like hell" on
|
|||
|
principle, you never "run laconically" from an imminent
|
|||
|
explosion)]
|
|||
|
- Wait somewhere btw 1-30 minutes.
|
|||
|
- and do not go near unless you want to risk your life.
|
|||
|
|
|||
|
I'd like to emphasize this last point. It's a good idea to have some
|
|||
|
sort of firearm handy to trigger the thing if it fails to go off by
|
|||
|
itself, so you don't spend all afternoon throwing rocks at it (you can
|
|||
|
NOT just leave it for someone to find.). I personally would not do
|
|||
|
this with a glass container, 2 liter plastic bottles work just fine.
|
|||
|
Dry ice bombs are pretty safe, unless you have a short attention span.
|
|||
|
|
|||
|
Do not handle dry ice with your bare hands.
|
|||
|
|
|||
|
You might want to check local laws before making one of these, as they
|
|||
|
are major illegal in some places.
|
|||
|
|
|||
|
For more info, try Alt.Rec.Fireworks, Protechnic Guild International
|
|||
|
(18021 Baseline Avenue, Jordan, MN 55352), or American Fireworks News
|
|||
|
(Star Route Box 30, Dingmans Ferry, PA 18328).
|
|||
|
|
|||
|
Here's an older list of pyro BBSs:
|
|||
|
|
|||
|
Name Phone Number Location
|
|||
|
Evergreen Micro (206)452-2012 Port Angles, WA
|
|||
|
Exchange of Byte(206)692-7301 Silverdale, WA
|
|||
|
Jimby BBS (206)698-1044 Brownsville, WA
|
|||
|
West Coast Pyro (209)661-5355 Madera, CA
|
|||
|
Sundial (509)545-1789 Pasco, WA
|
|||
|
Spokane Data (509)747-5199 Spokane, WA
|
|||
|
The Hideaway (509)586-0104 Kennewick, WA
|
|||
|
Strikezone (509)586-6803 Kennewick, WA
|
|||
|
FOG-Line (515)964-7937 Des Moines, IA
|
|||
|
Empire BBS (516)325-0827 Eastport, NY
|
|||
|
VAXCat (603)424-0923 Merrimack, NH
|
|||
|
Babble Board (603)267-5921 Belmont, NH
|
|||
|
Nuke-Zone (603)474-8915 Seabrook, NH
|
|||
|
jBBS (619)221-0311 San Diego, CA
|
|||
|
Starhelm (619)479-3006 San Diego, CA
|
|||
|
|
|||
|
Maybe somebody has a newer list, I'm not sure how many of these are
|
|||
|
still up. I fergit who I got most of this info from, but thanks
|
|||
|
anyway.
|
|||
|
|
|||
|
I hope this helps.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 29 Mar 1993 18:12:35 -0500
|
|||
|
From: Mike McNally <mcnally@EECS.UMICH.EDU>
|
|||
|
Subject: File 4--Re: Debating the Virus contest - 3 (#5.23)
|
|||
|
|
|||
|
In article <1993Mar28.222658.9625@chinacat.unicom.com> "Roy Batchelor" writes:
|
|||
|
|
|||
|
>This note is in reference to the current issue of CuD and the all the
|
|||
|
>discussion of Mark Ludwigs' virus writing contest.
|
|||
|
>
|
|||
|
[...]
|
|||
|
>
|
|||
|
>So, the book gets published and sells lots of copies. Mark Ludwig
|
|||
|
>arrives home one day to find that his place of residence has been
|
|||
|
>destroyed by a huge bomb. It just so happens that the type of bomb
|
|||
|
>used is the same award winning explosive device as I published in my
|
|||
|
>book.
|
|||
|
>
|
|||
|
>Surely, Mr. Ludwig would not hold me responsible for the destruction
|
|||
|
>of his home caused by someone who decided to implement the plans I
|
|||
|
>presented purely for "scientific research purposes".
|
|||
|
|
|||
|
Though I'm sure you meant this sarcastically, I'll take it at face
|
|||
|
value. In such a situation *I* wouldn't blame you, I'd blame the
|
|||
|
person responsible for setting the bomb. If you were run over by a
|
|||
|
drunk driver, who would you blame? Henry Ford? Jack Daniels? Mobil
|
|||
|
Oil, for selling the driver the gas the car needed to run?
|
|||
|
|
|||
|
The responsibility for such an action belongs completely to the
|
|||
|
person who initiates the action, not the thousands of people involved
|
|||
|
in making the whole situation possible. Why not blame the authors of
|
|||
|
MS-DOS for writing an OS that's such an easy host for viruses?
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 2 Apr 93 21:28:37 MST
|
|||
|
From: mrosen@NYX.CS.DU.EDU(Michael Rosen)
|
|||
|
Subject: File 5--USPS Freedom of Information Act Requests
|
|||
|
|
|||
|
In issue #42 of Phrack there was an article about the USPS' practice
|
|||
|
of selling change of address information without consumer consent. I
|
|||
|
sent the supplied form letter and carbon copied my congressman and
|
|||
|
senators. Today I received a reply from the USPS Records Office.
|
|||
|
|
|||
|
April 1, 1993
|
|||
|
|
|||
|
Dear Mr. Rosen:
|
|||
|
|
|||
|
This concerns your recent Privacy Act request for accountings of
|
|||
|
disclosure of mail forwarding information you have provided to
|
|||
|
the Postal Service.
|
|||
|
|
|||
|
Disclosure of your forwarding address might have been made to
|
|||
|
individual requesters by post offices or to subscribers to the
|
|||
|
National Change of Address File (NCOA) by an NCOA licensee. The
|
|||
|
NCOA is a consolidated file of all forwarding information
|
|||
|
provided by postal customers and stored on automated media.
|
|||
|
Listholders may subscribe to NCOA to obtain the new addresses of
|
|||
|
individuals for whom they already have in their possession the
|
|||
|
old address.
|
|||
|
|
|||
|
For disclosures made by post offices, we are in the process of
|
|||
|
querying the Washington, DC postmaster for any accountings.
|
|||
|
|
|||
|
For disclosures made from the NCOA system, we will begin querying
|
|||
|
NCOA licensees all of which keep logs identifying the particular
|
|||
|
subscribers to whom they have given NCOA information. This
|
|||
|
accounting will not identify with certainty the subscribers who
|
|||
|
have in fact received your new address, but will give you a list
|
|||
|
of all subscribers receiving NCOA service for the relevant time
|
|||
|
period and thus might have received your address.
|
|||
|
|
|||
|
Because a large number of requests like yours are being received,
|
|||
|
there will be a delay in responding. Requests are being
|
|||
|
processed in order of receipt and you will be sent the
|
|||
|
accountings as soon as possible. Your patience is appreciated.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 30 Mar 93 22:39:29 EST
|
|||
|
From: lodcom@MINDVOX.PHANTOM.COM(LOD Communications)
|
|||
|
Subject: File 6--Collecting Cu Files (From "LOD")
|
|||
|
|
|||
|
Thank you for requesting information about the Hack/Phreak
|
|||
|
Underground BBS Message Base Files. The first Price Listing of
|
|||
|
completed message base Files will be sent to you via email in early to
|
|||
|
mid April 1993. Until then, the following background information
|
|||
|
should provide you with a better picture of this undertaking.
|
|||
|
|
|||
|
A significant portion of now retired computer underground
|
|||
|
participants (hackers and phone phreaks) have expressed an interest in
|
|||
|
seeing all of those old messages they posted on various underground
|
|||
|
hacker bulletin boards during their respective 'careers'. This is
|
|||
|
especially the case for those who never downloaded the messages; sold,
|
|||
|
gave away, or chucked their disks; and those who were visited by law
|
|||
|
enforcement officials who TOOK EVERYTHING including that suspicious
|
|||
|
looking toaster 8-/. In addition to this crowd, those who have come to
|
|||
|
the 'scene' relatively recently are keenly interested in what their
|
|||
|
'forefathers' talked about and what computer systems and networks they
|
|||
|
were into. This interest, and the growing curiosity of corporations,
|
|||
|
security professionals, and the general public to know what all those
|
|||
|
'hacker kids' were REALLY up to (starting World War III of course!) is
|
|||
|
the reasoning behind this undertaking.
|
|||
|
|
|||
|
Basically, LOD Communications is creating a Historical Library of
|
|||
|
the dark portion of Cyberspace. Throughout history physical objects
|
|||
|
have been preserved for posterity for the benefit of the next
|
|||
|
generation of humans. Cyberspace however, isn't very physical; data
|
|||
|
contained on floppy diskettes has a finite lifetime as does the
|
|||
|
technology to retrieve that data. Most of the underground systems
|
|||
|
operated at a time when TRS80's, VIC-20's, Commodore 64's, and
|
|||
|
Apple //'s were state of the art. Today, it's difficult to find
|
|||
|
anyone who has one of these machines in operating condition not to
|
|||
|
mention the brain cells left to recall how to operate them. :(
|
|||
|
|
|||
|
The aim of the project is to acquire as much information as
|
|||
|
possible which was contained on the underground hack/phreak bulletin
|
|||
|
boards that were in operation during a decade long period dating from
|
|||
|
the beginnings (1979, 80 - MOM: Modem Over Manhattan and 8BBS) to the
|
|||
|
legendary OSUNY, Plovernet, Legion of Doom!, Metal Shop, etc. up
|
|||
|
through the Phoenix Project circa 1989. Currently messages from over
|
|||
|
40 different BBS's have been dug up although very few message bases
|
|||
|
are 100% complete. Not having a complete 'set' does not diminish their
|
|||
|
value however.
|
|||
|
|
|||
|
As happens with most projects, the effort and monetary investment
|
|||
|
turned out to be substantially more than originally anticipated.
|
|||
|
Literally hundreds of man-hours have been spent copying dusty apple ][
|
|||
|
disks, transferring them to IBM (or typing in hard copy versions when
|
|||
|
electronic versions were unavailable), organizing the over one
|
|||
|
thousand individual files according to what BBS the messages were
|
|||
|
originally posted on, and splicing the files together. Also, after
|
|||
|
consulting with the appropriate civil liberties organizations and
|
|||
|
actual legal counsel, a very slight editing of the messages restricted
|
|||
|
to long distance access codes, phone numbers, and computer passwords
|
|||
|
had to be made to ensure that there is nothing illegal contained
|
|||
|
within the messages. Every effort was made to keep the messages in
|
|||
|
their pristine condition: 40 columns, ALL CAPS, spelling errors,
|
|||
|
inaccuracies of various kinds, and ALL.
|
|||
|
|
|||
|
In order to at least break even, a dollar value has been attached
|
|||
|
to each set of message bases. The dollar values were determined based
|
|||
|
on the following conglomeration: the number of years ago the BBS
|
|||
|
operated, its popularity and message content, whether the BBS or
|
|||
|
portions thereof were deemed 'Elite' (and therefore restricted access
|
|||
|
to but a small number of users), and the total number of messages
|
|||
|
compiled. The prices were kept as low as possible and range from $1.00
|
|||
|
to $9.00 for each Copyrighted (c) 1993 by LOD Communications, H/P BBS
|
|||
|
message base set. Most sets include [in addition to the messages
|
|||
|
themselves]: a historical background and description of the BBS, any
|
|||
|
tutorials aka "G-Philes" that were online as well as downloaded
|
|||
|
userlists if available. Due to the economics involved in diskettes,
|
|||
|
snail mail costs, and filling orders, a minimum order of $20.00 is
|
|||
|
required. Corporations and Government agencies must order the complete
|
|||
|
set and pay a moderately higher rate. The files will be available in
|
|||
|
IBM (5.25 or 3.5 inch), Amiga, and Apple MacIntosh formats and orders
|
|||
|
are expected to arrive at the requestors' physical mail box in 2-4
|
|||
|
weeks upon receipt of the order. Paper versions can be ordered but
|
|||
|
cost double (many messages are of 40 column format and therefore
|
|||
|
wastes lots of paper) and take twice the time to deliver.
|
|||
|
|
|||
|
These Files will hopefully provide those who were not part of the
|
|||
|
underground experience to learn what it was all about instead of
|
|||
|
relying on those often slanted (negatively) accounts found in the
|
|||
|
press. How much did the hackers and phone phreaks who used these
|
|||
|
bulletin boards know and how did they find it out? Did they have the
|
|||
|
capability to shut down phone service of Area Code proportions, could
|
|||
|
they ruin someone's credit, could they 'move satellites in the
|
|||
|
heavens', could they monitor packet switching network conversations?
|
|||
|
The answers lay within the messages which were painstakingly collected
|
|||
|
and are currently being organized into Files. Your patience is
|
|||
|
appreciated.
|
|||
|
|
|||
|
LOD Communications: Leaders in Engineering, Social and Otherwise
|
|||
|
|
|||
|
Email: lodcom@mindvox.phantom.com
|
|||
|
Voice Mail: 512-448-5098
|
|||
|
Snail Mail: LOD Communications
|
|||
|
603 W. 13th
|
|||
|
Suite 1A-278
|
|||
|
Austin, Texas 78701
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 28 Mar 93 15:37:16 EST
|
|||
|
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
|||
|
Subject: File 7--CU in the news
|
|||
|
|
|||
|
Virus Advert Censored
|
|||
|
=====================
|
|||
|
The British Advertising Standards Authority has asked Total Control
|
|||
|
Ltd (U.K.) to stop running a particular ad for the VIS Anti Virus
|
|||
|
Utilities package. The ad appeared in a March 1992 edition of PC
|
|||
|
Week. ((Moderators' note: yes, 1992)
|
|||
|
|
|||
|
The ad features two diskettes lying on pillows next to each other
|
|||
|
in bed. The headline read ''Before you put it in...make sure you
|
|||
|
know where it's been!''. The Authority found this to be offensive.
|
|||
|
(Infosecurity News. March/April 1993. Page 8)
|
|||
|
|
|||
|
Tiger Team Penetrate IRS Computers
|
|||
|
===================================
|
|||
|
A so-called ''Tiger Team'' of internal security agents has successfully
|
|||
|
penetrated two IRS computers, and were active in the system for seven
|
|||
|
days without being detected, according to a Knight-Ridder report.
|
|||
|
|
|||
|
Agents posed as IRS employees ((not too difficult, considering they
|
|||
|
were! just kidding. - Moderators')) and entered facilities at Memphis,
|
|||
|
Tenn. and Ogden, Utah locations. Once inside they installed programs
|
|||
|
to steal passwords by capturing keystrokes. Later they used the
|
|||
|
stolen passwords to infiltrate the systems.
|
|||
|
(Infosecurity News. March/April 1993. Page 8)
|
|||
|
|
|||
|
Computer Sabotage By Employees
|
|||
|
==============================
|
|||
|
The March 8, 1993 issue of Information Week has a lengthy excerpt from
|
|||
|
_Sabotage In The American Workplace_. (Pressure Drop Press, San
|
|||
|
Francisco) Although the book has anecdotes from all types of workers,
|
|||
|
the Information Week extracts focus on those involving the use of
|
|||
|
computers.
|
|||
|
The following five stories are featured:
|
|||
|
- A programmer who planted a logic bomb.
|
|||
|
- A technician who undermined sales efforts.
|
|||
|
- A technical writer who works on outside projects during
|
|||
|
throughout the day.
|
|||
|
- A system designer who resolves problems by erasing data.
|
|||
|
- A stockbroker who generates random buy/sell transactions
|
|||
|
to see how the market will react.
|
|||
|
|
|||
|
For more information see "Sabotage: They're Mad, They're Bad, They
|
|||
|
Just Don't Care. Workers Tell How They Use Computers to Strike
|
|||
|
Back". Pages 34-48
|
|||
|
|
|||
|
Price Waterhouse's Hackers For Hire
|
|||
|
===================================
|
|||
|
The Big Six accounting firm of Price Waterhouse is offering clients
|
|||
|
a "Security Penetration Study" in which former hackers and computer
|
|||
|
security experts will assess a systems security by attempting to
|
|||
|
break into it. Other services, such as employee awareness programs,
|
|||
|
are also offered.
|
|||
|
(Information Week. March 15, 1993. Page 8)
|
|||
|
|
|||
|
PC's and Households
|
|||
|
===================
|
|||
|
A Software Publishers Association (SPA) survey of 672 US households
|
|||
|
found that college graduates were twice as likely to have personal
|
|||
|
computers as non-graduates. Of the homes that had PC's, 56% boasted
|
|||
|
a household income in excess of $50,000. The survey also found that
|
|||
|
75% of home computers are MS-DOS based, with more than half of those
|
|||
|
being 386 or 486 machines. Respondents also admitted that 40% of
|
|||
|
their entertainment software had been copied from friends, work, or
|
|||
|
school.
|
|||
|
%Moderators' Note: We'd speculate that much more than 40% of business
|
|||
|
software used at home is copied from others.%
|
|||
|
(Information Week. March 15, 1993. Page 66)
|
|||
|
|
|||
|
AT&T Collects from Jiffy Lube
|
|||
|
=============================
|
|||
|
A US District Judge in Maryland has ruled that the automobile service
|
|||
|
company Jiffy Lube is responsible for fifty thousand dollars in
|
|||
|
unauthorized phone calls placed on its 800-number. Jiffy Lube had
|
|||
|
argued that it shouldn't be held liable for calls it did not authorize
|
|||
|
nor place, but the judge found that AT&T's tarrifs specify that
|
|||
|
customers are responsible for all calls.
|
|||
|
(Information Week. March 22, 1993. Page ??)
|
|||
|
|
|||
|
Piracy Down, Jobs Still Lost
|
|||
|
============================
|
|||
|
Windows Magazine (March 1993, pg 32) reports that although the SPA
|
|||
|
says business software piracy fell by 41% in 1992, it still represents
|
|||
|
a $1.2 Billion loss to the industry. That money is great than the
|
|||
|
cumulative revenue of 81 of the top 100 independent software developers.
|
|||
|
The SPA also estimates that stolen software cost 60,000 jobs in the
|
|||
|
industry.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 30 Mar 93 08:53 EST
|
|||
|
From: "Michael E. Marotta" <MERCURY@LCC.EDU>
|
|||
|
Subject: File 8--Comments on SJG Decision (GRID News)
|
|||
|
|
|||
|
GRID News. March 30, 1993.
|
|||
|
ISSN 1054-9315. vol 4 nu 2.
|
|||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
(74 lines) Reflections of an Author and Publisher
|
|||
|
on Judge Sam Sparks' Decision
|
|||
|
by Michael E. Marotta mercury@well.sf.ca.us
|
|||
|
|
|||
|
Grid News was launched in 1989. While Jolnet and PHRACK were
|
|||
|
being busted, I was a participant in the White House Conference on
|
|||
|
Library and Information Services. As a result of that bust, I
|
|||
|
applied for and received the ISSN designator from the Library of
|
|||
|
Congress. I wanted it perfectly clear that Grid News is a
|
|||
|
publication. (After its first volume, I obtained an ISSN for
|
|||
|
HERMES, a cybercast periodical for economic topics.)
|
|||
|
|
|||
|
What disturbs me about Judge Sparks's ruling are these words:
|
|||
|
|
|||
|
In any event, the Court declines to find from a
|
|||
|
preponderance of the evidence that on March 1, 1990,
|
|||
|
Agent Foley or any other employee or agent of the United
|
|||
|
States had reason to believe that property seized would
|
|||
|
be the work product materials of a person believed to
|
|||
|
have a purpose to disseminate to the public a newspaper,
|
|||
|
book, broadcast or other similar form of public
|
|||
|
communication.
|
|||
|
|
|||
|
Foley and Kluepfel were recognized by the court to be experts in
|
|||
|
computers. Yet, the court did not expect them to recognize a BBS
|
|||
|
as a "form of public communication." This is disturbing. Earlier
|
|||
|
this week, I received a file from Bitnic about the "Clinton-Gore
|
|||
|
Initiative." That we can link everyone in America to the same
|
|||
|
fiberoptic network and not have "public communication" is beyond
|
|||
|
reason.
|
|||
|
|
|||
|
I wrote a book about codes and ciphers (available from Loompanics,
|
|||
|
P. O. Box 1197, Port Townsend, WA 98368. $13.95 w/s&h). This
|
|||
|
week, I have the proceedings from Crypto 85 and Crypto 86 and I
|
|||
|
enjoyed reading Adleman's attack on Shamir's quadratics. However,
|
|||
|
these guys should be warned that merely attempting to break
|
|||
|
someone else's cipher is suspect in the eyes of the law.
|
|||
|
|
|||
|
Judge Sparks said: "Kluepfel had legitimate concerns, both about
|
|||
|
the 911 document stolen from Bell South and the possibility of a
|
|||
|
decryption system which could utilize passwords in rapid fashion
|
|||
|
and could result in intrusions of computer systems, including those
|
|||
|
of the Bell System." And later, he ruled: "If the Secret Service,
|
|||
|
in the performance of executing Court order, had only obtained and
|
|||
|
taken the 911 document or alleged decryption materials,
|
|||
|
application of the definitions of "documentary materials" and
|
|||
|
"work product materials" would logically result in no violation of
|
|||
|
the statute under the circumstances of this case."
|
|||
|
|
|||
|
It seems that merely attempting decryption can make you the target
|
|||
|
of a Secret Service bust. Someone better warn the SETI folks and
|
|||
|
maybe Dr. Lilly ... (:-)
|
|||
|
|
|||
|
The darkest shadow is cast by these words from the conclusion of
|
|||
|
the ruling: "It may well be, as the Government Defendants contend,
|
|||
|
these statutes relied upon by the Plaintiffs should not apply to
|
|||
|
the facts of this case, as these holdings may result in the
|
|||
|
government having great difficulties in obtaining information or
|
|||
|
computer documents representing illegal activities. But this Court
|
|||
|
cannot amend or rewrite the statutes involved. The Secret Service
|
|||
|
must go to the Congress for relief. Until that time, this Court
|
|||
|
recommends better education, investigation and strict compliance
|
|||
|
with the statutes as written."
|
|||
|
|
|||
|
I suggest that the Secret Service and the telcos will in fact
|
|||
|
devote their resources to lobbying Congress for tougher laws and
|
|||
|
will not spend much effort on education within their ranks.
|
|||
|
Caveat computor.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.25
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|