879 lines
42 KiB
Plaintext
879 lines
42 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Sun June 27 1993 Volume 5 : Issue 47
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Copy Editor: Etaoin Shrdlu, Seniur
|
|||
|
|
|||
|
CONTENTS, #5.47 (June 27 1993)
|
|||
|
File 1--Squelching the Rumor of the CuD ftp Sites
|
|||
|
File 2--Another Stupid Rumor Bites the Dust
|
|||
|
File 3--UPDATE #14-AB1624: bill-text as amended (*improved)*
|
|||
|
File 4--Re: Full Disclosure TRIGGERFISH Hassle (CuD 5.46)
|
|||
|
File 5--Response to Interview with a Virus Writer (CuD 5.44)
|
|||
|
File 6--Virus Hits White House
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|||
|
WHQ) 203-832-8441 NUP:Conspiracy
|
|||
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|||
|
nodes and points welcome.
|
|||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Sat, 26 June 1993 11:12:19 CDT
|
|||
|
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 1--Squelching the Rumor of the CuD ftp Sites
|
|||
|
|
|||
|
We have received a number of queries in the past few days regarding
|
|||
|
the future of the /cud directory and files on the CuD ftp site at
|
|||
|
ftp.eff.org. The rumors focused on three basic "facts:" 1) The EFF
|
|||
|
has removed all PHRACKS because of complaints from teleco and other
|
|||
|
corporations; 2) The /pub/cud directory will be removed because it
|
|||
|
does not coincide with the EFF mandate; 3) The EFF continues to sell
|
|||
|
out by distancing itself from its original constituency.
|
|||
|
|
|||
|
These RUMORS are FALSE!
|
|||
|
HERE ARE THE FACTS:
|
|||
|
|
|||
|
1) PHRACK will be removed for economic reasons. Mitch Kapor explains
|
|||
|
the drain on EFF's limited resources in the following post, but the
|
|||
|
bottom line is that the EFF pays $1,000 a month to make it available
|
|||
|
to the public.
|
|||
|
|
|||
|
2) The /pub/cud directory *WILL NOT* be removed. We try to place
|
|||
|
research articles, theses/dissertations, and other material there as
|
|||
|
we obtain them, and the E-'Zines and other documents provide an
|
|||
|
excellent resource for scholars, journalists, and students.
|
|||
|
|
|||
|
3) The EFF has not sold out. As soon as the rumors
|
|||
|
began flying in, John Perry Barlow and Mitch Kapor immediately wrote,
|
|||
|
expressing considerable concern over the unfounded rumors. Both
|
|||
|
recognize the value of the CuD and Comp-Academic-Freedom archives on
|
|||
|
the eff.org system, and providing public access to documents not
|
|||
|
readily available elsewhere is a continuation of the EFF goal of
|
|||
|
making on-line information available to the public. Removing PHRACKS
|
|||
|
is not a decision they made lightly, but reducing the costs by
|
|||
|
removing one 'Zine readily available elsewhere (it is our
|
|||
|
understanding the the CuD shadow sites will continue to carry them)
|
|||
|
simply assures that other, less-available documents will continue to
|
|||
|
be provided.
|
|||
|
|
|||
|
There are a few points to keep in mind on this issue:
|
|||
|
|
|||
|
1) The EFF is under no obligation to provide an ftp site for CuD.
|
|||
|
They do it because they feel it provides a number of different points
|
|||
|
of view on cyberspace issues. As Mitch points out below, the files in
|
|||
|
the /pub/cud directory impose a significant usage burden on the site
|
|||
|
and this burden is not free. In a sense, the EFF is paying to provide
|
|||
|
net-folk with a service that is unavailable elsewhere.
|
|||
|
|
|||
|
Perhaps we have all been taking EFF's donation of its system for
|
|||
|
public ftp services for granted. While not a highly visible
|
|||
|
activity, it nonetheless remains a critically important one.
|
|||
|
Now is the time to thank them for their generosity. The CuD
|
|||
|
editors receive numerous compliments from those who have found the
|
|||
|
files in the cud/pub directory useful. It is EFF, as well as the
|
|||
|
shadow sites (and, of course, the Brendan Kehoe and the other
|
|||
|
archmeisters listed in the CuD masthead) who deserve the credit.
|
|||
|
The generosity of those who provide the space and those who fill it
|
|||
|
and keep it well-maintained make the nets a friendlier and more
|
|||
|
productive space.
|
|||
|
|
|||
|
We also appreciate the support of those who wrote expressing
|
|||
|
support in case the rumors were true. All of us, from Mitch and
|
|||
|
John to the archmeisters and CuD editors are involved in enhancing
|
|||
|
information flow out of a sense of voluntaristic service, and the
|
|||
|
occasional expressions of support are about the only compensation
|
|||
|
we receive.
|
|||
|
|
|||
|
We can more tangibly support the archives by supporting EFF. The most
|
|||
|
obvious way to support them is to join at the relatively low cost of
|
|||
|
$20 a year for students or low income, or $40 for regular membership.
|
|||
|
In addition to the EFF newsletter, EFF members occasionally receive
|
|||
|
"surprises," such as the first issue of Wired and other goodies.
|
|||
|
Joining is one way of thanking them for offering their system for an
|
|||
|
extensive ftp archive for a growing body of documents. So, if you use
|
|||
|
the ftp site, consider sending a few bucks. Whether you agree with all
|
|||
|
of their policies or not, we're certain that there is little
|
|||
|
disagreement that it's not fair that they provide us all with a
|
|||
|
valuable service while we simply leech from it.
|
|||
|
|
|||
|
You can send your sub to:
|
|||
|
|
|||
|
Electronic Frontier Foundation
|
|||
|
1001 G Street, N.W.
|
|||
|
Suite 950 East
|
|||
|
Washington, DC 20001
|
|||
|
202/347-5400 voice
|
|||
|
202/393-5509 fax
|
|||
|
|
|||
|
EFF's e-mail address is: eff@eff.org
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 26 Jun 1993 10:17:51 -0600
|
|||
|
From: mkapor@KEI.COM(Mitchell Kapor)
|
|||
|
Subject: File 2--Another Stupid Rumor Bites the Dust
|
|||
|
|
|||
|
We have never contemplated removing CuD from the EFF ftp archive. We
|
|||
|
have believed and continue to believe it is important to let all
|
|||
|
voices be heard and we are happy to do what we can. It astounds me
|
|||
|
and saddens me the extent to which unfounded rumor propagates on the
|
|||
|
net. People need to have a little more faith, and, oh, maybe, ask us
|
|||
|
what we're doing before jumping off in paranoid fantasies of EFF
|
|||
|
selling-out.
|
|||
|
|
|||
|
Here are the facts. EFF's carriage of Phrack, not CuD, was costing us
|
|||
|
$1,000 per month in additional transmission charges. After an internal
|
|||
|
review, we decided we could not justify absorbing this rather
|
|||
|
substantial expense for a single publication. Monthly downloads of
|
|||
|
Phrack constituted 2 gigabytes or more. We have communicated with the
|
|||
|
editor of Phrack who has accepted our decision and has arranged for an
|
|||
|
alternate site.
|
|||
|
|
|||
|
An analysis of the past year of traffic on eff.org revealed an
|
|||
|
interesting pattern. Roughly 40% of the total byte flow was due to a
|
|||
|
single publication -- Phrack. Another 40% was due to all other FTP
|
|||
|
traffic from CuD and other publications. The remaining 20% included
|
|||
|
all of our email, FTP from the EFF archive, USEET, etc.
|
|||
|
|
|||
|
EFF contracted with UUNET to provide what is called low-volume T-1
|
|||
|
service. That is, our instantaneous bandwidth to the net is a T-1,
|
|||
|
which enables fast through-put, but the $1,000 per month we pay is
|
|||
|
only intended to give us an average bandwidth of 128 kilobits. UUNET
|
|||
|
measures the 5 minute average load in every segment and sends
|
|||
|
statistics to its customers. Because of the growth of traffic over
|
|||
|
the past year, EFF has been running at as much as twice our
|
|||
|
contractual limit. UUNET has been billing us a surcharge of another
|
|||
|
$1,000 per month and was about to permanently convert us to a full
|
|||
|
T-1 customer at $2,000 per month. We felt we couldn't justify this
|
|||
|
expense, as the $12,000 per year could pay for nearly half of a
|
|||
|
full-time staff member, for instance.
|
|||
|
|
|||
|
The solution we chose was to make a decision that we will stop
|
|||
|
carrying Phrack in the near future. This will enable us to continue
|
|||
|
to provide all the rest of the services on our server for a good long
|
|||
|
time without causing us more in the way of expenses.
|
|||
|
|
|||
|
People tend to think of FTP as a "free good". It isn't. Both storage
|
|||
|
and transmission cost money. Maybe it's time Phrack started charging?
|
|||
|
|
|||
|
Mitch Kapor
|
|||
|
Chairman, EFF
|
|||
|
Mitchell Kapor, Electronic Frontier Foundation
|
|||
|
Note permanent new email address for all correspondence as of 6/1/93
|
|||
|
mkapor@kei.com
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 26 Jun 1993 09:04:46 -0700
|
|||
|
From: Jim Warren <jwarren@WELL.SF.CA.US>
|
|||
|
Subject: File 3--UPDATE #14-AB1624: bill-text as amended (*improved)*
|
|||
|
|
|||
|
((MODERATORS' NOTE: Through the efforts of Jim Warren, and others,
|
|||
|
California is coming very close to passing a bill that would provide
|
|||
|
on-line access to computerized public records. This is a crucial bill
|
|||
|
and has national implications. It's passage could provide the stimulus
|
|||
|
for other states and provide the public with greater access to crucial
|
|||
|
legislative and other information. See back issues of CuD for the
|
|||
|
history of the bill)).
|
|||
|
|
|||
|
June 25, 1993
|
|||
|
|
|||
|
This summarizes the latest set of amendments to AB1624 that were done
|
|||
|
by bill-author Debra Bowen on June 17th, and - thanks to Ray of Apple
|
|||
|
- includes the complete bill-text, as amended.
|
|||
|
|
|||
|
NEW VERSION HAS SIGNIFICANT IMPROVEMENTS
|
|||
|
|
|||
|
1. It removes the permission and fee requirements that had been
|
|||
|
placed on anyone who charged anything to "republish or otherwise
|
|||
|
duplicate" the [electronic-only] public records - a requirement
|
|||
|
demanded by John Burton (who, incidentally, may kill the bill when it
|
|||
|
returns to the Assembly for concurrence - unless we can change
|
|||
|
Burton's mind; yes, he has that much clout).
|
|||
|
|
|||
|
2. It [generically] specifies that the files are to be available
|
|||
|
via the Internet - as opposed to leaving open the option for the state
|
|||
|
to create its own, closed network (e.g., as Hawaii has done).
|
|||
|
|
|||
|
3. It makes explicit that the Legislative Counsel cannot limit how
|
|||
|
many files someone can request, and that there will be no monitoring
|
|||
|
or reporting of who is interested in what files except as it might
|
|||
|
explicitly pertain to computer operations (i.e., normal sysop
|
|||
|
operations monitoring).
|
|||
|
|
|||
|
4. It makes explicit that no fees or other charges can be imposed
|
|||
|
for this public access to public records - since it will cost the
|
|||
|
state perhaps $200/month to provide free access throughout the entire
|
|||
|
state (and globe).
|
|||
|
|
|||
|
5. It makes explicit that the *complete* print-files will be
|
|||
|
available, as opposed to the possibility of only having some
|
|||
|
dumbed-down, limited version of the data from which page- and
|
|||
|
line-numbers could not be recalculated - though there's no prohibition
|
|||
|
on them *also* offering ASCII-dumbed versions in *addition* to the
|
|||
|
full data-files.
|
|||
|
|
|||
|
6. It specifies that the data is to be made available to the public
|
|||
|
*immediately* after being sent to the printing plant - which is
|
|||
|
*after* it has become public record - instead of waiting until it is
|
|||
|
available on the Legislative Inquiry System. (That turns out to
|
|||
|
sometimes be days or even weeks after some of the AB1624-mandated
|
|||
|
records are public.)
|
|||
|
|
|||
|
7. It assures that older versions of bills will remain available
|
|||
|
from the Legislature's file-server for at least 90 days they are
|
|||
|
amended.
|
|||
|
|
|||
|
8. And, it makes documentation of their data formats available
|
|||
|
online, uh, IF it's available in computerized form at all - a question
|
|||
|
to which I have been unable to obtain an answer.
|
|||
|
|
|||
|
++++++++++
|
|||
|
|
|||
|
THE NEW BILL-TEXT, AS AMENDED 6/17 [THERE WILL BE MORE AMENDMENTS, LATER]
|
|||
|
From apple!ganymede.apple.com!ray Tue Jun 22 00:13:07 1993
|
|||
|
Subject--AB1624 - newly amended text
|
|||
|
|
|||
|
hello jim -
|
|||
|
|
|||
|
i just got the new text for AB1624 from Mary today and typed it in.
|
|||
|
I posted it around (alt.etext, ca.politics, comp.society.cu-digest),
|
|||
|
but if you could put it on an ftp server i would be grateful.
|
|||
|
...
|
|||
|
|
|||
|
AMENDED IN SENATE JUNE 17, 1993
|
|||
|
AMENDED IN ASSEMBLY MAY 18, 1993
|
|||
|
CALIFORNIA LEGISLATURE--1993-94 REGULAR SESSION
|
|||
|
|
|||
|
ASSEMBLY BILL No. 1624
|
|||
|
|
|||
|
Introduced by Assembly Member Bowen
|
|||
|
Principal coauthor: Senator Torres)
|
|||
|
Coauthors: Assembly Members Areias, Bornstein,
|
|||
|
Goldsmith, Isenberg, Johnson, Karnette, Katz
|
|||
|
Mountjoy, Nolan, Polanco, Speier, and
|
|||
|
Vasconcellos
|
|||
|
Coauthors: Senators Dills, Hayden, Killea, Morgan, and
|
|||
|
Rosenthal
|
|||
|
|
|||
|
March 4, 1993
|
|||
|
|
|||
|
An act to add Section 10248 to the Government Code,
|
|||
|
relating to the Legislature;
|
|||
|
|
|||
|
LEGISLATIVE COUNSEL'S DIGEST
|
|||
|
|
|||
|
AB 1624, as amended, Bowen. Legislature: legislative
|
|||
|
information: access by computer network.
|
|||
|
Under existing law, all meetings of a house of the Legislature
|
|||
|
or a committee thereof are required to be open and public, unless
|
|||
|
specifically exempted, and any meeting that is required to be open
|
|||
|
and public, including specified closed sessions, may be held only
|
|||
|
after full and timely notice to the public as provided by the
|
|||
|
Joint Rules of the Assembly and Senate.
|
|||
|
This bill would make legislative findings and declarations that
|
|||
|
the public should be informed to the fullest extent possible as to
|
|||
|
the time, place, and agenda for each meeting.
|
|||
|
This bill would require the Legislative Counsel, with the advice
|
|||
|
of the Joint Rules Committee of the Senate and Assembly, to make
|
|||
|
available to the public, by means of access by way of the largest
|
|||
|
nonproprietary, nonprofit cooperative public computer network,
|
|||
|
specified information concerning bills, the proceedings of the
|
|||
|
houses and committees of the Legislature, statutory enactments,
|
|||
|
and the California Constitution.
|
|||
|
Vote: 2/3 majority. Appropriation: no. Fiscal committee: yes.
|
|||
|
State-mandated local program: no.
|
|||
|
|
|||
|
The people of the State of California do enact as follows:
|
|||
|
|
|||
|
1 SECTION 1. Section 10248 is added to the
|
|||
|
2 Government Code, to read:
|
|||
|
3 10248. (a) The Legislature finds and declares that
|
|||
|
4 the public should be informed to the fullest extent
|
|||
|
5 possible as to the time, place, and agenda for each
|
|||
|
6 meeting of the houses and committees of the Legislature.
|
|||
|
7 The Legislature further finds and declares that it is
|
|||
|
8 desirable to make timely information regarding these
|
|||
|
9 proceedings available to each member of the public,
|
|||
|
10 irrespective of where he or she resides, for the least cost
|
|||
|
11 possible.
|
|||
|
12 (b) The Legislative Counsel shall, with the advice of
|
|||
|
13 the Joint Rules Committee, make all of the following
|
|||
|
14 information available to the public in electronic form:
|
|||
|
15 (1) The most recent Assembly Daily File and most
|
|||
|
16 recent Daily Senate File.
|
|||
|
17 (2) The text of each bill introduced in each current
|
|||
|
18 legislative session, including all amended forms of the
|
|||
|
19 bill.
|
|||
|
20 (3) The bill history of each bill introduced and
|
|||
|
21 amended in each current legislative session.
|
|||
|
22 (4) The bill status of each bill introduced and
|
|||
|
1 amended in each current legislative session.
|
|||
|
2 (5) All bill analyses prepared in connection with each
|
|||
|
3 bill in each current legislative session.
|
|||
|
4 (6) All vote information concerning each bill in each
|
|||
|
5 current legislative session.
|
|||
|
6 (7) Veto messages concerning each bill, when issued,
|
|||
|
7 in each current legislative session.
|
|||
|
8 (8) The California Codes.
|
|||
|
9 (9) The California Constitution.
|
|||
|
10 (10) All uncodified statutes enacted on or after
|
|||
|
11 January 1, 1993.
|
|||
|
35 (11) Documentation that is available to the public and
|
|||
|
36 maintained in computerized form by the Legislative
|
|||
|
37 Counsel which describes the computerized digital
|
|||
|
38 formats of the files containing the information specified
|
|||
|
39 in this subdivision.
|
|||
|
40 (c) The Legislative Counsel shall automatically
|
|||
|
1 transmit copies of files of the information specified in
|
|||
|
2 subdivision (b) by way of the largest nonproprietary,
|
|||
|
3 nonprofit cooperative public computer network upon
|
|||
|
4 receiving any computerized request for the files. These
|
|||
|
5 files shall be made available in this manner immediately
|
|||
|
6 after they are transmitted to the Office of State Printing.
|
|||
|
7 The files shall contain all of the text and formatting
|
|||
|
8 information transmitted to the Office of State Printing. In
|
|||
|
9 the event that a technical malfunction prevents these
|
|||
|
10 files from being transmitted immediately after they are
|
|||
|
11 transmitted to the Office of State Printing, the
|
|||
|
12 Legislative Counsel shall report that fact to the Joint
|
|||
|
13 Rules Committee within one business day.
|
|||
|
14 (d) Any file that is available pursuant to subdivision
|
|||
|
15 (c) shall remain available to the public upon request by
|
|||
|
16 electronic digital data transmission until it is updated.
|
|||
|
17 When a file is updated, a copy of the file without the
|
|||
|
18 updated information shall remain available to the public
|
|||
|
19 by electronic data digital transmission for at least 90 days
|
|||
|
20 after the update.
|
|||
|
21 (e) The Legislative Counsel may not control which or
|
|||
|
22 how many files are available to a person who requests the
|
|||
|
23 files nor monitor or keep any records about those persons
|
|||
|
24 who request files, except for the purpose of assuring the
|
|||
|
25 quality of computer operations. No fee or other charge
|
|||
|
26 shall be imposed as a condition to public access to any files
|
|||
|
27 that are made available to the public pursuant to this
|
|||
|
28 section.
|
|||
|
29 (f) No action taken pursuant to this section shall be
|
|||
|
30 deemed to alter or relinquish any copyright or other
|
|||
|
31 proprietary interest or entitlement of the State of
|
|||
|
32 California relating to any of the information made
|
|||
|
33 available pursuant to this section.
|
|||
|
|
|||
|
=========
|
|||
|
Ray -
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 24 Jun 93 12:49:49 -0700
|
|||
|
From: Phil Karn <karn@UNIX.KA9Q.AMPR.ORG>
|
|||
|
Subject: File 4--Re: Full Disclosure TRIGGERFISH Hassle (CuD 5.46)
|
|||
|
|
|||
|
In CU Digest 5.46:
|
|||
|
|> Harris Law Enforcement Products
|
|||
|
|>
|
|||
|
|> TRIGGERFISH has a number of cellular phone based applications:
|
|||
|
|> determining a suspects phone number, dialed number recorder, and
|
|||
|
|> wiretapping. According to Harris, 'for the first time, law
|
|||
|
|> enforcement is not at a disadvantage in tracking the high-tech
|
|||
|
|> criminal." Additionally, the unit 'collects and integrates all
|
|||
|
|> relevant data, including voice, directly from the ether."
|
|||
|
|
|||
|
|> Reprinted from Full Disclosure, Box 903, Libertyville, Illinois 60048
|
|||
|
|
|||
|
I find the phrase "directly from the ether" *most* illuminating given
|
|||
|
a rather heated exchange I had with Mr. Jim Kallstrom of the FBI at
|
|||
|
the recent CPSR Cryptography Conference in Washington DC earlier this
|
|||
|
month.
|
|||
|
|
|||
|
Kallstrom is the FBI's chief public advocate for their "Digital
|
|||
|
Telephony Initiative". Among other things, they want the ability to
|
|||
|
intercept suspects' cellular telephone calls at the MTSO (switch).
|
|||
|
Only with a valid warrant, naturally.
|
|||
|
|
|||
|
At the meeting, I made the following comments. I had seen the
|
|||
|
standards-setting process for the new digital cellular telephone
|
|||
|
systems from the inside as they related to security and privacy. And I
|
|||
|
was wondering why the government (specifically NSA, through its export
|
|||
|
control reviews) was so strongly opposed to meaningful air link
|
|||
|
encryption, even if the encryption were to stop at the switch as it
|
|||
|
would have to in order to be compatible with existing telephones on
|
|||
|
the land side of a cellular call. Such encryption would secure the air
|
|||
|
link, the most easily intercepted portion of a cellular telephone
|
|||
|
call, while leaving the conversation in the clear at the MTSO where it
|
|||
|
could be tapped, if necessary.
|
|||
|
|
|||
|
In a private conversation, one of the senior members of the committee
|
|||
|
who didn't want his name mentioned told me why. "It's very simple", he
|
|||
|
said. "Anybody can intercept the radio link. It's easy. But tapping a
|
|||
|
call at the switch requires the cooperation of the telephone company,
|
|||
|
and they generally require warrants. And law enforcement says that
|
|||
|
sometimes, warrants are, well, just too damn inconvenient."
|
|||
|
|
|||
|
This really set Kallstrom off. He attacked my unwillingness to name my
|
|||
|
source. I challenged him, unsuccessfully, to back up *his* shrill
|
|||
|
claims for the absolute necessity of Digital Telephony with anything
|
|||
|
more than handwaving. In a one-on-one conversation during a break, he
|
|||
|
insisted to me that the FBI was never interested in intercepting the
|
|||
|
air link portion of cellular calls - "too difficult, too
|
|||
|
labor-intensive", he said. They only wanted the capability to tap in
|
|||
|
at the switch, and he couldn't care less if the air link were securely
|
|||
|
encrypted (though he still wanted the keys to be escrowed for some
|
|||
|
reason...hmmm...)
|
|||
|
|
|||
|
Perhaps it was a desperate attempt to maintain this "we're not
|
|||
|
interested in the air link" fiction that triggered Harris's silly
|
|||
|
overreaction to the public mention of TRIGGERFISH.
|
|||
|
|
|||
|
Phil
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 18 Jun 93 08:45:52 EDT
|
|||
|
From: morgan@ENGR.UKY.EDU(Wes Morgan)
|
|||
|
Subject: File 5--Response to Interview with a Virus Writer (CuD 5.44)
|
|||
|
|
|||
|
Re: CuD 5.44 - Interview with a Virus Writer
|
|||
|
|
|||
|
>We're certainly interested in your reactions, pro and con. Did you get
|
|||
|
>hit by a virus that was more than a minor inconvenience?
|
|||
|
|
|||
|
Yup; our students are hit by viruses on a regular basis. Just last
|
|||
|
week, a student lost 3 months' work in a virus attack from a friend's
|
|||
|
home system. Personally, I'm not hit that often; of course, I burn up
|
|||
|
time scanning every time I boot my system, and I scan *every* floppy that
|
|||
|
goes into my PC...not everyone has the time/resources to do that, and PC
|
|||
|
networks (StarLAN, Novell, etc) make it extremely simple to spread viruses.
|
|||
|
|
|||
|
>GA: Do you want to mention that you are running a BBS (computer
|
|||
|
>bulletin board)?
|
|||
|
>
|
|||
|
>UK: Yeah, sure. Call anytime. It exists for people to come and get the
|
|||
|
>Crypt Newsletter if they are interested in finding it without going
|
|||
|
>through the usual hassles of underground channels like the cool, elite
|
|||
|
>bulletin board systems. The underground world has become very
|
|||
|
>exclusive. In a sense it is cliquey..........
|
|||
|
|
|||
|
Gee, why isn't his newsletter distributed more widely? If it's all
|
|||
|
so innocent, I should be able to subscribe via email, right? Are back
|
|||
|
issues available via ftp? How about an email server?
|
|||
|
|
|||
|
>GA: Aren't they all written in programming languages?
|
|||
|
>
|
|||
|
>UK: Assembly mostly. By far most viruses are written in assembly
|
|||
|
>language.
|
|||
|
|
|||
|
Did this strike anyone else as a rather silly question? Unless
|
|||
|
someone's hacking with DEBUG, they *have* to write in a "program-
|
|||
|
ming language"........
|
|||
|
|
|||
|
>GA: So how many viruses have you made and which ones are they?
|
|||
|
>
|
|||
|
>UK: I don't know all of them. Well, there was the Encroacher. That was
|
|||
|
>in one of the Newsletters. That was a Mutation virus that attacks
|
|||
|
>Central Point Software's anti-virus program. There might have been
|
|||
|
>three variants to that.
|
|||
|
|
|||
|
This guy writes a virus that attacks a specific commercial product,
|
|||
|
and he still has the chutzpah to claim innocence for viruses? Pfui.
|
|||
|
|
|||
|
>GA: What's so exciting about viruses and source codes?
|
|||
|
>
|
|||
|
>UK: [...]
|
|||
|
>I don't think there's a
|
|||
|
>lot of mystery associated with viruses. Viruses, in my opinion, are
|
|||
|
>rather trivial programs that, once you're thoroughly cognizant of what
|
|||
|
>a virus can and can't do, become more like a pest if you ever run into
|
|||
|
>one.
|
|||
|
|
|||
|
Viruses are "trivial," but this fellow keeps cranking them out?
|
|||
|
Sounds like doublespeak to me.....8)
|
|||
|
|
|||
|
>People think it's a major catastrophe when they are
|
|||
|
>hit by a virus. I do not take seriously claims of people being set
|
|||
|
>back for hours. If they are completely ignorant of a virus, yes. But
|
|||
|
>someone in the department or in the household knows about viruses.
|
|||
|
|
|||
|
No, "someone in the department or in the household" does NOT necessarily
|
|||
|
"know about viruses." College and universities are loaded with students
|
|||
|
who, in many cases, never used a PC before their arrival.
|
|||
|
|
|||
|
>GA: That's becoming very interesting to me.
|
|||
|
>
|
|||
|
>UK: Politically incorrect terms. There's always been a great deal of
|
|||
|
>controversy surrounding this. And so for this reason alone, viruses to
|
|||
|
>me are interesting. For example, on Prodigy it is okay for dozens of
|
|||
|
>people to advertise adult bulletin boards, with gigs of pornographic
|
|||
|
>files available for download. These are not expunged from the Prodigy
|
|||
|
>computer club as inappropriate. However, if anyone posted a note on
|
|||
|
>Prodigy saying they want to find a virus, can someone help them locate
|
|||
|
>a virus, that is immediately spiked. Why is that? I'm not sure. But
|
|||
|
>it's interesting.
|
|||
|
|
|||
|
It sounds like this guy gets a charge out of being a gadfly.
|
|||
|
|
|||
|
>UK: Well, I enjoy publishing the Crypt Newsletter. [...]
|
|||
|
>You want to see if you can top yourself and make it more interesting.
|
|||
|
|
|||
|
I believe that this is the crux of the matter. Most virus authors
|
|||
|
seem to look at viruses as a competition. Just pick up a virus family
|
|||
|
tree and check out the derivations; everyone's trying to top everyone
|
|||
|
else, and none of them care about the damage/lost time they cause.
|
|||
|
|
|||
|
>UK: And, so, why is that interesting? Well, he explains why viruses
|
|||
|
>are interesting for a number of reasons. Part of it because of the
|
|||
|
>controversy that the concepts brings up. In a way, I think studying
|
|||
|
>viruses gives you a good understanding of the computer on a really low
|
|||
|
>level basis, and that's worthwhile. For some people that makes the
|
|||
|
>computer much more enjoyable as they start to unlock some of its
|
|||
|
>secrets or understand what is actually going on inside it a little
|
|||
|
>better. Viruses are kind of an indirect way of getting at that
|
|||
|
>information.
|
|||
|
|
|||
|
I'll be the first to agree that viruses are educational in some
|
|||
|
respects; you can certainly pick up a lot of low-level information
|
|||
|
during the programming cycle. My point is (and has always been) that
|
|||
|
release of viruses into the world is completely unnecessary. If you
|
|||
|
were really taking a scholastic bent, you'd never release a live
|
|||
|
virus; you'd write one, test it, say "it works," put it in your logs,
|
|||
|
and move on......
|
|||
|
|
|||
|
>UK: You don't need anti-virus software to get rid of something like
|
|||
|
>Michelangelo or Stoned. You can do it with undocumented commands. If
|
|||
|
>you've talked to someone who does know something about viruses, and
|
|||
|
>you didn't have anti-virus software, you could use that and dispatch
|
|||
|
>something like Michelangelo and Stoned rather quickly.
|
|||
|
|
|||
|
Yeah, we can really expect our secretaries, clerks, and data entry
|
|||
|
operators to be conversant with all those undocumented commands and
|
|||
|
virus scanners.
|
|||
|
|
|||
|
>GA: So you think the reports about problems in other countries are
|
|||
|
>over exaggerated?
|
|||
|
>
|
|||
|
>UK: Well, there's an article which analyzes the media coverage of
|
|||
|
>Michelangelo and I think that really puts it into perspective. It
|
|||
|
>really shows the people that tried to actually come up with hard data
|
|||
|
>after March 6. They just weren't able to come up with anything that I
|
|||
|
>consider serious data.
|
|||
|
|
|||
|
The only reason that our labs weren't hit was that we went on a massive
|
|||
|
eradication mission; we made scanning automatic, and we found several
|
|||
|
hundred infections in the week prior to the target date.
|
|||
|
|
|||
|
>Actually, it is more annoying. It is a
|
|||
|
>boot sector infector like Michelangelo but once you discover it, you
|
|||
|
>usually don't have much time left before it activates. It has a very
|
|||
|
>short activation period after it has been first placed on a disk and
|
|||
|
>then it encrypts the information on a disk which essentially makes it
|
|||
|
>useless to you. So he removed it, but it wasn't Michelangelo, he had a
|
|||
|
>different virus. So where were all the Michelangelo infections? Were
|
|||
|
>there any? I think it was vastly overstated.
|
|||
|
|
|||
|
Of course, this "different virus" doesn't really jibe with UK's earlier
|
|||
|
comment of "I do not take seriously claims of people being set back for
|
|||
|
hours."
|
|||
|
|
|||
|
>UK: No, I think colleges are still pretty vulnerable, don't you? They
|
|||
|
>are always going to have computer labs, where people can bring stuff
|
|||
|
>in indiscriminately. That really hasn't changed and maybe it has
|
|||
|
>moved a little more to the individuals because computers have moved
|
|||
|
>more into the homes of individuals.
|
|||
|
|
|||
|
This guy is talking through his hat. He follows comments about
|
|||
|
the "trivial" nature of viruses with analyses of "vulnerability."
|
|||
|
The comments that "only a few viruses are truly bad" are ludicrous.
|
|||
|
This fellow sounds like every other virus author I've read; he
|
|||
|
comes across with the attitude of "you should be watching out for
|
|||
|
this stuff anyway; it doesn't matter what I do." This strikes me
|
|||
|
as the height of irresponsibility (and immaturity).
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 24 Jun 93 03:37:40 -0400
|
|||
|
From: ci330@CLEVELAND.FREENET.EDU(Jack McNeeley)
|
|||
|
Subject: File 6--Virus Hits White House
|
|||
|
|
|||
|
((MODERATORS' NOTE: The following was excerpted from a longer
|
|||
|
article from The Washington Post)).
|
|||
|
|
|||
|
The following article moved on the Washington Post news wire
|
|||
|
March 13. I confess that I expected some other CuD reader to go to
|
|||
|
the trouble of passing the thing along, with enough comment and
|
|||
|
criticism to pass muster with the fair-use copyright gods, so I
|
|||
|
neglected to toss the thing your way.
|
|||
|
|
|||
|
Since no one else has done so, and since the on-line shriek
|
|||
|
community has inexplicably let George Bush's vandalism of the White
|
|||
|
House computers pass virtually unnoticed, I must submit the following
|
|||
|
for your perusal. Readers who want the complete article will have to
|
|||
|
visit their local (paper) library, armed with a dime to plug into the
|
|||
|
photocopying machine, so that the Post's copyright may be properly
|
|||
|
violated. Those of you with a social conscience will send some spare
|
|||
|
change to Katy Graham to buy a legal copy of the newspaper.
|
|||
|
|
|||
|
11th-Hour Covenant: Lost Memory Computers to Gain for Bush
|
|||
|
By George Lardner Jr.
|
|||
|
(c) 1993, The Washington Post
|
|||
|
|
|||
|
WASHINGTON -- When President Clinton's top aides moved
|
|||
|
into the White House in January, many of them had trouble
|
|||
|
getting their computers to work.
|
|||
|
|
|||
|
That's because during the night of Jan. 19 and into the
|
|||
|
next morning -- President Bush's last hours in office --
|
|||
|
officials wiped out the computerized memory of the White House
|
|||
|
machines.
|
|||
|
|
|||
|
The hurried operation was made possible only by an
|
|||
|
agreement signed close to midnight by the archivist of the
|
|||
|
United States, Don W. Wilson. The ensuing controversy has
|
|||
|
added to allegations that the archives, beset for years by
|
|||
|
political pressures and slim resources, is prone to
|
|||
|
mismanagement and ineptitude in its mission of preserving for
|
|||
|
the public the nation's documentary history.
|
|||
|
|
|||
|
It also has raised strong doubts about the efficacy of a
|
|||
|
15-year-old law that says a former president's records belong
|
|||
|
to the people.
|
|||
|
|
|||
|
Just what information was purged remains unknown, but it
|
|||
|
probably ranged from reports on the situation in
|
|||
|
Bosnia-Herzegovina to details about Bush's Iran-Contra pardons
|
|||
|
to evidence concerning the pre-election search of Clinton's
|
|||
|
passport files. In the warrens of the secretive National
|
|||
|
Security Council, only a month's worth of foreign cable
|
|||
|
traffic was retained to help enlighten the incoming
|
|||
|
administration.
|
|||
|
|
|||
|
[At this point we must pause for fair-use commentary: It's
|
|||
|
obvious from merely the first five paragraphs of this article that a
|
|||
|
crime of historic proportions has been committed. If some
|
|||
|
cyber-rambling teenager had wiped the hard disks of the White House
|
|||
|
computers, you can bet that legions of doomed SS agents would spare no
|
|||
|
expense to run the scoundrel to ground. The article continues:]
|
|||
|
|
|||
|
Bush and his lawyers had wanted to leave no trace of the
|
|||
|
electronic files, arguing they were part of an internal
|
|||
|
communications system, not a records system. But court orders
|
|||
|
issued a few days earlier required that the information be
|
|||
|
preserved if removed from the White House.
|
|||
|
|
|||
|
So backup tapes were made of the data on mainframe
|
|||
|
computers and carted off to the National Archives by a special
|
|||
|
task force. Hard disk drives were plucked out of personal
|
|||
|
computers and loosely stacked into boxes for the trip. Despite
|
|||
|
such measures, there are indications some material may have
|
|||
|
been lost.
|
|||
|
|
|||
|
[Indications? Tell me more, tell me more! As in "General
|
|||
|
Failure Reading Drive C: (A)bort (R)etry (I)gnore"? Oh, I get it:
|
|||
|
Somebody must have accidentally entered "wipefile *.*".
|
|||
|
[The article continues:]
|
|||
|
|
|||
|
The transfer had been authorized by Wilson, who at 11:30
|
|||
|
p.m. on Jan. 19 put his signature on what would prove to be a
|
|||
|
highly controversial "memorandum of agreement.' It gave Bush
|
|||
|
"exclusive legal control' over the computerized records of his
|
|||
|
presidency as well as "all derivative information.'
|
|||
|
|
|||
|
Critics have denounced Wilson's agreement with Bush as a
|
|||
|
clear violation of a post-Watergate law that made presidential
|
|||
|
records public property. And they fear that the authority
|
|||
|
granted Bush is far broader than officials so far have
|
|||
|
acknowledged.
|
|||
|
|
|||
|
For their part, archives officials say they did the best
|
|||
|
they could under difficult circumstances and contend they
|
|||
|
deserve some credit for getting physical custody of the
|
|||
|
electronic material. Chided days later about the broad scope
|
|||
|
of the agreement in a meeting with outside historians, Wilson
|
|||
|
protested that they just did not appreciate "the political
|
|||
|
environment in which I was operating.'
|
|||
|
|
|||
|
On Feb. 12, Wilson compounded his difficulties by
|
|||
|
announcing he was taking a $129,000-a-year job as executive
|
|||
|
director of the George Bush Center for Presidential Studies at
|
|||
|
Texas A&M University. The Justice Department has said it is
|
|||
|
considering a criminal investigation of a possible conflict of
|
|||
|
interest by Wilson.
|
|||
|
|
|||
|
[Now, that is rich. Not even in Texas could you get this kind of
|
|||
|
nonsense past a grand jury.
|
|||
|
|
|||
|
[The article goes on to say that the archivist agreed with Bush's
|
|||
|
claim that the electronic materials were not records but were internal
|
|||
|
communications. However, the article says, a federal judge had
|
|||
|
already rejected that claim.
|
|||
|
|
|||
|
[Specifically, the article says, U.S. District Judge Charles
|
|||
|
Richey had ruled on Jan. 6, in a case brought at the end of the Reagan
|
|||
|
administration, that information in the White House computer systems
|
|||
|
not only "fit into an everyday understanding' of what a record is,
|
|||
|
but also met the statutory definition in the Federal Records Act. The
|
|||
|
article continues:]
|
|||
|
|
|||
|
Richey said he was worried that the [Bush] administration
|
|||
|
was about to destroy information "of tremendous historical
|
|||
|
value.' He also said that making paper copies of the
|
|||
|
electronic data would not be sufficient, because the paper
|
|||
|
copies would not necessarily show who had received the
|
|||
|
information and when.
|
|||
|
|
|||
|
"The question of what government officials knew and when
|
|||
|
they knew it has been a key question in not only the
|
|||
|
Iran-Contra investigations, but also in the Watergate matter,"
|
|||
|
Richey observed.
|
|||
|
|
|||
|
The judge ordered the defendants, including Wilson and the
|
|||
|
Bush White House, not to delete or alter any of the electronic
|
|||
|
records systems until archivists could preserve the material
|
|||
|
protected by the Federal Records Act.
|
|||
|
|
|||
|
Richey's Jan. 6 order obliged the archives to make sure
|
|||
|
that the "federal' or "agency' records on White House
|
|||
|
computers were preserved, even though they might be commingled
|
|||
|
with "presidential records.' Figuring out the difference is a
|
|||
|
chore affecting primarily NSC computer files.
|
|||
|
|
|||
|
[At this point the article explains that a memo written by the
|
|||
|
national security director to the president would be a presidential
|
|||
|
record, and not disclosable, but that if the president signs it and
|
|||
|
sends it to the Pentagon for implementation, then it is a federal
|
|||
|
record and is disclosable.
|
|||
|
[The article then says:]
|
|||
|
|
|||
|
According to records churned up by the lawsuit, Richey's
|
|||
|
Jan. 6 order precipitated numerous meetings of archives
|
|||
|
officials, often with Justice Department and White House
|
|||
|
representatives. Government lawyers, meanwhile, went to
|
|||
|
Richey to ask if they could make backups and purge the
|
|||
|
computers before Clinton moved in.
|
|||
|
|
|||
|
Richey, uneasy about past foul-ups and what he called
|
|||
|
"inconsistencies' in the backup taping plan, turned them down
|
|||
|
on Jan. 14. But the Bush administration promptly appealed. The
|
|||
|
next day, the U.S. Court of Appeals in Washington said backups
|
|||
|
would be acceptable "so long as the information is preserved
|
|||
|
in identical form' until the appeal could be decided on its
|
|||
|
merits.
|
|||
|
|
|||
|
But the inventories given to the archives task force
|
|||
|
were not complete. "Many dates are missing,' an after-action
|
|||
|
archives memo said of the backup tapes, and more than 100
|
|||
|
had no dates. It was impossible to tell how many erasures
|
|||
|
might have been made after Richey's ruling. And according to
|
|||
|
a certificate from the White House Communications Agency,
|
|||
|
six tapes packed with NSC messages and memos were
|
|||
|
"overwritten due to operator error.'
|
|||
|
|
|||
|
[Holy Ned! Does this sound familiar? Where is Rose Marie Woods
|
|||
|
and her six-and-one-half-minute gap when we need her? The amount of
|
|||
|
information we're talking about here is staggering. Six nine-track
|
|||
|
tapes overwritten "due to operator error"? C'mon.]
|
|||
|
|
|||
|
In all, more than 5,000 tapes and hard disk drives were
|
|||
|
delivered to the archives. Most had to be preserved because of
|
|||
|
the lawsuit, but a number of hard drives were added at the
|
|||
|
last minute because of a grand-jury subpoena related to the
|
|||
|
pre-election search of Clinton's passport files. Once that
|
|||
|
investigation is over, the grand-jury materials, under the
|
|||
|
Bush-Wilson agreement, will become "the personal records of
|
|||
|
George Bush.'
|
|||
|
|
|||
|
[How conveeenient!
|
|||
|
|
|||
|
[The next section of the story details Wilson's background as a
|
|||
|
Reagan appointee and former director of the Gerald Ford Presidential
|
|||
|
Library (beg your pardon?). It says that Wilson (shocking though it
|
|||
|
may seem) declined to comment for this article. It then says,
|
|||
|
however, that in a March 2 deposition, Wilson testified that he didn't
|
|||
|
see the Bush agreement until the night of Jan. 19, was unfamiliar with
|
|||
|
its terms, and signed it only "upon advice of counsel,' namely, one
|
|||
|
Gary Brooks, the archives general counsel. That's some general
|
|||
|
counsel, that Gary Brooks!
|
|||
|
|
|||
|
[The article continues:]
|
|||
|
|
|||
|
The Bush-Wilson agreement went far beyond the presidential
|
|||
|
records law. It gave the ex-president exclusive legal control
|
|||
|
of all "presidential information, and all derivative
|
|||
|
information in whatever form' that was in the computers. And
|
|||
|
it gave Bush the veto power in retirement to review all the
|
|||
|
backup tapes and hard drives at the archives and make sure
|
|||
|
that all the information he considers "presidential' is kept
|
|||
|
secret. He can even order the archivist to destroy it.
|
|||
|
|
|||
|
"It's history repeating itself almost 20 years later,' one
|
|||
|
official close to the case said, alluding to the September
|
|||
|
1974 agreement that gave former President Nixon, who had just
|
|||
|
been pardoned, ownership and control of his White House tape
|
|||
|
recordings and papers and allowed him to destroy the tapes
|
|||
|
over a five-year period. Congress quickly canceled that
|
|||
|
agreement in a law that applies only to Nixon, but to this day
|
|||
|
most of the 4,000 hours of Nixon's tapes remain tied up by the
|
|||
|
maneuvering of Nixon and his lawyers.
|
|||
|
|
|||
|
[The article goes on at considerable length here, and it just
|
|||
|
gets worse and worse. All I can say is, where is the attorney
|
|||
|
general? Where is the FBI? Where is the freaking Secret Service and
|
|||
|
their computer-crime goons? Conspicuously missing, that's where.
|
|||
|
|
|||
|
[The last paragraph of the story is worth reading:]
|
|||
|
|
|||
|
Skeptics are still wondering what's in the [Bush computer]
|
|||
|
tapes. "There must be something important in them,'
|
|||
|
[historian Page] Miller said. "You don't have agreements late
|
|||
|
at night, just like that.'
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.47
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|