962 lines
50 KiB
Plaintext
962 lines
50 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Wed Aug 4 1993 Volume 5 : Issue 58
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Coop Eitidor: Etaoin Shrdlu, Senior
|
|||
|
|
|||
|
CONTENTS, #5.58 ( Aug 4 1993)
|
|||
|
File 1--An Apology to Joel Garreau
|
|||
|
File 2--The Complexity of Issues in the AIS BBS Affair
|
|||
|
File 3--Virus distribution
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|||
|
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
|||
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|||
|
nodes and points welcome.
|
|||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Wed, 4 Aug 1993 21:18:55 CDT
|
|||
|
From: Jim Thomas <cudigest@mindvox.phantom.com>
|
|||
|
Subject: File 1--An Apology to Joel Garreau
|
|||
|
|
|||
|
In CuD 5.57, we published a response to Rep. Edward J. Markey's letter
|
|||
|
criticizing AIS BBS. We indicated that Rep. Markey's staff based the
|
|||
|
letter on the Washington Post article by Joel Garreau. We also argued
|
|||
|
there, and in CuD 5.51, that the Post article raised serious questions
|
|||
|
of journalistic ethics, primarily because of the use of citations by
|
|||
|
an "anonymous" informant and by an identified informant who were the
|
|||
|
same person.
|
|||
|
|
|||
|
Some readers apparently, and mistakenly, believed that we were
|
|||
|
implying that Joel Garreau was unethical. As author of the response,
|
|||
|
this was categorically not my intent. As I (and other critics of the
|
|||
|
Post article) have stated explicitly, Joel made a conscious effort to
|
|||
|
be balanced and to present the facts as they were presented to him.
|
|||
|
Many of us consider Joel Garreau one of the more responsible
|
|||
|
journalists covering cyber-issues, and he has consistently displayed a
|
|||
|
willingness to learn and a meticulous concern to "get the story
|
|||
|
straight." I have both personal and professional respect for Joel, and
|
|||
|
I regret any ambiguous wording that might have suggested otherwise. I
|
|||
|
apologize to Joel for any impression that his own integrity was called
|
|||
|
into question. It wasn't. To challenge what may be common practices
|
|||
|
in no way implies that the practitioner is necessarily guilty. Airing
|
|||
|
media practices is not intended to cast blame, but instead to raise
|
|||
|
issues of how images are created through the visual or ASCII symbols
|
|||
|
of a given medium. One can object to a message while simultaneously
|
|||
|
respecting the messenger.
|
|||
|
|
|||
|
The broader issue in media coverage of cyberspace issues lies in
|
|||
|
general media formatting and how all reporters shape images. As
|
|||
|
suggested in CuD 5.51, this probably reflects a style of journalism
|
|||
|
practiced by conventional media. Some reporters, including Joel
|
|||
|
Garreau, John McMullen, John Schwartz, Joe Abernathy, John Markoff,
|
|||
|
and a few others, provide balanced and often sympathetic coverage of
|
|||
|
computer-related issues. Often, however, there is room for honest
|
|||
|
disagreement over an "angle," and choice of facts. Less-experienced
|
|||
|
reporters seem especially prone to looking for a sexy or dramatic
|
|||
|
angle that will stimulate public interest. Lack of public familiarity
|
|||
|
with computer technology and related issues requires simplification
|
|||
|
and an occasional bad metaphor. These, in turn, influence legislators
|
|||
|
(as in the Markey letter), media hyperbole, and distorted information
|
|||
|
that re-inforce the image amongst law enforcement and the public at
|
|||
|
large that pernicious dangers lurk beneath the techno-culture of BBSes
|
|||
|
and the Net. We will provide a few examples of such coverage within
|
|||
|
the next week or two.
|
|||
|
|
|||
|
At stake in all of this is the battle over images and the power that
|
|||
|
symbols possess to stigmatize and control certain behaviors that, when
|
|||
|
occurring in "real space," are Constitutionally protected. "Bad images
|
|||
|
lead to bad law," so this is not simply a quibble over preferred
|
|||
|
images, but rather a debate and battle over which rights shall (or
|
|||
|
shall not) be extended to cyberspace.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 2 Aug 1993 22:31:44 CDT
|
|||
|
From: Paul Melka <no@internet.address>
|
|||
|
Subject: File 2--The Complexity of Issues in the AIS BBS Affair
|
|||
|
|
|||
|
((MODERATORS' COMMENT: Although we have frozen the discussion of
|
|||
|
specific personalities in the AIS BBS incident, Paul Melka's response
|
|||
|
is a thoughtful and in-depth response that focuses on issues. Paul's
|
|||
|
theme is that the complexity of issues offers no easy answers. Paul
|
|||
|
Melka is a security analyst in Baltimore)).
|
|||
|
|
|||
|
+++
|
|||
|
|
|||
|
(Open Letter to Paul Ferguson)
|
|||
|
|
|||
|
Paul,
|
|||
|
|
|||
|
You and I have talked a number of times in FIDO and I have met you
|
|||
|
before during the "first" International Computer Virus Conference
|
|||
|
sponsored by the ICSA in Washington in late 1991. I have been
|
|||
|
following with interest the developments that have occurred with the
|
|||
|
Bureau of Public Debt's Automated Information System BBS. As a
|
|||
|
Security Analyst, I feel that I need to clarify some thoughts from my
|
|||
|
perspective as a user of AIS. I will quote you as appropriate,
|
|||
|
without quoting a ton of other background information. The quotes are
|
|||
|
from your responses to Cory Tucker on June 24, to All on June 26 and
|
|||
|
Frank Tirado, through Aristotle on July 15. I have also quoted
|
|||
|
selected portions of your response to CuD 5.51 that appeared in CuD
|
|||
|
5.52. Again, my opinions are my own, for whatever they are worth. I
|
|||
|
debated long and hard, whether to just drop this completely, but I
|
|||
|
feel that its important that people see a different perspective of AIS
|
|||
|
and what Kim was trying to accomplish.
|
|||
|
|
|||
|
|
|||
|
PF> Although I'm a proponent of the "free-virus-exchange-is-akin-to-
|
|||
|
PF> Typhoid-Mary" train of thought, let's examine, for a moment, both
|
|||
|
PF> sides of the argument.
|
|||
|
PF>
|
|||
|
PF> Pro Vx
|
|||
|
PF>
|
|||
|
PF> o Individuals in favor of Vx claim that they have seen no evidence
|
|||
|
PF> that virus exchange systems have contributed to the spread of viruses.
|
|||
|
|
|||
|
Actually, I believe that Vx boards have _definitely_ aided in the
|
|||
|
spread of computer viruses, both by allowing the spread of live
|
|||
|
viruses and by providing the knowledge to create new viruses. In the
|
|||
|
case of the AIS, it provided about 32 files containing viruses, as of
|
|||
|
late April, some of which had descriptions such as "Source code for 51
|
|||
|
viruses". Adding all these together comes out to less than 160
|
|||
|
_total_ disassemblies. Almost two years ago, David Stang asked you
|
|||
|
during a discussion how many viruses you have and you answered over
|
|||
|
900 viruses. I would assume that this number has more than doubled
|
|||
|
for you. The reason that I point that out, is that proportionally AIS
|
|||
|
had no live viruses and very little source code. The source code
|
|||
|
itself was provided as a sampling of virus disassemblies. The great
|
|||
|
majority of people, both Anti-Virus and Pro-Virus would consider such
|
|||
|
a collection "lame". These viruses would not be any reason for even
|
|||
|
"wannabee" virus writers to contact the board.
|
|||
|
|
|||
|
Yes, there were other files on the board, such as the virus generators
|
|||
|
VCL and G-squared, as well as the MtE and TPE encryption engines.
|
|||
|
These may have been far more attractive to "wannabee" virus writers
|
|||
|
and _might_ have been a misjudgment on Kim's part to make these
|
|||
|
available on the requested access area of the board (no one had access
|
|||
|
to the Underground files without directly requesting it). Personally,
|
|||
|
I don't feel that it was a mistake because having access to these
|
|||
|
files alerted me both to their strengths and weaknesses.
|
|||
|
|
|||
|
PF> o Proponents of virus exchanges claim that by making viruses and
|
|||
|
PF> disassemblies available to their users, they are providing them
|
|||
|
PF> with the tools necessary to understand how computer viruses work.
|
|||
|
PF> Similarly, once this information is understood, they also claim that
|
|||
|
PF> it contributes to the overall enhancement of the computer security
|
|||
|
PF> knowledge-base of their users.
|
|||
|
PF>
|
|||
|
|
|||
|
I believe this to be a true statement. Yes there are risks involved,
|
|||
|
but the bottom line to me is that if you catch one new virus from this
|
|||
|
information but are able to prevent 100 attacks from the information
|
|||
|
that you gained from that same source, the information is justified.
|
|||
|
Neither you nor I are in any position to determine whether more good
|
|||
|
or bad came directly from AIS. In fact, your echo VIRUS_INFO has had
|
|||
|
the telephone numbers for various Vx boards posted in it. As
|
|||
|
moderator, you can only re-act rather than act to prevent this, and I
|
|||
|
don't believe that your echo should be shut down because it provides
|
|||
|
this type of information on a regular basis.
|
|||
|
|
|||
|
PF> o Many advocates of Vx systems claim that attempts at stemming the flow
|
|||
|
PF> of computer viruses is an idealism that should be protected under
|
|||
|
PF> freedom of expression and freedom of information concepts.
|
|||
|
|
|||
|
I feel that what I or you or anyone else do on our own personal
|
|||
|
computers is our own business. As you mention in a post, when that
|
|||
|
starts to impact other people, then I give up my freedom as an
|
|||
|
individual to the freedom of society to have as safe a computing
|
|||
|
environment as possible.
|
|||
|
|
|||
|
PF> Con Vx
|
|||
|
PF>
|
|||
|
PF> o Figures reflected in statistics compiled by all of the computer
|
|||
|
PF> security and antivirus organizations show a dramatic increase in the
|
|||
|
PF> number of computer viruses in the past three years. Since Todor
|
|||
|
PF> Todorov's Virus eXchange BBS, which was the first of its kind in the
|
|||
|
PF> world, the number of "underground" systems which mimic the
|
|||
|
PF> activities of Todorov's system has risen. Sara Gordon has documented
|
|||
|
PF> quite a bit concerning the impact of these systems; I'd recommend
|
|||
|
PF> her paper(s) on the subject which she has presented on several
|
|||
|
PF> occasions. <vfr@netcom.com>
|
|||
|
|
|||
|
As mentioned earlier, I think that this is true and don't argue the point.
|
|||
|
But I do not accept your argument that AIS was a Vx board, just because
|
|||
|
it had a handful of virus disassemblies on it.
|
|||
|
|
|||
|
PF> o Viruses and disassemblies which are made available on these systems
|
|||
|
PF> are a potential danger. While live viruses present a more immediate
|
|||
|
PF> threat in the wrong hands, disassemblies can be considered even more
|
|||
|
PF> of a danger in most cases because of their ability to be easily
|
|||
|
PF> modified, recompiled and redistributed as undetectable variants of
|
|||
|
PF> existing viruses. These instances have happened with increasing
|
|||
|
PF> frequency and can be directly attributed to Vx systems and virus
|
|||
|
PF> creation groups such as Phalcon/Skism, YAM, NuKe and ARCV.
|
|||
|
|
|||
|
Yes they do represent a potential danger, just by the very nature of
|
|||
|
Vx boards encouraging each other with who has the most viruses in their
|
|||
|
libraries (even though in many cases, there are quite a number of phony
|
|||
|
"viruses" just used to get access to other files).
|
|||
|
|
|||
|
PF> o With the availability of virus creation "kits," such as the VCL,
|
|||
|
PF> PS-MPC and the G-squared, even "wannabe" virus writers with little
|
|||
|
PF> or no skill at all can make viruses and distribute them at their
|
|||
|
PF> leisure.
|
|||
|
|
|||
|
Agreed. Yet they also provide a valuable learning tool to people like
|
|||
|
myself who go beyond what the job requires to really attempt to learn how
|
|||
|
viruses work and how to best protect against them.
|
|||
|
|
|||
|
PF> o While it should be realized that this type of activity cannot be
|
|||
|
PF> stopped completely, we must acknowledge the fact that Virus
|
|||
|
PF> exchange systems _do_ contribute to the spread of viruses. Virus
|
|||
|
PF> exchanges _do_ contribute to the propagation of new and undetectable
|
|||
|
PF> viruses. Access to live viruses and disassemblies are not necessary
|
|||
|
PF> for gaining knowledge and understanding how they work. A basic
|
|||
|
PF> understanding of assembler language and some practical examples,
|
|||
|
PF> including pseudo code, would suffice.
|
|||
|
|
|||
|
There are an incredible amount of people in the security field of
|
|||
|
which you and I who are part who don't even need that much
|
|||
|
information! They will do their research and choose whatever virus
|
|||
|
protection PC Magazine recommends for this year (Central Point
|
|||
|
Anti-Virus and Norton's Anti-Virus). You mentioned in one of your
|
|||
|
posts that you have been doing virus disassemblies since they first
|
|||
|
came out. Why? Only you can answer that. In my case, I want to
|
|||
|
understand exactly how these things work. Have I succeeded? No, not
|
|||
|
by a long shot. There are too many things going on in the security
|
|||
|
field besides viruses that take up my time. I did get my company to
|
|||
|
allow me to set up both a stand-alone computer and a small LAN for
|
|||
|
virus research projects. Both these systems are in a locked room with
|
|||
|
passwords on the systems. Both these systems do not have viruses on
|
|||
|
them, except when I am specifically testing a product against live
|
|||
|
viruses. I also volunteered to assist with the International Computer
|
|||
|
Security Associates' volunteer Virus Field Researcher program.
|
|||
|
Unfortunately after only a few months the program fell apart. I don't
|
|||
|
want viruses to infect my company or computers that I am responsible
|
|||
|
for, yet at the same time, it is very important to me that I
|
|||
|
understand the inner workings of a virus as well as I can. I have had
|
|||
|
people say too many times, just illustrate it with pseudo code, yet
|
|||
|
for each of those times, I have heard three times as many people say,
|
|||
|
"I'm not going to give anyone any examples or pseudo-code, because it
|
|||
|
might give a virus writer an idea." I believe that the knowledge of
|
|||
|
viruses that I have gained has made me a better security analyst.
|
|||
|
|
|||
|
PF> Can there be a common ground on this issue? Probably not. The computer
|
|||
|
PF> virus arena is filled with complex and diversified idealisms on the
|
|||
|
PF> subject. I consider myself a proponent of freedom of information, but
|
|||
|
PF> I also believe there are limits to one's freedom.
|
|||
|
|
|||
|
I feel that AIS was helping to provide that common ground, just as
|
|||
|
ComSec is. I honestly do not believe that the information on AIS was
|
|||
|
of any real interest to any virus "wannabees". I think it was much
|
|||
|
more of an information exchange area for security professionals and
|
|||
|
the only benefit that the virus writers were getting out of it, was
|
|||
|
that they could say that one of their text files was posted on a
|
|||
|
Federal board.
|
|||
|
|
|||
|
PF> ... In other words, one's right to a particular freedom
|
|||
|
PF> ends where it infringes on someone else's rights for safety or
|
|||
|
PF> privacy, in this instance.
|
|||
|
|
|||
|
I agree with this as I said earlier.
|
|||
|
|
|||
|
PF> And the government should certainly not
|
|||
|
PF> allow systems which participate in these type of questionable
|
|||
|
PF> activities to function within their realm of responsibility. Simply the
|
|||
|
PF> appearance of government sponsorship tends to lend some form of
|
|||
|
PF> legitimacy to the activities in question.
|
|||
|
|
|||
|
But as you may have gathered, I strongly disagree with this statement.
|
|||
|
Can you tell me where I can legitimately get this type information
|
|||
|
except from boards such as AIS or ComSec. Personally, I would be
|
|||
|
willing to submit to whatever requirements there would be for this
|
|||
|
access. The problem is that I am not an anti-virus vendor or a
|
|||
|
full-time researcher. I am just someone who is trying his very best
|
|||
|
to understand and deal with the computer virus problem. And I feel
|
|||
|
that AIS has helped greatly with that understanding.
|
|||
|
|
|||
|
PF> Proponents of virus exchanges remain unconvinced that making live
|
|||
|
PF> viruses, source code and disassemblies available endangers end-users.
|
|||
|
PF> I'm convinced that not all instances do cause damage, but I'm also
|
|||
|
PF> convinced that many times, it has done exactly this.
|
|||
|
|
|||
|
I'm also convinced that _not_ all instances do cause damage, and I believe
|
|||
|
that AIS was one of those instances.
|
|||
|
|
|||
|
PF> In the case of the AIS BBS, it was operating under the auspices,
|
|||
|
PF> whether explicitly or implied, of a Federal Office, namely the US
|
|||
|
PF> Department of Treasury. The point in all of this is not necessarily
|
|||
|
PF> what AIS did, but rather, how it was done and the apparent moral
|
|||
|
PF> "high ground" of legitimacy it portrayed by being an apparatus of
|
|||
|
PF> a United States Government office, financed (in part) with taxpayer
|
|||
|
PF> money.
|
|||
|
|
|||
|
The point was that it was being operated as a _security BBS_ not a
|
|||
|
Vx BBS. The files that were on there were common viruses that were
|
|||
|
"ancient" in CyberSpace time. The fact that the government, or the
|
|||
|
Bureau of Public Debt was providing the service is really besides the
|
|||
|
point. Maybe the FBI or the Secret Service should have provided that
|
|||
|
service. They certainly accessed it. They were also certainly aware
|
|||
|
of it! But did either of these groups try to shut it down? No, it was
|
|||
|
shut down because of public perception in Risks forum that tax payers
|
|||
|
money might be used to sponsor a Vx board.
|
|||
|
|
|||
|
PF> I admit that I am dismayed that people do not see the problem here.
|
|||
|
|
|||
|
If the government was really sponsoring a Vx board, I could see your
|
|||
|
point, but again it was a board for _security_ people to gather
|
|||
|
information and to interact with hackers.
|
|||
|
|
|||
|
PF> After this knowledge was made public, many questions surfaced,
|
|||
|
PF> including under what authority did Clancy operate a system with
|
|||
|
PF> implied blessings of the Treasury Department? I'd venture to say
|
|||
|
PF> that the Secret Service (remember Gail Thackeray?) frowned on this
|
|||
|
PF> rather heavily.
|
|||
|
|
|||
|
If they frowned on this so heavily, then why did you have to get
|
|||
|
involved to shut it down? I'm sorry, Paul, but I don't think the
|
|||
|
pressure came from within, because those people could see the benefit
|
|||
|
of AIS. I think the pressure to shut it down came from the
|
|||
|
unreasonable, yet too often justified, fear of what the public might
|
|||
|
think.
|
|||
|
|
|||
|
PF> I certainly claim no "moral high ground" on the issue. I took what I
|
|||
|
PF> thought was the best avenue of approach, which was to bring this topic
|
|||
|
PF> out of the shadows and into the forefront for discussion.
|
|||
|
|
|||
|
And this was _the_ most nagging question in my mind. Why post
|
|||
|
anonymously? Your feeling have been widely known on these issues for
|
|||
|
a long time and posting anonymously really took away from that. I
|
|||
|
_do_ very much respect the fact that you took actions that you felt
|
|||
|
must be taken, but I do have to question your methods. I feel that
|
|||
|
the results would have been exactly the same if your English contact,
|
|||
|
whether it be Dr. Solomon or not, would have posted in Risks in almost
|
|||
|
exactly the same way, asking why as Americans we allow our taxpayers
|
|||
|
money to be used in this way.
|
|||
|
|
|||
|
PF> Unfortunately, the discussion was brief and the actions behind the
|
|||
|
PF> scenes were apparently swift. Also, the assumption that Alan Solomon
|
|||
|
PF> originally forwarded the BBS capture log is pure conjecture.
|
|||
|
|
|||
|
But still might be true!
|
|||
|
|
|||
|
PF> In an ideal world, we all share the freedom to express our concerns
|
|||
|
PF> and ideas in an open forum. Although I may not agree with what you may
|
|||
|
PF> say, I would give my life for your right to freedom of expression.
|
|||
|
|
|||
|
I'm not sure you understand exactly what you just said - because it really
|
|||
|
is up to each individual to protect their own rights and yes like you I would
|
|||
|
fight for those rights.
|
|||
|
|
|||
|
PF> However, let's not confuse concepts of freedom of expression and
|
|||
|
PF> reckless computing.
|
|||
|
|
|||
|
Again, in the case of AIS, I don't believe that reckless computing was
|
|||
|
involved at all. It was more so a matter of Kim wishing to share
|
|||
|
information that she had found beneficial to her with other people in
|
|||
|
the security field. There was no financial gain to Kim to make this
|
|||
|
information available. She could have simply kept everything that she
|
|||
|
learned to herself and none of this would have happened at all. But
|
|||
|
hasn't it been said over and over again that "Truth will set you
|
|||
|
free." I believe that. And if you just look at some of the
|
|||
|
outlandish claims by some AV packages, you have to wonder where the
|
|||
|
truth is.
|
|||
|
|
|||
|
PF> Mr. Corey Tucker sent an "advance" copy article written by George Smith
|
|||
|
PF> (aka Urnst Kouch) which implied several items which were conjectured and
|
|||
|
PF> seemingly allusions. I posted a prior response, but additionally, I'd
|
|||
|
PF> like to post an article also written by Kouch which outlines Clancy in
|
|||
|
PF> the CRYPT newsletter #13, in which more altruistic mentalities are
|
|||
|
PF> discussed. I believe this is valid; it reflects the entirety in which
|
|||
|
PF> this whole fiasco existed.
|
|||
|
PF>
|
|||
|
PF> Additionally, I am also posting the Washington Post article, in its
|
|||
|
PF> entirety, for information purposes.
|
|||
|
PF>
|
|||
|
PF> If the truth be known, Mr. Smith did the most damage to Kim Clancy's
|
|||
|
PF> underground organization (and BBS) than anyone who may have followed, by
|
|||
|
PF> the publication of this very article.
|
|||
|
|
|||
|
Certainly the fact that AIS was mentioned in both CuD and the Crypt
|
|||
|
newsletter may not have been in the best interest of the AIS, especially
|
|||
|
in the eyes of the general public. Both these underground magazines,
|
|||
|
although in some cases talking about how the Federal government had virus
|
|||
|
disassemblies available, were really focusing on the fact that this
|
|||
|
information was being provided to improve security, to aid in virus
|
|||
|
protection and prevention and to promote an exchange of ideas with both
|
|||
|
"hackers" and security professionals.
|
|||
|
|
|||
|
PF> No need to call this number, it ain't there anymore. Not only did Mr.
|
|||
|
PF> Smith (Kouch) nail Clancy's coffin, he enabled others to do so on his
|
|||
|
PF> behalf.
|
|||
|
|
|||
|
Actually as you mentioned in a later post, you accomplished exactly what
|
|||
|
you wanted to - you shut down the underground files on AIS.
|
|||
|
|
|||
|
PF> Mr. Thomas (and readers of CuD),
|
|||
|
PF>
|
|||
|
PF> While my first instinct was to not post any response to your
|
|||
|
PF> scathing series of highly volatile articles (albeit, on a highly
|
|||
|
PF> volatile subject, Cud 5.51), I reconsidered after a colleague
|
|||
|
PF> reminded me that, unfortunately, silence on my part may be
|
|||
|
PF> misinterpreted as some form of admission of guilt. I do regret
|
|||
|
PF> that this instance has created such a stir, but I do not apologize
|
|||
|
PF> for the attention brought upon the AIS system which ultimately
|
|||
|
PF> resulted in the removal of commented virus disassemblies from
|
|||
|
PF> public access.
|
|||
|
|
|||
|
If the only thing that was lost were the virus disassemblies, the
|
|||
|
loss would have had little or no impact on anyone. Most of the
|
|||
|
information that I gleaned from AIS was in the various underground and
|
|||
|
aboveground electronic magazines, such as CuD that will no longer be
|
|||
|
available on the board. Also the "hacker files" on Unix and Novell
|
|||
|
security were very useful to me to give me a focus on potential problems.
|
|||
|
|
|||
|
PF> Without launching into a dissertation about the harm caused by
|
|||
|
PF> virus code (both compiled executables and reverse-engineered
|
|||
|
PF> disassemblies), I would like to make a couple of points which are
|
|||
|
PF> commonly taken for granted or disregarded altogether.
|
|||
|
PF>
|
|||
|
PF> The debate will obviously continue on virus eXchange systems,
|
|||
|
PF> which name they have been given due to the availability of virus
|
|||
|
PF> disassemblies, creation tools and the likes. (All of which were
|
|||
|
PF> available on AIS.) I get the distinct impression that we have not
|
|||
|
PF> heard the last on this topic. Far from it, I'd wager.
|
|||
|
|
|||
|
If AIS were actively trading in viruses I would consider it a Vx, but
|
|||
|
because it has some "sample" disassemblies on it, I would hardly call it
|
|||
|
a Vx board. More current were the various underground magazines which had
|
|||
|
both virus disassemblies in them as well as debug scripts. Yet, in my
|
|||
|
opinion, these magazines were the most informative to me in understanding
|
|||
|
how computer viruses work. Since these magazines were so readily
|
|||
|
available, signature strings were almost immediately incorporated into the
|
|||
|
latest virus scanning software.
|
|||
|
|
|||
|
PF> On one hand, we have those who argue that virus exchange (Vx) BBSs
|
|||
|
PF> do not further the spread of viruses and efforts to curtail their
|
|||
|
PF> activities are akin to stifling freedom of expression and the flow
|
|||
|
PF> of information. On the other hand, we have those who argue that Vx
|
|||
|
PF> BBSs most certainly aid in the spread of computer viruses simply
|
|||
|
PF> because they allow live computer viruses, source code and
|
|||
|
PF> disassemblies to be freely exchanged as would youngsters trade
|
|||
|
PF> baseball cards.
|
|||
|
PF>
|
|||
|
PF> However, baseball cards do not inflict damage, but many times
|
|||
|
PF> viruses do exactly this, in the hands of an unwitting or
|
|||
|
PF> inexperienced computer user.
|
|||
|
|
|||
|
Many things that someone might collect are potentially harmful, the
|
|||
|
point is what is done with them. Vx BBSs have both their good and
|
|||
|
bad sides and I don't think that anyone would argue that having full
|
|||
|
download privileges on the first call to a Vx board is curtailing the
|
|||
|
spread of viruses. (Well, maybe _someone_ might!)
|
|||
|
|
|||
|
PF> To briefly address some selected points made in Cud 5.51:
|
|||
|
PF>
|
|||
|
PF> Jim Thomas writes (in File 1 -- Introduction to the AIS BBS
|
|||
|
PF> Controversy) -
|
|||
|
PF>
|
|||
|
PF> "Perhaps the anonymous accusers are correct: Some types of
|
|||
|
PF> information may pose a risk if abused. But, in an open democracy,
|
|||
|
PF> the potential for abuse has been neither a necessary nor a
|
|||
|
PF> sufficient justification to silence those with whom we disagree."
|
|||
|
PF>
|
|||
|
PF> I am flattered that you suggest I actually have enough clout to
|
|||
|
PF> personally silence AIS, if that is the gist. I took the liberty
|
|||
|
PF> of making it public knowledge, while concurrently voicing _my_
|
|||
|
PF> opinion about its merits. This street goes both ways. Most of us
|
|||
|
PF> are painfully aware of the numerous virus underground systems
|
|||
|
PF> around the world, yet the attention is focused on a solitary
|
|||
|
PF> system run by an employee of the U.S. Treasury Department. Why is
|
|||
|
PF> that? I suggest that most who squeak the loudest in opposition
|
|||
|
PF> to my anonymous (hardly) posting are either a.) not familiar with
|
|||
|
PF> the amount of damage, in both manhours and dollars, caused by
|
|||
|
PF> computer viruses each year, b.) overly radical proponents of
|
|||
|
PF> information exchange who care not what damage may result in said
|
|||
|
PF> exchange, or c.) banging their drum just to bang their drum.
|
|||
|
PF>
|
|||
|
PF> (Please note the use of the word "most" in the statement above.)
|
|||
|
|
|||
|
Thanks for giving me the "most" option, because I honestly do not feel
|
|||
|
that I fit into category A, B or C. Throughout this letter I hope
|
|||
|
that I have adequately expressed my feelings that AIS provided a
|
|||
|
positive impact in the fight against computer viruses. I am very well
|
|||
|
aware of the damage viruses can cause in both hard and soft dollars, I
|
|||
|
do not believe that all information should be free - certainly there
|
|||
|
are very individual things such as credit history, medical history,
|
|||
|
etc. that are becoming far more free than I would care for. And I
|
|||
|
hope that no one feels that I am just banging my drum, just to hear
|
|||
|
the hollow sound it makes. I am trying to honestly express my
|
|||
|
personal opinion to give all of us the chance to stretch and grow.
|
|||
|
|
|||
|
PF> Jim Thomas again writes (in File 6 -- Media, Anti-virus
|
|||
|
PF> personnel, Ethics, and AIS) -
|
|||
|
PF>
|
|||
|
PF> "Let's keep some facts straight. 'Mr. Smith (Kouch)' did *not*
|
|||
|
PF> 'nail Clancy's coffin.' Paul Ferguson and his friends did with
|
|||
|
PF> anonymous inflammatory posts and with other posts that
|
|||
|
PF> irresponsibly suggest illegal and 'underground' activity."
|
|||
|
PF>
|
|||
|
PF> I'll address this directly, since it is obviously your opinion,
|
|||
|
PF> not fact, as you seem to imply. In fact, I think you should have
|
|||
|
PF> used "opinionated" instead of "inflammatory," but that is your
|
|||
|
PF> prerogative. I find it odd that after so much "underground"
|
|||
|
PF> exposure as was afforded AIS in the months preceding my
|
|||
|
PF> "anonymous" post, not an eyebrow was raised. Perhaps Kouch's
|
|||
|
|
|||
|
Paul, again I'm not sure where you are coming from. In one breath you
|
|||
|
say that your actions were not responsible for AIS losing its
|
|||
|
underground files, yet on the other hand you mention that no other
|
|||
|
response was made to the various underground articles about AIS (as
|
|||
|
well as aboveground articles in newspapers such as LAN Times). Your
|
|||
|
anonymous post was almost directly responsible for the current state
|
|||
|
of AIS and since that is exactly what you wanted to accomplish, why
|
|||
|
not just accept that?
|
|||
|
|
|||
|
PF> publication is truly "underground" catering specifically to
|
|||
|
PF> hush-hush underground circles of computer vandals? I don't
|
|||
|
PF> think so. Perhaps Cud is truly an "underground" publication?
|
|||
|
PF> I think not. So where's the beef?
|
|||
|
PF>
|
|||
|
PF> One "anonymous" post, strategically placed razed the house of
|
|||
|
PF> cards.
|
|||
|
PF>
|
|||
|
PF> Mr. Thomas makes one excellent point, however, in the midst of
|
|||
|
PF> the remaining text -
|
|||
|
PF>
|
|||
|
PF> "It's said that some people, angered at this affair, are planning
|
|||
|
PF> to retaliate against those judged responsible. This would be an
|
|||
|
PF> ethically bankrupt response."
|
|||
|
PF>
|
|||
|
PF> At least we can agree on this point.
|
|||
|
|
|||
|
I agree as well. What is done is done. And even if you went to the
|
|||
|
Bureau of Public Debt yourself, they would not allow the underground files
|
|||
|
to be posted again on their board. Only time will tell whether your
|
|||
|
actions were positive, as you believe, or negative.
|
|||
|
|
|||
|
PF> One final note, for what its worth. I did not post the forwarded
|
|||
|
PF> article to damage Clancy's reputation or to prove any particular
|
|||
|
PF> political point. Personally, I have nothing to gain by the
|
|||
|
PF> results. I do not foolishly sally forth and and do someone else's
|
|||
|
PF> bidding in hopes of gaining favor. I do not publish software
|
|||
|
PF> which would be directly or indirectly beneficial to myself,
|
|||
|
PF> especially anti-virus software (I have done extensive work in
|
|||
|
PF> assembly and have reversed-engineered viruses since their
|
|||
|
PF> appearance, however). I posted the article because I believe
|
|||
|
PF> it is a conflict of interest for any governmental agent to
|
|||
|
PF> openly make viruses and disassemblies available, regardless of
|
|||
|
PF> intent.
|
|||
|
|
|||
|
I realize that you were acting in what you felt were everyone's best
|
|||
|
interest, but I also feel that there is nothing wrong with our
|
|||
|
government making information available to help protect our computer
|
|||
|
systems - and I believe that is what AIS was doing. You can learn how
|
|||
|
to make a nuclear bomb by going to the library, but you need the
|
|||
|
intelligence and materials to actually build one.
|
|||
|
|
|||
|
PF>If only one instance of damage resulted directly from the
|
|||
|
PF> virus-related material available from AIS, then that is one too
|
|||
|
PF> many and I would happily rest my case.
|
|||
|
|
|||
|
Yet, what if the knowledge shared by AIS enabled more and more people,
|
|||
|
like myself or Frank Tirado, to better educate our users and to give
|
|||
|
them the knowledge of what to do if they discover a virus. I have
|
|||
|
seen more damage caused by user ignorance (meaning lack of knowledge),
|
|||
|
than most actual viruses once they are detected. Did you ever have a
|
|||
|
client who thought they might have a virus but didn't want to bother
|
|||
|
you, because they might be wrong. Those are the people that we need
|
|||
|
to educate - in virus protection, prevention and recovery. It is not
|
|||
|
a safe computing world out there and all of us need to do whatever we
|
|||
|
can to make it safer.
|
|||
|
|
|||
|
PF> What happened to the hacker ethic? I seem to recall a "no damage
|
|||
|
PF> clause" which still echoes in my mind, especially with the advent
|
|||
|
PF> of this fiasco. "Damage?" "Damage," you say, "What Damage?" "AIS
|
|||
|
PF> only made it available -- they're not responsible for what is
|
|||
|
PF> done with it!"
|
|||
|
|
|||
|
In my personal opinion, I would be very surprised if there is any
|
|||
|
damage that could be traced either directly or indirectly to AIS. But
|
|||
|
I would think that there are a lot of people that can directly trace a
|
|||
|
great deal of benefit from it. Again that is only my opinion and neither
|
|||
|
you nor I can really prove otherwise at this time.
|
|||
|
|
|||
|
PF> Now that I think about about it again, I'm really "not sorry."
|
|||
|
|
|||
|
I didn't think that you were and that's why I've taken the time to
|
|||
|
write these responses. I felt that even though you may not agree with
|
|||
|
everything that I have said, I still had to express those feelings.
|
|||
|
|
|||
|
PF>
|
|||
|
PF> An Open Letter to Mr. Frank Tirado
|
|||
|
PF>
|
|||
|
PF> In order to adequately address your concerns, accusations and
|
|||
|
PF> opinions, I have also included quotations from your last message,
|
|||
|
PF> preceded by angled brackets (">"), as is customary with most
|
|||
|
PF> netspeak.
|
|||
|
PF>
|
|||
|
PF> > Message from Paul Ferguson to Cory Tucker:
|
|||
|
PF>
|
|||
|
PF> > "....I find your posts rather humorous, yet at the same time
|
|||
|
PF> > offensive. If Mr. Tirado wishes to confront the issue himself,
|
|||
|
PF> > I'd suggest he do so. His absence here in Fidonet or Usenet
|
|||
|
PF> > somehow diminishes his credibility. In the meantime, please
|
|||
|
PF> > refrain from posting such drivel....."
|
|||
|
|
|||
|
Paul, most of your posts appear to be very well thought out, but
|
|||
|
whether someone is on the FidoNet or UseNet, really should not
|
|||
|
diminish his credibility.
|
|||
|
|
|||
|
PF> I'd like to specifically address each of your points and present
|
|||
|
PF> contrary opinion.
|
|||
|
PF>
|
|||
|
|
|||
|
PF>FT> o Closing down the AIS board eliminated a major avenue for
|
|||
|
PF>FT> the propagation of viruses........ Oops! My imagination
|
|||
|
PF>FT> ran wild for a moment. You and I both know that not the
|
|||
|
PF>FT> slightest dent has been made in the flow of information
|
|||
|
PF>FT> which you and your cohorts find so objectionable.
|
|||
|
PF>
|
|||
|
PF> I apologize, Mr. Tirado -- I do not know that and frankly, nor
|
|||
|
PF> do you. This statement is purely conjecture and you could not
|
|||
|
PF> know possibly otherwise. Your sarcasm is evident. However, I
|
|||
|
PF> disagree implicitly. As I stated in my response (which I have
|
|||
|
PF> submitted to Jim Thomas for inclusion into Cud 5.12) to CuD,
|
|||
|
PF> if even one incident of modified virus propagation resulted
|
|||
|
PF> from the availability of viruses on AIS, then my action was
|
|||
|
PF> warranted, in my own opinion. However, it is obviously a
|
|||
|
PF> rhetorical point because once the files were obtained, no one
|
|||
|
PF> can gauge the possible damage which may have resulted in these
|
|||
|
PF> instances.
|
|||
|
|
|||
|
The point being that no one can know either the beneficial or negative
|
|||
|
impacts that the virus disassemblies on AIS (not viruses) have had on
|
|||
|
all of us. I personally believe that if there was any negative
|
|||
|
impact, it was outweighed by the knowledge gained and shared by those
|
|||
|
thousand plus users of the board. But that is really just my own
|
|||
|
opinion.
|
|||
|
|
|||
|
|
|||
|
PF>FT> o Now the virus boards cannot point at the AIS board and
|
|||
|
PF>FT> say: "If they're doing it, why can't we?" I'll grant
|
|||
|
PF>FT> you this one, but I really can't see virus boards using
|
|||
|
PF>FT> this defense very successfully, should it ever come to
|
|||
|
PF>FT> that.
|
|||
|
PF>
|
|||
|
PF> Then you obviously have not been observing the activities of
|
|||
|
PF> underground vX (virus exchange) systems since their inception. I
|
|||
|
PF> have, and I have watched trends develop. For example, the major
|
|||
|
PF> Vx systems have been (and still are) run by members of virus
|
|||
|
PF> creationist groups such as Phalcon/Skism, Nuke and Trident.
|
|||
|
PF> These groups are directly responsible for escalating the sheer
|
|||
|
PF> number of viruses by creating new, undetectable variants of
|
|||
|
PF> existing viruses and creating virus creation tools. This is
|
|||
|
PF> unacceptable, yet you seem to condone this behavior...
|
|||
|
PF>
|
|||
|
|
|||
|
Paul, are you saying that you are a frequent visitor to Vx boards?
|
|||
|
Personally, I don't have any problem with that at all, because I
|
|||
|
believe that any interest you would have in the Vx boards would be
|
|||
|
used to increase your knowledge of viruses and their functions and to
|
|||
|
improve security for all your clients, and others through your posts
|
|||
|
on Virus_Info. I am not saying this sarcastically at all. We should
|
|||
|
all be willing to learn from many sources, not just those that are
|
|||
|
deemed "appropriate". I don't think anyone can deny the impact groups
|
|||
|
such as Phalcon/Skism, Nuke and Trident have had on the virus world.
|
|||
|
|
|||
|
PF> > o Those individuals who could "legally" (there was nothing
|
|||
|
PF> > illegal about any information obtainable through the AIS
|
|||
|
PF> > board) obtain useful and pertinent information from the
|
|||
|
PF> > underground will now probably gravitate towards hacker or
|
|||
|
PF> > virus boards. You think not? Let's wait and see.....
|
|||
|
PF>
|
|||
|
PF> "Nothing illegal?" At least not yet, obviously. Unethical? That
|
|||
|
PF> is subjective opinion. (I consider it unethical, but as I stated
|
|||
|
PF> above, this is purely subjective.) We shall "wait and see," as
|
|||
|
PF> you've suggested, however, do not expect us to simply dawdle
|
|||
|
PF> idly while these activities are being conducted in real-time.
|
|||
|
PF> Legislation will be introduced in the coming congressional
|
|||
|
PF> session which would outlaw these activities. (Refer to
|
|||
|
PF> Computerworld article, "Virus vagaries foil feds," July 12,
|
|||
|
PF> volume 27, issue 28 for further information.)
|
|||
|
PF>
|
|||
|
PF> > Your statement that my "absence here in Fidonet or Usenet
|
|||
|
PF> > somehow diminishes (my) credibility" is ludicrous. In other
|
|||
|
PF> > words, I'm outside of your control so my opinions don't count.
|
|||
|
PF>
|
|||
|
PF> On the contrary, Frank. Your opinions are equally as important
|
|||
|
PF> as anyone else. By my statement above (hopefully you can gauge
|
|||
|
PF> the sentiment), I simply do not indulge myself to be duped into
|
|||
|
PF> responding to 2nd party posts in FidoNet -- it is too easy to
|
|||
|
PF> forge. While Fido is near and dear to my heart, there are
|
|||
|
PF> certain aspects about Fido messaging which are rather dubious.
|
|||
|
PF> Your message, while intelligent and forthright, was presented by
|
|||
|
PF> a second party; in this instance, I had my doubts as to its
|
|||
|
PF> authenticity.
|
|||
|
|
|||
|
A reasonable precaution, since there have been numerous posts from
|
|||
|
various people pretending to be other people. It was actually
|
|||
|
refreshing to see you treat this post as a valid post by Frank Tirado.
|
|||
|
|
|||
|
PF> This is perhaps the most offensive of your statements. I am told
|
|||
|
PF> that you are a systems security analyst with the Department of
|
|||
|
PF> Agriculture. I do not recall seeing you at any computer security
|
|||
|
PF> conferences, nor recall your participation in any antivirus
|
|||
|
PF> parlances. Do you have some hidden expertise in the antivirus
|
|||
|
PF> arena, or are you simply spouting opinionated idealisms?
|
|||
|
|
|||
|
Actually, Paul, I'm not sure what conferences Frank attended has to do
|
|||
|
with anything. As I started out with, I met you in November of 1991
|
|||
|
in D.C. (don't worry that you don't remember me) and was going to be a
|
|||
|
guest speaker at the cancelled conference in November of 1992 with the
|
|||
|
ICSA's volunteer field research program. I was also at the NCSA
|
|||
|
conference in DC (IVYP '92), LAN SEC '93 and dropped in on InfoExpo
|
|||
|
'93. Unfortunately budgets are tight and I can't get to anywhere near
|
|||
|
the number of conferences that I would like to get to. I did meet
|
|||
|
Frank for the first time in person at LAN SEC and saw him again at
|
|||
|
InfoExpo, so I can at least say he was at these conferences. But the
|
|||
|
point is, I don't understand what _your_ point was. There are only a
|
|||
|
handful of recognized "experts" in the field and unless you are
|
|||
|
willing to devote a lot of time to the process, it will likely stay
|
|||
|
that way in the foreseeable future. People like myself, don't need to
|
|||
|
be an expert on every little aspect of computer viruses. We don't
|
|||
|
make our living dissecting the viruses and creating scan strings for
|
|||
|
them. But what we need to be able to do though, is to be able to talk
|
|||
|
intelligently about viruses and how they work. We need to be able to
|
|||
|
provide a positive service to the companies we work with and to people
|
|||
|
we meet. Virus_Info has helped provide some of this information, so
|
|||
|
did AIS. There are a great many security professionals out there that
|
|||
|
are just trying to do the best job that we can, and unfortunately
|
|||
|
product vendors are often not the best resource for information. You
|
|||
|
have to weigh the information from a number of sources, both good and
|
|||
|
bad, then make the most informed opinion that you can. If you only
|
|||
|
look at one side of the coin, you will be cheating yourself and your
|
|||
|
customers.
|
|||
|
|
|||
|
PF> Mr. Tirado, what I may think has nothing to do with your
|
|||
|
PF> opinions, nor anyone else's for that matter. I have watched as
|
|||
|
PF> virus exchange systems have become the rave, and have absolutely
|
|||
|
PF> contributed to the spread and distribution of viruses, both
|
|||
|
PF> known and contrived. In the matter of AIS, I was outraged that a
|
|||
|
PF> government sponsorship was participating in these same
|
|||
|
PF> activities as other virus eXchange systems.
|
|||
|
|
|||
|
If you were outraged, you were right to express those emotions. As I have
|
|||
|
mentioned many times, I do not feel that AIS could be dumped into the
|
|||
|
category of Vx boards. It was a board to provide security related
|
|||
|
information.
|
|||
|
|
|||
|
PF> > I don't think so. I find it next to impossible to implicitly
|
|||
|
PF> > accept the word of a group whose bottom line is the almighty
|
|||
|
PF> > dollar. Besides, as a self-regulating group you guys can't even
|
|||
|
PF> > police themselves. I obtained my first 20 viruses from a vendor at
|
|||
|
PF> > the same conference where Peter Tippett first proposed not sharing
|
|||
|
PF> > viruses. The implications should be "crystal clear", considering
|
|||
|
PF> > the plethora live viruses and source code floating around with the
|
|||
|
PF> > imprimatur of the major AV software developers.
|
|||
|
PF>
|
|||
|
PF> I admit that the antivirus crowd has its share of prima donas
|
|||
|
PF> and is shadowed by the profit modus operandi. I am in no way
|
|||
|
PF> part of the group, either explicitly or implied. You obviously
|
|||
|
PF> do not know me.
|
|||
|
|
|||
|
I think that there are a lot of people that really don't know you! I
|
|||
|
still can't get over the time you posted that you were looking for a
|
|||
|
new moderator for Virus_Info. It put a human side onto you that few
|
|||
|
people see electronically. I do honestly respect your opinions, even
|
|||
|
though I may not agree with all of them. Most of the stuff that I
|
|||
|
deleted out of here, I left out because either I agreed with what you
|
|||
|
were saying or had very little objection to it.
|
|||
|
|
|||
|
PF> As a final note, I respect your opinions, if that is of any
|
|||
|
PF> consequence. I have been a member of the cyberspace community
|
|||
|
PF> since the late seventies and I have witnessed many, many
|
|||
|
PF> changes in the culture of the nets. The one thing that truly
|
|||
|
PF> upsets me, however, is the reckless abandon with which computer
|
|||
|
PF> viruses are made available to anyone with a modem.
|
|||
|
|
|||
|
See above. And yes sometimes it is very upsetting how easy computer
|
|||
|
viruses are made available to anyone with a modem. But it is just as
|
|||
|
upsetting to see all these claims made by vendors that you will never
|
|||
|
need another scanner or any other product. There is as much in-fighting
|
|||
|
among the AV people as there is among the virus writing groups.
|
|||
|
|
|||
|
PF> I have spent countless hours and dollars cleaning up computer
|
|||
|
PF> viruses from countless workstations and LANs. The financial loss
|
|||
|
PF> on the part of these companies is mind-boggling. While you decry
|
|||
|
PF> the freedom of folks to freely exchange potentially damaging
|
|||
|
PF> "information," at least keep this in mind.
|
|||
|
PF>
|
|||
|
PF> To quote you in CRYPT #16,
|
|||
|
PF>
|
|||
|
PF> "Too my mind, the AIS BBS was one of the best applications
|
|||
|
PF> of my taxpayer dollars," said the USDA's Tirado angrily
|
|||
|
PF> during an interview for this story. "The spineless curs!"
|
|||
|
PF>
|
|||
|
PF>
|
|||
|
PF> My actions were neither spineless nor uncalculated. I have done
|
|||
|
PF> what I intended to do. Private virus distribution systems are
|
|||
|
PF> next on the agenda...
|
|||
|
|
|||
|
Obviously, I had no problem with my taxpayers dollars being used to
|
|||
|
help support AIS! And I have also spent far too many hours and
|
|||
|
dollars cleaning up viruses from workstations and LANs. I think there
|
|||
|
are a lot of people in the security field, who would like to see it
|
|||
|
all just end. But the thing that keeps sitting in the back of my mind
|
|||
|
is that you said you would be willing to die for my freedom of
|
|||
|
expression! I don't want you to die, but what I also don't want to
|
|||
|
lose is the right of a person to code a virus on his or her computer!
|
|||
|
There have been laws passed against alcohol and laws passed against
|
|||
|
pornography and many, many other laws. And I _now_ believe that there
|
|||
|
will be some kinds of laws passed against computer viruses, but I hope
|
|||
|
that these laws are laws of responsibility for actions, not laws for
|
|||
|
what each person does with their computer. I understand that
|
|||
|
deliberately infecting another individual with a virus is against the
|
|||
|
law and maybe in the future the posting of computer viruses on _any_
|
|||
|
type of BBS might be regulated with various controls, but as I
|
|||
|
overheard Dr. Solomon say once, "As an Englishman, I am constantly
|
|||
|
amazing how willing Americans are to give up freedoms that they fought
|
|||
|
so hard for just two hundred years ago." I don't know if that was the
|
|||
|
exact quote, but that was very close to it. I hope that we are not
|
|||
|
once again giving up another freedom because of fear.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Thu, 22 Jul 1993 09:41:25 -0400 (EDT)
|
|||
|
From: "Paul R. Coen" <PCOEN@DRUNIVAC.DREW.EDU>
|
|||
|
Subject: File 3--Virus distribution
|
|||
|
|
|||
|
Someone recently implied that distributing virus code may soon be
|
|||
|
illegal in the United States.
|
|||
|
|
|||
|
"This is a difficult issue." I keep hearing that. No, it isn't --
|
|||
|
not in the United States, at least. Sure, *maybe* laws can be passed
|
|||
|
to prevent distribution of virus source code via a BBS. I'd love to
|
|||
|
see someone try to pass a law preventing a printed publication
|
|||
|
distributing source code. Since the virus code itself, on a page, is
|
|||
|
not harmful, you really can't make a case for banning it. Especially
|
|||
|
since a good case could be made against such a law being an exercise
|
|||
|
in "prior restraint."
|
|||
|
|
|||
|
Not harmful? No. Not sitting on a page. Or even in a text file on a
|
|||
|
computer. It hasn't been turned into anything harmful. It isn't a
|
|||
|
direct threat. The threat comes from the fact that it is information
|
|||
|
that could be used to make something harmful. There's an awful lot of
|
|||
|
information out there that falls into that category.
|
|||
|
|
|||
|
Who really uses source code? There aren't that many virus writers out
|
|||
|
there, and source code has been around for a while. I would guess
|
|||
|
that much of it is aquired by the curious -- people who have heard
|
|||
|
about viruses, want to see what it looks like, etc. They'll probably
|
|||
|
never write their own. They may never even assemble the ones they
|
|||
|
get. Who else gets it? Technical staff who need to know what a virus
|
|||
|
does in order to figure out what level of panic they need to instill
|
|||
|
in their users over a particular outbreak. In other words, you can't
|
|||
|
assess a threat unless you know what a virus does.
|
|||
|
|
|||
|
In that case, you have a few choices -- find good, accurate
|
|||
|
information on what the virus does (difficult), disassemble it
|
|||
|
yourself (tedious and time consuming), or find a cleaned-up
|
|||
|
disassembly somewhere. I'd prefer the latter. I've had to do the
|
|||
|
second more than once.
|
|||
|
|
|||
|
"Oh, but you don't *really* need to know. Just remove it!" Bull***t.
|
|||
|
Making your users freak out over Stoned to the same degree that you
|
|||
|
would want to panic them if they had something that was deliberately
|
|||
|
nasty on their drives is just not what you want to do. A sense of
|
|||
|
proportion is required here, and that is what is so often lacking in
|
|||
|
discussions about computer viruses. Your users want to know what the
|
|||
|
threat is, and unless you either a) lie and always say it is
|
|||
|
destructive or b) shrug and say "I don't know," you need the
|
|||
|
information.
|
|||
|
|
|||
|
Who else gets it? Not too many of the virus writers. They usually
|
|||
|
have it already. They have channels to sources for information like
|
|||
|
this. A lot of IS people don't -- and don't want to have to waste
|
|||
|
their time making the needed connections, either.
|
|||
|
|
|||
|
This reminds me of Rep. Markey (is that the right spelling? I can
|
|||
|
never remember) going off about _2600_ at the hearings. He didn't
|
|||
|
seem to realize that a) _2600_ is pretty innocuous and b) a lot of the
|
|||
|
subscribers are computer professionals who would like to know what is
|
|||
|
going on so that they can protect themselves. Vendors never give you
|
|||
|
details, that's for damn sure.
|
|||
|
|
|||
|
Where am I coming from on this? I was one of the people who dealt
|
|||
|
with the first virus outbreak at Drew University, about 4 years ago.
|
|||
|
Since then, I've managed to convince the school to site license
|
|||
|
anti-virus software. I've also had to deal with a lot more viruses.
|
|||
|
And I've wasted a lot of time. A good amount of that time, though,
|
|||
|
would have been saved if there was detailed, accurate information on
|
|||
|
viruses available, or if I could just get an already-done and
|
|||
|
commented disassembly. Not for something like stoned, but every once
|
|||
|
in a while we get something kind of goofy that anti-virus software
|
|||
|
can't deal with. I want to know what it is, where it copies the
|
|||
|
original boot sector to on the drive, if it has a payload, what's the
|
|||
|
trigger, etc. I've never written a virus. Could I? Yes. Will I?
|
|||
|
Probably not. I don't have the desire or the time.
|
|||
|
|
|||
|
Stop trying to dictate what kinds of information are "good" and what
|
|||
|
is "bad" in an area like this. Unless this violates privacy (and I
|
|||
|
would make exceptions for people whistleblowing on corporations or
|
|||
|
criminal activities), I don't really have an ethical problem with it.
|
|||
|
The information is there, and it is far more useful to try to teach
|
|||
|
people to be responsible than it is to try to track down everything
|
|||
|
that an irresponsible person could do damage with. You don't teach
|
|||
|
ethics by declaring some piece of knowledge taboo and trying to stamp
|
|||
|
it out of existence.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.58
|
|||
|
************************************
|
|||
|
|
|||
|
|