755 lines
36 KiB
Plaintext
755 lines
36 KiB
Plaintext
|
|
|||
|
Computer underground Digest wed Nov 1, 1995 Volume 7 : Issue 86
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow Master: Stanton McCandlish
|
|||
|
Field Agent Extraordinaire: David Smith
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|||
|
|
|||
|
CONTENTS, #7.86 (Wed, Nov 1, 1995)
|
|||
|
|
|||
|
File 1--CyberAngels FAQ file
|
|||
|
File 2--Re: Attention Spammer: The War Has Started
|
|||
|
File 3--Scientology Attacks Carnegie Mellon University
|
|||
|
File 4--Head of the French hackers group was a secret service agent...
|
|||
|
File 5--Cu Digest Header Info (unchanged since 18 Oct, 1995)
|
|||
|
|
|||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|||
|
|
|||
|
---------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Mon, 30 Oct 1995 11:54:48 -0600
|
|||
|
From: bladex@BGA.COM(David Smith)
|
|||
|
Subject: 1--CyberAngels FAQ file
|
|||
|
|
|||
|
CYBERANGELS: FAQ
|
|||
|
|
|||
|
The Guardian Angels "CyberAngels" project is an all-volunteer
|
|||
|
Internet patrol and monitoring project started by senior members of the world
|
|||
|
famous "International Alliance of Guardian Angels", whose HQ is in New York
|
|||
|
City.
|
|||
|
|
|||
|
We are a worldwide informal group of volunteers, whose mission is to be a
|
|||
|
Cyberspace "Neighborhood Watch".
|
|||
|
|
|||
|
THE INTERNET IS OUR NEIGHBORHOOD - LET'S LOOK AFTER IT!
|
|||
|
|
|||
|
1) How did the CyberAngels project start?
|
|||
|
|
|||
|
The Cyberangels project was born in June 1995, after a discussion between
|
|||
|
senior Guardian Angels about the apparent lawlessness of the Internet world
|
|||
|
CyberCity. Guardian Angels leaders on the West Coast of the USA (Los Angeles
|
|||
|
and San Francisco) had been online for the previous 2 years, and when
|
|||
|
Guardian Angels Founder and President Curtis Sliwa himself went online in New
|
|||
|
York City and got his email address, we began a serious discussion about
|
|||
|
CyberCrime and how the Guardian Angels might respond to it.
|
|||
|
|
|||
|
Curtis Sliwa has a daily talk radio show on WABC in the New York state area.
|
|||
|
Once he had an email address, he made the announcement over the radio, and
|
|||
|
his email box immediately started to receive letters telling stories of
|
|||
|
online harassment (stalking), hate mail, pedophiles trying to seduce children
|
|||
|
in live chat areas, and complaints from worried parents about the easy access
|
|||
|
their children had to hard core pornographic images.
|
|||
|
|
|||
|
Realizing that there was a big issue at stake here, Curtis began discussing
|
|||
|
the Internet issues on his talk show, and as the debate raged daily, and the
|
|||
|
letters kept pouring in, we realized that perhaps we were being asked to DO
|
|||
|
SOMETHING.
|
|||
|
|
|||
|
We sat down and discussed what we the Guardian Angels could do to help
|
|||
|
reassure parents and to make the Net a safer place for kids and others. The
|
|||
|
answer was simple - we should do what we do in the streets. The Internet is
|
|||
|
like a vast city: there are some rough neighborhoods in it, including "red
|
|||
|
light" areas. Why not patrol the Internet, particularly in these "rough
|
|||
|
neighborhoods" just like a Neighborhood Watch? Just like our own Guardian
|
|||
|
Angels Community Safety Patrols. And why not recruit our volunteers from the
|
|||
|
very people who inhabited this vast world CyberCity? Who better than to
|
|||
|
cruise the Net watching out for people's safety than members of the Internet
|
|||
|
community themselves? After all, who else could do it? Never an
|
|||
|
organization to blame it on, or leave it to the government, we decided to do
|
|||
|
something ourselves.
|
|||
|
|
|||
|
So the CyberAngels program was set up - an all volunteer team, providing a
|
|||
|
CyberSpace Community Safety Patrol and an Internet monitoring service.
|
|||
|
|
|||
|
Current CyberAngels Chief Coordinator is Colin "Gabriel" Hatcher.
|
|||
|
|
|||
|
|
|||
|
2) What is the purpose of the CyberAngels project?
|
|||
|
|
|||
|
The purpose of the project is
|
|||
|
a) To promote and protect the idea that the same laws of decency and respect
|
|||
|
for others that apply in our streets should apply also to the Internet.
|
|||
|
b) To protect our children from online abuse.
|
|||
|
c) To pressurize service providers to enforce their Terms of Service.
|
|||
|
d) To give advice and assistance to victims of hate mail, harassment and
|
|||
|
sexual abuse online.
|
|||
|
e) To watch out for users violating terms of service by committing
|
|||
|
cybercrimes and to report them to relevant authorities (Sysadmins, or even
|
|||
|
Police).
|
|||
|
f) To help to make unnecessary Government legislation by showing Government
|
|||
|
that the World Net Community takes the safety of our children and the well
|
|||
|
being of all its members seriously.
|
|||
|
|
|||
|
|
|||
|
3) How does the project work?
|
|||
|
|
|||
|
Volunteers send their information to Gabriel at ganetwatch@aol.com and we
|
|||
|
send them a copy of our FAQ. Each volunteer volunteers to spend a minimum of
|
|||
|
2 hours per week cruising the Net and looking for places where they believe
|
|||
|
there may be unacceptable activity. It is up to each member where they go
|
|||
|
and what they look for, although sometimes we may send a bulletin to all
|
|||
|
members advising them to search a particular area.
|
|||
|
|
|||
|
If a volunteer finds criminal activity on the Net, GANetWatch functions as a
|
|||
|
clearing house for information. We do encourage members to report violations
|
|||
|
themselves, but we ask that copies of all actions taken are forwarded to us.
|
|||
|
Members may choose instead to simply report the problem to us and leave it
|
|||
|
to our more experienced members to deal with.
|
|||
|
|
|||
|
We keep our members informed via email, with a regular update on what's going
|
|||
|
on.
|
|||
|
|
|||
|
4) Why do we need volunteers?
|
|||
|
|
|||
|
The Internet Community is huge - around 40-50 million people, and growing
|
|||
|
every day. There are hundreds of new Web sites each week. The more
|
|||
|
volunteers we have, the more effective we can be. And by giving a little of
|
|||
|
your time to looking after the welfare of the Net, you can make a real
|
|||
|
difference!
|
|||
|
|
|||
|
WE NEED MORE VOLUNTEERS!
|
|||
|
|
|||
|
Anyone can be a CyberAngel. The only requirement is that you commit a
|
|||
|
minimum of 2 hours per week to the project. No previous experience or
|
|||
|
special skills are necessary...although a computer and an Internet account
|
|||
|
would be useful! :)
|
|||
|
|
|||
|
JOIN US NOW! LOOK AFTER YOUR CYBERCITY!
|
|||
|
|
|||
|
We are anonymous in cyberspace. Noone cruises with a Cyberangels badge. And
|
|||
|
we do not encourage our volunteers to identify themselves online. We DO NOT
|
|||
|
advise our volunteers to challenge cybercriminals directly, neither by
|
|||
|
arguing in live areas, nor by flaming in emails, nor by counter-postings on
|
|||
|
message boards / newsgroups. Being a CyberAngel involves no risk or
|
|||
|
danger. You are volunteering only to be eyes watching the Net.
|
|||
|
|
|||
|
|
|||
|
5) What should volunteers be looking out for?
|
|||
|
|
|||
|
We are searching to uncover and prevent:
|
|||
|
|
|||
|
a) Child abuse and pedophilia;
|
|||
|
b) The trading in images of child pornography;
|
|||
|
b) Sexual harassment;
|
|||
|
c) Hate crimes, including harassment;
|
|||
|
d) Fraud schemes operating on the Net (particularly credit card fraud);
|
|||
|
e) Software piracy;
|
|||
|
f) Computer virus developments;
|
|||
|
g) Terrorism, bomb-making, weapons trading etc.
|
|||
|
|
|||
|
Activities between consenting adults (providing they are within the law) are
|
|||
|
not our concern.
|
|||
|
|
|||
|
Searching for the above violations our volunteers are encouraged to visit:
|
|||
|
|
|||
|
a) Live talk sites (Chat Rooms, IRC areas, MUDs etc);
|
|||
|
b) Kids and Teens sites of all types;
|
|||
|
c) Message boards, where visitors can leave postings;
|
|||
|
d) Newsgroups (particularly "alt." newsgroups);
|
|||
|
e) Any sites providing material / discussions / images / contacts of a
|
|||
|
sexually explicit nature (there are thousands!) These are unsupervised areas
|
|||
|
of the Net where children may roam. For example, parts of the World Wide Web
|
|||
|
are online porno stores with the doors wide open, and with no staff inside.
|
|||
|
Kids can easily surf by.... The only warning says "Don't come in here if you
|
|||
|
are under 18". But there is noone there to check what is happening. And
|
|||
|
naturally enough kids are wandering in and looking at the merchandise. This
|
|||
|
is not acceptable on the streets of our cities, and yet we are allowing this
|
|||
|
on the Net.
|
|||
|
|
|||
|
When discovering suspicious or criminal activity, CyberAngels should record
|
|||
|
the date, time and place and nature of the violation and write down the
|
|||
|
user's full ID and InterNet address. Mail can be forwarded to
|
|||
|
ganetwatch@aol.com, or volunteers may copy and paste information to send.
|
|||
|
|
|||
|
Please follow our advice and DO NOT attempt to challenge cybercriminals
|
|||
|
directly. Simply report the violations to us at Netwatch, and also to the
|
|||
|
System Administrators, or Service Providers, of the cybercriminal. Email can
|
|||
|
usually be sent to "Postmaster@..." or "Sysop@..." or "Sysadmin@...", or find
|
|||
|
out by writing to/calling the company (the cybercriminal's Service Provider)
|
|||
|
and asking them who you contact to report a violation.
|
|||
|
|
|||
|
As far as Web Sites are concerned, w e are encouraging parents to use some of
|
|||
|
the new filtering software, that can screen out chosen areas of the WWW.
|
|||
|
Organizations like **"Safesurf"** are campaigning for Websites to register
|
|||
|
as "child friendly", and are on the cutting edge in helping to develop new
|
|||
|
software for parents to regulate their children's access to the Internet. We
|
|||
|
fully support Safesurf and are working together with them. Together we
|
|||
|
believe that CyberAngels and Safesurf will form an irresistible alliance for
|
|||
|
Good on the Net!
|
|||
|
|
|||
|
|
|||
|
6) How will the project develop?
|
|||
|
|
|||
|
The first stage of our project is to involve volunteers in pressurizing
|
|||
|
Internet Providers to enforce their terms of service. This involves the
|
|||
|
accumulation of information and the reporting of violations to Service
|
|||
|
Providers.
|
|||
|
|
|||
|
The second stage of our project involves the Police. Information about
|
|||
|
crimes will be passed to the relevant Police authorities, particularly Sex
|
|||
|
Crime departments and Fraud departments.
|
|||
|
|
|||
|
For the third stage of our project we will have a section on our Web Site
|
|||
|
where we will be offering rewards for information about various
|
|||
|
cybercriminals. There will be the equivalent of "Wanted" posters, asking for
|
|||
|
further information about people who have already been reported to us, and
|
|||
|
whom we have verified as cybercriminals.
|
|||
|
|
|||
|
|
|||
|
7) Is this a US First Amendment Issue? What about Freedom of Speech? Don't
|
|||
|
people have a right on the Internet to express their views freely? Are the
|
|||
|
CyberAngels proposing censorship?
|
|||
|
|
|||
|
CyberAngels support the First Amendment of the US Constitution.
|
|||
|
|
|||
|
We are not trying to abolish free speech, but we believe that freedom of
|
|||
|
speech should not be exercised if by exercising it you are violating someone
|
|||
|
else's basic rights. For example I could claim freedom of speech to justify
|
|||
|
talking sexually and obscenely to a young child - but we all know that that
|
|||
|
is wrong. This is not a First Amendment issue. Breaking the law takes
|
|||
|
precedence over "freedom of speech". We are all granted our freedom, but not
|
|||
|
the freedom to hurt, corrupt, abuse or harass innocent people.
|
|||
|
|
|||
|
The First Amendment was not written to protect pedophiles. No criminal can
|
|||
|
claim "freedom of expression" to justify a crime. Child pornographers on the
|
|||
|
Net are criminals and should be brought to justice.
|
|||
|
|
|||
|
8) The Internet is huge and unregulated. Surely such a project is an
|
|||
|
impossible task?
|
|||
|
|
|||
|
The fact that the Net is impossible to maintain crime-free is no reason for
|
|||
|
us to do nothing. Each person does their part. If everyone picked up their
|
|||
|
own trash, there would be no need for garbage collectors. The same could be
|
|||
|
said of our streets. We are not naively hoping to eliminate crime from the
|
|||
|
Net, only to play our part in protecting the innocent majority from the
|
|||
|
violations of the tiny tiny minority.
|
|||
|
|
|||
|
The Internet Community consists of millions of people. That is millions of
|
|||
|
potential CyberAngels.
|
|||
|
|
|||
|
TOGETHER WE CAN MAKE A DIFFERENCE!
|
|||
|
|
|||
|
|
|||
|
9) What kinds of changes would the Guardian Angels / CyberAngels like to see?
|
|||
|
|
|||
|
a) We would like to see an improvement in User identification. User ID is
|
|||
|
impossible to verify or trace back. The very anonymity of Users is itself
|
|||
|
causing an increase in rudeness, sexual abuse, flaming, and crimes like
|
|||
|
pedophile activity. We the Net Users must take responsibility for the
|
|||
|
problem ourselves. One of our demands is for more accountable User IDs on
|
|||
|
the Net. When people are anonymous they are also free to be criminals. In a
|
|||
|
riot you see rioters wearing masks to disguise their true identity. The same
|
|||
|
thing is happening online. We would like to see User ID much more thoroughly
|
|||
|
checked by Internet Service Providers.
|
|||
|
b) We would like to see Websites registering as "Child Safe" or "Child
|
|||
|
Friendly", so that parents can use the new software to restrict children's
|
|||
|
access. We support Safesurf in their campaign on this issue.
|
|||
|
c) We would like to see Internet Service Providers enforcing their Terms of
|
|||
|
Service.
|
|||
|
d) We would like to see a worldwide blacklist of known cybercriminals,
|
|||
|
circulated to all Providers and regularly updated, so that these people could
|
|||
|
be denied access to Internet accounts.
|
|||
|
e) We would like to see the whole Internet Community united together to
|
|||
|
protect the Net from all crimes and violations.
|
|||
|
|
|||
|
JOIN US, NOW!
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 27 Oct 95 11:43:28 PDT
|
|||
|
From: Barry Gold <barryg@sparc.SanDiegoCA.ATTGIS.COM>
|
|||
|
Subject: 2--Re: Attention Spammer: The War Has Started
|
|||
|
|
|||
|
Instead of using the extra-legal methods so heavily hinted-at in Patrick
|
|||
|
Townson's comments, I think we should look at technological methods to
|
|||
|
defend ourselves against Spammers. I don't think we can stop them
|
|||
|
althogether, but we can probably make their life more difficult and
|
|||
|
get rid of all but two classes:
|
|||
|
(A) First-time offenders that don't know enough to cover their tracks
|
|||
|
(B) A very few, really dedicated and net-wise spammers who won't
|
|||
|
give a damn about the law.
|
|||
|
|
|||
|
Class (A), of course, can be dealt with by traditional methods: e-mail
|
|||
|
the ISP and get their account cancelled.
|
|||
|
|
|||
|
Class (B) will probably require resort to the law, but I think we can
|
|||
|
push them to the point where they will have to commit actual crimes in
|
|||
|
order to get their spam through - which is why only a very few of them
|
|||
|
will remain.
|
|||
|
|
|||
|
Let me (try to) explain:
|
|||
|
|
|||
|
The latest round of spam (the "Magazine subscription service") came
|
|||
|
from an obviously forged address. In general, the more experienced
|
|||
|
spam artists forge the headers of their spam to make themselves harder
|
|||
|
to track down. (Which means it takes longer before we can get their
|
|||
|
account cancelled.) So, we make this a little harder:
|
|||
|
|
|||
|
Definitions:
|
|||
|
"real site": something with an IP address that is up 24-hours a
|
|||
|
day (more or less, allowing for possible down time due to
|
|||
|
telecomm problems, software bugs, hardware faults, etc.).
|
|||
|
|
|||
|
To qualify as a "real site", you must be able to ping it and
|
|||
|
open an SMTP connection to it on the standard port (25).
|
|||
|
|
|||
|
"hop": something that shows up in "received:" headers. Each "hop"
|
|||
|
therefore causes either one "received: from... by..." header
|
|||
|
or a single pair of "Received: from" and "Received: by"
|
|||
|
headers, depending on the mailer daemons involved.
|
|||
|
|
|||
|
Note that this isn't the same as the IP "hop" involved in the
|
|||
|
"hop count", "time-to-live", etc. fields.
|
|||
|
|
|||
|
Assumption:
|
|||
|
A legitimate e-mail address is no more than "n" (say 2) hops away
|
|||
|
from a "real site". If it appears to be further away than that,
|
|||
|
the probability is that one or more "received:" headers have been
|
|||
|
forged to conceal the true origin of the message.
|
|||
|
|
|||
|
1 hop would be even better, because then we can at least verify
|
|||
|
the site names for every message (see below).
|
|||
|
|
|||
|
|
|||
|
1. Mailing lists: two steps:
|
|||
|
|
|||
|
a) Improve majordomo and listserv to recognize obviously forged
|
|||
|
headers and dump the messages. This is a simple change. If the
|
|||
|
supposedly "verified" From: line is non-conforming, trash the
|
|||
|
message. Some examples include:
|
|||
|
. more than one "from" address
|
|||
|
. totally ridiculous site names, especially where the
|
|||
|
top-level domain (the last one) isn't one of the "standard"
|
|||
|
three-letter names or a two-letter country code.
|
|||
|
|
|||
|
b) A further improvement involves actually verifying the From:
|
|||
|
line before sending the message out again. This would be more
|
|||
|
work, but would make the spammer's job much more difficult. When
|
|||
|
processing a message, majordomo/listserv should open an SMTP
|
|||
|
connection to the site shown in the "From:" header. If that can't
|
|||
|
be done, the Return-Path and/or Received: headers should be parsed
|
|||
|
to find a system that _can_ be connected to.
|
|||
|
|
|||
|
If the From: site is "real", majordomo/listserv should go further
|
|||
|
and verify that a RCPT-TO: will be accepted by the smtpd at that site.
|
|||
|
If it isn't real, at least verify that the next-site in the
|
|||
|
return-path is acceptable (RCPT-TO: postmaster@site).
|
|||
|
|
|||
|
2. News: similar two steps
|
|||
|
|
|||
|
a) a daemon that runs periodically and trashes anything in the
|
|||
|
spool directories that has a bad From: line.
|
|||
|
|
|||
|
b) verify From: lines as above. This might be done when the
|
|||
|
message is accepted by nntpd (or uucp, for sites that still use
|
|||
|
it). Or the above daemon might do the verify for each message it
|
|||
|
scans.
|
|||
|
|
|||
|
Note that step b) can be improved by cacheing site names known to be
|
|||
|
good and possibly even user names at those sites.
|
|||
|
|
|||
|
So, I can hear you asking, what does all this get us? The spammers
|
|||
|
will just put "real" site names and real usernames in their "From:"
|
|||
|
headers, right? Then when the software checks it out, the supposed
|
|||
|
"From:" site will say "sure, I exist and I've got a user with that
|
|||
|
name". And the message will be posted/remailed, and the spam will go
|
|||
|
on.
|
|||
|
|
|||
|
BUT, if we fix things so the spammer can only get a message in with a
|
|||
|
real username, then those messages will be much closer to "forgeries" in
|
|||
|
the legal sense: a document issued by person B, and purporting to issue
|
|||
|
from person A. I'm not a lawyer, so I'm not sure if an ordinary
|
|||
|
letter qualifies for this purpose (as opposed to a check, deed,
|
|||
|
contract, etc.) but it sure brings them a lot closer to a prosecutable
|
|||
|
offense.
|
|||
|
|
|||
|
And if it isn't currently unlawful, I think we can get the legal
|
|||
|
definition expanded without getting the government into
|
|||
|
constitutionally questionable areas of regulating free speech. We
|
|||
|
don't need the govt telling people what's "on-topic" for a given
|
|||
|
newsgroup or mailing list. No regulation of "commercial" speech in
|
|||
|
areas dedicated to "non-commercial" use -- and just try getting such a
|
|||
|
law through a Congress dominated by commercial interests anyway.
|
|||
|
|
|||
|
Just a simple rule that makes it a crime to claim to be someone else.
|
|||
|
Note that this doesn't outlaw pseudonyms per se. Using an anonymous
|
|||
|
account, or one where you've used "chfn" or equivalent to change the
|
|||
|
name to something other than what you use for other purposes, wouldn't
|
|||
|
be unlawful -- the basic rule still applies: you can use any name you
|
|||
|
like, as long as the purpose isn't to defraud others. But pretending
|
|||
|
to be some other _real_ person would be a crime -- if not under
|
|||
|
current law, then under rules that could be enacted, would be
|
|||
|
defensible under constitutional challenge, and wouldn't be excessively
|
|||
|
intrusive in our freedoms on the net.
|
|||
|
|
|||
|
In fact, such a law needn't (and _shouldn't_) mention the network,
|
|||
|
computers, etc. at all. It would be unlawful to sign someone else's
|
|||
|
name to a letter sent via snailmail, e-mail, netnews, posted on a
|
|||
|
supermarket bulletin board, or carved in the bark of a tree
|
|||
|
(S.K. -heart- J.S.).
|
|||
|
|
|||
|
Of course, this still leaves the dedicated few who don't care about
|
|||
|
the law, but they will be few and very much on the fringes, _not_ the
|
|||
|
big companies that we usually worry about. Just as existing rules
|
|||
|
(and social controls) help keep down the number and intrusiveness of
|
|||
|
crackers, I think this scheme would keep down the number and volume of
|
|||
|
the spam artists.
|
|||
|
|
|||
|
So, whatdya think?
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 1 Nov 1995 00:34:11 -0800 (PST)
|
|||
|
From: Declan McCullagh <declan@EFF.ORG>
|
|||
|
Subject: 3--Scientology Attacks Carnegie Mellon University
|
|||
|
|
|||
|
Reprinted from FOCUS, vol. 25, no. 1, October 1995, page 4:
|
|||
|
|
|||
|
SCIENTOLOGY ATTACKS CARNEGIE MELLON UNIVERSITY
|
|||
|
|
|||
|
by Declan McCullagh (declan@well.com)
|
|||
|
|
|||
|
|
|||
|
A flame-war raging on the Internet over the Church of Scientology's
|
|||
|
attempts to halt the distribution of its bizarre secret scriptures has
|
|||
|
spread to Carnegie Mellon University.
|
|||
|
|
|||
|
When SCS senior research scientist Dave Touretzky placed a copy of a
|
|||
|
Scientology tract on the World Wide Web in August, the church immediately
|
|||
|
moved to cancel his netnews posts that mentioned the web pages. It also
|
|||
|
faxed printouts of the pages to CMU's attorneys and threatened a lawsuit
|
|||
|
over "trade secret violations."
|
|||
|
|
|||
|
The same day, University Attorney Walter DeForest called Touretzky, who
|
|||
|
agreed to remove the 136-page tract from his web site. "DeForest didn"t
|
|||
|
know what the legal status was of the court records and copyrighted
|
|||
|
documents. He was going to research this. In order to spare CMU and
|
|||
|
myself an unnecessary lawsuit, I voluntarily took the materials down," says
|
|||
|
Touretzky.
|
|||
|
|
|||
|
Complicating the problem for CMU was the files' origin. Touretzky's web
|
|||
|
site contained documents that were then available to anyone who walked into
|
|||
|
the federal court building in Los Angeles. The court documents were later
|
|||
|
sealed after attorneys for Scientology successfully argued that copyright
|
|||
|
laws prohibiting unauthorized republication apply to the documents.
|
|||
|
|
|||
|
"This is not an easy area of the law since it combines the Internet with
|
|||
|
controversial subjects," DeForest says. "It's normal and appropriate for a
|
|||
|
university to respect copyright -- if it exists. It's consistent with
|
|||
|
academic freedom."
|
|||
|
|
|||
|
The threats against CMU are the most recent in a series of lawsuits the
|
|||
|
church has filed against Internet service providers, newspapers, magazines
|
|||
|
-- and especially against its critics, who argue Scientology is a cult that
|
|||
|
brainwashes and blackmails its members and harasses defectors and critics.
|
|||
|
|
|||
|
"The Church of Scientology has made a practice of suing people who have
|
|||
|
been critics of their practices or their tactics. The fact is that these
|
|||
|
lawsuits are not meritorious," says Mike Godwin, staff counsel for the
|
|||
|
Electronic Frontier Foundation, an online civil liberties group based in
|
|||
|
San Francisco.
|
|||
|
|
|||
|
In August the church sued one of its former members for posting anti-church
|
|||
|
information to the Internet and persuaded a federal judge to permit the
|
|||
|
seizure of his computer. The church then sued The Washington Post for
|
|||
|
reporting on the computer seizure and quoting from public court records.
|
|||
|
Ironically, the court documents were generated by Scientology's previous
|
|||
|
lawsuit against TIME magazine, which in 1991 ran a cover story calling the
|
|||
|
church a "thriving cult of greed and power."
|
|||
|
|
|||
|
Despite Scientology's best efforts, its religious teachings remain publicly
|
|||
|
available on the Internet -- not just because of the efforts of critics and
|
|||
|
free-speech advocates, but because network users delight in passing around
|
|||
|
the excerpts, which read like one of Scientology founder L. Ron Hubbard's
|
|||
|
pulp science fiction novels.
|
|||
|
|
|||
|
Hubbard's scriptures claim that 75 million years ago an evil galactic
|
|||
|
overlord named Xenu solved the galaxy's overpopulation problem by freezing
|
|||
|
the excess population and transporting the bodies to Teegeeack, now called
|
|||
|
Earth. After the hapless travelers were defrosted, they were chained to
|
|||
|
volcanoes that were blown up by hydrogen bombs. Then, Hubbard writes in
|
|||
|
Operating Thetan 7: "The Pacific area ones were taken in boxes to Hawaii
|
|||
|
and the Atlantic area ones to Las Palmas and there "packaged." His name
|
|||
|
was Xenu. He used renegades."
|
|||
|
|
|||
|
Elsewhere in the scriptures, Hubbard requires church acolytes to go to a
|
|||
|
park or a zoo "with many types of life and communicate with each of them
|
|||
|
until you know the communication is received and, if possible, returned."
|
|||
|
The disembodied spirits of the dead are called "thetans" and supposedly
|
|||
|
still haunt mankind, but Scientology offers ways to "audit" them away --
|
|||
|
for a price.
|
|||
|
|
|||
|
Church members pay tens of thousands of dollars and wait years before
|
|||
|
they"re "cleared" for this "Operating Thetan" (OT) knowledge. (They"re
|
|||
|
required to wait this long. The tracts threaten pneumonia if the mentally
|
|||
|
unprepared read the OT texts.)
|
|||
|
|
|||
|
Now, to the church's dismay, any of the Internet's 35 million users can
|
|||
|
peruse the most private -- and lucrative -- teachings of Scientology. The
|
|||
|
band of online dissidents understands this. Many are former church members
|
|||
|
who became disaffected and left. Some have used a private anti-cult
|
|||
|
bulletin board system in Colorado to distribute news on the activities of
|
|||
|
the church. Others have relied on netnews.alt.religion.scientology, a
|
|||
|
Usenet newsgroup, to disseminate information about Scientology tactics.
|
|||
|
|
|||
|
If alt.religion.scientology is the front line of the war on the Internet,
|
|||
|
then the newsgroup is the Internet's equivalent of a food fight in a school
|
|||
|
cafeteria. The attacks on the church flowing through
|
|||
|
alt.religion.scientology once prompted a church attorney to try and delete
|
|||
|
the newsgroup from every computer on the Internet via an "rmgroup" control
|
|||
|
message.
|
|||
|
|
|||
|
That raised the netiquette hackles of many Internet users and escalated the
|
|||
|
online fight from a small-scale battle into a full-scale war. It's one the
|
|||
|
church can"t win, says EFF's Godwin. "The church is going to lose.
|
|||
|
They"re making so many people angry that they"re succeeding in motivating
|
|||
|
people to become critics," says Godwin.
|
|||
|
|
|||
|
On the WELL, a computer conferencing system in California, Godwin posted:
|
|||
|
"If the Church wanted the records sealed, it could have sought that. In
|
|||
|
the meantime, copyright interests do not normally trump the public's right
|
|||
|
to know the details of court proceedings."
|
|||
|
|
|||
|
Another participant in the discussion, Jerod Pore, wrote that
|
|||
|
alt.religion.scientology is "the site of the most vicious flame-war on the
|
|||
|
Net: a flame-war that includes forged cancels of articles, with the
|
|||
|
forgeries coming from sites such as the Department of Energy, real lawsuits
|
|||
|
being filed to shut people up, death threats, midnight phone calls and the
|
|||
|
like."
|
|||
|
|
|||
|
Other net-skirmishes have touched upon Scientology's attempts to censor
|
|||
|
anti-church netnews posts by deleting them from Usenet servers; the
|
|||
|
church's threats to sue people who posted the above-quoted lines about
|
|||
|
communicating with animals at the zoo; the church's attempt to file
|
|||
|
university disciplinary charges against a California college student; the
|
|||
|
church's attempt to force Caltech to reveal the identity of one of its
|
|||
|
alumni users; and the church's attempt to remove the contents of a web page
|
|||
|
maintained by an MIT user.
|
|||
|
|
|||
|
But perhaps what riled online "netizens" the most was the church's raids on
|
|||
|
Finland's anon.penet.fi anonymous remailer and on the Colorado anti-cult
|
|||
|
bulletin board system. In both cases, the church was able to seize
|
|||
|
information to protect its "trade secrets" under international law. The
|
|||
|
secrets in question? Xenu and the galactic conspiracy. On the Internet,
|
|||
|
thousands of users every day rely on Julf Helsingus' anon.penet.fi server
|
|||
|
to communicate anonymously with other users or post to controversial
|
|||
|
netnews bboards under a numerical pseudonym automatically assigned by his
|
|||
|
computer. When Scientology and the Finnish police forced Helsingus to
|
|||
|
reveal the true name of one of his users, his subscribers on the Internet
|
|||
|
realized how vulnerable their identities were.
|
|||
|
|
|||
|
And more sparks started flying on alt.religion.scientology. Recently, the
|
|||
|
41-year-old church has experienced setbacks in its attempts to stifle its
|
|||
|
critics. Last month, a federal judge in Colorado upheld free speech claims
|
|||
|
and ordered Scientology to return the computers and files seized from two
|
|||
|
men who ran an anti-Scientology bulletin board. An ad-hoc group of network
|
|||
|
users formed and successfully fought the church's attempts to cancel
|
|||
|
netnews posts. On September 15, the judge in The Washington Post case said
|
|||
|
she thought the newspaper had acted appropriately in printing the Xenu
|
|||
|
excerpts and that Scientology had gone too far in snooping through the
|
|||
|
computer they seized in August. She ordered the church to "immediately
|
|||
|
return and restore to [the defendant] all seized materials in their exact
|
|||
|
original condition." The uproar from the church's raids on computers
|
|||
|
worldwide is why CMU's Touretzky became involved. "I realized there was a
|
|||
|
great interest in this material and I knew about the forged cancels. I
|
|||
|
wanted to further an educational purpose in a way that would be protected
|
|||
|
from vandals," says Touretzky.
|
|||
|
|
|||
|
Even though Touretzky has removed the court records from his site, he
|
|||
|
maintains a list of their current locations on the Internet. After
|
|||
|
Scientology threatened an Internet service provider in the Netherlands,
|
|||
|
Dutch collections of the United States documents sprouted overnight. "Many
|
|||
|
of the Dutch sites are copies of my site. My site's still up, but with
|
|||
|
hyperlinks to the Dutch sites," Touretzky says.
|
|||
|
|
|||
|
A member of the Dutch House of Commons has put the materials on his home
|
|||
|
page, and the materials are popping up elsewhere. Once Xenu is out of the
|
|||
|
bottle, there's no putting him back.
|
|||
|
|
|||
|
|
|||
|
DECLAN MCCULLAGH
|
|||
|
|
|||
|
For more information, look at: http://www.cs.cmu.edu/~dst/Fishman on the
|
|||
|
World Wide Web.
|
|||
|
|
|||
|
[ screen dump of a Netscape display of the 1991 TIME Magazine volcano cover,
|
|||
|
"The Cult of Greed", showing the URL for the Fishman web site. ]
|
|||
|
|
|||
|
................
|
|||
|
|
|||
|
FOCUS -- in seven issues a year -- is a publication of the faculty and
|
|||
|
staff of Carnegie Mellon University. Many of the articles in FOCUS express
|
|||
|
the opinions of individual members of the CMU community; unless so
|
|||
|
indicated, they should not be construed as reflecting university policy.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 28 Oct 1995 18:56:54 GMT
|
|||
|
From: JeanBernard_Condat@EMAIL.FRANCENET.FR(JeanBernard Condat)
|
|||
|
Subject: 4--Head of the French hackers group was a secret service agent...
|
|||
|
|
|||
|
Bonjour,
|
|||
|
|
|||
|
In the October 12th issue of "Intelligence Newsletter", I note the
|
|||
|
following text that the editor accept to put at the end of this email.
|
|||
|
Don't hesitate to send me all your comments related at this fact...
|
|||
|
|
|||
|
The _Chaos Digest_ from the CCCF was build in this mission by me!
|
|||
|
|
|||
|
Regards,
|
|||
|
|
|||
|
-- Jean-Bernard Condat
|
|||
|
47 rue des Rosiers, 93400 Saint-Ouen, France
|
|||
|
Phone: +33 141238807, portable phone: +33 07238628
|
|||
|
JeanBernard_Condat@eMail.FranceNet.FR
|
|||
|
|
|||
|
========================================================
|
|||
|
A Computer Spy Unmasked
|
|||
|
|
|||
|
For years Jean-Bernard Condat has undoubtedly been France's
|
|||
|
best-known computer hacker. Appearing on television talk shows,
|
|||
|
launching provocative operations and attending computer seminars, he
|
|||
|
founded the Chaos Computer Club France (CCCF) in 1989 as France's
|
|||
|
answer to the renowned Chaos Computer Club in Germany. French
|
|||
|
journalist Jean Guisnel revealed this week in a book entitled Guerres
|
|||
|
dans le Cyberespace, Internet et les Services Secrets (Cyberspace
|
|||
|
War, Internet and Secret Services) published by the Editions La
|
|||
|
Decouverte (ISBN 2-7071-2502-4) that Condat has been controlled from
|
|||
|
the outset by the Direction de la Surveillance du Territoire. A
|
|||
|
student in Lyons where he followed music and information technology
|
|||
|
courses, Condat was taken in hand by the local branch of the DST in
|
|||
|
1983 after committing some "minor misdemeanor." The DST organized his
|
|||
|
participation in hacker meetings abroad. Guisnel said that from 1989
|
|||
|
onwards "Jean-Luc Delacour, Condat's handler at the DST, decided that
|
|||
|
his proteg was ready for bigger and better things." He asked Condat
|
|||
|
to start up CCCF, then worked to promote his public image in order
|
|||
|
that the largest number of hackers would gravitate towards him. The
|
|||
|
DST printed hundreds of T-shirts and thousands of post cards for him.
|
|||
|
When Thomson and Pechiney found that hackers were trying to break
|
|||
|
into their systems Condat enabled the French counter-espionage
|
|||
|
service to trace the intruders. When he was taking part in a
|
|||
|
television program in 1991 in which he was to demonstrate how to hack
|
|||
|
into a system his handler dictated what he should say in his
|
|||
|
earphones. Questioned by Intelligence Newsletter, Condat admitted he
|
|||
|
had worked for the DST over a 52 month period and written up 1,032
|
|||
|
reports during that time. He claims, however, that he broke with the
|
|||
|
DST in 1991 and that he intends to shortly publish an account of what
|
|||
|
he calls his "turpitude." Whether true or not, Condat worked for
|
|||
|
several years for the SVP company before leaving it a few months ago
|
|||
|
to take over a key function: he is now system operator for the France
|
|||
|
forum on Compuserve.
|
|||
|
|
|||
|
Guisnel cites any number of cases of how "Internet is controlled to
|
|||
|
the bone" by such measures as turning around hackers, systematically
|
|||
|
bugging computer networks and manipulating newsgroups. "If no serious
|
|||
|
company should confide its correspondence to the network and if no
|
|||
|
government should use it to transmit sensitive information the reason
|
|||
|
is that the NSA is watching and that all the network's communications
|
|||
|
physically travel through the U.S., and very probably through
|
|||
|
computer filters at its installations at Fort Meade, Maryland,"
|
|||
|
Guisnel said. He said the conclusion was that advanced encryption
|
|||
|
programs like PGP needed to be used if one wants to communicate in a
|
|||
|
secure manner on the Internet. Citing the debate raging in the U.S.
|
|||
|
over computer security which has made little impact in Europe,
|
|||
|
Guisnel called on France to authorize the use of encryption by
|
|||
|
everyone and criticized the country's reactionary policy in that
|
|||
|
score. He said the attitude, while defensive in nature, was all the
|
|||
|
harder to understand because its first consequence was to increase
|
|||
|
the vulnerability of French companies, to the benefit of NSA.
|
|||
|
------
|
|||
|
Copyright 1995 Indigo Publications. All rights reserved.
|
|||
|
This news report may not be republished or redistributed, in whole or in
|
|||
|
part, without the prior written consent of Indigo Publications.
|
|||
|
For more information and sample issues, please mail to
|
|||
|
indigo1@dialup.francenet.fr.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 18 Oct 1995 22:51:01 CDT
|
|||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|||
|
Subject: 5--Cu Digest Header Info (unchanged since 18 Oct, 1995)
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically.
|
|||
|
|
|||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|||
|
|
|||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115, USA.
|
|||
|
|
|||
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
|||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|||
|
(NOTE: The address you unsub must correspond to your From: line)
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|||
|
CuD is also available via Fidonet File Request from
|
|||
|
1:11/70; unlisted nodes and points welcome.
|
|||
|
|
|||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|||
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|||
|
|
|||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|||
|
|
|||
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|||
|
|
|||
|
The most recent issues of CuD can be obtained from the
|
|||
|
Cu Digest WWW site at:
|
|||
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #7.86
|
|||
|
************************************
|
|||
|
|