869 lines
42 KiB
Plaintext
869 lines
42 KiB
Plaintext
![]() |
|
||
|
Computer underground Digest Wed Aug 14, 1996 Volume 8 : Issue 59
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
||
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
||
|
Archivist: Brendan Kehoe
|
||
|
Shadow Master: Stanton McCandlish
|
||
|
Field Agent Extraordinaire: David Smith
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
||
|
|
||
|
CONTENTS, #8.59 (Wed, Aug 14, 1996)
|
||
|
|
||
|
File 1--Paranoia and Brit hackers fuel infowar craze in spy agencies
|
||
|
File 2--Nat'l Law Journal and The Independent on CWD and net-filters
|
||
|
File 3--ACLU warns of G-7 international net-censorship efforts
|
||
|
File 4--DiFi/Barr: Terrorist Handbook on Net
|
||
|
File 5--Internet Domain Survey, July 1996 (fwd)
|
||
|
File 6--Hackers Find Cheap Scotland Yard Phone Connection
|
||
|
File 7--Re: - SPECIAL ISSUE: Anti Terrorism
|
||
|
File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: Tue, 6 Aug 1996 20:12:06 -0500 (CDT)
|
||
|
From: Crypt Newsletter <crypt@sun.soci.niu.edu>
|
||
|
To: Jim Thomas <jthomas@sun.soci.niu.edu>
|
||
|
Subject: File 1--Paranoia and Brit hackers fuel infowar craze in spy agencies
|
||
|
|
||
|
|
||
|
Electronic doom will soon be visited on U.S. computer networks by
|
||
|
information warriors, hackers, pannational groups of computer-wielding
|
||
|
religious extremists, possible agents of Libya and Iran, international
|
||
|
thugs and money-mad Internet savvy thieves.
|
||
|
|
||
|
John Deutch, director of Central Intelligence, testified to the
|
||
|
truth of the matter, so it must be graven in stone. In a long statement
|
||
|
composed in the august tone of the Cold Warrior, Deutch said to the
|
||
|
Senate Permanent Subcommittee on Investigations on June 25, "My greatest
|
||
|
concern is that hackers, terrorist organizations, or other nations might
|
||
|
use information warfare techniques" to disrupt the national
|
||
|
infrastructure.
|
||
|
|
||
|
"Virtually any 'bad actor' can acquire the hardware and software
|
||
|
needed to attack some of our critical information-based infrastructures.
|
||
|
Hacker tools are readily available on the Internet, and hackers
|
||
|
themselves are a source of expertise for any nation or foreign
|
||
|
terrorist organization that is interested in developing an information
|
||
|
warfare capability. In fact, hackers, with or without their full
|
||
|
knowledge, may be supplying advice and expertise to rogue states such
|
||
|
as Iran and Libya."
|
||
|
|
||
|
In one sentence, the head of the CIA cast hackers -- from those more
|
||
|
expert than Kevin Mitnick to AOLHell-wielding idiots calling an America
|
||
|
On-Line overseas account -- as pawns of perennial international bogeymen,
|
||
|
Libya and Iran.
|
||
|
|
||
|
Scrutiny of the evidence that led to this conclusion was not possible
|
||
|
since it was classified, according to Deutch.
|
||
|
|
||
|
" . . . we have [classified] evidence that a number of countries
|
||
|
around the world are developing the doctrine, strategies, and tools
|
||
|
to conduct information attacks," said Deutch.
|
||
|
|
||
|
Catching glimpses of shadowy enemies at every turn, Deutch
|
||
|
characterized them as operating from the deep cover of classified
|
||
|
programs in pariah states. Truck bombs aimed at the telephone
|
||
|
company, electronic assaults by "paid hackers" are likely to
|
||
|
be part of the arsenal of anyone from the Lebanese Hezbollah
|
||
|
to "nameless . . . cells of international terrorists such as those
|
||
|
who attacked the World Trade Center."
|
||
|
|
||
|
Quite interestingly, a Minority Staff Report entitled "Security and
|
||
|
Cyberspace" and presented to the subcommittee around the same time as
|
||
|
Deutch's statement, presented a different picture. In its attempt to
|
||
|
raise the alarm over hacker assaults on the U.S., it inadvertently
|
||
|
portrayed the intelligence community responsible for appraising the
|
||
|
threat as hidebound stumblebums, Cold Warriors resistant to change and
|
||
|
ignorant or indifferent to the technology of computer networks and their
|
||
|
misuse.
|
||
|
|
||
|
Written by Congressional staff investigators Dan Gelber and Jim Christy,
|
||
|
the report quotes an unnamed member of the intelligence community likening
|
||
|
threat assessment in the area to "a toddler soccer game, where everyone
|
||
|
just runs around trying to kick the ball somewhere." Further, assessment
|
||
|
of the threat posed by information warriors was "not presently a priority
|
||
|
of our nation's intelligence and enforcement communities."
|
||
|
|
||
|
The report becomes more comical with briefings from intelligence
|
||
|
agencies said to be claiming that the threat of hackers and information
|
||
|
warfare is "substantial" but completely unable to provide a concrete
|
||
|
assessment of the threat because few or no personnel were working on
|
||
|
the subject under investigation. "One agency assembled [ten] individuals
|
||
|
for the Staff briefing, but ultimately admitted that only one person was
|
||
|
actually working 'full time' on intelligence collection and threat
|
||
|
analysis," write Gelber and Christy.
|
||
|
|
||
|
The CIA is one example.
|
||
|
|
||
|
"Central Intelligence Agency . . . staffs an 'Information Warfare
|
||
|
Center'; however, at the time of [the] briefing, barely a handful
|
||
|
of persons were dedicated to collection and on [sic] defensive
|
||
|
information warfare," comment the authors.
|
||
|
|
||
|
" . . . at no time was any agency able to present a national threat
|
||
|
assessment of the risk posed to our information infrastructure," they
|
||
|
continue. Briefings on the subject, if any and at any level of
|
||
|
classification, "consisted of extremely limited anecdotal information."
|
||
|
|
||
|
Oh no, John, say it ain't so!
|
||
|
|
||
|
The minority report continues to paint a picture of intelligence agencies
|
||
|
that have glommed onto the magic words "information warfare" and
|
||
|
"hackers" as mystical totems, grafting the subjects onto "pre-existing"
|
||
|
offices or new "working groups." However, the operations are based only
|
||
|
on labels. "Very little prioritization" has been done, there are
|
||
|
few analysts working on the subjects in question.
|
||
|
|
||
|
Another "very senior intelligence officer for science and technology"
|
||
|
is quoted claiming "it will probably take the intelligence community
|
||
|
years to break the traditional paradigms, and re-focus resources"
|
||
|
in the area.
|
||
|
|
||
|
Restated, intelligence director Deutch pronounced in June there was
|
||
|
classified evidence that hackers are in league with Libya and Iran and
|
||
|
that countries around the world are plotting plots to attack the U.S.
|
||
|
through information warfare. But the classified data is and was, at best,
|
||
|
anecdotal gossip -- hearsay, bullshit -- assembled by perhaps a handful of
|
||
|
individuals working haphazardly inside the labyrinth of the intelligence
|
||
|
community. There is no real threat assessment to back up the Deutch
|
||
|
claims. Can anyone say _bomber gap_?
|
||
|
|
||
|
The lack of solid evidence for any of the claims made by the intelligence
|
||
|
community has created an unusual stage on which two British hackers,
|
||
|
Datastream Cowboy and Kuji, were made the dog and pony in a ridiculous
|
||
|
show to demonstrate the threat of information warfare to members of
|
||
|
Congress. Because of a break-in at an Air Force facility in Rome, NY,
|
||
|
in 1994, booth hackers were made the stars of two Government Accounting
|
||
|
Office reports on network intrusions in the Department of Defense earlier
|
||
|
this year. The comings and goings of Datastream Cowboy also constitute the
|
||
|
meat of Gelber and Christy's minority staff report from the Subcommittee on
|
||
|
Investigations.
|
||
|
|
||
|
Before delving into it in detail, it's interesting to read what a
|
||
|
British newspaper published about Datastream Cowboy, a sixteen year-old,
|
||
|
about a year before he was made the poster boy for information
|
||
|
warfare and international hacking conspiracies in front of Congress.
|
||
|
|
||
|
In a brief article, blessedly so in contrast to the reams of propaganda
|
||
|
published on the incident for Congress, the July 5 1995 edition of The
|
||
|
Independent wrote, "[Datastream Cowboy] appeared before Bow Street
|
||
|
magistrates yesterday charged with unlawfully gaining access to a series
|
||
|
of American defense computers. Richard Pryce, who was 16 at the time of
|
||
|
the alleged offences, is accused of accessing key US Air Force systems
|
||
|
and a network owned by Lockheed, the missile and aircraft manufacturers."
|
||
|
|
||
|
Pryce, a resident of a northwest suburb of London did not enter a plea
|
||
|
on any of 12 charges levied against him under the British
|
||
|
Computer Misuse Act. He was arrested on May 12, 1994, by New Scotland
|
||
|
Yard as a result of work by the U.S. Air Force Office of Special
|
||
|
Investigations. The Times of London reported when police came for
|
||
|
Pryce, they found him at his PC on the third floor of his family's house.
|
||
|
Knowing he was about to be arrested, he "curled up on the floor and cried."
|
||
|
|
||
|
In Gelber and Christy's staff report, the tracking of Pryce, and to a
|
||
|
lesser extent a collaborator called Kuji -- real name Mathew Bevan, is
|
||
|
retold as an eight page appendix entitled "The Case Study: Rome
|
||
|
Laboratory, Griffiss Air Force Base, NY Intrusion."
|
||
|
|
||
|
Pryce's entry into Air Force computers was noticed on March 28, 1994,
|
||
|
when personnel discovered a sniffer program he had installed on one
|
||
|
of the Air Force systems in Rome. The Defense Information System
|
||
|
Agency (DISA) was notified. DISA subsequently called the Air
|
||
|
Force Office of Special Investigations (AFOSI) at the Air Force
|
||
|
Information Warfare Center in San Antonio, Texas. AFOSI then
|
||
|
sent a team to Rome to appraise the break-in, secure the system and
|
||
|
trace those responsible. During the process, the AFOSI team discovered
|
||
|
Datastream Cowboy had entered the Rome Air Force computers for the
|
||
|
first time on March 25, according to the report. Passwords had been
|
||
|
compromised, electronic mail read and deleted and unclassified
|
||
|
"battlefield simulation" data copied off the facility. The
|
||
|
Rome network was also used as a staging area for penetration of other
|
||
|
systems on the Internet.
|
||
|
|
||
|
AFOSI investigators initially traced the break-in back one step to
|
||
|
the New York City provider, Mindvox. According to the Congressional
|
||
|
report, this put the NYC provider under suspicion because "newspaper
|
||
|
articles" said Mindvox's computer security was furnished by two "former
|
||
|
Legion of Doom members." "The Legion of Doom is a loose-knit computer
|
||
|
hacker group which had several members convicted for intrusions into
|
||
|
corporate telephone switches in 1990 and 1991," wrote Gelber and Christy.
|
||
|
|
||
|
AFOSI then got permission to begin monitoring -- the equivalent of
|
||
|
wiretapping -- all communications on the Air Force network. Limited
|
||
|
observation of other Internet providers being used during the break-in
|
||
|
was conducted from the Rome facilities. Monitoring told the investigators
|
||
|
the handles of hackers involved in the Rome break-in were Datastream
|
||
|
Cowboy and Kuji.
|
||
|
|
||
|
Since the monitoring was of limited value in determining the whereabouts
|
||
|
of Datastream Cowboy and Kuji, AFOSI resorted to "their human intelligence
|
||
|
network of informants, i.e., stool pigeons, that 'surf the Internet.'
|
||
|
Gossip from one AFOSI 'Net stoolie uncovered that Datastream Cowboy was from
|
||
|
Britain. The anonymous source said he had e-mail correspondence with Datastream
|
||
|
Cowboy in which the hacker said he was a 16-year old living in
|
||
|
England who enjoyed penetrating ".MIL" systems. Datastream Cowboy also
|
||
|
apparently ran a bulletin board system and gave the telephone number to the
|
||
|
AFOSI source.
|
||
|
|
||
|
The Air Force team contacted New Scotland Yard and the British law
|
||
|
enforcement agency identified the residence, the home of Richard
|
||
|
Pryce, which corresponded to Datastream Cowboy's system phone number.
|
||
|
English authorities began observing Pryce's phone calls and noticed
|
||
|
he was making fraudulent use of British Telecom. In addition,
|
||
|
whenever intrusions at the Air Force network in Rome occurred, Pryce's
|
||
|
number was seen to be making illegal calls out of Britain.
|
||
|
|
||
|
Pryce travelled everywhere on the Internet, going through South America,
|
||
|
multiple countries in Europe and Mexico, occasionally entering the Rome
|
||
|
network. From Air Force computers, he would enter systems at Jet
|
||
|
Propulsion Laboratory in Pasadena, California, and the Goddard Space
|
||
|
Flight Center in Greenbelt, Maryland. Since Pryce was capturing the logins
|
||
|
and passwords of the Air Force networks in Rome, he was then able to
|
||
|
get into the home systems of Rome network users, defense contractors
|
||
|
like Lockheed.
|
||
|
|
||
|
By mid-April of 1994 the Air Force was monitoring other systems being
|
||
|
used by the British hackers. On the 14th of the month, Kuji logged on
|
||
|
to the Goddard Space Center from a system in Latvia and copied data
|
||
|
from it to the Baltic country. According to Gelber's report, the
|
||
|
AFOSI investigators assumed the worst, that it was a sign that someone
|
||
|
in an eastern European country was making a grab for sensitive
|
||
|
information. They broke the connection but not before Kuji had
|
||
|
copied files off the Goddard system. As it turned out, the Latvian
|
||
|
computer was just another system the British hackers were using as
|
||
|
a stepping stone; Pryce had also used it to cover his tracks when
|
||
|
penetrating networks at Wright-Patterson Air Force Base in Ohio, via
|
||
|
an intermediate system in Seattle, cyberspace.com.
|
||
|
|
||
|
The next day, Kuji was again observed trying to probe various
|
||
|
systems at NATO in Brussels and The Hague as well as Wright-Patterson.
|
||
|
On the 19th, Pryce successfully returned to NATO systems in The
|
||
|
Hague through Mindvox. The point Gelber and Christy seem to be trying
|
||
|
to make is that Kuji, a 21-year old, was coaching Pryce during some
|
||
|
of his attacks on various systems.
|
||
|
|
||
|
By this point, New Scotland Yard had a search warrant for Pryce
|
||
|
with the plan being to swoop down on him the next time he accessed
|
||
|
the Air Force network in Rome.
|
||
|
|
||
|
In April, Pryce penetrated a system on the Korean peninsula and copied
|
||
|
material off a facility called the Korean Atomic Research Institute
|
||
|
to an Air Force computer in Rome. At the time, the investigators had
|
||
|
no idea whether the system was in North or South Korea. The impression
|
||
|
created is one of hysteria and confusion at Rome. There was fear that the
|
||
|
system, if in North Korea, would trigger an international incident, with
|
||
|
the hack interpreted as an "aggressive act of war." The system turned
|
||
|
out to be in South Korea.
|
||
|
|
||
|
During the Korean break-in, New Scotland Yard could have intervened and
|
||
|
arrested Pryce. However, for unknown reasons, the agency did not. Those
|
||
|
with good memories may recall mainstream news reports concerning Pryce's
|
||
|
hack, which was cast as an entry into sensitive North Korean networks.
|
||
|
|
||
|
It's worth noting that while the story was portrayed as the work of
|
||
|
an anonymous hacker, both the U.S. government and New Scotland Yard knew
|
||
|
who the perpetrator was. Further, according to Gelber's report English
|
||
|
authorities already had a search warrant for Pryce's house.
|
||
|
|
||
|
Finally, on May 12 British authorities pounced. Pryce was arrested
|
||
|
and his residence searched. He crumbled, according to the Times of
|
||
|
London, and began to cry. Gelber and Christy write that Pryce promptly
|
||
|
admitted to the Air Force break-ins as well as others. Pryce
|
||
|
confessed he had copied a large program that used artificial intelligence
|
||
|
to construct theoretical Air Orders of Battle from an Air Force computer
|
||
|
to Mindvox and left it there because of its great size, 3-4 megabytes.
|
||
|
Pryce paid for his Internet service with a fraudulent credit card number.
|
||
|
At the time, the investigators were unable to find out the name and
|
||
|
whereabouts of Kuji. A lead to an Australian underground bulletin board
|
||
|
system failed to pan out.
|
||
|
|
||
|
On June 23 of this year, Reuters reported that Kuji -- 21-year-old Mathew
|
||
|
Bevan -- a computer technician, had been arrested and charged in
|
||
|
connection with the 1994 Air Force break-ins in Rome.
|
||
|
|
||
|
Rocker Tom Petty sang that even the losers get lucky some time. He
|
||
|
wasn't thinking of British computer hackers but no better words could be
|
||
|
used to describe the two Englishmen and a two year old chain of events that
|
||
|
led to fame as international computer terrorists in front of Congress
|
||
|
at the beginning of the summer of 1996.
|
||
|
|
||
|
Lacking much evidence for the case of conspiratorial computer-waged
|
||
|
campaigns of terror and chaos against the U.S., the makers of Congressional
|
||
|
reports resorted to telling the same story over and over, three
|
||
|
times in the space of the hearings on the subject. One envisions U.S.
|
||
|
Congressmen too stupid or apathetic to complain, "Hey, didn't we get that
|
||
|
yesterday, and the day before?" Pryce and Bevan appeared in "Security in
|
||
|
Cyberspace" and twice in Government Accounting Office reports AIMD-96-84
|
||
|
and T-AIMD96-92. Jim Christy, the co-author of "Security in Cyberspace"
|
||
|
and the Air Force Office of Special Investigations' source for the Pryce
|
||
|
case supplied the same tale for Jack Brock, author of the GAO reports.
|
||
|
Brock writes, ". . . Air Force officials told us that at least one of
|
||
|
the hackers may have been working for a foreign country interested in
|
||
|
obtaining military research data or areas in which the Air Force was
|
||
|
conducting advanced research." It was, apparently, more wishful
|
||
|
thinking.
|
||
|
|
||
|
|
||
|
Notes:
|
||
|
|
||
|
1. The Federation of American Scientists has made available on its
|
||
|
Web site electronic copies of all the reports mentioned previously.
|
||
|
The URL is http://www.fas.org/ .
|
||
|
|
||
|
The FAS Web site also features an easy to use search engine which can
|
||
|
be used to pull up the Congressional testimony on hackers and
|
||
|
network intrusion. These example key words are effective: "Jim
|
||
|
Christy," "Datastream Cowboy".
|
||
|
|
||
|
Crypt Newsletter 38
|
||
|
http://www.soci.niu.edu/~crypt
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Tue, 30 Jul 1996 16:06:06 -0500
|
||
|
From: Declan McCullagh <declan@well.com>
|
||
|
Subject: File 2--Nat'l Law Journal and The Independent on CWD and net-filters
|
||
|
|
||
|
Attached are portions of two articles from the National Law Journal and
|
||
|
London's The Independent following up on the CyberWire Dispatch that Brock
|
||
|
and I put out earlier this month on the rather unusual behavior of
|
||
|
net-filtering software.
|
||
|
|
||
|
The original CWD is at:
|
||
|
http://www.eff.org/pub/Publications/Declan_McCullagh/
|
||
|
http://cyberwerks.com:70/cyberwire/cwd/ (eventually)
|
||
|
|
||
|
-Declan
|
||
|
|
||
|
===========================================================================
|
||
|
|
||
|
The National Law Journal
|
||
|
Monday, August 5, 1996
|
||
|
Page A13
|
||
|
By Ann Davis
|
||
|
|
||
|
...Civil libertarians are demanding to know: since when were the National
|
||
|
Organizaton for Women or the Endangered Species Coalition in the same class
|
||
|
as devil worshippers? How can photos posted by animal rights groups be
|
||
|
categorized as "gross depictions"? Caught in a dragnet of blocking software
|
||
|
are web sites on everything from the safe use of fireworks to safe sex,
|
||
|
according to a report by the Internet-based news service CyberWire
|
||
|
Dispatch.
|
||
|
|
||
|
To blocked groups' disappointment, however, Internet legal experts say any
|
||
|
lawsuit against private computer censors may be a losing proposition...
|
||
|
[Mike Godwin is quoted.]
|
||
|
|
||
|
...A cyber-Deep Throat recently leaked the lists to two Internet
|
||
|
investigative reporters, Brock N. Meeks and Declan B. McCullagh.
|
||
|
Blacklisted sites include a Silicon Valley council of the National Rifle
|
||
|
Association and Cyber High School, whose web address is similar to that of
|
||
|
a gay video site... [Snapshot of CyberHigh's web page included]
|
||
|
|
||
|
As a lawyer for CompuServe, Inc., Mr. Cunard meets potential legal
|
||
|
challenges with skepticism. The free speech angle? Implausible against a
|
||
|
private entity, he said. Discrimination claims? Difficult, unless you can
|
||
|
prove the Internet is a place of public accomodation. Tortious
|
||
|
interferrence? not likely, because most web site operators don't require
|
||
|
subscriptions and therefore don't have a duty to those who access their
|
||
|
sites.
|
||
|
|
||
|
===========================================================================
|
||
|
|
||
|
The Independent (London)
|
||
|
Monday, July 22, 1996
|
||
|
By Charles Arthur
|
||
|
|
||
|
REAL ALE IS TOO STRONG FOR THE AMERICAN MORALISTS
|
||
|
|
||
|
Programs to protect children from Net porn are keeping them out of
|
||
|
a vast range of sites, says Charles Arthur
|
||
|
|
||
|
[...]
|
||
|
Since last July, programs such as Cyber Patrol, NetNanny and
|
||
|
Cybersitter have sold thousands of copies. Some have distribution
|
||
|
agreements with organisations such as BT and CompuServe. The makers boast
|
||
|
that their products "includes a bad site list of thousands of Wed sites
|
||
|
that are not suitable for children" and "allow parents to censor what their
|
||
|
children access on the Internet."
|
||
|
So far, so good - except that many of those "banned" sites include
|
||
|
many British sources holding very useful or entirely innocent information.
|
||
|
And the morality underlying many of the bannings is very American, and
|
||
|
quite unlike that which a British parent might be expected to apply.
|
||
|
Among the British sites on the World Wide Web which your child
|
||
|
would be unable to access when using the programs are the Campaign for Real
|
||
|
Ale (Camra), the Prison Lexicon (which provides information about penal
|
||
|
reform), the computing department of Queen Mary and Westfield College,
|
||
|
Imperial College, the University of Stirling, the Internet connection
|
||
|
companies Demon and Zetnet, and Telephone Information Services - which
|
||
|
offers weather and share reports but not sex lines.
|
||
|
Between them, the programs prevent access to tens of thousands of
|
||
|
sites on the Internet. But they effectively apply an American system of
|
||
|
morals - on religion, weapons, drugs, alcohol and sex - to the data which
|
||
|
British children might be expected to know about, or could obtain from
|
||
|
newspapers.
|
||
|
None of the operators of any of the sites mentioned above was aware
|
||
|
that they were "blocked", and all were mystified by it. "Which
|
||
|
self-selected Mary Whitehouse put us on their list?" asked Iain Lowe,
|
||
|
research manager of Camra.
|
||
|
In Camra's case, the answer is a team of researchers at
|
||
|
Microsystems Software, based in Farmingham, Massachusetts, which has been
|
||
|
selling Cyber Patrol since July 1995, and now claims 80 per cent of a
|
||
|
fast-growing market. "Camra's site is blocked under our code for beer,
|
||
|
alcohol, wine and tobacco," said Dick Gorgens, the company's chief
|
||
|
executive. "It was added on June 10 when it was advertising a beer
|
||
|
festival."
|
||
|
Mr Lowe responded, "We don't promote underage drinking. But pubs in
|
||
|
this country are allowed to apply for childrens' certificates: all the
|
||
|
family can go. And we have had inquiries to our site from GCSE students
|
||
|
doing projects on the economics of the brewing industry."
|
||
|
Mr Gorgens denied that the program was imposing American morals
|
||
|
onto British users. However, the panel which reviews the banning of sites
|
||
|
includes no Britons, although it does include representatives from the
|
||
|
National Rifle Association and the right-wing anti-pornography Morality in
|
||
|
Media group.
|
||
|
|
||
|
[...]
|
||
|
|
||
|
"A close look at the actual range of sites blocked by these
|
||
|
programs shows they go far beyond just restricting 'pornography'," said
|
||
|
Brock Meeks, an Internet journalist and consultant who, with fellow
|
||
|
journalist Declan McCullough, obtained a decoded list of the sites banned
|
||
|
by the programs earlier this month, July, and revealed their
|
||
|
indiscriminate breadth in an Internet mailing list, Cyberwire Dispatch.
|
||
|
Steve Robinson-Grindey, who runs the Prison Lexicon site, said "It
|
||
|
is effectively an electronic encyclopaedia of everything concerning prisons
|
||
|
and penal affairs in England and Wales. It is extensively used by schools
|
||
|
and universities for information. Even the People's Republic of China allow
|
||
|
access to the site." He thought it might be banned because "obviously they
|
||
|
rely on search words for filtering - in which case they would discover the
|
||
|
words sex, AIDS, homosexual, and so on. But they failed to realise these
|
||
|
words were being used in serious material."
|
||
|
|
||
|
[...]
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Wed, 31 Jul 1996 18:24:14 -0700 (PDT)
|
||
|
From: Declan McCullagh <declan@eff.org>
|
||
|
Subject: File 3--ACLU warns of G-7 international net-censorship efforts
|
||
|
|
||
|
ACLU Warns of Latest Government Efforts to Regulate Cyberspace;
|
||
|
New Global Campaign Will Monitor National, International Threats
|
||
|
|
||
|
FOR IMMEDIATE RELEASE
|
||
|
Wednesday, July 31, 1996
|
||
|
|
||
|
NEW YORK, NY--Despite a second federal court decision affirming
|
||
|
that censorship in cyberspace is unconstitutional, the ACLU today
|
||
|
warned of persistent government attempts, in the U.S. and
|
||
|
internationally, to censor electronic communications and regulate
|
||
|
privacy technology.
|
||
|
|
||
|
At a meeting in Paris yesterday of the major U.S. allies known
|
||
|
as "G-7," government leaders announced plans to strictly regulate
|
||
|
the Internet and other electronic communications in an effort to
|
||
|
combat terrorism. The meeting came in the wake of the bombing
|
||
|
incident at the Atlanta Olympics and the explosion of TWA Flight
|
||
|
800, which is being investigated as a possible terrorist bombing.
|
||
|
Participants included France, Italy, Japan, Britain, Germany,
|
||
|
Canada, Russia and the United States.
|
||
|
|
||
|
Although not all details were made public, proposed measures
|
||
|
apparently include investigations of charities and political
|
||
|
organizations with radical political points of view -- threatening
|
||
|
their rights to free speech -- and using the Internet to "monitor"
|
||
|
terrorist communications. There was also agreement to adopt a U.S.
|
||
|
plan to prohibit non-key-escrowed encryption, which would mean that
|
||
|
individuals and companies would be barred from using encryption
|
||
|
technology to electronically lock up their most private and
|
||
|
sensitive information unless they make the keys available to their
|
||
|
government.
|
||
|
|
||
|
In response to these and other threats to limit Internet and
|
||
|
electronic privacy, the Global Internet Liberty Campaign was formed
|
||
|
last month at a meeting of the Internet Society in Montreal. The
|
||
|
group, which announced its formation today, will work in coalition
|
||
|
with organizations from around the world to share information and
|
||
|
protect free speech, privacy, equality of access and liberty on the
|
||
|
global Internet. GILC members include the ACLU, the Electronic
|
||
|
Privacy Information Center, Human Rights Watch, the Internet
|
||
|
Society, Privacy International, and other civil liberties and human
|
||
|
rights organizations. The ACLU is a founding member of the group.
|
||
|
|
||
|
"GILC recognizes that there are no borders in cyberspace and
|
||
|
that decisions made by international bodies like the G-7 nations
|
||
|
affect all Internet users," said Barry Steinhardt, associate
|
||
|
director of the ACLU. "The U.S. government may not accomplish
|
||
|
through an international end-run what the U.S. Congress and the
|
||
|
U.S. Courts have rejected."
|
||
|
|
||
|
Steinhardt cited a recent ruling by a panel of federal judges
|
||
|
in New York declaring that censorship in cyberspace is
|
||
|
unconstitutional. The decision marked another win in the ongoing
|
||
|
battle for free speech in cyberspace, which saw its first major
|
||
|
victory last month in ACLU v. Reno, when a Philadelphia court
|
||
|
granted a motion for preliminary injunction on "indecency"
|
||
|
provisions of the Communications Decency Act. The ACLU filed its
|
||
|
challenge on February 8 of this year, the day the CDA was signed
|
||
|
into law.
|
||
|
|
||
|
"We are delighted that the New York judges have joined their
|
||
|
Philadelphia colleagues in protecting the Internet from
|
||
|
governmental intrusion," said Steinhardt, who testified in the
|
||
|
Philadelphia case. "But we remain concerned about the government's
|
||
|
continuing efforts to censor electronic speech, not only in the
|
||
|
United States but internationally."
|
||
|
|
||
|
In the U.S., Congress is now attempting to revive a proposal
|
||
|
that would make it a felony to disseminate information on bomb-
|
||
|
making in print, radio, television or in cyberspace. Violations
|
||
|
would be punishable by up to 20 years in prison, a $250,000 fine,
|
||
|
or both.
|
||
|
|
||
|
"This unconstitutional bill, rightly rejected by Congress last
|
||
|
year, would criminalize everything from a high school chemistry
|
||
|
teacher explaining basic scientific principles, to a newspaper
|
||
|
carrying an illustration of a bomb's construction, to a U.S.
|
||
|
Department of Agriculture manual describing how to make fertilizer
|
||
|
bombs for removing tree stumps," the ACLU's Steinhardt said.
|
||
|
|
||
|
In addition, President Clinton this week announced an
|
||
|
initiative to increase the powers of federal investigators,
|
||
|
including an expanded wiretapping authority. While the ACLU has
|
||
|
commended the Clinton Administration and law enforcement
|
||
|
authorities for their investigation into recent tragic incidents,
|
||
|
it urged President Clinton and Congress in a letter sent to the
|
||
|
White House on Monday to "preserve the American spirit" by
|
||
|
safeguarding constitutional principles. The ACLU has asked for a
|
||
|
meeting with the President and Congressional leaders to discuss
|
||
|
continuing civil liberties concerns in light of recent events.
|
||
|
|
||
|
[Note to Editors: A temporary web page for the Global Internet
|
||
|
Liberty Campaign has been established at
|
||
|
<<A HREF="http://www.aclu.org/gilc/index1.html"> http://www.aclu.org/gilc/inde
|
||
|
x1.html</A> >.]
|
||
|
|
||
|
-- 30 --
|
||
|
|
||
|
Contact: Emily Whitfield, (212) 944-9800 ext. 424
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Tue, 30 Jul 1996 10:27:04 -0400
|
||
|
From: Bob Palacios <bobpal@cdt.org>
|
||
|
Subject: File 4--DiFi/Barr: Terrorist Handbook on Net
|
||
|
|
||
|
Excerpt of interview with Sen. Feinstein and Rep. Barr on CNN, 7/28:
|
||
|
|
||
|
[Full transcript at
|
||
|
http://prod.lexis-nexis.com/trackers/html/11000/11032.1693817.1.html]
|
||
|
------------------
|
||
|
|
||
|
Sen. DIANNE FEINSTEIN: .... But I'd like to say something else, and this is
|
||
|
very disturbing. Right now on the Internet, you can take off of the Internet
|
||
|
something called the terrorist handbook, the anarchist's cookbook, both of
|
||
|
which have the recipe-
|
||
|
|
||
|
FRANK SESNO: What you're holding is off the Internet?
|
||
|
|
||
|
Sen. DIANNE FEINSTEIN: This is off the Internet.
|
||
|
|
||
|
FRANK SESNO: I don't know if people can see it, but it says, 'Stuff You Are
|
||
|
Not Supposed To Know About' right across the top there.
|
||
|
|
||
|
Sen. DIANNE FEINSTEIN: Yes. 'Whether you're planning to blow up the World
|
||
|
Trade Center or merely explode a few small devices on the White House Lawn,
|
||
|
the terrorist handbook is an invaluable guide to having a good time.' And
|
||
|
then it goes on and it tells you how to make a pipe bomb here with a design,
|
||
|
with the words 'How to make a book bomb, a light bulb bomb, bombs in baby
|
||
|
food, how to use nails and screws in bombs.'
|
||
|
|
||
|
FRANK SESNO: You can also get this sort of thing in bookstores. Isn't that
|
||
|
right?
|
||
|
|
||
|
Sen. DIANNE FEINSTEIN: That's right.
|
||
|
|
||
|
FRANK SESNO: What do you want to do with this?
|
||
|
|
||
|
Sen. DIANNE FEINSTEIN: Well, what I want to do- and this passed the Senate
|
||
|
again in the terrorism bill; it was taken out by the House. I have put it
|
||
|
back in the defense authorization bill. It passed the Senate unanimously. It
|
||
|
is now in conference, and from what I understand, some are going to try to
|
||
|
take it out. What it would do is say, 'If you know or have reason to believe
|
||
|
that this information will be used for criminal purposes, it is illegal to
|
||
|
put it on.' Let me make one other point.
|
||
|
|
||
|
FRANK SESNO: Quickly, because I want to get back to Congressman Barr.
|
||
|
|
||
|
Sen. DIANNE FEINSTEIN: There is no legal purpose for a pipe bomb, a book
|
||
|
bomb, a light bulb bomb.
|
||
|
|
||
|
FRANK SESNO: Congressman Barr, is it time to ban this kind of document,
|
||
|
documentation, from the Internet, from America's bookstores? Is this
|
||
|
something that the House will now support?
|
||
|
|
||
|
Rep. BOB BARR: Well, Frank, the problem is not the House. The problem is our
|
||
|
courts. We made efforts in the telecommunications bill earlier this year to
|
||
|
restrict certain information over the Internet, and the courts do not allow
|
||
|
it. The problem really is working out language that meets First Amendment
|
||
|
challenges through the courts, and that's something that we do need to work
|
||
|
on. But it's not as simple as simply sending something over to the House and
|
||
|
waiting for those of us in the House to take it out. The problem is with the
|
||
|
courts, really, and that's where we need to devote our attention.
|
||
|
|
||
|
Sen. DIANNE FEINSTEIN: I have worked with constitutional lawyers in the
|
||
|
drafting of it. We believe it will pass a court test. I would challenge the
|
||
|
congressman to let it have a court test. Pass the legislation. It is worth
|
||
|
it. It'll keep kids from blowing themselves and others up. Let's do it.
|
||
|
|
||
|
FRANK SESNO: Congressman?
|
||
|
|
||
|
Rep. BOB BARR: Well, the problem here, again- and I'm not necessarily
|
||
|
disagreeing with the senator. The problem, though, as you sort of alluded
|
||
|
to, Frank, it goes beyond simply taking something off the Internet. It
|
||
|
raises questions about what information can be in our libraries, in our
|
||
|
bookstores, in our schools and so forth.
|
||
|
|
||
|
FRANK SESNO: Well, you don't want pornography across the Internet. I know
|
||
|
you're opposed-
|
||
|
|
||
|
Rep. BOB BARR: Well, and we tried that also and the courts have not allowed
|
||
|
us to place restrictions on it yet.
|
||
|
|
||
|
[...]
|
||
|
|
||
|
-----
|
||
|
Bob Palacios, Online Organizer/Sysop Center for Democracy and Technology
|
||
|
<bobpal@cdt.org> 1634 Eye Street, NW Suite 1100
|
||
|
Washington, DC 20006
|
||
|
http://www.cdt.org/ (v) +1 202 637 9800
|
||
|
http://www.cdt.org/homes/bobpal/ (f) +1 202 637 0968
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Fri, 9 Aug 1996 18:49:13 -0400 (EDT)
|
||
|
From: Noah <noah@enabled.com>
|
||
|
Subject: File 5--Internet Domain Survey, July 1996 (fwd)
|
||
|
|
||
|
From -Noah
|
||
|
|
||
|
---------- Forwarded message ----------
|
||
|
Date: Thu, 8 Aug 96 17:01:11 PDT
|
||
|
From: Mark Lottor <mkl@nw.com>
|
||
|
|
||
|
|
||
|
Internet Domain Survey Network Wizards July 1996
|
||
|
|
||
|
The Domain Survey attempts to discover every host on the Internet by doing
|
||
|
a complete search of the Domain Name System. The latest results were
|
||
|
gathered during late July 1996 and a summary is listed below.
|
||
|
|
||
|
For the full report see WWW.NW.COM.
|
||
|
-- Mark Lottor
|
||
|
|
||
|
|
||
|
|
||
|
Number of Hosts, Domains, and Nets Advertised in the Domain Name System
|
||
|
|
||
|
Replied Network Class
|
||
|
Date | Hosts Domains ToPing* A B C
|
||
|
------+-----------------------------------------------------
|
||
|
Jul 96| 12,881,000 488,000 2,569,000 95 5892 128378
|
||
|
Jan 96| 9,472,000 240,000 1,682,000 92 5655 87924
|
||
|
|
||
|
Jul 95| 6,642,000 120,000 1,149,000 91 5390 56057
|
||
|
Jan 95| 4,852,000 71,000 970,000 91 4979 34340
|
||
|
|
||
|
Jul 94| 3,212,000 46,000 707,000 89 4493 20628
|
||
|
Jan 94| 2,217,000 30,000 576,000 74 4043 16422
|
||
|
|
||
|
[* estimated by pinging 1% of all hosts]
|
||
|
|
||
|
|
||
|
Host Distribution by Top-Level Domain Name
|
||
|
[see ftp.nw.com, zone/iso-country-codes to decode names]
|
||
|
|
||
|
3323647 com 25109 hu 1335 lt 99 mc 18 az
|
||
|
2114851 edu 24133 hk 1099 bm 94 mk 14 ky
|
||
|
1232902 net 21464 ie 919 cy 92 zm 11 vi
|
||
|
579492 uk 20253 mx 878 uy 89 aw 10 md
|
||
|
548168 de 17573 pt 817 eg 86 hn 9 mn
|
||
|
496427 jp 13601 su 609 ec 86 fo 9 bb
|
||
|
432727 us 13239 cl 545 kz 85 py 8 sb
|
||
|
431939 mil 12689 gr 476 mt 84 na 8 bz
|
||
|
424356 ca 11282 cn 469 ae 81 ad 7 vu
|
||
|
397460 au 10810 is 386 pk 79 jo 7 bj
|
||
|
361065 gov 9949 si 359 lb 77 al 7 aq
|
||
|
327148 org 9415 ar 351 ma 74 uz 6 qa
|
||
|
277207 fi 8541 my 307 ir 71 pr 6 gh
|
||
|
214704 nl 7743 tr 285 ni 66 tt 6 dj
|
||
|
189786 fr 6605 ee 277 sm 64 gu 6 cf
|
||
|
186312 se 6362 th 275 sa 60 ug 5 vn
|
||
|
120780 no 5498 sk 236 bh 60 np 4 cu
|
||
|
113776 it 5265 co 234 lk 60 gi 4 ci
|
||
|
102691 ch 5262 id 207 pa 58 fj 3 va
|
||
|
83349 za 4499 ua 195 jm 49 sz 3 to
|
||
|
77886 nz 3117 ph 170 bn 47 mu 3 gy
|
||
|
76955 dk 2932 lv 163 ag 46 sn 2 sr
|
||
|
71090 at 2877 lu 159 gt 45 zw 2 ne
|
||
|
62447 es 2725 ro 158 bs 44 ai 2 gn
|
||
|
47973 kr 2582 cr 154 bo 43 sv 2 an
|
||
|
46854 br 2480 hr 140 gl 40 tn 1 ml
|
||
|
43311 be 2269 pe 140 do 40 gb 1 ck
|
||
|
39611 il 2254 bg 134 li 27 dm 1 bf
|
||
|
38432 pl 2176 in 133 ke 26 mz 1 ao
|
||
|
38376 sg 1963 kw 129 mo 23 mg
|
||
|
32219 cz 1930 int 119 ge 20 lc
|
||
|
32022 ru 1679 ve 105 am 19 nc
|
||
|
30645 tw 1631 yu 103 by 18 dz
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Mon, 05 Aug 1996 12:02:55 -0400
|
||
|
From: valgamon@megahits.com
|
||
|
Subject: File 6--Hackers Find Cheap Scotland Yard Phone Connection
|
||
|
|
||
|
Monday August 5 12:01 AM EDT
|
||
|
|
||
|
Hackers Find Cheap Scotland Yard Phone Connection
|
||
|
|
||
|
LONDON (Reuter) - Computer hackers broke into a security system at
|
||
|
Scotland Yard, London's metropolitan police headquarters, to make
|
||
|
international calls at police expense, police said Sunday.
|
||
|
|
||
|
A police spokesman would not confirm a report in the Times newspaper
|
||
|
that the calls totaled one million pounds ($1.5 million). He said
|
||
|
the main computer network remained secure.
|
||
|
|
||
|
"There is no question of any police information being accessed," the
|
||
|
spokesman said. "This was an incident which was investigated by our
|
||
|
fraud squad and by AT&T investigators in the U.S."
|
||
|
|
||
|
AT&T Corp investigators were involved because most of the calls were
|
||
|
to the United States, the Times said.
|
||
|
|
||
|
According to The Times, the hackers made use of a system called PBX
|
||
|
call forwarding that lets employees to make business calls from home
|
||
|
at their employer's expense.
|
||
|
|
||
|
..................
|
||
|
|
||
|
Reuters/Variety
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Mon, 5 Aug 1996 16:35:27 +0000
|
||
|
From: e.tan@UCL.AC.UK(Emerson Tan)
|
||
|
Subject: File 7--Re: - SPECIAL ISSUE: Anti Terrorism
|
||
|
|
||
|
It would appear that the US legal system is intent on making another
|
||
|
catastrophic attempt to regulate the net. What they seem to have forgotten
|
||
|
is that due the truly borderless nature of the net, the sprit of the
|
||
|
mesures proposed have been defeated before the leglistaion had been
|
||
|
drafted.
|
||
|
|
||
|
For a long time it has been possible to obatin much material, deemed
|
||
|
illegal in many states (eg sinagapore), on the net. This is likely to
|
||
|
remain so as long as the development of the net and the driving forces and
|
||
|
sprit of the net reamin the same. All outlawing certain things in the
|
||
|
united states will achieve is too drive these materials out of the country,
|
||
|
not stop the materials being distributed. If the loons and terrorists still
|
||
|
want to procure the information they wil;l still be able to, albeit
|
||
|
somewhat slowers than would be otherwise. What will happen is that
|
||
|
monitoring of the disemination of these materials will pass out of the
|
||
|
accountable cvil juristiction, and into the very secret foreign
|
||
|
intelligence realm (the CIA being the principal agency here). This will
|
||
|
deny the public at large the oppotunity to look at how this effective this
|
||
|
legislation was effectively giving those in power carte blanche to claim
|
||
|
whatever sucesses or new menaces that they feel like.
|
||
|
|
||
|
At the end of the day it has always been true that the best place to keep
|
||
|
an enemy is in plain sight. On the net as in the real world this remains as
|
||
|
true as it ever was.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 8--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send post with this in the "Subject:: line:
|
||
|
|
||
|
SUBSCRIBE CU-DIGEST
|
||
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
||
|
|
||
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
||
|
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
||
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #8.59
|
||
|
************************************
|
||
|
|