740 lines
35 KiB
Plaintext
740 lines
35 KiB
Plaintext
|
|
|
|
****************************************************************************
|
|
>C O M P U T E R U N D E R G R O U N D<
|
|
>D I G E S T<
|
|
*** Volume 2, Issue #2.06 (October 6, 1990) **
|
|
****************************************************************************
|
|
|
|
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
|
ARCHIVISTS: Bob Krause / Alex Smith
|
|
USENET readers can currently receive CuD as alt.society.cu-digest.
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted as long as the source is
|
|
cited. It is assumed that non-personal mail to the moderators may be
|
|
reprinted, unless otherwise specified. Readers are encouraged to submit
|
|
reasoned articles relating to the Computer Underground.
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
DISCLAIMER: The views represented herein do not necessarily represent the
|
|
views of the moderators. Contributors assume all responsibility
|
|
for assuring that articles submitted do not violate copyright
|
|
protections.
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
CONTENTS:
|
|
File 1: Moderators' Corner
|
|
File 2: From the Mailbag
|
|
File 3: MARS BBS Sting a Prank
|
|
File 4: Another view of hacking
|
|
File 5: The CU in the news
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
********************************************************************
|
|
*** CuD #2.06, File 1 of 5: Moderator's corner ***
|
|
********************************************************************
|
|
|
|
From: Moderators
|
|
Subject: Moderators' Corner
|
|
Date: October 6, 1990
|
|
|
|
++++++++++
|
|
In this file:
|
|
1. CuD SURVEY
|
|
2. NATIONAL COMPUTER SECURITY CONFERENCE
|
|
3. CORRECTION / ATI
|
|
|
|
+++++++++++++++
|
|
CuD Survey
|
|
+++++++++++++++
|
|
|
|
We thank everybody who filled out the CuD survey and thanks to Pat Townson for
|
|
printing it in Telecom Digest. The response was far, far better than expected,
|
|
and Bob Krause will have the results as soon as he tabulates them. Because of
|
|
the volume, it may take a few weeks. Names and all identifying references are,
|
|
of course, removed.
|
|
|
|
+++++++++++++++++
|
|
Computer Security Conference
|
|
+++++++++++++++++
|
|
|
|
Coming Next Issue: An eyewitness report on the National Computer Security
|
|
Conference held last week in Washington, D.C. CuD's coverage will be
|
|
limited to a single article unless someone else contributes! If you attended
|
|
the NCSC (and we know many of you did!) why not jot down a few
|
|
thoughts/observations and send them in? Alternate views, reviews,
|
|
comments, and summaries are all welcome.
|
|
|
|
++++++++++++++
|
|
Correction on ATI
|
|
++++++++++++++
|
|
|
|
Gremlins in the keyboard mistyped---ATI stands for
|
|
ACTIVIST TIMES, INC., (*NOT* "Anarchist")--
|
|
|
|
********************************************************************
|
|
>> END OF THIS FILE <<
|
|
***************************************************************************
|
|
|
|
------------------------------
|
|
|
|
From: Various Contributors
|
|
Subject: From the Mailbag
|
|
Date: October 4, 1990
|
|
|
|
********************************************************************
|
|
*** CuD #2.06: File 2 of 5: From the Mailbag ***
|
|
********************************************************************
|
|
|
|
From: peter@FICC.FERRANTI.COM(peter da silva)
|
|
|
|
Regarding "what to do when you talk to LE agents":
|
|
|
|
Most of these guidelines are important when talking to reporters, too. One
|
|
would expect the press to be the underground's natural allies: the First
|
|
Amendment should always be near and dear to their hearts. In practice,
|
|
however, they have often taken action that seems designed to encourage
|
|
authorities to curb free speech. Also, one of the recurring themes in
|
|
articles posted by victimes of witchhunts is the effect of unfavorable
|
|
publicity on people's lives. There was such an account in this very
|
|
issue! So watch your tongue. Remember, if the press believe you're a
|
|
bad guy they'll say anything to get you to make a "publishable"
|
|
statement.
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
From: Mike Jezierski
|
|
|
|
Law Enforcement and Computers:
|
|
|
|
Not many law enforcement officials KNOW about computers. They see a computer
|
|
as a way to check on a license plate or NCIC (we all know what that is)
|
|
|
|
Refusing to answer questions gets on the bad side of a law enforcement
|
|
officer, and sometimes he/she WILL use force against you (Indianapolis
|
|
is a prime example of violent force against criminals)
|
|
|
|
Saying "I want my lawyer" will do nothing but enrage your typical cop/agent
|
|
and there is the possiblity that they would say "F*** your lawyer, I want
|
|
answers NOW!!!" then proceed to beat the holy snot out of you...
|
|
|
|
To the police, a criminal is a criminal...no matter is you're a murderer, a
|
|
rapist, a thief or even a hacker.
|
|
|
|
Of course you *could* bring brutality charges... so then the agent/cop lies
|
|
and gets out of it ... big deal. Like the alleged thief described in
|
|
C-u-D 2.05, you might be innocent but their being there makes you guilty.
|
|
|
|
Enough Said...
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
From: The Butler
|
|
|
|
Comment on Operation Sun Devil
|
|
|
|
One of the reasons SS agents confiscated various BBS systems was because of
|
|
the so called "ILLEGAL" information contained on them. It doesn't matter
|
|
that most if not all of the "ILLEGAL" information can be found in a local
|
|
Library, the SS still claimed it should not be posted on Electronic
|
|
Bulletin Boards.
|
|
|
|
Well the other day as I was thumbing through the latest issue of Computer
|
|
Shopper I stumbled across an ad for, Guess what??? "TOP SECRET MANUALS"
|
|
among them being: Computer Phreaking, Beyond Van Eck Phreaking, Automatic
|
|
Teller Machines, Phone Color Boxes, Voice Mail Hacking, etc, etc.
|
|
|
|
I suppose this is ok because it is in printed form. Same information but
|
|
different form, is there a difference? Not to me!!!
|
|
|
|
The Butler
|
|
|
|
********************************************************************
|
|
>> END OF THIS FILE <<
|
|
***************************************************************************
|
|
|
|
------------------------------
|
|
|
|
From: Jim Thomas
|
|
Subject: MARS BBS Sting a Prank
|
|
Date: 5 October, 1990
|
|
|
|
********************************************************************
|
|
*** CuD #2.06: File 3 of 5: MARS BBS STING A PRANK ***
|
|
********************************************************************
|
|
|
|
Ok, boys and girls, we've been had--the rumor of alleged Secret Service
|
|
involvement in the MARS BBS at Mississippi State was a bit of a prank. It
|
|
was not malicious, not intended to be deceptive, and not without a few
|
|
lessons.
|
|
|
|
For those who have read the post from Ed Luke, the sysop of MARS, a BBS
|
|
accessible via ftp, the gist of the story was that the Secret Service had
|
|
busted the board, but allowed it to return as a sting board. According to
|
|
the post (reproduced at the end of this file), the names and the
|
|
up/downloads of allegedly "obscene" .gif and .gl files were kept and turned
|
|
over to the SS. The post circulated across the nets during the past week,
|
|
and most of us were concerned about the implications of the story, if true.
|
|
We tried calling Ed during the week, but couldn't reach him (he was not
|
|
hiding--he was studying for seven hour exam), which delayed explanation of
|
|
the prank. Some might be angry at the prank for the consternation it
|
|
created among a lot of people. Was it tacky, in bad taste and outrageous?
|
|
Of course it was. But, in context, it was also rather funny (for those of
|
|
us who prefer Emo Phillips' view of the world to Kant's moral imperative).
|
|
Here's the story as Ed relates it:
|
|
|
|
MARS BBS began at Mississippi State on a university computer system. Ed
|
|
had been asked to work on a BBS program for a friend, and he set it up as a
|
|
demo board called "Resource Pirates Bulletin Board." The name was intended
|
|
as a campy take-off on pirate boards, because they were "pirating" the
|
|
nets, not software. Ed was explicit in re-affirming that, whatever his own
|
|
personal views of proprietary information (he favors "knowledge to the
|
|
people"), he takes his administrative obligations very seriously, and
|
|
respects the laws restricting what can and cannot be placed on a university
|
|
board (see related story on censorship in the next issue). The original
|
|
software could accommodate about 50 users, and was quite small. It was a "no
|
|
rules" board, but it became quite popular, something he had not
|
|
anticipated. He made arrangements to obtain a legitimate board through the
|
|
university on a legitimate machine and reworked the software.
|
|
|
|
"I had no idea what I was getting when I started," Ed said in explaining
|
|
that he was surprised at the number of users (currently over 1,400) and the
|
|
amount of work involved in keeping up with the volume of traffic and the
|
|
file transfers. The board was down for awhile when it was switched from an
|
|
Athena to a MARS system. Numerous .gif (graphic pictures) and .gl (animated
|
|
pictures) were uploaded, many of which were sexually explicit. His
|
|
position was not to monitor or censor, even if the sheer volume of files
|
|
would allow him time to do so: "How do I determine what's obscene? It
|
|
becomes my responsibility to make that judgement call on everything. And I
|
|
don't want to make that call," he explained. The gif collection grew, and
|
|
they dominated communications on the board and ftp traffic.
|
|
|
|
Although Ed doesn't know how the National Science Foundation (NSF) became
|
|
aware of the files, there were complaints and threats by the NSF of
|
|
curtailing access to the nets, because the NSF provide some of the net
|
|
backbone. It was not a fight that Ed felt he could win, or one that he felt
|
|
he could make a strong case for, so he removed the files. That's when the
|
|
fun began.
|
|
|
|
He began receiving a number of messages, and some of the "ridiculous" ones
|
|
prompted the prank. He received numerous notes and complaints, and there
|
|
was what he describes as "lots of paranoia" about why they were taken down.
|
|
From mail we received at CuD, Ed's observations are accurate, because some
|
|
MARS users suspected that the temporary hiatus during the change in systems
|
|
was the result of a bust. In response to some of the more strident and
|
|
conspiratorial messages he received, Ed wrote the following post:
|
|
|
|
******START POST**********
|
|
|
|
Posted By: lush (Ed Luke)
|
|
Date: Sat Sep 29 21:54:03 1990
|
|
Title: The story about the GIF files.
|
|
|
|
Ok, since everyone has been asking about the gif files, here's the story of
|
|
what happened with the gifs... It seems that the secret service under
|
|
direction of Pres. Bush is on a campaign against computer crime. You've
|
|
read about some of this probably. It's called Operation Sun Devil. Some
|
|
of the older users will remember when this bbs was called the Pirates
|
|
Resource BBS and was on athena.ee.mssate.edu. Well we eventually got shut
|
|
down in a fashion similar to that of the victims of operation sun devil.
|
|
However, in our case, since we were such an allegedly large center for
|
|
computer criminal activity, the Secret Service, along with the National
|
|
Computing Defence Council decided to conduct an ongoing investigation. If
|
|
you want to catch mice, you don't just plug their holes. You lay traps.
|
|
Well they allowed us to set up again at mars on the strict requirement that
|
|
we would do strict accounting. We have been keeping records of every
|
|
(timestamped) upload and download that's been made to this board. In
|
|
addition, in hopes of cooperating with the Feds for obvious reasons, I
|
|
instituted the monitoring system software on mars. When anyone did an ftp
|
|
it logged the date, did a finger on the system that was connecting and
|
|
snarfed up the userid via ftp protocol and made a complete record of all
|
|
files downloaded and uploaded. Also, users that download files from the
|
|
bbs had the machine name they were connecting to, and any other evidence
|
|
collected in a similar manner. After enough information was collected, we
|
|
gave them the reams of data files and removed the gifs, giving yall the
|
|
bogus NSF story. So there it is. The GIFS and GL's aren't the biggest
|
|
part of the story, but they are illegal in some states and the FCC has been
|
|
interested in cracking down on computer obscenity for a long time. I can't
|
|
say I like it, but that we have to live with it.
|
|
|
|
Later,
|
|
Ed Luke
|
|
|
|
*******END POST*******
|
|
|
|
Ed emphasizes that we wrote the post under his own name, as a user, which
|
|
he feels gives him the latitude to be more playful, and *not* as "sysop."
|
|
He offers several reasons for the post:
|
|
|
|
First, it was a response to the numerous messages he received. Second, and
|
|
more importantly, it was an experiment in the level of paranoia that exists
|
|
on the nets, and he was surprised when he continued to discover the paths
|
|
through which the post was spreading. Finally, it was a test of the scope
|
|
of the BBS. He found that the latter two were significant: "Never
|
|
underestimate the level of paranoia and the power of the nets," he
|
|
observed.
|
|
|
|
Ed stresses that he had absolutely no intention to deceive the CU community
|
|
and that his act was done in good humor, not ill will. But, the sexually
|
|
explicit files *will not* return, because he feels the board provides far
|
|
to many other beneficial services to jeopardize it. The MARS board is
|
|
ftp-accessible at 130.18.64.3, but if the numbers continue to grow, access
|
|
may be difficult. Type "bbs" at the prompt and follow the instructions
|
|
from there. It is a true BBS, and files can be ftp-ed or transfered with a
|
|
variety of protocols, including kermit. On line chat, a lively message
|
|
section, and an array of free (legitimate) software is available. Those
|
|
wishing to obtain a copy of the BBS program may download it from the board
|
|
(free), and are encouraged to tinker with it and make changes, but
|
|
improvements or suggestions for them should be passed back to Ed.
|
|
|
|
We see two important lessons to be learned from this. The first we will
|
|
address in the next issue of CuD and relates to prior censorship. Ed (and
|
|
others) agree that many of the files were in bad taste because of their
|
|
sexual explicitness. The issue, however, is by what means files are
|
|
determined to be "obscene" and the process by which even agencies with a
|
|
legitimate interest in the contents of files should or may intervene to
|
|
remove them. We do not yet know the circumstances of NFS involvement and we
|
|
do not challenge the right of those with a legitimate interest to assume
|
|
responsibility for standards. But, given the current lack of protections
|
|
for cyberspace media, anything that smacks of censorship should at least
|
|
raise the question of "how" and "why."
|
|
|
|
The second lesson is more frightening. Although some astute readers were
|
|
sharp enough to suspect a prank, even they were fully aware of the
|
|
possibility of Secret Service meddling. This is frightening: Rather than
|
|
say "no way! The SS would never do *that*," few people would have been
|
|
surprised at the scenario outlined in Ed's post.
|
|
|
|
Are those who believed the worst gullible or naive? We think not. In the
|
|
1960s, it was quite common for law enforcement agents to collect lists of
|
|
"radicals" (defined as anybody who opposed the Viet Nam war) and use these
|
|
in highly disruptive ways. For example, in 1977 one CuD moderator was part
|
|
of a class action suit to obtain "Red Squad" files from the Michigan State
|
|
Police, which included documents of numerous local, state, and national
|
|
agencies that detailed surveillance mechanisms. One of the more ludicrous
|
|
was the practice of listing the license plates of cars in parking lots near
|
|
anti-war or other meetings, running these plates through the DMV, and then
|
|
listing those that turned up more than once. The owners of those vehicles,
|
|
according to these documents, would find themselves added to the list of
|
|
"suspects" on a Red Squad list, and this type of information demonstrably
|
|
cost people jobs, promotions, or subjected them to other forms of
|
|
harassment. A series of law suits and legislative actions curtailed the
|
|
worst of these abuses. However, the questionable tactics of the Secret
|
|
Service in Operation Sun Devil hardly inspires confidence in voluntary
|
|
restraint against the Computer Underground. The 15 hours of video tape
|
|
that were obtained from the room of an alleged informant at Summercon '88
|
|
are one example of questionable surveillance--How far are law enforcement
|
|
agents willing to go on their war against the "hacker menace?" If they are
|
|
video taping a bunch of under-age kids drinking, if they seem willing to
|
|
circumvent Constitutional limitations in indictments and searches,
|
|
then running a sting board and listing users seems fully plausible.
|
|
As we have cited in previous articles, sting boards are encouraged
|
|
as a legitimate option for both state and federal authorities.
|
|
|
|
The tragedy of Ed Luke's prank is not that he pulled it off, but rather
|
|
that, in the current climate of legitimate paranoia created by a few
|
|
over-zealous law enforcement agents, few of us would have been the least
|
|
bit surprised if it were true. What does this say about the respect for
|
|
law that such actions as Operation Sun Devil have created?
|
|
|
|
********************************************************************
|
|
>> END OF THIS FILE <<
|
|
***************************************************************************
|
|
|
|
------------------------------
|
|
|
|
From: Toxic Shock
|
|
Subject: Another view of hacking
|
|
Date: Sat, 06 Oct 90 03:04:57 EDT
|
|
|
|
********************************************************************
|
|
*** CuD #2.06: File 4 of 5: Another View of Hacking ***
|
|
********************************************************************
|
|
|
|
%The Toxic Shock group forwarded the following over to us--moderators.%
|
|
|
|
The Evil That Hackers Do
|
|
------------------------
|
|
|
|
"I am a hacker."
|
|
|
|
If I ever told that to anyone, it would immediately be assumed that I am a
|
|
malicious, vandalising, thieving, pseudo-terrorist out to take over the
|
|
computers of the world for personal gain or quite possibly to glean some
|
|
morbid satisfaction from deleting megs upon megs of valuable data.
|
|
|
|
Excrement of an uncastrated male bovine.
|
|
|
|
"I am associated with the computer underground."
|
|
|
|
If I ever told that to anyone, there would be a flash flood of foolish
|
|
associations in that person's mind between myself and The Mafia, with Saddam
|
|
Hussein, Syria, Libya, Abu Nidal, and who knows what else.
|
|
|
|
More excrement of an uncastrated male bovine.
|
|
|
|
Almost universally, among the ignorant majority, we hackers are considered to
|
|
be dangerous thugs whose sole purpose in life is to cause as much damage as we
|
|
can in as little time as possible to the largest number of people.
|
|
|
|
Need I repeat my picturesque opinion?
|
|
|
|
Sure, there are those little kiddies (mental and physical) who call themselves
|
|
"hackers" and fit the above descriptions. There are also people who call
|
|
themselves "human beings" that rape, murder, cheat, lie and steal every few
|
|
minutes (or is it seconds, now?). Does that mean that all "human beings"
|
|
should then be placed in prison?
|
|
|
|
Perhaps the term "hacker" has become a misnomer, but for my purposes in this
|
|
file, I will use that term to describe the way I view us hackers.
|
|
|
|
A hacker is always two things: curious and bored.
|
|
|
|
The boredom of a hacker is spawned by a society whose educational system is
|
|
designed mainly to get X number of students through the schools with the
|
|
average scores of X on tests; tests whose hardest challenge is to maintain
|
|
consciousness throughout the taking thereof.
|
|
|
|
There is no challenge in balancing the same binomial equations over and over
|
|
and over again. There is no challenge is learning to print your name on a
|
|
screen in BASIC, or PASCAL for that matter.
|
|
|
|
There is no challenge in being spoonfed such little bits of information as to
|
|
make it almost not worth one's while to even bother continuing education.
|
|
|
|
The lack of challenge, the minute bits of knowledge actually given to us, is
|
|
like a stake through our hearts. We are curious...So intensely curious that
|
|
we border on being nosy...They teach us NOTHING in schools. What is passed
|
|
off as education is nothing more than learning by rote. They pound the same
|
|
things into our heads, the things we learned the first time they pounded it,
|
|
and they pound and they pound, as if trying to knock our thirst for knowledge
|
|
right out of our heads!
|
|
|
|
We HAVE to be curious because we want to LEARN! Colleges take three semesters
|
|
to cover material that should take only three WEEKS! We cannot depend on our
|
|
educational system to quench our thirst, to satisfy our need for more and more
|
|
information! We are addicted to information and knowledge, and our drugs are
|
|
withheld from us.
|
|
|
|
We are forced to seek our precious information and knowledge elsewhere. We
|
|
have to find challenge somewhere, somehow, or it tears our very souls apart.
|
|
And we are, eventually, forced to enter someone's system...
|
|
|
|
Why? Because the system is new, unknown. How does one get in? What can be
|
|
found within? These are questions we can ask, with answers we must find for
|
|
ourselves...Oh, so different from school already!
|
|
|
|
Our boredom disappears as if it never existed. Our little spark of curiosity
|
|
becomes a bonfire within our minds. We have an open challenge to our
|
|
intellect, an opportunity to learn SOMEthing, and we cannot turn that
|
|
challenge down.
|
|
|
|
It doesn't happen like Wargames shows it. Oh no, it is so much different.
|
|
The geek in the movie....he had it so easy. No real hackers would exist if it
|
|
was that easy (perhaps therein lies the solution to the "problem").
|
|
|
|
No, we hack and hack at a system, like a man on a safari, clearing away the
|
|
vines of the jungle with his machete, trying to forge ahead to a destination
|
|
he cannot yet see. We keep on, torturing our brains and pounding our fingers
|
|
on the keyboard until at last...oh at long, sweet last... we are in.
|
|
|
|
We have already learned something...we know how to get into the system, we
|
|
know what kind of security the system has. We should, by now, have a general
|
|
idea how intelligent the operators of the system are or are not, and what kind
|
|
of information might be found within.
|
|
|
|
Something the nerd from Wargames could get into probably won't have any new AI
|
|
techniques, or other such things that help us to better our own programming
|
|
skills.
|
|
|
|
And at this point, many people assume we would then proceed to copy everything
|
|
we find and then trash the system so we could then sell the only remaining
|
|
copy of the data to the highest bidder, preferably a foreign agent or the
|
|
richest competitor of the company...
|
|
|
|
It makes no sense. We thirst for knowledge and information, and then you can
|
|
possibly think we are going to destroy that which is sacred to us? To take
|
|
away someone else's chance to succeed in getting in as we did? To fuel an
|
|
already terrible reputation and increase our chances of getting caught and
|
|
thus have our lives and careers effectively ruined?
|
|
|
|
Are you really THAT..DAMN..STUPID???
|
|
|
|
We value information as much as we value our systems, which is almost as much
|
|
as we value our lives, if not more so. We would no more destroy data than we
|
|
would chop off our own heads because we value our brains!
|
|
|
|
Most, if not all, of us think information should be exchanged freely... If
|
|
everyone is kept abreast of the newest technologies, techniques, what have
|
|
you, then everyone can benefit...The more each of us knows, the fewer past
|
|
mistakes we will repeat, the greater knowledge base we will have for future
|
|
developments.
|
|
|
|
Can you really believe that we are so hypocritical that we would SELL that
|
|
which we demand the free exchange of?
|
|
|
|
But, even as I type this, I begin to realize just why we are such a feared
|
|
group of people...
|
|
|
|
We are misunderstood by the majority.
|
|
|
|
You cannot understand someone who is driven by the thirst for knowledge, not
|
|
for money and power. You cannot understand someone who wants to learn, and to
|
|
teach, instead of putting away more and more money into a bank account.
|
|
|
|
You cannot understand someone who judges others by what they say, think, and
|
|
do, rather than how they look or how large their income is.
|
|
|
|
You cannot understand someone who wants to be honest and sharing, instead of
|
|
lying, stealing, and cheating.
|
|
|
|
You cannot understand us because we are different. Different in a society
|
|
where conformity is the demanded norm. We seek to rise above the rest, and
|
|
then to pull everyone else up to the same new heights. We seek to innovate,
|
|
to invent. We, quite seriously, seek to boldly go where no one has gone
|
|
before.
|
|
|
|
We refuse to be herded like the sheep which make up this society. We choose
|
|
to think for ourselves. We demand the respect of our individuality. And we
|
|
are slandered and shunned, condemned without a trial, because of these things.
|
|
|
|
We are misunderstood, misinterpreted, misrepresented.
|
|
|
|
All because we simply want to learn. We simply want to increase the flow of
|
|
information and knowledge, so that EVERYONE can learn and benefit.
|
|
|
|
And that is the terrible, evil, malign thing that we truly are. Intelligent
|
|
and inquisitive. Seeking improvement in the lot of all mankind. Seeking
|
|
equality. Seeking respect for individual freedom.
|
|
|
|
Oppression is our only reward....yet if it were not for people like us, all of
|
|
you who wake up each day to an alarm clock, or drive to work in your fine new
|
|
car after cutting on your security system, while drinking that cup of coffee
|
|
you didn't have to get up to prepare, would still be living in a cave,
|
|
somewhere near Africa, grunting and reproducing, eating the raw meat of some
|
|
beast you hunted down with clubs, trying to ignore the cold that seeps in
|
|
through the animal skins you wear, and wondering when some curious person with
|
|
some intelligence, creativity, and ingenuity would come along and invent the
|
|
wheel.
|
|
|
|
********************************************************************
|
|
>> END OF THIS FILE <<
|
|
***************************************************************************
|
|
|
|
------------------------------
|
|
|
|
From: Various Contributors
|
|
Subject: The CU in the news
|
|
Date: 28 July, 1990
|
|
|
|
********************************************************************
|
|
*** CuD #2.06: File 5 of 5: The CU in the News ***
|
|
********************************************************************
|
|
|
|
(Washington, DC)--CONGRESS TO APPROVE BILL BANNING SOFTWARE RENTALS
|
|
|
|
The Senate and the House Judiciary Committee have passed bills that will
|
|
allow software publishers to prevent computer stores and businesses from
|
|
renting out their software. Rep. Mike Synar of Oklahoma (a democrat) has
|
|
sponsored the House's Bill, and Congress is expected to pass his bill (or
|
|
the Senate's proposal) before October.
|
|
|
|
Mike Synar's bill is aimed at preventing video rental stores from
|
|
renting microcomputer software, since software pirates who don't own
|
|
modems can easily obtain commercial software through them. Interestingly
|
|
enough, the bill does NOT prevent video rental stores from renting out
|
|
Nintendo Game Cartridges, since Nintendo games can't be copied by software
|
|
pirates. It seems that Nintendo earns revenue from cartridge sales, since
|
|
they manufacture ALL Nintendo game cartridges....
|
|
|
|
(reprinted with permission from:
|
|
STReport "Your Independent News Source" September 28, 1990
|
|
16/32bit Magazine copyright 1990 No.6.39
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
From: Computerworld, September 24, 1990, p. 122, Inside Lines:
|
|
|
|
"And a Merry Christmas to All?"
|
|
|
|
An almost identical version of the IBM Christmas virus that infected
|
|
thousands of computers on IBM's internal mail in December 1987 has
|
|
reportedly been posted on the Bitnet network. The virus puts a tree and
|
|
seasonal greeting message on the screen of infected computers and is known
|
|
to replicate wildly, shutting down computers. No word of any infections,
|
|
however. Bitnet connects computers at more than 200 universities as well
|
|
as to the Earn network in Europe, the entry point of the original virus.
|
|
IBM was forced to shut down its 350,000-terminal network for nearly three
|
|
days to get rid of the virus.
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
From the JOHNSON CITY PRESS, Wednesday, October 3, 1990
|
|
|
|
HACKER ALTERING RECORDED PHONE MESSAGES
|
|
|
|
By Leslie Loyd
|
|
Associated Press Writer
|
|
|
|
KINGSPORT, TN - A computer hacker is tapping into voice mail telephone
|
|
messages and replacing them with explicit sexual descriptions, a telephone
|
|
company spokesman said Tuesday.
|
|
|
|
Phil Timp, a spokesman for United Telephone Co., said the company has
|
|
received 70 complaints.
|
|
|
|
"All of the sudden in the last two weeks, we've had a barrage of
|
|
complaints," Timp said. "What the motive is we don't know... Obviously
|
|
they're very disturbed."
|
|
|
|
The FBI and Kingsport police were called in Tuesday to investigate.
|
|
|
|
... (portion omitted describing voice mail) ...
|
|
|
|
"(Subscribers) are checking their messages and hearing this," Timp said.
|
|
"Imagine if your mother called."
|
|
|
|
He said subscribers frequently use the last four digits of their telephone
|
|
number as their access code because it is easy to remember. But that also
|
|
makes the code easy to break. Timp said subscribers should check messages
|
|
and change access code frequently.
|
|
|
|
Timp said someone is using a computer to tap into the system and figure out
|
|
the codes.
|
|
|
|
"It's a knowledgeable user," Timp said.
|
|
|
|
He said he doesn't know if any subscribers have canceled because of the
|
|
explicit messages.
|
|
|
|
"We're doing everything we can to make sure these people can continue their
|
|
voice mail service," Timp said.
|
|
|
|
"It's the first time we've had a problem to this degree," he said. The
|
|
company began offering the service two years ago and has had a few isolated
|
|
incidents like this.
|
|
|
|
(Submitted by Paul Schmidt)
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
The Ithaca Journal
|
|
Tuesday September 25, 1990 (reprinted by permission)
|
|
|
|
"IHS student unleashes computer viruses"
|
|
|
|
by Chris Swingle
|
|
Journal Staff
|
|
|
|
A 16-year-old Ithaca High School student created computer viruses that
|
|
spread during the summer to dozens of Macintosh personal computers in
|
|
Ithaca, officials reported Monday.
|
|
|
|
Computers at Ithaca High, BAKA Computers Inc. and Cornell University were
|
|
affected, but the problems are now believed solved. The viruses took
|
|
hundreds -- or even thousands -- of work hours to fix, one official
|
|
estimated.
|
|
|
|
"It can be described as a nuisance," said Ted Palmer, a senior investigator
|
|
with the New York State Police in Cortland who specializes in computer
|
|
crime investigations.
|
|
|
|
The Ithaca High School teenager, whose name wasn't released, isn't being
|
|
prosecuted because he cooperated and agreed to help police in future
|
|
investigations, Palmer said.
|
|
|
|
Computer viruses are miniature programs that can replicate and spread from
|
|
one computer to another, much as microorganism do. These viruses can wreak
|
|
havoc -- tying up computer's memory, interrupting normal operations,
|
|
causing errors or even destroying data.
|
|
|
|
The IHS case comes almost two years after a Cornell University graduate
|
|
student drew national attention with a similar type of rogue program called
|
|
a "worm," which jammed some 6,000 government, military and university
|
|
computers.
|
|
|
|
Robert T. Morris Jr. was convicted on federal charges of computer tampering
|
|
in January, and he was sentenced to 400 hours of community service and
|
|
fined $10,000.
|
|
|
|
This summer's two local viruses, which additionally had variations, didn't
|
|
destroy any information, but did spread quickly from disk to disk. The
|
|
virus "infected" a new computer by moving into the hard disk core of the
|
|
computer, then hopping onto the next disk that was put in the computer.
|
|
|
|
"All that was necessary is that a disk be inserted, to be infected," said
|
|
Mark Anbinder, a technical consultant for BAKA. "So it was a particularly
|
|
annoying one."
|
|
|
|
"I would describe it as serious in that it interferes with the computers'
|
|
operation," he added.
|
|
|
|
One virus was first discovered in May, and another strain appeared in
|
|
August, Anbinder said.
|
|
|
|
A police investigation started Aug. 22 and ended Sunday, Palmer said.
|
|
State police and Cornell public safety investigators worked with virus
|
|
experts to analyze the computer bug and trace its origin. In the spring of
|
|
1988, Macintosh computers at Cornell were infected by a virus called Scores
|
|
that made the machines act increasingly erratically, then stop working
|
|
altogether.
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
IBM US News Bulletin
|
|
Dateline - September 18, 1990
|
|
|
|
IBM, MERIT AND MCI FORM NEW ORGANIZATION TO EXPAND NATIONAL COMPUTER
|
|
SUPERHIGHWAY
|
|
|
|
IBM, MCI Communications Corporation, and Merit, Inc., a consortium of eight
|
|
Michigan universities, has announced the establishment of Advanced Network
|
|
and Services, Inc. (ANS), a new company that will help propel high-speed
|
|
computer networking into the next century for the nation's research and
|
|
education communities.
|
|
|
|
The new not-for-profit organization will manage and operate the federally
|
|
funded National Science Foundation Network (NSFNET) backbone, under
|
|
subcontract to Merit, as well as provide a broad spectrum of networking
|
|
services to researchers and educators in universities, federal laboratories
|
|
and the private sector. These services range from basic network monitoring
|
|
to complete networking connectivity and support. ANS will begin to connect
|
|
additional educational, industrial and government institutions to the
|
|
nation's largest public computer superhighway at speed up to 45 megabits per
|
|
second.
|
|
|
|
ANS is being established to help build and expand current networking
|
|
capabilities to meet the skyrocketing demand by the nation's scientists,
|
|
engineers and academics for high-speed networking.
|
|
|
|
The goals of ANS are:
|
|
|
|
* To assist in the expansion of the existing national network so that it
|
|
broadly serves the research and education community.
|
|
|
|
* To increase the speed and capability of the network, maintaining it at
|
|
the leading edge of technology.
|
|
|
|
* To provide the highest quality network and services in helping to advance
|
|
research and education.
|
|
|
|
IBM and MCI are providing ANS with initial funding, as well as leading edge
|
|
technology. Merit, Inc. will add its expertise in network operations,
|
|
engineering and planning, in addition to network information services. IBM,
|
|
MCI and Merit have been partners in NSFNET since 1987.
|
|
|
|
Headquarters for ANS are in Elmsford, Ney York.
|
|
--
|
|
Dan Ehrlich <ehrlich@cs.psu.edu>/Voice: +1 814 863 1142/FAX: +1 814 865 3176
|
|
|
|
********************************************************************
|
|
|
|
------------------------------
|
|
|
|
**END OF CuD #2.06**
|
|
********************************************************************
|
|
! |