949 lines
47 KiB
Plaintext
949 lines
47 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 2, Issue #2.07 (October 15, 1990) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
||
ARCHIVISTS: Bob Krause / Alex Smith
|
||
USENET readers can currently receive CuD as alt.society.cu-digest.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source is
|
||
cited. It is assumed that non-personal mail to the moderators may be
|
||
reprinted, unless otherwise specified. Readers are encouraged to submit
|
||
reasoned articles relating to the Computer Underground.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
views of the moderators. Contributors assume all responsibility
|
||
for assuring that articles submitted do not violate copyright
|
||
protections.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
CONTENTS:
|
||
File 1: Moderators' Corner
|
||
File 2: Re: IBM mainframe trojan repost <CHRISTMA EXEC>
|
||
File 3: CPSR Annual Meeting (Oct. 20-21, 1990)
|
||
File 4: Electronic Frontier Foundation Hires Staff Counsel
|
||
File 5: 13th Annual National Computer Security Conference (Part 1)
|
||
File 6: 13th Annual National Computer Security Conference (Part 2)
|
||
File 7: Summary of COMPUTER ETHICS (book)
|
||
File 8: Introduction to TOXIC SHOCK
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
********************************************************************
|
||
*** CuD #2.07, File 1 of 8: Moderator's corner ***
|
||
********************************************************************
|
||
|
||
From: Moderators
|
||
Subject: Moderators' Corner
|
||
Date: October 15, 1990
|
||
|
||
++++++++++++++++++
|
||
Miscellaneous comments
|
||
++++++++++++++++++
|
||
|
||
1. MAIL: A few people have received up to TEN copies of a single issue. We
|
||
have no idea why. On occasion, we send out duplicates if the mailer
|
||
indicates a net-block. Copies go out about 8-10 at a time, and if one batch
|
||
is returned, which happens most often on weekends, we repeat the addresses
|
||
in that batch individually, so it may happen that some people receive a
|
||
duplicate (we have no way of knowing which address caused the failure, so
|
||
we re-send all in that batch). However, there is no reason that we, or our
|
||
postmaster, can determine that would cause multiple copies to be received.
|
||
|
||
2. Most recipients on the mailing list will notice that the "TO" header
|
||
line is not to their address, but to "tk0jut1." Some people have asked how
|
||
(and why) we do this. We simply use the BCC (blind carbon copy) command.
|
||
For those asking what kind of system we use, it's an IBM Amdahl, wylbur on
|
||
the front end, and, yes, we do wish we had Unix.
|
||
|
||
3. CENSORSHIP: The article on censorship will be in issue 2.08 along with
|
||
an excellent article by Jim Warren on "Political Activity and Computers."
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Wes Morgan <morgan@ENGR.UKY.EDU>
|
||
Subject: Re: IBM mainframe trojan repost <CHRISTMA EXEC>
|
||
Date: Mon, 8 Oct 90 10:44:54 EDT
|
||
|
||
********************************************************************
|
||
*** CuD #2.07: File 2 of 8: From the Mailbag ***
|
||
********************************************************************
|
||
|
||
Re: "And a Merry Christmas to All?"
|
||
>
|
||
>An almost identical version of the IBM Christmas virus that infected
|
||
>thousands of computers on IBM's internal mail in December 1987 has
|
||
>reportedly been posted on the Bitnet network.
|
||
|
||
In reality, the CHRISTMA EXEC was reposted to *Usenet*, not Bitnet. While
|
||
some Bitnet sites are part of the Usenet, they are by no means one network.
|
||
In addition, the original CHRISTMA EXEC incident involved the entire
|
||
Bitnet, not just IBM's internal mail system.
|
||
|
||
By the way, it would have been far more accurate to refer to CHRISTMA EXEC
|
||
as a trojan, rather than a virus........
|
||
|
||
>The virus puts a tree and
|
||
>seasonal greeting message on the screen of infected computers and is known
|
||
>to replicate wildly, shutting down computers.
|
||
|
||
Its method of replication is to send copies of itself to every entry in the
|
||
user's NAMES files; Unix users can think of NAMES as an alias file. It
|
||
does NOT infect entire systems; it only acts on the virtual machine of the
|
||
user who executes it.
|
||
|
||
>No word of any infections,
|
||
>however. Bitnet connects computers at more than 200 universities as well
|
||
>as to the Earn network in Europe, the entry point of the original virus.
|
||
|
||
I don't think we'll see much more of this one. It was posted to a
|
||
low-volume newsgroup on Usenet. A reader of that newsgroup would also
|
||
require access to a BITNET site in order to implement the trojan.
|
||
|
||
Note that the file MUST be sent via SENDFILE; the headers placed on
|
||
electronic mail render it useless unless someone strips off the headers and
|
||
executes it.
|
||
|
||
>IBM was forced to shut down its 350,000-terminal network for nearly three
|
||
>days to get rid of the virus.
|
||
|
||
True enough; I strongly suspect that most RSCS handlers now look for and
|
||
eliminate any files named CHRISTMA EXEC........8)
|
||
|
||
A word of warning: IBM users should be extremely cautious of *ANY* EXEC
|
||
that simply appears in their reader. I have heard reports of several
|
||
variations on this theme; anyone with a good knowledge of CP and CMS can
|
||
imagine some nasty possibilities.
|
||
|
||
+++++++
|
||
The opinions expressed above are not those of UKECC unless so noted.
|
||
Wes Morgan % %rutgers,rayssd,uunet%!ukma!ukecc!morgan
|
||
University of Kentucky % or morgan@engr.uky.edu
|
||
Engineering Computing Center % or morgan%engr.uky.edu@UKCC.BITNET
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: General Posting
|
||
Subject: CPSR Annual Meeting (Oct. 20-21, 1990)
|
||
Date: Oct. 13, 1990
|
||
|
||
********************************************************************
|
||
*** CuD #2.07: File 3 of 8: CPSR Annual Meeting, Oct. 20-21 ***
|
||
********************************************************************
|
||
|
||
1990 Annual Meeting of Computer Professionals for Social Responsibility
|
||
|
||
October 20, 21, 1990
|
||
Stanford University and Palo Alto, California.
|
||
|
||
The general public is invited. For more information, please call the CPSR
|
||
National Office at (415) 322-3778.
|
||
|
||
The CPSR Annual Meeting is a substantive, two-day conference
|
||
addressing critical issues facing society because of the impact of
|
||
information technology. The meeting will feature well-known speakers
|
||
on subjects such as civil liberties in electronic communication, using
|
||
computers for democratic oversight of government, women in the
|
||
computing profession, and how the public learns about computers
|
||
through the popular media.
|
||
|
||
Speakers will include:
|
||
|
||
John Perry Barlow, "Civilizing Cyberspace: Computers, Civil Liberties
|
||
and Freedom."
|
||
|
||
John Perry Barlow, a self-described "techno-crank," has been a Wyoming
|
||
cattle rancher, a Republican Party official, and a lyricist with the
|
||
Grateful Dead. He writes articles on computers for MicroTimes and The
|
||
Whole Earth Review, and he co-founded the Electronic Frontier
|
||
Foundation with Mitch Kapor.
|
||
|
||
David Burnham, "Turning the Tables: Computer Oversight for Citizens."
|
||
|
||
David Burnham, a former investigative reporter for The New York Times,
|
||
is author of The Rise of the Computer State (1980) and A Law Unto
|
||
Itself (1990), an inside look at the Internal Revenue Service.
|
||
Burnham also works with the Transactional Records Access Clearinghouse
|
||
at Syracuse University, which examines computerized records of Federal
|
||
enforcement agencies.
|
||
|
||
Panel discussion: "Women in Computing: Where We Are, Where We Want to
|
||
Be, and How to Get There."
|
||
|
||
Shari Lawrence Pfleeger, Chair, ACM Committee on Women and Minorities
|
||
Donna Lehnoff, Women's Legal Defense Fund
|
||
Barbara Simons, National Secretary, Association for Computing Machinery
|
||
Dr. Sheila Humphreys, Department of Computer Science, UC Berkeley
|
||
|
||
Moderated by Dr. Anita Borg, DEC Western Research Laboratory
|
||
|
||
Panel discussion: "The Media and 'Mythinformation': How and What Does the
|
||
Public Learn About Computers?"
|
||
|
||
Bob Abel Multi-media expert, Synapse Technologies
|
||
Michael Rogers General editor, Newsweek magazine
|
||
Dr. Rudy Rucker, Science fiction author
|
||
Brenda Laurel Consultant, interactive entertainment
|
||
|
||
Moderated by Paul Saffo, Institute for the Future
|
||
|
||
James Fallows will be the speaker at the banquet Saturday evening.
|
||
"The Cold War is Over: Who Won?"
|
||
|
||
The Sunday, October 21, program of the CPSR Annual Meeting will
|
||
feature workshops on issues such as computing and civil liberties,
|
||
education, workplace issues, computers and the environment, and other
|
||
subjects, most self-organized by meeting participants. There will
|
||
also be a workshop on "Organizing for Change in the 90s."
|
||
|
||
For more information, please call the CPSR National Office at
|
||
(415) 322-3778.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Mike Godwin <decwrl!well.sf.ca.us!well!mnemonic@uunet.uu.net>
|
||
Subject: Electronic Frontier Foundation Hires Staff Counsel
|
||
Date: 9 Oct 90 14:12:02 GMT
|
||
|
||
********************************************************************
|
||
*** CuD #2.07: File 4 of 8: EFF Hires Staff Counsel ***
|
||
********************************************************************
|
||
|
||
This posting is meant to serve two purposes:
|
||
|
||
a) formally announcing that I have been hired as staff counsel by the
|
||
Electronic Frontier Foundation, for whom I will investigate
|
||
cases that the EFF may be interested in, and for whom I will be
|
||
coordinating EFF's legal strategy, and
|
||
|
||
b) letting readers of this newsgroup know how to contact EFF about
|
||
computer-related incidents and cases that raise civil-liberties
|
||
issues in which you think the organization should be interested.
|
||
|
||
To let EFF know about an interesting or troubling incident or case,
|
||
you can send information to my address (mnemonic@well.sf.ca.us) or
|
||
to EFF's general address (eff@well.sf.ca.us). The first address
|
||
will probably get a slightly faster response, but either is fine.
|
||
|
||
The U.S. Mail address is the following:
|
||
|
||
Mike Godwin
|
||
c/o Electronic Frontier Foundation
|
||
155 Second Street
|
||
Cambridge, MA 02141.
|
||
|
||
I can be reached by phone at 617-864-0665.
|
||
|
||
Mike Godwin, (617) 864-0665
|
||
mnemonic@well.sf.ca.us
|
||
Electronic Frontier Foundation
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 08 Oct 90 12:01:45 CDT
|
||
From: Gordon Meyer (CuD Co-moderator)
|
||
Subject: 13th Annual National Computer Security Conference (Part 1)
|
||
|
||
********************************************************************
|
||
*** CuD #2.07: File 5 of 8: NCSC Conference (part 1) ***
|
||
********************************************************************
|
||
|
||
13th Annual National Computer Security Conference
|
||
October 1-4, 1990
|
||
Omni Shoreham Hotel
|
||
Washington, D.C.
|
||
Reported by Gordon Meyer
|
||
|
||
Dr. Dorothy Denning's presentation, "Concerning Hackers Who Break Into
|
||
Computer Systems", was part of the 'ethics' session held the afternoon of
|
||
Oct 3rd.
|
||
|
||
Denning's presentation consisted mainly of data, in the form of quotation
|
||
and observations, taken from her recent interviews with approximately ten
|
||
self-identified computer hackers. While her paper offers some suggestions
|
||
on how the computer security community could assimilate some of the
|
||
information hackers have available, her presentation instead focused on
|
||
several thematic concerns she found to be prevalent in the computer
|
||
underground.
|
||
|
||
This was a wise tactical decision on her part, as her argument that hackers
|
||
can be of some use to computer security professionals is not only somewhat
|
||
unique, but must be considered only after the anti-hacker stereotypes have
|
||
been methodically shattered. Trying to accomplish this in a 20 minute
|
||
verbal presentation would be unrealistic. However, it should be pointed
|
||
out that each of the conference attenders did receive the full text of
|
||
Denning's paper (in fact, all the papers presented at all the sessions) in
|
||
the two-volume proceedings book for the conference.
|
||
|
||
The data presented at the session highlighted the CU's concern for ethical
|
||
and legal issues related to information security. A large number of the
|
||
quotes were taken from Denning's interview with Frank Drake (publisher of
|
||
the defunct W.O.R.M. magazine), and focused, in part, on the ethics of
|
||
large corporate data bases on individuals, and the NSA's role in providing
|
||
standards for data encryption. Denning also utilized some quotes from
|
||
PHRACK Inc (specifically the infamous 'Phoenix Project' announcement) and a
|
||
quote concerning the recent spate of CU busts as reported in a past issue
|
||
of CuD. Other excerpts were taken from The Mentor's Guide to Hacking, and
|
||
various other statements from her interviews with unidentified hackers.
|
||
The overall thrust of all of this was to show that hackers can be concerned
|
||
with information technology ethics, their own actions while on a system,
|
||
and the future of information technology and the CU in general.
|
||
|
||
Denning's presentation appeared to be well received by the audience. By
|
||
presenting the actual words of the subjects, rather than summarizing her
|
||
findings, the CU was brought to life in a way that most likely many of the
|
||
attenders had never seen before. (Each quote, by the way, was shown on an
|
||
overhead projector and dramatically read by Dorothy's husband, Peter
|
||
Denning.) The audience reactions during the presentations where quite
|
||
interesting to observe. Outward displays of hostility, disbelief, and
|
||
amusement were common, usually in reaction to statements of freedom, power,
|
||
and tales of busts respectively.
|
||
|
||
After Denning's presentation there was time for a few questions and
|
||
audience comments. One comment was from a West German attender and
|
||
concerned the Chaos Club. He told of Cliff Stoll's hacker adversary and
|
||
how "three disks of VMS information was sold to the KGB" despite denials
|
||
that such a thing had been done. His conclusion, emphatically stated, was
|
||
that "you can't believe what hackers tell you, you can't trust them!".
|
||
This comment received an enthusiastic burst of applause from the crowd.
|
||
|
||
The panel session, "Hackers: Who Are They?", was held Thursday morning.
|
||
The session was moderated by Denning, and consisted of the following
|
||
panelists:
|
||
|
||
Katie Hafner, author. Currently writing a book on Mitnick,
|
||
Pengo, and Morris.
|
||
Frank Drake, former publisher of W.O.R.M. magazine.
|
||
Emmanuel Goldstein, publisher of 2600 magazine.
|
||
Craig Neidorf, former co-publisher of PHRACK Inc.
|
||
Sheldon Zenner, defense attorney in the Neidorf/Phrack case.
|
||
Gordon Meyer, co-moderator of Computer Underground Digest.
|
||
|
||
Denning opened the session by stating that although her initial intentions
|
||
were to bring actual hackers in for the session, criticisms that doing so
|
||
would be giving "aid and comfort to the enemy" convinced her that the next
|
||
best thing, utilizing people who were closely associated with the CU, would
|
||
be more prudent. This theme, aggrandizing computer criminals, would surface
|
||
two or three more times during the session.
|
||
|
||
Denning started the session off by presenting each panelist with one or two
|
||
questions to answer. These questions served to introduce both the speaker
|
||
and various aspects of the computer underground. Her first question was to
|
||
Hafner, and addressed the concern that by writing about hackers,
|
||
impressionable young readers might be attracted to the "fame and glory" of
|
||
the enterprise. Hafner's answer essentially focused on the hardship and
|
||
emotional/financial loss each of her subjects had suffered as a result of
|
||
their activities. Hardly a glorified or attractive picture of hacking.
|
||
|
||
Other introductory questions dealt with Zenner's summary of the
|
||
Neidorf/Phrack case, Frank Drake defined "cyberpunk" and his motives in
|
||
founding W.O.R.M. magazine, Goldstein discussed 2600 magazine, Neidorf on
|
||
PHRACK Inc, and Meyer on CuD and defining the computer underground.
|
||
|
||
A number of themes emerged from the questions that were asked by the
|
||
conference attenders:
|
||
|
||
First Amendment rights, and the publication of stolen information.
|
||
|
||
Morality of publishing information that could be used to break the law.
|
||
|
||
Possible implications of hacking into a system that would threaten the
|
||
life and/or safety of others. (such as a hospital computer)
|
||
|
||
The obligation of companies to secure their own systems, and possible
|
||
legal complications that could arise if they fail to do so.
|
||
|
||
The perception that corporations overstate the financial impact of CU
|
||
activity. How much does it really cost you for a hacker to "steal" 3
|
||
seconds of CPU time?
|
||
|
||
Possible use of CU members or skills by organized crime.
|
||
|
||
Ways in which companies or organizations could provide a means for CU
|
||
members to provide information on security holes, without risking
|
||
reprisal.
|
||
|
||
There were many more questions and comments, but unfortunately the session
|
||
was not recorded. Perhaps what was even more interesting than the comments
|
||
and answers themselves was the emotional reaction of the audience.
|
||
|
||
Of the approximately 1600 people that registered for the conference around
|
||
250 attended this session. Scheduled to run about an hour and half, it
|
||
lasted nearly two hours with a number of questions still remaining to be
|
||
asked. Audience attention and participation was high, but couldn't be
|
||
described as very "friendly" at times. Subjects that seemed especially
|
||
"hot" included the financial impact of hacking, and the ease of reading and
|
||
utilizing information found in personal email.
|
||
|
||
The session went quite well, with many ideas and views being exchanged on
|
||
both sides. There was a feeling that some good ideas and concepts had
|
||
surfaced, and perhaps both sides had learned something about the other.
|
||
There was, however, a definite adversarial feeling in the air. The
|
||
panelists did, for the most part, manage to keep from being cast as
|
||
apologists for the CU and were straight forward with their views and
|
||
opinions. Goldstein and Drake in particular served to "ease over" a couple
|
||
of tough questions with the application of appropriate humor. (eg: Hey, if
|
||
it wasn't for hackers some of you wouldn't have a job!)
|
||
|
||
Denning should be congratulated and thanked for her efforts to bring some
|
||
dialogue between the CU and security professionals. This session should be
|
||
an example of the mutual benefit such meetings can bring about. If the
|
||
further efforts in this direction are made, rather than worrying about the
|
||
politics and appearances of meeting with hackers, perhaps some moderation
|
||
can be brought to both sides of the issue. Hyperbole and hysteria are
|
||
hardly productive for either group, and only by shattering stereotypes and
|
||
finding common ground will any resolution be possible. Let's hope that
|
||
future meetings of the profession will allow for further discussions of
|
||
this type.
|
||
|
||
Postscript: It was great to meet the many CuD readers that came up and
|
||
introduced themselves after the session. Thanks for your comments and kind
|
||
words. Also, welcome to the new CuD subscribers that were picked up as a
|
||
result of this conference. Additional comments and observations regarding
|
||
any aspect of the conference are most welcome from any CuD reader, send
|
||
them in!
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 11 Oct 90 22:04:28 CDT
|
||
From: "Craig M. Neidorf" <C483307@UMCVMB.BITNET>
|
||
Subject: 13th Annual National Computer Security Conference (Part 2)
|
||
|
||
********************************************************************
|
||
*** CuD #2.07: File 6 of 8: NCSC Conference (part 2) ***
|
||
********************************************************************
|
||
|
||
13th Annual National Computer Security Conference
|
||
October 1-4, 1990
|
||
Omni Shoreham Hotel
|
||
Washington, D.C.
|
||
A "Knight Lightning" Perspective
|
||
by Craig M. Neidorf
|
||
|
||
Dr. Dorothy Denning first hinted at inviting me to take part on her panel
|
||
"Hackers: Who Are They?" in May 1990 when we first came into contact while
|
||
preparing for my trial. At the time I did not feel that it was a very good
|
||
idea since no one knew what would happen to me over the next few months. At
|
||
the conclusion of my trial I agreed to participate and surprisingly, my
|
||
attorney, Sheldon Zenner (of Katten, Muchin, & Zavis), accepted an invitation
|
||
to speak as well.
|
||
|
||
A few weeks later there was some dissension to the idea of having me appear at
|
||
the conference from some professionals in the field of computer security. They
|
||
felt that my presence at such a conference undermined what they stood for and
|
||
would be observed by computer "hackers" as a reward of sorts for my notoriety
|
||
in the hacker community. Fortunately Dr. Denning stuck to her personal values
|
||
and did not exclude me from speaking.
|
||
|
||
Unlike Gordon Meyer, I was unable to attend Dr. Denning's presentation
|
||
"Concerning Hackers Who Break Into Computer Systems" and the ethics sessions,
|
||
although I was informed upon my arrival of the intense interest from the
|
||
conference participants and the reactions to my now very well known article
|
||
announcing the "Phoenix Project."
|
||
|
||
Not wishing to miss any more class than absolutely necessary, I arrived in
|
||
Washington D.C. late in the day on Wednesday, October 4th. By some bizarre
|
||
coincidence I ended up on the same flight with Sheldon Zenner.
|
||
|
||
I had attended similar conventions before such as the Zeta Beta Tau National
|
||
Convention in Baltimore the previous year, but there was something different
|
||
about this one. I suppose considering what I have been through it was only
|
||
natural for me to be a little uneasy when surrounded by computer security
|
||
professionals, but oddly enough this feeling soon passed as I began to
|
||
encounter friends both old and new.
|
||
|
||
Zenner and I met up with Dorothy and Peter Denning and soon after I met Terry
|
||
Gross, an attorney hired by the Electronic Frontier Foundation who had helped
|
||
with my case in reference to the First Amendment issues. Emmanuel Goldstein,
|
||
editor of 2600 Magazine and probably the chief person responsible for spreading
|
||
the news and concern about my indictment last Spring, and Frank Drake, editor
|
||
of W.O.R.M. showed up. I had met Drake once before. Finally I ran into Gordon
|
||
Meyer.
|
||
|
||
So for a while we all exchanged stories about different events surrounding our
|
||
lives and how things had changed over the years only to be interrupted once by
|
||
a odd gentleman from Germany who inquired if we were members of the Chaos
|
||
Computer Club. At the banquet that evening, I was introduced to Peter Neumann
|
||
(who among many other things is the moderator of the Internet Digest known as
|
||
"RISKS") and Marc Rotenberg (Computer Professionals for Social Responsibility).
|
||
|
||
Because of the great interest in the ethics sessions and comments I had heard
|
||
from people who had attended, I felt a strange irony come into play. I've
|
||
hosted and attended numerous "hacker" conventions over the years, the most
|
||
notable being "SummerCon". At these conventions one of the main time consuming
|
||
activities has always been to play detective and attempt to solve the mystery
|
||
of which one of the guests or other people at the hotel were there to spy on us
|
||
(whether they were government agents or some other form of security personnel).
|
||
|
||
So where at SummerCon the youthful hackers were all racing around looking for
|
||
the "feds," at the NCSC I wondered if the security professionals were reacting
|
||
in an inverse capacity... Who Are The Hackers? Despite this attitude or maybe
|
||
because of it, I and the other panelists, wore our nametags proudly with a
|
||
feeling of excitement surrounding us.
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
October 4, 1990
|
||
|
||
Dorothy Denning had gathered the speakers for an early morning brunch and I
|
||
finally got a chance to meet Katie Hafner in person. The panelists discussed
|
||
some possibilities of discussion questions to start off the presentation and
|
||
before I knew it, it was time to meet the public.
|
||
|
||
As we gathered in the front of the conference room, I was dismayed to find that
|
||
the people in charge of the setting up the nameboards (that would sit in front
|
||
of each panelist) had attended the Cook school of spelling and labeled me as
|
||
"Neirdorf." Zenner thought this was hysterical. Luckily they were able to
|
||
correct the error before we began.
|
||
|
||
Hackers: Who Are They?
|
||
|
||
Dr. Denning started the presentation by briefly introducing each panelist and
|
||
asking them a couple of questions.
|
||
|
||
Katie Hafner disputed the notion that her work has caused a glorification
|
||
of hacking because of the severe hardships the people she interviewed had to
|
||
endure. I found myself sympathizing with her as I knew what it was like to
|
||
be in their positions. Many people commented later that her defense of Mitnick
|
||
seemed a little insincere as he had indeed committed some serious acts. Not
|
||
knowing all of the details surrounding Mitnick's case and not relying on the
|
||
general newsmedia as a basis for opinion I withheld any sort of judgment.
|
||
|
||
Emmanuel Goldstein and Frank Drake appeared to take on the mantle of being the
|
||
spokespersons for the hackers, although I'm unsure if they would agree with
|
||
this characterization. Drake's main point of view dealt with the idea that
|
||
young hackers seek to be able to use resources that they are otherwise excluded
|
||
from. He claimed to once have been a system intruder, but now that he is in
|
||
college and has ample computing resources available to him, he no longer sees a
|
||
need to "hack."
|
||
|
||
Goldstein on the other hand sought to justify hacking as being beneficial to
|
||
society because the hackers are finding security holes and alerting security to
|
||
fix these problems before something catastrophic occurs.
|
||
|
||
Gordon Meyer tried to explain the hacker mind-set and how the average hackers
|
||
does not see using corporate resources as having a real financial burden to
|
||
today's companies. Some people misunderstood his remarks to be speaking from a
|
||
factual position and took offense, stating that the costs are great indeed.
|
||
He also explained the differences between Phrack and the Computer Underground
|
||
Digest. Most notable is that CuD does not print tutorials about computer
|
||
systems.
|
||
|
||
Sheldon Zenner focused on the freedom of the speech and press issues. He also
|
||
spoke about technical details of the U.S. v. Neidorf case and the court rulings
|
||
that resulted from it. One major point of interest was his quite reasonable
|
||
belief that the courts will soon be holding companies financially liable for
|
||
damages that may occur because of illegal intrusion into their systems. This
|
||
was not to suggest that a criminal defense strategy could be that a company did
|
||
not do enough to keep an intruder out, but instead that the company could be
|
||
held civilly liable by outside parties.
|
||
|
||
Zenner and Denning alike discussed the nature of Phrack's articles. They found
|
||
that the articles appearing in Phrack contained the same types of material
|
||
found publicly in other computer and security magazines, but with one
|
||
significant difference. The tone of the articles. An article named "How to
|
||
Hack Unix" in Phrack usually contained very similar information to an article
|
||
you might see in Communications of the ACM only to be named "Securing Unix
|
||
Systems." But the differences were more extreme than just the titles. Some
|
||
articles in Phrack seemed to suggest exploiting security holes while the
|
||
Communications of the ACM concentrated more on fixing the problem. The
|
||
information in both articles would be comparable, but the audiences reading and
|
||
writing these articles were often very different.
|
||
|
||
I explained the concept and operation of Phrack and wandered into a discussion
|
||
about lack of privacy concerning electronic mail on the Internet from
|
||
government officials, system managers, and possibly even by hackers. I went on
|
||
to remark that the security professionals were missing the point and the
|
||
problem. The college and high-school students while perhaps doing some
|
||
exploration and causing some slight disturbances are not the place to be
|
||
focusing their efforts. The real danger comes from career criminals and
|
||
company insiders who know the systems very well from being a part of it. These
|
||
people are the source of computer crime in this country and are the ones who
|
||
need to be dealt with. Catching a teenage hacker may be an easier task, but
|
||
ultimately will change nothing. To this point I agreed that a hacker gaining
|
||
entry and exposing holes on computer systems may be a service to some degree,
|
||
but unlike Goldstein, I could not maintain that such activity should bring
|
||
prosecutorial immunity to the hacker. This is a matter of discretion for
|
||
security personnel and prosecutors to take into consideration. I hope they do.
|
||
|
||
To a large degree I was rather silent on stage. Perhaps because I was cut off
|
||
more than once or maybe even a little stagefright, but largely because many of
|
||
the questions posed by the audience were wrong on their face for me to answer.
|
||
I was not going to stand and defend hacking for its own sake nor was I there to
|
||
explain the activities of every hacker in existence.
|
||
|
||
So I let Goldstein and Drake handle questions geared to be answered by a system
|
||
intruder and I primarily only spoke out concerning the First Amendment and
|
||
Phrack distribution. In one instance a man upset both by Drake's comments
|
||
about how the hackers just want to use resources they can't get elsewhere and
|
||
by Goldstein's presentation of the Operation Sun-Devil raids and the attack on
|
||
"Zod" in New York spoke up and accused us of being viciously one sided.
|
||
|
||
He said that none of us (and he singled me out specifically) look to be age 14
|
||
(he said he could believe I was 18) and that "our" statement that its ok for
|
||
hackers to gain access to systems simply because they lacked the resources
|
||
elsewhere meant it was ok for kids to steal money to buy drugs.
|
||
|
||
I responded by asking him if he was suggesting that if these "kids" were rich
|
||
and did not steal the money, it would be ok to purchase drugs? I was sure that
|
||
it was just a bad analogy so I changed the topic afterwards. He was right to a
|
||
certain extent, all of the hackers are not age 14 or even in highschool or
|
||
college, but is this really all that important of a distinction?
|
||
|
||
The activities of the Secret Service agents and other law enforcement officials
|
||
in Operation Sun-Devil and other investigations have been overwhelming and very
|
||
careless. True this is just their standard way of doing business and they may
|
||
not have even singled out the hackers as a group to focus excess zeal, but
|
||
recognizing that the hackers are in a worst case scenario "white-collar
|
||
offenders," shouldn't they alter their technique? Something that might be
|
||
important to make clear is that in truth my indictment and the indictments on
|
||
members of the Legion of Doom in Atlanta had absolutely nothing to do with
|
||
Operation Sun-Devil despite the general media creation.
|
||
|
||
Another interesting point that was brought out at the convention was that there
|
||
was so much activity and the Secret Service kept so busy in the state of
|
||
Arizona (possibly by some state official) concerning the hacker "problem" that
|
||
perhaps this is the reason the government did not catch on to the great Savings
|
||
& Loan multi-Billion dollar loss.
|
||
|
||
One gentleman spoke about his son being in a hospital where all his treatments
|
||
were being run by computer. He added that a system intruder might quite by
|
||
accident disrupt the system inadvertently endangering his son's life. Isn't
|
||
this bad? Obviously yes it is bad, but what was worse is that a critical
|
||
hospital computer system would be hooked up to a phoneline anyway. The main
|
||
reason for treatment in a hospital is so that the doctors are *there* to
|
||
monitor and assist patients. Could you imagine a doctor dialing in from home
|
||
with a modem to make his rounds?
|
||
|
||
There was some discussion about an editor's responsibility to inform
|
||
corporations if a hacker were to drop off material that he/she had breached
|
||
their security. I was not entirely in opposition to the idea, but the way I
|
||
would propose to do it was probably in the pages of a news article. This may
|
||
seem a little roundabout, but when you stop and consider all of the private
|
||
security consultants out there, they do not run around providing information to
|
||
corporations for free. They charge enormous fees for their services. There
|
||
are some organizations that do perform services for free (CERT comes to mind),
|
||
but that is the reason they were established and they receive funding from the
|
||
government which allows them to be more generous.
|
||
|
||
It is my belief that if a hacker were to give me some tips about security holes
|
||
and I in turn reported this information to a potential victim corporation, the
|
||
corporation would be more concerned with how and from whom I got the
|
||
information than with fixing the problem.
|
||
|
||
One of the government's expert witnesses from U.S. v. Neidorf attended this
|
||
session and he prodded Zenner and I with questions about the First Amendment
|
||
that were not made clear from the trial. Zenner did an excellent job of
|
||
clarifying the issues and presenting the truth where this Bellcore employee
|
||
sought to show us in a poor light.
|
||
|
||
During the commentary on the First Amendment, Hafner, Zenner, and I discussed a
|
||
July 22, 1988 article containing a Pacific Bell telephone document copied by a
|
||
hacker and sent to John Markoff that appeared on the front page of the New York
|
||
Times. A member of the audience said that this was ok, but the Phrack article
|
||
containing the E911 material was not because Phrack was only sent to hackers.
|
||
Zenner went on to explain that this was far from true since private security,
|
||
government employees, legal scholars, reporters, and telecom security personnel
|
||
all received Phrack without discrimination. There really is a lot that both
|
||
the hackers and security professionals have to learn about each other.
|
||
|
||
It began to get late and we were forced to end our session. I guess what
|
||
surprised me the most were all of the people that stayed behind to speak with
|
||
us. There were representatives from NASA, U.S. Sprint, Ford Aerospace, the
|
||
Department of Defense, a United States Army Lt. Colonel who all thanked us
|
||
for coming to speak. It was a truly unique experience in that a year ago I
|
||
would have presumed these people to be fighting against me and now it seems
|
||
that they are reasonable, decent people, with an interest in trying to learn
|
||
and help end the problems. I also met Mrs. Gail Meyer for the first time in
|
||
person as well.
|
||
|
||
I was swamped with people asking me how they could get Phrack and for the most
|
||
part I referred them to Gordon Meyer and CuD (and the CuD ftp). Just before we
|
||
went to lunch I met Donn Parker and Art Brodsky, an editor from Communications
|
||
Daily. So many interesting people to speak with and so little time. I spent a
|
||
couple hours at the National Gallery of Art with Emmanuel Goldstein, flew back
|
||
to St. Louis, and returned to school.
|
||
|
||
It was definitely an enLightening experience.
|
||
|
||
++++++++++++++++++++++++++++++
|
||
|
||
A very special thank you goes to Dorothy Denning, a dear friend who made it
|
||
possible for me to attend the conference.
|
||
|
||
:Craig M. Neidorf a/k/a Knight Lightning
|
||
|
||
C483307 @ UMCVMB.MISSOURI.EDU
|
||
C483307 @ UMCVMB.BITNET
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 08 Oct 90 12:02:51 CDT
|
||
From: Gordon Meyer (CuD Co-moderator)
|
||
Subject: Summary of COMPUTER ETHICS (book)
|
||
|
||
********************************************************************
|
||
*** CuD #2.07: File 7 of 8: Summary of "Computer Ethics" (book) ***
|
||
********************************************************************
|
||
|
||
Here's a recently published book that will be of interest to CuD readers.
|
||
This summary has been taken, verbatim, from the flaps of the dust jacket.
|
||
|
||
_Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing_
|
||
Forester, Tom and Perry Morrison
|
||
1990. The MIT Press. Cambridge, Massachusetts.
|
||
ISBN 0-262-06131-7 (hardcover)
|
||
Price paid: $19.95 193 pages, with index
|
||
|
||
_Computer Ethics_ exposes the dangers of letting society rely too heavily
|
||
on computers.. Written by two insiders, it provides balanced and
|
||
authoritative coverage of such topics as software unreliability, computer
|
||
crime, software theft, hacking, viruses, unmanageable complexity, invasions
|
||
of privacy, "artificial intelligence," and degraded work.
|
||
|
||
The authors describe these problem areas with fascinating, often dramatic
|
||
examples of computer abuse and misuse, augmented by extensive notes and
|
||
references, role-playing exercises, and hypothetical situations. There
|
||
are suggestions for further discussion at the end of each chapter.
|
||
|
||
Forester and Morrison argue that it is the nature of computer systems to
|
||
be unreliable, insecure, and unpredictable, and that society must face
|
||
the consequences. _Computer Ethics_ is an outgrowth of the authors' work
|
||
with computer science student, focusing on the ethical dilemmas these
|
||
students will confront as professionals.
|
||
|
||
About the authors:
|
||
|
||
Tom Forester teaches in the School of Computing and Information Technology
|
||
at Griffith University in Queensland, Australia, and is author or editor
|
||
of six books on technology and society. Perry Morrison is Lecturer in
|
||
Computing at the University of New England, New South Wales, Australia.
|
||
|
||
Table of Contents:
|
||
|
||
Preface and Acknowledgements
|
||
|
||
1 Introduction: Our Computerized Society
|
||
Some problems created for Society by Computers - Ethical Dilemmas
|
||
for computer professionals and users
|
||
|
||
2 Computer Crime
|
||
The rise of the high-tech heist - Is reported crime the tip of an
|
||
iceberg? - Targets of the computer criminal - Who are the computer
|
||
Criminals? - Improving computer security - Suggestions for further
|
||
discussion
|
||
|
||
3 Software Theft
|
||
The growth of software piracy - Revenge of the nerds? - Intellectual
|
||
property rights and the law - Software piracy and industry progress
|
||
- Busting the pirates - Suggestions for further discussion
|
||
|
||
4 Hacking and Viruses
|
||
What is hacking? - Why do hackers 'hack'? - Hackers: criminals or
|
||
modern-day robin hoods? - Some 'great' hacks - Worms, trojan horses
|
||
and time bombs - The virus invasion - Ethical issues - Suggestions
|
||
for further discussion
|
||
|
||
5 Unreliable Computers
|
||
Most information systems are failures - Some great software disasters
|
||
- Warranties and disclaimers - Why are complex systems so
|
||
unreliable? - What are computer scientists doing about it? -
|
||
Suggestions for further discussion
|
||
|
||
6 The Invasion of Privacy
|
||
Database disasters - Privacy legislation - Big brother is watching
|
||
you - The surveillance society - Just when you thought no one was
|
||
listening - Computers and elections - Suggestions for further
|
||
discussion
|
||
|
||
7 AI and Expert Systems
|
||
What is AI? - What is intelligence? - Expert systems - Legal problems
|
||
- Newer developments - Ethical issues: is AI a proper goal? -
|
||
Conclusion: the limits of hype - Suggestions for further discussion
|
||
|
||
8 Computerizing the workplace
|
||
Computers and employment - Computers and the quality of worklife:
|
||
'De-skilling' - Productivity and People: stress, monitoring, de-
|
||
personalization, fatigue and boredom - Health and safety issues:
|
||
VDT's and the RSI debate - Suggestions for further discussion
|
||
|
||
Appendix Autonomous Systems: the case of 'Star Wars'
|
||
|
||
Index
|
||
|
||
----
|
||
CuD would welcome a review and/or summary of this book. If any CuD-ites
|
||
are interested, please send one in!
|
||
|
||
Terra Primum!
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Deleted
|
||
Subject: Introduction to TOXIC SHOCK
|
||
Date: Wed, 10 Oct 90 20:49:32 EDT
|
||
|
||
********************************************************************
|
||
*** CuD #2.07: File 8 of 8: Introduction to TOXIC SHOCK ***
|
||
********************************************************************
|
||
|
||
%We have been asked by various readers for information on Toxic
|
||
Shock, so we asked the group to provide an introduction/summary,
|
||
which they did (moderators)%.
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
!*@&#^$%#^@&!*@&#^$%#^@&!*@&#^$%#^@&!*@&#^$%#^@&!*@&#^$%#^@&!*@&#^$%#^@&!*
|
||
|
||
|
||
.
|
||
.:::::. .::::::::.
|
||
...:::::::::.. ::::::::::::
|
||
..:::::::::::::::::.. ::::: ::::
|
||
.::: ::::::: :::. :::::. :
|
||
:: ::::: :: :::::::.
|
||
: ::: : :::::::::.
|
||
::: ::::::::
|
||
::: :::::
|
||
::::: : ::::
|
||
::::: oxic :::......:::: hock
|
||
.:::::::. :::::::::::
|
||
::::::::::: :::::::::
|
||
|
||
by
|
||
|
||
Bloody Afterbirth
|
||
|
||
!@*&#$^%!@*&#$^%!@*&#$^%!@*&#$^%!@*&#$^%!@*&#$^%!@*&#$^%!@*&#$^%!@*&#$^%!@
|
||
|
||
By request, I present you with some info about Toxic Shock...
|
||
|
||
Our main purpose in existence is to piss someone off.
|
||
|
||
Originally, we did this (quite well, I like to think) by being
|
||
disgustingly explicit, both sexually and violently. We did parodies of the
|
||
B-I-B-L-E <gasp>, made fun of nouns (people, places, things!), and basically
|
||
tried to be as raunchy as we could, with or without a serious message.
|
||
|
||
We slowly began to change... Our stories became less explicit,
|
||
sometimes, and became more dramatic, with unusual endings and some form of
|
||
meaning/message/moral behind them. We began to mix our utter bullshit with
|
||
things of a more serious nature, though only the message behind what we did
|
||
may have seemed serious. We were still being raunchy, but we were doing it
|
||
to get a point across, then.
|
||
|
||
Our movement away from the original stories was agonizingly slow and we
|
||
regressed several times along the way... I wanted the group to become a
|
||
force (hopefully) for change... I wanted to educate people about things, to
|
||
try to open their eyes about certain issues in society and life...
|
||
Eventually, the others began to see it my way...
|
||
|
||
It was about that time that we first excerpted from magazines and
|
||
pamphlets... We began to get pissed off about environmental issues, social
|
||
issues, political issues, etc.. Our files and those things that we
|
||
excerpted began to reflect this.
|
||
|
||
About that time I wrote a story called The Final Conflict which, on the
|
||
surface, was the final battle between My Lord Fetus and that weak spined
|
||
fool of a deity we call Coathanger... As I pointed out in the file, it was
|
||
designed to present my views on drugs, abortion, sex, etc., and to make
|
||
people think about these issues for themselves.
|
||
|
||
That was, I like to think, the herald of a new age for Toxic Shock.
|
||
|
||
We began excerpting more and more, from HIGH TIMES, Omni, GreenPeace
|
||
literature, etc.. What we were reading pissed us off, what we saw on the
|
||
news pissed us off... And the fact that noone was doing anything about
|
||
those things pissed us off.
|
||
|
||
So, we tried our best to get this information to the people, and
|
||
hopefully to make someone, somewhere, angry enough to help us fight the
|
||
corruption in our government and society, and the morally WRONG policies set
|
||
by our government.
|
||
|
||
That is where we were, and that is where we are now.
|
||
|
||
We embrace the Underground, for it is our home.
|
||
|
||
What we have called the Underground includes the Hacker Society that has
|
||
been rapidly declining since around 1985, and the Drug Culture. This makes
|
||
us look bad, nasty, and evil, and we really don't care much... Because the
|
||
people we want to reach out to are open minded enough to listen to what we
|
||
have to say, and are able to weigh the information in their heads and make
|
||
up their own minds about things like drug legalization, terrorist attacks
|
||
such as Operation Sun Devil, and other such issues.
|
||
|
||
We continue to excerpt from magazines, take things that we find floating
|
||
along the networks, and basically try to get in your face with the Other
|
||
Viewpoint to all of the propaganda that the government and big pressure
|
||
groups feed those Television Addicts.
|
||
|
||
The citizens of the United States do not seem to realize, do not seem to
|
||
care, that the name of the country will soon be changed to United Police
|
||
State of America... We try to help people see that this is happening, that
|
||
the Rights to Free Speech, Thought, and Action, which are supposedly
|
||
Inalienable, are being systematically stripped from all the people...
|
||
|
||
Unfortunately, this has proven to be difficult because, as of right now,
|
||
we have only three members...Even by the most lenient of measures, the most
|
||
we have ever had at one time has been six... Admittedly, we've done over
|
||
one hundred files with three people alone, but we could really use some help
|
||
in our effort to Educate...
|
||
|
||
Soooooo...For the future...Ideally, we will help prevent the situation in
|
||
America, the Home of the Slave, from getting any worse, and help to speed up
|
||
the radical reforms and changes that are necessary in the ideals, morals,
|
||
attitudes and policies of the people of this country...and the world...
|
||
|
||
|
||
(c)October 1990 Bloody Afterbirth/Toxic Shock
|
||
.....Reproduce at will, with no modifications to the text.....
|
||
|
||
Toxic Shock are not affiliated with CuD (not YET!), so if you are
|
||
wanting to contact one of us, please don't bother the moderators.
|
||
Bloody Afterbirth can be found on Lunatic Labs and Ripco, or if
|
||
you prefer to use USENET or Internet, shoot something to this
|
||
guy, he'll pass it on...
|
||
|
||
sixhub!kk4fs!lynched -or- lynched@kkf4s.uucp
|
||
|
||
You can also call the Centre Of Eternity at 615.552.5747 (12/24)
|
||
The Sop can get you in touch with one of us eventually...
|
||
|
||
|