782 lines
39 KiB
Plaintext
782 lines
39 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun, Oct 27, 1991 Volume 3 : Issue 38
|
||
|
||
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
||
CONTENTS, #3.38 ( October 27, 1991)
|
||
File 1: Geraldo's _Now it can be Told_ Revisited
|
||
File 2: Comment on the Geraldo Show
|
||
File 3: A Guest's-eye view of the Geraldo Show
|
||
File 4: Second Thoughts about the "Ingraham Massacre"
|
||
File 5: Response to CuD #3.37's "Mad Hacker" Issue
|
||
File 6: Release of Informatik #1
|
||
File 7: Second Annual XMASCON
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
||
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
|
||
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
|
||
Chicago email server, send mail with the subject "help" (without the
|
||
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to the
|
||
Computer Underground. Articles are preferred to short responses.
|
||
Please avoid quoting previous posts unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 25 Oct 91 12:19:22 CDT
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 1--Geraldo's _Now it can be Told_ Revisited
|
||
|
||
The fallout from the Geraldo show (see CuD #3.37) that we've received
|
||
has focused on Alameda County (Calif) Assistant District Attorney Don
|
||
Ingraham for the reckless manner in which he treated "truth" and Craig
|
||
Neidorf. Craig provides an insider's view, and the moderators offer a
|
||
review of Ingraham's made-for-tv performance below.
|
||
|
||
Krista Bradford, Senior Reporter for NICBT, provides a helpful glimpse
|
||
into production of the show that explains some of the dynamics behind
|
||
framing topics. Krista also adds a thoughtful commentary on educating
|
||
the media to the issues of cyberspace. Her lesson is: There is no
|
||
"media," but rather reporters who do media work. These workers don't
|
||
"get educated" by some mystical process. Instead, those of us who
|
||
complain about media misrepresentation have to obligation to find
|
||
constructive ways to deliver our message to individuals writing on the
|
||
topic. It is our obligation, she argues, to contact individual
|
||
reporters, to sign them up on various systems, and to bring the
|
||
message to them rather than assume they can, on their own, go out and
|
||
find it.
|
||
|
||
For those interested, Craig is still in debt to Katten, Muchin, &
|
||
Zavis for close to $50,000.00. Any contributions to his defense fund
|
||
would be greatly appreciated. Please send a check or money order to:
|
||
|
||
Sheldon Zenner
|
||
Katten, Muchin, & Zavis
|
||
525 West Monroe Street
|
||
Suite 1600
|
||
Chicago, Illinois 60606-3693
|
||
|
||
The checks must be made out to Katten, Muchin, and Zavis and you must
|
||
put his name on the memo section somewhere or else they will not
|
||
credit the money to his account.
|
||
|
||
------------------------------
|
||
|
||
Date: 19 Oct 91 20:42:40 CDT (Sat)
|
||
From: peter@TARONGA.COM(Peter da Silva)
|
||
Subject: File 2--Comment on the Geraldo Show
|
||
|
||
My reaction to Rivera's show was simply that it glorified all the
|
||
negative connotations of the word "Hacker". It put an obvious bozo up
|
||
against Neidorf who simply made the government look bad. It also made
|
||
Neidorf look bad by linking him to things he never did, nor that any
|
||
other "hacker" ever did (the 911 paper in question was public
|
||
information, for heavens' sake, and they didn't say that once!). It
|
||
was a complete loss for everyone except Rivera and the foreign hackers
|
||
out of reach of Sun-Devil hysteria.
|
||
|
||
No matter what side of the subject you're on... if you live in the
|
||
U.S. this show hurt you whether you know it or not.
|
||
|
||
Which is typical of Geraldo's flaming. The best part was Cliff Stoll,
|
||
but of course he never got a chance to refute Goldstein's dismissal of
|
||
his point about breaking and entering... which is quite valid. If you
|
||
want to be pedantic, phreak-style crackers are like joy-riding kids.
|
||
Joy-riding is, rightly, illegal. And so it should be. Of course, you
|
||
don't get thousands of dollars worth of equipment confiscated and jail
|
||
terms for joy-riding. The government *and* the apologists for these
|
||
soi-disant hackers are *both* wrong, and attempting to trivialize
|
||
*either* side's grievances is counterproductive.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 22 Oct 1991 01:05:07 -0400
|
||
From: Craig Neidorf <knight@stormking.com>
|
||
Subject: File 3--A Guest's-eye view of the Geraldo Show
|
||
|
||
Same Story, New Court Room
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
"I guess they figured I needed to be tried twice."
|
||
|
||
Now It Can Really Be Told...
|
||
|
||
It was Monday, March 25, 1991 and I was sitting in a conference room
|
||
at the SFO Marriott Hotel in Burlingame, California. I was attending
|
||
a tutorial session called "How Computer Crime is Investigated" hosted
|
||
by Don Ingraham at the First Conference on Computers, Freedom, and
|
||
Privacy.
|
||
|
||
Don Ingraham, an Assistant District Attorney in Alameda County,
|
||
California was already a nationally-known computer crime prosecutor
|
||
and I was Craig Neidorf, political science/pre-law student from St.
|
||
Louis, already nationally-known for being Knight Lightning, editor of
|
||
Phrack... the guy who published the 911 text file and more.
|
||
|
||
What began as a tutorial and learning session about the use of search
|
||
warrants on electronically stored evidence changed into a heated
|
||
debate with Ingraham on one side with some supporters and me on the
|
||
other side allied with Sheldon Zenner, Mike Godwin, and Sharon
|
||
Beckman. It was interesting and quite a few constitutional and ethical
|
||
issues were raised. However, when it was all over, I left with a
|
||
feeling of respect for Mr. Ingraham even if I disagreed with his
|
||
views.
|
||
|
||
As the conference continued over the next few days, I found that where
|
||
I had expected clashes I found conversations. The law enforcement
|
||
officers and prosecutors were not bad people when you got them in a
|
||
small group away from the reporters. As odd as this may sound, a
|
||
whole bunch of them (joined by people like Bruce Sterling and John
|
||
Perry Barlow) were seated in the lounge when I showed up late one
|
||
evening and they had been speaking about my future. They had decided
|
||
that should I choose a career path in law enforcement after I finished
|
||
law school, they would all be out of work as I became the most feared
|
||
prosecutor among the entire hacker community and many others. In one
|
||
sense it was very flattering. Among these prosecutors was Don
|
||
Ingraham and he was very supportive of the idea of me becoming a
|
||
prosecutor.
|
||
|
||
In late July 1991, I was just finishing up my last semester at the
|
||
University of Missouri-Columbia. I had been forced to take a full
|
||
12-hour summer school load of classes in order to make the August
|
||
commencement. I was running a litte behind after William Cook made
|
||
sure that I could not complete the Spring semester of 1990. As it
|
||
turns out, the CFP folks had predicted my future rather accurately, I
|
||
was working for law enforcement. As part of my undergraduate
|
||
requirements I had to take an internship with some branch of state
|
||
government. A strong grade point average and critical writing skills
|
||
had earned me a prestigious position with the Missouri Attorney
|
||
General's Office in their Public Protection Division (the department
|
||
that handles consumer fraud).
|
||
|
||
One evening I received a call from Phyllis Zimmerman who represented
|
||
"Now It Can Be Told." She explained who she was and what their
|
||
program was all about. "We're going to show how the hackers are
|
||
really the good guys who are exposing the flaws so the criminals can't
|
||
exploit them." It sounded like she had been brainwashed by Emmanuel
|
||
Goldstein of 2600 Magazine to me, but what the hell. I told her that
|
||
I might be interested, but I could not do anything with her until
|
||
after August 3rd since I had to finish school and I had some finals
|
||
coming up for my remaining classes.
|
||
|
||
I didn't hear from the NOW people again until the second week of
|
||
September. This time I was contacted by Cindy Frei. They didn't want
|
||
to interview me in a segment anymore, instead they wanted me to take
|
||
part in sort of a discussion after the main part of the show. She
|
||
told me that William Cook might be there, as well as Donald Delaney,
|
||
Wynn Schwartaw[sic], and Chris Goggans. I knew Cook would never show
|
||
up and hanging out in New York with Bloodaxe (Goggans) sounded like it
|
||
might be cool since we had so much fun the previous summer at
|
||
CyberView in St. Louis. So we made plans for me to fly up to New York
|
||
on Wednesday, September 25th. On Tuesday, I learned that Chris
|
||
Goggans and Donald Delaney had been cancelled and Don Ingraham had
|
||
been substituted in as a replacement. I also began to learn a little
|
||
more about the show.
|
||
|
||
Scenes of Dutch hackers breaking into systems and more. I was
|
||
concerned that instead of the viewers getting impressions of good guy
|
||
hackers, the Department of Defense would go on alert and press
|
||
Congress for stronger legislation against computer hackers. Frei said
|
||
I was supposed to sort of give my impressions of what I saw, a
|
||
hacker's viewpoint. I explained that I wasn't a hacker in the sense
|
||
she was looking for, but this did not present a problem for her. She
|
||
didn't want me to get into a discussion about the difference of
|
||
opinion on the use of the word hacker. I began to have second
|
||
thoughts about doing the show, but I decided that I was probably best
|
||
suited to try and dispel some of the hacker hysteria that might
|
||
arise. I was wrong.
|
||
|
||
I arrived in a cold, rainy, unfamiliar and unfriendly metropolis --
|
||
New York City. No car waiting or anything special like that. Frei
|
||
said I should take a cab and just save all the receipts, they would
|
||
reimburse me. It took seemingly forever, but I arrived at the hotel
|
||
Empire (Radison). It was a dump. The hallways and rooms looked like
|
||
they hadn't been remodeled in at least a decade and to make matters
|
||
worse, there was a mouse loose in my room.
|
||
|
||
The next morning I took a cab to CBS Studios on West 57th street where
|
||
Now It Can Be Told is shot. They ran me through a little preping and
|
||
a little makeup. They wanted me to be confrontational with Don
|
||
Ingraham. This was not on my agenda. I expected we would talk about
|
||
electronic search and seizure and the dilemmas that computer crime
|
||
investigation presents to law enforcement. I was not looking for a
|
||
fight with this man, I thought he was a friend.
|
||
|
||
The studio for Geraldo is actually very tiny despite how the cameras
|
||
make it look like a large room. I met Geraldo who found it
|
||
interesting that I was a political science major in school and not
|
||
computer science. I was told that Geraldo wanted to use my scrapbook
|
||
in the show to flip to a few of the headlines in the articles...
|
||
instead he used it to sensationalize.
|
||
|
||
We had to shoot the intro segment at least eight times before there
|
||
was one they finally liked. Each time Geraldo threw a different
|
||
question at me. It was funny in a way when they would screw up and
|
||
Geraldo started cursing a little. Everything was going fine until Don
|
||
Ingraham came on camera.
|
||
|
||
Ingraham's comparison of hackers to rapists almost made me physically
|
||
ill. How can a reasonable person draw an analogy between these two
|
||
types of activity? Ok, sure, if a person's computer is accessed
|
||
without authorization, there very well might be a feeling of being
|
||
violated, of vulnerability, but the physical and emotional damage of a
|
||
rape is almost immeasurable. Although I'm not an expert on
|
||
psychology, I do know a little about the long-term psychological
|
||
damage a rape can do to a woman, the fear of ever being intimate
|
||
again, of going outside, the inability to have a relationship with a
|
||
man, the constant questions; "Is it my fault?" "Did I encourage
|
||
this?" How can a man as intelligent as Don Ingraham stoop to such
|
||
blatant disregard for a true representation of the facts? Of course,
|
||
I was not given a chance to respond to those remarks. We cut right to
|
||
a commercial and when we came back, I was busy trying to find a way to
|
||
respond to Ingraham's other uncalled for remarks.
|
||
|
||
Ingraham called me lucky to have not gotten convicted and he is right.
|
||
I am lucky that I had a brilliant attorney and a decent judge who made
|
||
the justice system work despite the efforts of a malicious
|
||
media-hungry prosecutor. However, he neglected to point out that the
|
||
government voluntarily dropped the case because there was no case. I
|
||
hadn't done anything wrong. Furthermore, it was unknown to him that
|
||
Federal District Court Judge Bua issued a court order to the Secret
|
||
Service, FBI, and U.S. Marshalls several months ago to expunge all of
|
||
my arrest records and have them destroyed. And there is a lot more to
|
||
it than the fact that BellCore published 911 documents.
|
||
|
||
As for the 911 information being public, there have been indepth
|
||
articles on 911 in magazines like CO, Teleconnect, and Telephone
|
||
Engineering & Management. Not to mention the fact that the 911
|
||
information itself was just a bunch of bureaucratic nonsense. Scott
|
||
Ticer of BellSouth doesn't know what he's talking about.
|
||
|
||
Ingraham also claims that the Federal Court said that the Pentagon
|
||
Papers (New York Times Co. v. United States, 403 U.S. 713, 1971) case
|
||
did not apply to me. This is not exactly true. The Court decided
|
||
that if someone is committing a fraud and using a publication to
|
||
commit that fraud, then that activity is not protected by the First
|
||
Amendment. At the time, the U.S. Attorney's office was alleging that
|
||
Phrack Newsletter in and of itself from day one was a fraud to begin
|
||
with. Because of that allegation (which fell completely apart at
|
||
trial), the Court could not dismiss based on the First Amendment.
|
||
|
||
The main problem here is that I was taken completely by surprise.
|
||
Frei had promised that this show was not about my case and more than
|
||
that, I thought I knew Ingraham. I never even considered the
|
||
possibility of such an attack from him. It was clear that they had
|
||
set me up for an ambush. Why was Ingraham discussing my case anyway?
|
||
The case has been over for a long time and he never had anything to do
|
||
with it. Perhaps if he did have something to do with it, he would
|
||
have known that the government did not charge me with a conspiracy,
|
||
did not prove a conspiracy, and in fact my co-defendant Robert Riggs
|
||
had testified that I had never asked him to break into any computer or
|
||
copy any document, let alone a Bell South computer or a 911 document.
|
||
No, Ingraham did not know much about my case and this ignorance was
|
||
used to my disadvantage.
|
||
|
||
I haven't complained too much about Geraldo here and basically it
|
||
isn't that Geraldo isn't deserving of a lot of criticism, but unlike
|
||
Ingraham, he didn't know any better or at least I would not have
|
||
expected him to know any better.
|
||
|
||
Before I knew what had happened, the show was over. I never had the
|
||
opportunity to raise ANY civil liberties concerns and I felt like I
|
||
had just gotten the stuffing beaten out of me on national television.
|
||
My friends told me not to feel too bad, after all I'm just a guy
|
||
barely out of college and Ingraham is a prosecutor with over a dozen
|
||
years of experience. How could I have hoped to prevail against him in
|
||
this type of confrontation, especially with Geraldo feeding on the
|
||
allegations like a blood-sucking leech. I didn't come to New York to
|
||
fight with Don Ingraham, I guess he had a different idea.
|
||
|
||
I didn't feel like hanging out in New York any longer, so I got to the
|
||
airport and a flight home as soon as possible.
|
||
|
||
Frei and the other staff at NOW did not even have the decency to send
|
||
me a copy of the show on a videotape and to this day, I have not been
|
||
reimbursed for the cab fare money that they promised me. This amounts
|
||
to about $45.00.
|
||
|
||
And that is my story...
|
||
|
||
------------------------------
|
||
|
||
Date: 27 Oct 91 7:43:01 CDT
|
||
From: Jim Thomas <jthomas@well.sf.ca.us>
|
||
Subject: File 4--Second Thoughts about the "Ingraham Massacre"
|
||
|
||
Craig Neidorf has yet to receive an apology from Bill Cook. Or Tim
|
||
Foley. Or the BellSouth crowd. They had no case, yet they nearly
|
||
ruined his life. Even though the case was dropped, prosecutors still
|
||
seem intent on prosecuting--and convicting--him in the media on the
|
||
same half-truths and fabrications.
|
||
|
||
This time, Don Ingraham owes Craig Neidorf an apology.
|
||
|
||
But, Don Ingraham, Alameda County Ass't DA, apparently feels no need
|
||
to apologize to Craig Neidorf. At least, he hasn't to date. But,
|
||
then, why should the powerful worry about such trivia, even when they
|
||
distort facts, betray trust, and act unethically in their hatchet job?
|
||
Ingraham betrayed Craig's trust that no cheap-shots would be taken; He
|
||
betrayed Craig's trust by bringing in an agenda of his own when Craig
|
||
expected a legitimate discusion; and he betrayed the public's trust by
|
||
playing fast and loose with facts.
|
||
|
||
The transcript of the Sept 30 Geraldo show makes Don Ingraham seem
|
||
less than honorable in the shameless way he exploited Craig for his
|
||
own ends.
|
||
|
||
>Geraldo: . . . .Don, do you think Craig's lucky that he's
|
||
>not behind bars right now?
|
||
>
|
||
>Don: Yes, I think he's extraordinarily lucky. He was part
|
||
>of a conspiracy, in my opinion, to take property that wasn't
|
||
>his and share it with others. They charged him with
|
||
>interstate transport of stolen property - couldn't make the
|
||
>threshold -and it came out that it had been compromised by,
|
||
>unfortunately, released by another BellCore subsidiary. But
|
||
>was certainly not through any doing of HIS that he is a free
|
||
>man.
|
||
|
||
Normally, the courts--not publicity-seeking Assistant DAs trying to
|
||
make a splash on national television--try suspects. There was no
|
||
evidence that Craig was involved in a conspiracy to "take property
|
||
that wasn't his." The evidence showed that the E911 documents in
|
||
question were stolen long before being published in PHRACK, and that
|
||
Craig had no role in their acquisition. Ingraham used his skills as
|
||
a glib rhetorician to distort reality in ways that may make good
|
||
theater, but lousy justice.
|
||
|
||
Ingraham is right about one thing: It wasn't Craig's doing that forced
|
||
the government to drop the charges. It was a six-figure attorney fee
|
||
and the volunteer help of John Nagel, Dorothy Denning, the EFF, and
|
||
others who devastated the government's case. However, it was not on
|
||
some "threshold" technicality that the case was dropped, as Ingraham
|
||
implies. The case against Craig was dropped because the government had
|
||
no case.
|
||
|
||
Craig suggested an analogy between the issues the PHRACK case raised
|
||
and Daniel Ellsberg and the Pentagon Papers. Rather than accept the
|
||
analogy as a departure point for discussion, Prosecutor Ingraham
|
||
preferred to hurl a few sleaze-balls:
|
||
|
||
>Geraldo: Do you figure it that way Don? Is he like Daniel
|
||
>Ellsberg?
|
||
>
|
||
>Don: No, Ellsberg went to court to deal with it. Daniel
|
||
>Ellsberg's release of the Pentagon Papers is the subject of
|
||
>a published court decision to point out it was a matter of
|
||
>national security and national interest. The E911 codes,
|
||
>which is the citizen's link to the police department are not
|
||
>a matter of national security. They're a matter of the
|
||
>central service to the community.......
|
||
>
|
||
>Geraldo: You broke into the 911 system? He broke into the
|
||
>911 system!
|
||
>
|
||
>KL: No, that's not correct. I never entered any 911
|
||
>telephone system.
|
||
>
|
||
>Don: I didn't say he entered into it. What I said was that
|
||
>he and Riggs conspired together to take a code that they
|
||
>knew was necessary to 911 and to take it apart to see how it
|
||
>worked. They never had the owner's permission, they never
|
||
>asked for it.
|
||
|
||
Ingraham first implies that Craig broke into the E911 system, then we
|
||
waffles back and claims he merely conspired to take code. He is
|
||
fabricating a role for Craig despite evidence to the contrary, he
|
||
grossly misrepresents the E911 documents in question, which were text
|
||
files rather than a "program," and he imputes to Craig motives (taking
|
||
apart the code) which are not true.
|
||
|
||
Sitting in the presumably quiet confines of his office, Ingraham
|
||
apparently judges it fully acceptable to besmirch the reputation and
|
||
feelings of a victim of malicious prosecution. Why? What would
|
||
possess a normal adult to play the bully-role on national television?
|
||
And, what would he do with hackers given the chance? Why, what
|
||
else? Toss 'em in jail--"HARD TIME!"
|
||
|
||
>Don: I don't think they're being punished very much at all.
|
||
>We're having trouble even taking away their gear. I don't
|
||
>know one of them has done hard time in a prison. The book,
|
||
>Hafner's book on _Cyberpunk_, points out that even Mitnick
|
||
>who is a real electronic Hannibal Lecter ... did not get
|
||
>near any of the punishment that what he was doing entitled
|
||
>him to.
|
||
|
||
Isn't Ingraham aware of the hackers who've been sent to prison? What
|
||
does he mean by "hard time?" Doesn't he think that the devastating
|
||
consequences of separation of family that Len Rose is experiencing is
|
||
"hard time?" Nah, better we lop of a hand for the first offense, pluck
|
||
out the eyes for a second. And, as a commentator observed last issue,
|
||
it's really a drag that due process gets in the way when Ingraham and
|
||
his brownshirts try to grab suspects' equipment. Damn! They even had
|
||
to give Steve Jackson's back. Too bad Doc Ripco and others haven't
|
||
been as lucky.
|
||
|
||
It is apparent that Ingraham is not on the show to discuss issues,
|
||
but to perform. Craig is a convenient prop for an anti-hacker
|
||
soliloquy:
|
||
|
||
>Don: If they stopped at voyeurism they would be basically
|
||
>sociopathic, but not doing near the harm they do now. But
|
||
>they don't stop at looking, that's the point. They take
|
||
>things out and share them with others, and they are not
|
||
>being accountable and being responsible as to whom they are
|
||
>sharing this information. That is the risk.
|
||
|
||
(. . .)
|
||
|
||
>Don: What do I think of Craig? I have a lot of respect for
|
||
>Craig, I think he's probably going to be an outstanding
|
||
>lawyer someday. But he is contributing to a disease, and a
|
||
>lack of understanding ethically, that is causing a lot of
|
||
>trouble.
|
||
|
||
Craig Neidorf, for better or worse, believed he was walking into a
|
||
discussion of issues. Don Ingraham had a somewhat different agenda,
|
||
and used his experience to promote it, and allowed "truth" to fall
|
||
where it may.
|
||
|
||
Don Ingraham may be an adept prosecutor, he may feed the pigeons, and
|
||
some claim that, on occasion, he even displays concern for civil
|
||
liberties. But, Don Ingraham's comments do not reflect his own
|
||
accountability to truth, and he seemed to make up facts to fit his
|
||
claims. Actually, it is *he* who "is contributing to a disease, and a lack
|
||
of understanding ethically, that is causing a lot of trouble."
|
||
|
||
Ingraham did a number on Craig that served no purpose. Unfortunately,
|
||
Ingraham may be one of those who fails to recognize that brutality
|
||
comes in many forms, and his own sanctimonious bullying of a
|
||
near-defenseless youth is inexcusable. If Geraldo had been thinking
|
||
more quickly, he might have toyed with Ingraham's hyperbolic analogy
|
||
to rape by alluding to a few other examples of older men who've done
|
||
hatchet jobs on young males. Like John Gacy and Jeffrey Dahmer. They,
|
||
too, felt no need to apologize to their victims.
|
||
|
||
------------------------------
|
||
|
||
Date: 21 Oct 91 22:15:15 EDT
|
||
From: Krista Bradford <76436.3200@COMPUSERVE.COM>
|
||
Subject: File 5--Response to CuD #3.37's "Mad Hacker" Issue
|
||
|
||
I briefly will address a few points discussed by critics of the show,
|
||
and then will address what may ultimately be more helpful and
|
||
productive.
|
||
|
||
<In response to the moderators criticism of>:
|
||
>"Skillfully juxtaposed film images of terrorism and military
|
||
>violence with discussions and images of hackers".
|
||
|
||
The first story was dedicated to the hackers in Amsterdam making their
|
||
way into a US army computer. We aired video of the hackers which
|
||
Emmanuel Goldstein was so kind to provide, and attempted to explain in
|
||
layman's terms exactly how they made their way in. I felt that was
|
||
necessarily to lay to rest any misconceptions about what it is that
|
||
hackers do. In addition, one of the documents found in the Army
|
||
computer related to the war with Iraq, and so we used footage from the
|
||
war.
|
||
|
||
I then intentionally separated the first story from the second with a
|
||
commercial break...so their would be no confusing hackers with
|
||
terrorists. The second piece related to computer terrorism. In it we
|
||
showed footage of Die Hard 2, which was viewed at a congressional
|
||
hearing as an example of how vulnerable we are, and how what happened
|
||
in that movie could happen in real life.
|
||
|
||
In both pieces I attempted to show a balance of viewpoints.
|
||
|
||
I strenuously objected to the use of the term Mad Hacker, and to the
|
||
title "Mad Hackers' Key Party" - which I found out about after the
|
||
stories aired. (They weren't mad, but are now - and it wasn't a
|
||
"party" but rather a breech of security.) I'm afraid that was not of
|
||
my doing, but rather of one of our show's producers. I find the term
|
||
objectionable and offensive and insulting. I do not believe in name
|
||
calling, yet that is what occurred, and for that I offer my apologies
|
||
to Emmanuel Goldstein and to anyone else who took offense. You can be
|
||
assured that I have addressed the issue internally.
|
||
|
||
As for the comment that we put at least one military computer at risk.
|
||
We didn't. The military has known of its bug for years, but hasn't
|
||
fixed it. In addition, we volunteered to show the videotape to the
|
||
Army for further explanation and protection, but it didn't take us up
|
||
on the offer. It was well aware of the problem, you can be sure by
|
||
the number of calls we made to attempt to get an interview. Also, I
|
||
checked and was told that that particular army computer no longer
|
||
resides at that address. I realized I might be criticized for
|
||
actually showing how to hack. We did not show each and every step, but
|
||
we wanted to show just how easy it was. And I think it was valuable
|
||
to demystify hacking.
|
||
|
||
As for the alleged hatchet job on Craig - I believe it was less of
|
||
Geraldo's doing and more of an imbalance between a prosecutor
|
||
well-versed in expressing himself, and someone who was not as capable.
|
||
That is what happens when interviews are taped as live - one cannot
|
||
insert a balance (a little less of the prosecutor, a little more of
|
||
Craig).
|
||
|
||
While you can criticize Geraldo for his heavy-handedness and
|
||
sensational style - some credit is due him for giving me the freedom
|
||
to pursue this story, the funding to produce the pieces and the
|
||
extraordinary amount of airtime. We spent several months researching
|
||
and taping the stories. Also, while it is may be hard to imagine -
|
||
there are many shows that would shy away from such a topic because it
|
||
was "technical" or "boring" or because the shows didn't understand or
|
||
don't want to understand computers. The latter still tends to be the
|
||
norm. While most newsrooms are computerized - most reporters have not
|
||
turned to computer assisted journalism. But this is a growing area of
|
||
interest. You can easily tap into computer-literate journalists
|
||
through the Center for Computer-Assisted Reporting at the University
|
||
of Missouri Columbia (Professor Elliot Jaspin-reachable on CIS) and
|
||
the National Institute for Advanced Reporting at the University of
|
||
Indiana (Scott Abel).
|
||
|
||
How can the media be made more aware of the nuances of the topics? By
|
||
using computers themselves. Sign your favorite reporter up to
|
||
Compuserve, and then leave them flattering E-mail. Invite them to
|
||
call a local BBS. Have sources leave them tips for stories on the
|
||
BBS, instead of calling. Having running threads giving them feedback
|
||
on their stories. A reporter really won't understand the nuances
|
||
unless he gives virtual space a try...sort of like the difference
|
||
between being a passenger and being in the driver's seat.
|
||
|
||
As for media distortions. They are inevitable. I guess I would go for
|
||
quantity as well as quality - establish relationships with reporters
|
||
who will become more educated about hackers/computer issues the more
|
||
stories they do. Realize the media does uses headlines to capture the
|
||
rather short attention spans of viewers and readers, so a headline may
|
||
distort, but the story which follows may clarify.
|
||
|
||
As for an informed public dialog emerging...I believe that Operation
|
||
Sun Devil is old news. What I care about is what is happening today
|
||
and tomorrow to hackers and their civil rights, to their computer
|
||
equipment. What is happening to computer security? Just how safe are
|
||
we? Find the most compelling examples of your point of view (i.e- a
|
||
teenage hacker who just had all of his computer equipment, clock radio
|
||
and VCR seized with no charges filed.) Let me know. Let other
|
||
reporters know. Let us meet new people, new sources to report on the
|
||
evolving history of this issue. We can discuss the ethics within the
|
||
context of each additional story. And as the stories are told,
|
||
perhaps legislators will hear and think and be more inclined to draft
|
||
more constructive legislation.
|
||
|
||
And one special note of interest...I am looking for government
|
||
databases I can obtain by asking or by using the Freedom of
|
||
Information Act. I then crunch the databases myself and determine
|
||
whether said Department is enforcing its own laws or regulations...and
|
||
whether it is misrepresenting its data, cooking the books. If anyone
|
||
knows of any gov't databases out there that would be worthy of
|
||
consideration - drop me a line via E-Mail. In addition, story
|
||
suggestions and tips are always welcome.
|
||
|
||
Cordially, Krista Bradford, Senior Reporter, Now It Can Be Told, CIS
|
||
76436,3200 or call (212) 373-6200.
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 6 Oct 91 17:58:45 CDT
|
||
From: duane@SHAKE.TAMU.EDU(Duane)
|
||
Subject: File 6--Release of Informatik #1
|
||
|
||
I would like to announce the release of the first issue of 'Informatik'.
|
||
Informatik #1 is available by anonymous ftp at uunet.uu.net under:
|
||
tmp/inform1.Z
|
||
tmp/inform1.txt
|
||
|
||
Below is an excerpt from the issue's header:
|
||
|
||
|
||
** Introduction **
|
||
By the Informatik staff
|
||
|
||
Welcome to the inaugural issue of Informatik, an electronic
|
||
periodical devoted to the distribution of information not readily
|
||
available to the public, with a particular emphasis on technology and
|
||
the computing world. First and foremost, this publication is
|
||
dedicated to the freedom of information. This journal is made
|
||
possible by The First Amendment of the U.S. Constitution which states:
|
||
|
||
Congress shall make no law respecting an establishment of
|
||
religion, or prohibiting the free exercise thereof; OR ABRIDGING
|
||
THE FREEDOM OF SPEECH OR OF THE PRESS; or the right of the
|
||
people peaceably to assemble, and to petition the Government for
|
||
redress of grievances.
|
||
|
||
In this and coming issues, we plan to exercise our First Amendment
|
||
rights to the best of our ability. We will print feature articles on
|
||
hacking, phreaking, and various other illicit activities. We also
|
||
plan on bringing you recent news and gossip from the underground,
|
||
anything news of interest to hackers, phreakers, grifters,
|
||
cyber-punks, and the like. Informatik will also provide a plethora of
|
||
information on the inner workings of corporate America and the U.S.
|
||
Government.
|
||
|
||
DO distribute this freely! Remember this is not illegal, this is
|
||
information.
|
||
|
||
*Please send submissions and comments to duane@shake.tamu.edu. (for
|
||
now)*
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 13 Oct 91 18:50 CDT
|
||
From: ulowell!nuchat.sccsi.com!samp%harvard@HARVUNXW.BITNET
|
||
Subject: File 7--Second Annual XMASCON
|
||
|
||
NIA & Phrack Magazine, & dFx International Digest Are Proud To Present:
|
||
|
||
|
||
The Second Annual
|
||
|
||
X M A S C O N
|
||
|
||
|
||
Who: All Hackers, Journalists, Security Personnel, Federal Agents, Lawyers,
|
||
Authors and Other Interested Parties.
|
||
|
||
Where: Houston Airport Hilton Inn
|
||
500 North Belt East
|
||
Houston, Texas 77060
|
||
U.S.A.
|
||
Tel: (713) 931-0101
|
||
Fax: (713) 931-3523
|
||
|
||
When: Friday December 27 through Sunday December 29, 1991
|
||
|
||
|
||
Yes, ladies and gentlemen, you read it right... Xmascon has returned!
|
||
This will undoubtedly be the telecom event of the year. Unlike certain
|
||
conferences in the past, Xmascon 91 has a devoted and dedicated staff
|
||
who are putting in an unmentionable amount of time to ensure a large,
|
||
vast and organized collection of some of the most diversified people
|
||
in the telecommunications world. The event will be open to the public
|
||
so that anyone may attend and learn more about the different aspects
|
||
of computer security.
|
||
|
||
|
||
Hotel Information
|
||
-----------------
|
||
|
||
The Houston Airport Hilton Inn is located about 6 miles from
|
||
Intercontinental Airport. The Xmascon group room rates are $49.00 plus
|
||
tax (15%) per night, your choice of either single or double. There are
|
||
also 7 suites available, the prices of which vary from $140 to $250.
|
||
You can call the hotel to find out the differences and availability of
|
||
the suites, and you will also NEED to tell them you are with the
|
||
Xmascon Conference to receive the reduced room rate, otherwise, you
|
||
will be paying $69.00. There is no charge for children, regardless of
|
||
age, when they occupy the same room as their parents. Specially
|
||
designed rooms for the handicapped are available. The hotel provides
|
||
free transportation to and from the airport, as well as neighbouring
|
||
Greenspoint Mall, every 30 minutes on the hour, and on call, if
|
||
needed. There are 2 restaurants in the hotel. The Wicker Works is open
|
||
until 11:00 pm, and The Forty Love is open 24 Hours. There will also
|
||
be breakfast, lunch and dinner buffets each day. There is a piano bar,
|
||
The Cycle Club, as well as a sports bar, Chaps, which features
|
||
numerous table games, large screen tv, and a disco with a DJ. Within
|
||
the hotel compound, there are 3 pools, 2 of which are indoors, a
|
||
jacuzzi, a miniature golf course, and a fully equipped health club
|
||
which features universal weights, a whirlpool and sauna. A car rental
|
||
agency is located in the hotel lobby, and you can arrange to pick your
|
||
car up at either the airport or the hotel. Xmascon attendees are
|
||
entitled to a discounted rate. Contact the hotel for more information.
|
||
|
||
Xmascon will last 3 days, with the main conference being held on
|
||
Saturday, December 28, in the Osage meeting room, starting at 12:00
|
||
p.m. and continuing on throughout the evening. This year, we have our
|
||
own complete wing of the hotel, which is housed around a 3,000 square
|
||
foot atrium ballroom. The wing is completely separated from the rest
|
||
of the hotel, so we are strongly encouraging people to make their
|
||
reservations as far in advance as possible to ensure themselves a room
|
||
within our area.
|
||
|
||
We are hoping to have a number of people speak on a varied assortment
|
||
of topics. If you would like to speak, please contact us as soon as
|
||
possible and let us know who you are, who you represent (if anyone),
|
||
the topic you wish to speak on, a rough estimate of how long you will
|
||
need, and whether or not you will be needing any audio-visual aids.
|
||
|
||
There will be a display case inside the meeting room which will hold
|
||
items of telecom interest. Specific items that will be available, or
|
||
that we hope to have, include the first issues of 2600, Tap, Mondo
|
||
2000, and other magazines, non-computer related magazines that feature
|
||
articles of interest, a wide array of boxes, the Quaker Oats 2600 mhz
|
||
whistle, The Metal AE, etc. We will also have a VCR and monitor set
|
||
up, so if you have any interesting videos (such as the Unsolved
|
||
Mysteries show featuring Kevin Poulsen), or if you have anything you
|
||
think people would enjoy having the chance to see, please let us know
|
||
ahead of time, and tell us if you will need any help getting it to the
|
||
conference. If all else fails, just bring it to the con and give it to
|
||
us when you arrive.
|
||
|
||
Media support has been very strong so far. Publications that have
|
||
agreed to print pre-conference announcements and stories include
|
||
Computer World, Info World, New York Times, San Francisco Chronicle,
|
||
Austin Chronicle, Houston Chronicle, Independent Journal, Mondo 2000,
|
||
CuD, Informatik, a leading Japanese computer magazine, NME,
|
||
Regeneration (Germany), and a few other European based magazines. PBS
|
||
stations WHNY, WNET, and KQED, as well as the stations that carry
|
||
their syndicated shows, will be mentioning the conference also. If you
|
||
are a journalist and would like to do a story on Xmascon 91, or know
|
||
someone who would, contact us with any questions you may have, or feel
|
||
free to use and reprint any information in this file.
|
||
|
||
If anyone requires any additional information, needs to ask any
|
||
questions, wants to RSVP, or would like to be added to the mailing
|
||
list to receive the Xmascon updates, you may write to either myself
|
||
(Drunkfux), Judge Dredd, or Lord Macduff via Internet at:
|
||
|
||
nia@nuchat.sccsi.com
|
||
|
||
Or via US Mail at:
|
||
|
||
Hard Data Corporation
|
||
ATTN: HoHo
|
||
P.O. Box 60695
|
||
Houston, Texas
|
||
77205-9998
|
||
U.S.A.
|
||
|
||
|
||
We will hopefully have an 800 mailbox before the next update is sent
|
||
out. If someone cares to donate a decent one, that will stay up
|
||
throughout the end of the year, please let us know. We should also be
|
||
listing a few systems as an alternative form of reaching us.
|
||
|
||
|
||
Xmascon 91 will be a priceless learning experience for professionals,
|
||
and gives journalists a chance to gather information and ideas direct
|
||
from the source. It is also one of the very few times when all the
|
||
members of the computer underground can come together for a realistic
|
||
purpose. We urge people not to miss out on an event of this caliber,
|
||
which doesn't happen very often. If you've ever wanted to meet some of
|
||
the most famous people from the hacking community, this may be your
|
||
one and only chance. Don't wait to read about it in all the magazines,
|
||
and then wish you had attended, make your plans to be there now! Be a
|
||
part of our largest and greatest conference ever.
|
||
|
||
Remember, to make your reservations, call (713) 931-0101 and tell them
|
||
you're with Xmascon.
|
||
|
||
In closing... if you miss this one, you're only cheating yourself.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #3.38
|
||
************************************
|
||
|
||
|