916 lines
44 KiB
Plaintext
916 lines
44 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Nov 8, 1992 Volume 4 : Issue 56
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Copy Editro: Etaion Shrdlu, Junior
|
||
|
||
CONTENTS, #4.56 (Nov 8, 1992)
|
||
File 1--Response to the Virus Discussion
|
||
File 2-- Carnegie Commission on S&T Policy and Long-Term Goals
|
||
File 3--THIRD ANNUAL XMASCON/H0H0CON
|
||
File 4--Re: Worship SPERF of be engulfed in SunDevil Jr. ][+
|
||
File 5--Computer Info off-limits to Federal Prisoners
|
||
File 6--These Computer Abusers Cost us nearly $100 Billion
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
||
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
||
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
||
libraries; from America Online in the PC Telecom forum under
|
||
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
|
||
Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
|
||
anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
|
||
/pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
|
||
(192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
|
||
in /pub/text/CuD.
|
||
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
|
||
Back issues also may be obtained from the mail
|
||
server at mailserv@batpad.lgb.ca.us.
|
||
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Some authors do copyright their material, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 02 Nov 1992 16:07:19 -0500 (EST)
|
||
From: Guido Sanchez<guido@nunbeaters.anon.com>
|
||
Subject: File 1--Response to the Virus Discussion
|
||
|
||
I've some qualms about this article. It seems that The Dark Adept is,
|
||
while trying to clear up some common misconceptions, contributing to
|
||
the ignorance of the computer community at large. Perhaps this was his
|
||
goal in writing this article, I really don't know. As a writer of
|
||
viruses and a pillar of spam in the virus writing community <inside
|
||
joke, really>, I'd like to clear up some misconceptions on the points
|
||
raised by The Dark Adept.
|
||
|
||
Let's start off with his definition of viruses..
|
||
|
||
> What is a virus?
|
||
> ++++++++++++++++
|
||
> A virus is a tiny program that attaches itself to other programs. It does
|
||
> in fact operate as a biological virus does. It finds a victim program and
|
||
> infects it with a copy of itself. Then when the victim program is
|
||
> unsuspectingly run, the virus now inside it is activated. At this point,
|
||
> it can do one of two things: infect another program, or cause mischief.
|
||
|
||
This is innocent enough, but not altogether true. A virus doesn't
|
||
always attach itself to another program. If they merely did that, they
|
||
would be NoWhere <another inside joke.. I'd better watch myself> near
|
||
as virulent as the anti-viral community would like John Q. Netrunner
|
||
to believe. The only efficient way that we <viral community> are going
|
||
to get our stuff to spread <assuming that we even want that> is to
|
||
utilize the boot sector of a diskette to contain virulent code. Not
|
||
file infectors, but actual disk infectors. Once this diskette goes
|
||
into another computer, that system has a much higher risk than if a
|
||
mere infected program were to be run. Another array of misleading
|
||
points being:
|
||
|
||
> How do people catch viruses?
|
||
> ++++++++++++++++++++++++++++
|
||
> Yikes! Here's where all the rumors are! You cannot get a virus from a modem,
|
||
> a printer, a CRT, etc. Viruses only come from other programs. So, whenever
|
||
^^^^^^^^^^^^^^^^^
|
||
Wrong, as I said before
|
||
|
||
> you add a program to your hard disk or run one off of a floppy, you stand
|
||
> a chance of catching a virus. Data files (files that are not programs, like
|
||
> text for your wordprocessor) cannot contain viruses. Only programs can
|
||
> contain viruses. On IBM PC's, programs usually end in ".exe" or ".com" and
|
||
> are the files that you run. The programs are the only ones that can contain
|
||
> viruses.
|
||
|
||
Also overlooking the .SYS, .OVL, and .APP files to name a few which
|
||
can be infected by file infectors. The data files, true, cannot
|
||
contribute to the spread of a virus, but they might be corrupted or
|
||
overwritten with the virus signatures depending on the type of virus.
|
||
|
||
> The only way to activate the virus is to run the program. Say for example
|
||
> you got a new program called "game.exe". You put it on your hard drive,
|
||
> but you never run it (i.e., you never tried it). Even if game.exe has a virus
|
||
> in it, you WILL NOT catch it. The program has to be run at least once to make
|
||
> the virus active.
|
||
|
||
Wrong again, re the boot sector argument.
|
||
|
||
> Another thing is batch files. These are files on IBM PC's that end in ".bat".
|
||
> These DO NOT contain viruses. However, .bat files run other programs. So
|
||
> if the .bat file runs a program that has a virus, the virus WILL be activated.
|
||
> The cause is NOT the .bat file, but the program that was run BY the .bat
|
||
> file.
|
||
|
||
This is part fact, part ignorance. On Vx <Virus Exchange> BBSs, there
|
||
have been seen batch file viruses. That is a batch file which, when
|
||
run, would use the debug program and insert viral code into memory,
|
||
subsequently executing it. In this case and others, the cause is both
|
||
the .BAT file and the DEBUG.EXE program.
|
||
|
||
> What do viruses do?
|
||
> +++++++++++++++++++
|
||
> Well, a number of things. Some erase your disks. Others print silly
|
||
> messages to your screen. In any case, a virus is not written like other
|
||
> programs are. It uses things that other programs normally don't. If your
|
||
> computer is infected by a virus, whenever you turn on the machine that
|
||
> virus is in the memory, and even if all it does is print "I want a cookie,"
|
||
> it can still interfere with other programs since they don't expect it to
|
||
> be there.
|
||
|
||
Supposedly, there are some viruses and trojans <trojan horses being
|
||
merely programs which do something they aren't supposed to do, usually
|
||
destructive, but still not being able to replicate like viruses do>
|
||
which can cause physical damage to hardware. Example, the HEADKILL
|
||
Trojan which supposedly ruins the head of the victim hard drive <I ran
|
||
this trojan on a 1.2meg 5.25" disk, it registers as invalid media
|
||
now>. Some viruses could overwrite the disk as to not be recognizeable
|
||
as a DOS compatible disk at all. Taking advantage of a user's
|
||
ignorance, the STIFFY virus uses the Media Descriptor Table to
|
||
re-define A: to an 8 inch disk drive no matter what it previously was.
|
||
It inter-cepts COMMAND.COMs error message and prints a phallic insult,
|
||
and obviously the acceptable format could not be used, causing massive
|
||
efforts towards retrieving the 'lost' drive. The TURKEY virus
|
||
supposedly alters cathode ray dispersion to 'melt' the monitor. Point
|
||
being that there ARE some annoying little buggers out there, not all
|
||
of them mere data corruptors or spreaders.
|
||
|
||
> Tell me more about these things...
|
||
> ++++++++++++++++++++++++++++++++++
|
||
> Ok. Viruses can only be made for specific machines. By this I mean
|
||
> that a virus that infects IBM PC's will NOT be able to infect Macs.
|
||
> There may be a tiny tiny chance if your Mac is running something like
|
||
> an IBM Emulator that a virus may cause problems, but in general, if
|
||
> you have a non-IBM compatible computer, and you can't run IBM
|
||
software, > then you can't catch IBM viruses and vice-versa.
|
||
|
||
BIG misconception there, buddy. The SHIBOLETH virus, for example,
|
||
executes MAC code to test for machine type. If there is no error, it
|
||
runs the MAC section of the viral code. If so, it runs the IBM section
|
||
of the code. It's rather clumsy, but it DOES withstand transferral to
|
||
MAC from IBM and back.
|
||
|
||
> + It might miss some or give you false results, so don't rely on it
|
||
> completely.
|
||
|
||
You MIGHT say that. It takes maybe 4 seconds to render a virus
|
||
unscannable by McAfee's or Norton. Simply putting in a small NoWhere
|
||
loop <meaning point A's instructions are to loop back to point A for
|
||
an amount of time> or using an executable compression program <eg
|
||
PKLITE, LZEXE, DIET> and removing the header will usually get the
|
||
virus through scanners. What about the boot sector infectors mentioned
|
||
above? Usually on Vx BBSs a dropper program is given out that will
|
||
'drop' the virus into the boot sector of the designated drive. Yes,
|
||
they're THAT user friendly :).
|
||
|
||
> +++Detectors+++
|
||
> +++++++++++++++
|
||
> What the detectors do is watch for virus activity. For example, some
|
||
> viruses try and erase your hard disk. What a detector does is sit in
|
||
> the background and watches for an illegal or abnormal attempt to do
|
||
> something to the hard disk. Then all sorts of alarms and bells go off
|
||
> ("Warning Will Robinson! Warning!") and the detector tries to stop
|
||
> the virus from doing it. Some will also ask you if you want to allow
|
||
> whatever action is taking place since you might actually be trying to
|
||
> format your hard disk.
|
||
|
||
This is PARTLY true. What these memory resident things do is keep an
|
||
eye on specific DOS interrupts and notify the user if a certain
|
||
interrupt function is being attempted. More often than not these are
|
||
the interrupts 13h and 21h. Such memory resident alarms can be easily
|
||
disabled by handling the error quietly or grabbing the interrupt
|
||
before the memory resident alarm does.
|
||
|
||
> You must know that the detector only checks program files. It would be a
|
||
> real pain if every time you changed your term paper the detector went off.
|
||
> However, this is not a weakness since only program files can contain
|
||
> the viruses.
|
||
|
||
Again, partly true. Integrity Master v1.23 by Wolfgang Stiller keeps
|
||
track of the crcs of all files and stores them in files called ID.)(
|
||
<or something to that extent>. Changing the values in these files or
|
||
removing them altogether is a common virus technique.
|
||
|
||
> However, since I took a shot at McAfee, I must also state this: I have
|
||
> known people to use McAfee's software and be 100% satisfied with no
|
||
> complaints. They like McAfee's software and continue to use it. It
|
||
> works for them and meets their needs. I hate both McAfee and his software,
|
||
> and I refuse to use it ever, so you must decide for yourself.
|
||
|
||
Oh, leave John alone :). The least I can say is at least his product
|
||
is free <Central Point is supposed to be bought> to the public. I
|
||
myself prefer Fridrik Skulason's F-PROT program. Not only does it
|
||
check for more than one virus signature, the heuristic scan is
|
||
formidable to viruses. It checks for viral-like code, not signatures.
|
||
It's just one step closer to having a scanner disassemble the program.
|
||
|
||
> "BBS's are the major cause of virus spreading"
|
||
> ++++++++++++++++++++++++++++++++++++++++++++++
|
||
> FALSE FALSE FALSE!! The major cause of virus spreading is LAN's and
|
||
> also copying from friends. BBS's merely store programs that you can copy
|
||
> and most people who run BBS's try and make sure none of them have viruses.
|
||
> A BBS is just copying from a friend over a modem. BBS's do not need to
|
||
> be shut down or restricted because of viruses. It is up to *you* to
|
||
> protect yourself from *any* program contamination no matter where
|
||
> you copy the program from (i.e., a friend or BBS).
|
||
|
||
Well, I do acknowledge that the threat BBSs pose to virulence is
|
||
minimal, but only because 99% of the time only executable viruses are
|
||
downloaded and inadvertently run. It's not often an unsuspecting user
|
||
downloads a 900k TD0 file and gets infected :). Point being that
|
||
virulence in executable files is minimal compared to that of boot
|
||
sectors, hence the BBSs ineffectiveness.
|
||
|
||
> Some of you may have heard of Virus Exchange BBS's. Let me explain what
|
||
> this is:
|
||
>
|
||
> (etc...)
|
||
>
|
||
> Now on these virus exchange BBS's, they 99% of the time just have virus
|
||
> SOURCE FILES not virus programs. The source files CANNOT cause infection.
|
||
> They must be fed to an assembler or a compiler first to become a program.
|
||
> Remember that for a virus to become active it must be run as a program.
|
||
> These BBS's do not distribute virus programs, but virus source files.
|
||
|
||
When is the last time you've been on a Vx BBS? I would say that 99% of
|
||
them possess and strive for the executables, and couldn't care less
|
||
about the sources. The reason being that Vx sysops usually just care
|
||
about the power and prestige of having 100+ viruses. Rarely do they
|
||
actually run the viruses to see if they are. Point being <yes, again>
|
||
the WHORE! virus, a copy of COMMAND.COM renamed to show how
|
||
inefficient Vx sysops are at checking the authenticity of their files.
|
||
They're similar to pirate BBSs in a way, only caring about having the
|
||
viruses and most of the time not using them. The average pirate BBS
|
||
will have the latest releases and they'll be downloaded, etc, but
|
||
maybe 5% of the people downloading will actually use the programs.
|
||
Viruses are like this. They are usually just a commodity, and only the
|
||
small 1% <the virally elite, as Quayle would say> care about the
|
||
source and validity of the files.
|
||
|
||
> For right now, let me just say that in a nutshell, Virus Exchange BBS's do
|
||
> NOT DIRECTLY cause infections. I think even the so-called "experts" would
|
||
> agree with that.
|
||
|
||
But of course! Where do you think they get THEIR viruses? :)
|
||
|
||
> "The first virus was written by..."
|
||
> +++++++++++++++++++++++++++++++++++
|
||
> No one knows. However, if you were to ask me, I will say the first
|
||
> virus was written by the first person who made copy-protection. Why?
|
||
|
||
Or cares, really. I'm sure there are those out there that know of the
|
||
COREWARS story, so I'll spare relating it here.
|
||
|
||
> "They endanger National Security and the military!"
|
||
> +++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
> Hahahahahahaha! All I have to say is that most viruses (like 99.9%)
|
||
> attack only personal computers, and any military or government that depends
|
||
> on personal computers for national security and weaponry has more problems
|
||
> than viruses. And furthermore, what are they doing letting missile officers
|
||
> run MacPlaymate on the missile control computer anyhow?
|
||
|
||
Well, most govt. security installations <example : Treasury Dept> do
|
||
run LANs, and not only are they susceptible to viruses, there are
|
||
several viruses designed to seek out and foul up LAN systems. Frankly,
|
||
PCs are cheaper and more efficient than mainframes from the 80s, and
|
||
they are used in a wider scope than you'd believe.
|
||
|
||
Well, I'd say that the most likely place to find these virus authors,
|
||
in step with the end note, are echomail nets designed for virus
|
||
authors. Like..
|
||
|
||
* VX_NET - Virus Exchange NET, an up-and-coming non-partisan net. Directed
|
||
towards unity and making fun of the anti-viral community.
|
||
|
||
* Phalcon/Skism NET - The virus echos are a place for learning, and you can
|
||
contact the members on this net.
|
||
|
||
* [NuKE] Net - Another net from a virus group, get in contact with them on it.
|
||
|
||
* VIRUS_INFO on FIDO - Surprisingly enough, virus authors abound there with
|
||
fake names, contributing to confusion and getting a
|
||
good laugh at the expense of the anti-viral crew.
|
||
|
||
Interestingly enough, there's been some progression of rivalry between
|
||
the pro-viral and anti-viral communities <as the names indicate>. Way
|
||
back when, virus authors released their wares. Then, the anti-viral
|
||
communities recognized that they could either (i) be altruistic in
|
||
their ways and help their fellow man or (ii) make a quick buck off of
|
||
human suffering. They wrote anti-viral wares and organized. The virus
|
||
authors did not like this. They themselves organized and now have
|
||
become more Anti-Anti-Viral than Pro-Viral. I have no idea what
|
||
significance this progression has, and leave it to you capable readers
|
||
to determine what will happen. Yes, virus authors are in it now more
|
||
for making fun and avenging themselves of the anti-viral authors, who
|
||
in turn do the same in their programs. Etc, Etc, Etc.
|
||
|
||
So here's what I do. On my 'underground e-leet Vx' BBS, I make all
|
||
viruses and other files free on the first call. There's even a command
|
||
to download entire file bases. Meaning, if you release all of these
|
||
viruses to your users, they in turn set up BBSs and become Vx sysops
|
||
themselves. Hopefully, besides using viruses as a commodity, the
|
||
fledgling sysop will look at a few of the pro-viral utilities and some
|
||
of the source code. Perhaps the sysop will want to maybe get in on
|
||
this ASM thing and learn a thing or two, perhaps the sysop will become
|
||
a virus writer over time. Thus, like the viruses we propagate, we
|
||
propagate. We force nothing into the minds and computers of others,
|
||
it's all part of curiosity and voluntary. We help people to find their
|
||
calling <forgive me for sounding like a religious fanatic or cult
|
||
leader here..> in whatever field of modem-dom they like. I know it's
|
||
an empty desire, to want other sysops to do the same, but it's a
|
||
desire nonetheless.
|
||
|
||
In conclusion, I just wanted to clear up some things about both
|
||
viruses <yes, there are only two of them! surprise!> and the pro-viral
|
||
community. May you all find your calling and make it possible for
|
||
others to do the same, as that sysop long ago did the same, custom
|
||
made to do just that <I could not resist>.
|
||
|
||
In spirits,
|
||
Guido Sanchez
|
||
|
||
Oh yes, and if you are interested in the theory of thought viruses,
|
||
more information can be obtained on the BBS Nun-Beaters Anonymous,
|
||
708/251-5094. Thank you for your 'time'.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 2 Nov 1992 08:20:24 -0500
|
||
From: "(Gary Chapman)" <chapman@SILVER.LCS.MIT.EDU>
|
||
Subject: File 2--Carnegie Commission on S&T Policy/Long-Term Goals
|
||
|
||
The Carnegie Commission on Science, Technology, and Government has
|
||
released a new report on democracy and science and technology policy,
|
||
entitled, "Enabling the Future: Linking Science and Technology to
|
||
Societal Goals" (September 1992). The report was prepared by a small
|
||
panel that was a subset of a larger group studying the entire range of
|
||
science and technology policy issues; the larger group's report has
|
||
not yet been released. The panel on long-term social goals was
|
||
chaired by H. Guyford Stever, who was director of the National Science
|
||
Foundation during the Ford administration, White House Science Adviser
|
||
to both Nixon and Ford, and president of Carnegie-Mellon University
|
||
from 1965 to 1972. Panel members included Harvey Brooks of Harvard
|
||
University; William D. Carey, former head of AAAS; John Gibbons,
|
||
director of the Congressional Office of Technology Assessment; Rodney
|
||
Nichols, head of the New York Academy of Sciences; James B.
|
||
Wyngaarden, foreign secretary of the National Academy of Sciences and
|
||
former head of the National Institutes of Health; and Charles Zracket,
|
||
former CEO of the MITRE Corporation and now a Scholar-in-Residence at
|
||
the Kennedy School at Harvard University.
|
||
|
||
This report begins as follows:
|
||
|
||
The end of the Cold War, the rise of other economically
|
||
and scientifically powerful nations, and competition
|
||
in the international economy present great opportunities
|
||
for the United States to address societal needs: policy-
|
||
makers may now focus more attention on social and econo-
|
||
mic concerns and less on potential military conflicts.
|
||
In the next decade and those that follow, the United
|
||
States will confront critical public policy issues that
|
||
are intimately connected with advances in science and
|
||
technology. . . . Policy issues will not be resolved by
|
||
citizens, scientists, business executives, or government
|
||
officials working alone; addressing them effectively will
|
||
require the concerted efforts of all sectors of society.
|
||
|
||
Further on, a passage worth quoting at some length:
|
||
|
||
We believe that American faces a clear choice. For too
|
||
long, our science and technology policies, apart from
|
||
support of basic research, have emphasized short-term
|
||
solutions while neglecting longer-term objectives. If
|
||
this emphasis continues, the problems we have encountered
|
||
in recent years, such as erosion of the nation's indust-
|
||
rial competitiveness and the difficulties of meeting
|
||
increasingly challenging standards of environmental
|
||
quality, could overwhelm promising opportunities for
|
||
progress. However, we believe there is an alternative.
|
||
The United States could base its S&T policies more firmly
|
||
on long-range considerations and link these policies to
|
||
societal goals through more comprehensive assessment
|
||
of opportunities, costs, and benefits.
|
||
|
||
We emphasize the necessity for choice because there is
|
||
nothing inevitable about the shape of the future: the
|
||
policy decisions we make today will determine whether
|
||
historic opportunities will be seized or squandered. . .
|
||
As Frank Press, President of the National Academy of
|
||
Sciences, said recently, "Without a vision of the future,
|
||
there is no basis for choosing policies in science and
|
||
technology that will be appropriate for the years ahead."
|
||
|
||
The panel says that their report does not propose societal goals that
|
||
should be met by changing S&T policy; "we believe this is primarily a
|
||
political process," the report says. The report instead addresses the
|
||
process of defining social goals and shaping policy to meet them.
|
||
|
||
There are five major recommendations of the panel:
|
||
|
||
1. Establishment of a nongovernmental National Forum on Science and
|
||
Technology Goals. This Forum, says the report, would "assemble a
|
||
broad-based and diverse group of individuals who are both critical and
|
||
innovative, and who can examine societal goals and the ways in which
|
||
science and technology can best contribute to their achievement."
|
||
This group would also sponsor meetings and research, and would
|
||
eventually propose "specific long-term S&T goals in both national and
|
||
international contexts, and identify milestones in achieving them."
|
||
The panel proposes two options for the convening of such a National
|
||
Forum: under the umbrella of the National Academies, or as a new,
|
||
independent, nongovernmental organization.
|
||
|
||
2. The panel says that "Congress should devote more explicit
|
||
attention to long-term S&T goals in its budget, authorization,
|
||
appropriation, and oversight procedures." The panel recommends annual
|
||
or biennial hearings on long-term S&T goals before the House Committee
|
||
on Science, Space, and Technology.
|
||
|
||
3. The panel suggests that federal government agencies supporting
|
||
science and technology policy should be directed to aid the Congress
|
||
in assessing long-term S&T goals, such as OTA and the Congressional
|
||
Budget Office.
|
||
|
||
4. The same goes for executive branch agencies, particularly the
|
||
White House Office of Science and Technology Policy and the Office of
|
||
Management and Budget.
|
||
|
||
5. Finally, federal departments and agencies should contribute to the
|
||
process of developing long-term goals by coordinating R&D efforts and
|
||
sponsoring extramural research that helps support analysis and vision.
|
||
|
||
The panel does propose some potential societal goals that might be
|
||
addressed through the process the report recommends. The goals are
|
||
very broad and include education; personal and public health; cultural
|
||
pluralism; economic growth; full employment; international
|
||
cooperation; worldwide sustainable development; and human rights,
|
||
among other very expansive goals.
|
||
|
||
The report also identifies the "players" that should be part of the
|
||
process of policymaking. These include the above-mentioned components
|
||
of the federal government, state governments, academia, industry, and
|
||
nongovernmental organizations. In the latter category, the panel
|
||
mentions professional societies in science and technology,
|
||
environmental organizations, and the National Academies complex, which
|
||
includes the National Academy of Sciences, the Institute of Medicine,
|
||
the National Academy of Engineering, and the National Research
|
||
Council.
|
||
|
||
The report very admirably concludes with a quote from Einstein: "The
|
||
concern for man and his destiny must always be the chief interest of
|
||
all technical effort: Never forget it among your diagrams and
|
||
equations."
|
||
|
||
Copies of the 72-page report are available for free from:
|
||
|
||
The Carnegie Commission on Science, Technology, and Government
|
||
10 Waverly Place, 2nd Floor
|
||
New York, NY 10003
|
||
(212) 998-2150 (voice)
|
||
(212) 995-3181 (fax)
|
||
|
||
Gary Chapman
|
||
Coordinator
|
||
The 21st Century Project
|
||
Computer Professionals for Social Responsibility
|
||
Cambridge, Massachusetts
|
||
chapman@lcs.mit.edu
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 2 Nov 92 21:58 CST
|
||
From: dfx@NUCHAT.SCCSI.COM(dFx International Digest)
|
||
Subject: File 3--THIRD ANNUAL XMASCON/H0H0CON
|
||
|
||
[Updated Announcement - October 27, 1992]
|
||
|
||
|
||
dFx International Digest and cDc - Cult Of The Dead Cow proudly present :
|
||
|
||
The Third Annual
|
||
|
||
|
||
X M A S C O N
|
||
|
||
AKA
|
||
|
||
H 0 H 0 C O N
|
||
|
||
|
||
"WE KAN'T BE ST0PPED!"
|
||
|
||
|
||
Who: All Hackers, Journalists, Security Personnel, Federal Agents,
|
||
Lawyers, Authors and Other Interested Parties.
|
||
|
||
|
||
Where: Allen Park Inn
|
||
2121 Allen Parkway
|
||
Houston, Texas 77019
|
||
U.S.A.
|
||
Tel: (800) 231-6310
|
||
Hou: (713) 521-9321
|
||
Fax: (713) 521-9321, Ext. 350
|
||
|
||
|
||
When: Friday December 18 through Sunday December 20, 1992
|
||
|
||
|
||
|
||
HoJo's Says NoNo To HoHo
|
||
%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
HAY!^@!*%!$1#&! We beat our own record! This year, thanks to one
|
||
certain person's complete stupidity and ignorance, we managed to get
|
||
kicked out of our first chosen hotel 4 months in advance. Needless to
|
||
say, this caused some serious confusion for those who called to make
|
||
reservations and were told the conference had been canceled. Well.. it
|
||
hasn't been. The story is long, but if you wish to read exactly what
|
||
happened, check out CuD 4.45.
|
||
|
||
The conference dates are still the same, but the hotel has changed
|
||
since what was originally reported in the first update, which made
|
||
it's way throughout Usenet and numerous other places, including CuD
|
||
4.40. If you haven't heard about the new location, please make a note
|
||
of the information listed above.
|
||
|
||
|
||
What Exactly Is HoHoCon?
|
||
%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
HoHoCon is something you have to experience to truly understand. It is
|
||
the largest annual gathering of those in, related to, or wishing to
|
||
know more about the computer underground (or those just looking for
|
||
another excuse to party). Attendees generally include some of the most
|
||
notable members of the "hacking/telecom" community, journalists,
|
||
authors, security professionals, lawyers, and a host of others. Last
|
||
year's speakers ranged from Bruce Sterling to Chris Goggans and Scot
|
||
Chasin of Comsec/LoD. The conference is also one of the very few that
|
||
is completely open to the public and we encourage anyone who is
|
||
interested to attend.
|
||
|
||
Or, as Jim Thomas put it in CuD 4.45:
|
||
|
||
"For the past few years, a conference called "XmasCon" (or HoHoCon)
|
||
has been held in Texas in December. As reported previously (CuD
|
||
#4.40), it will be held again this year from 18-21 December. For those
|
||
unfamiliar with it, XmasCon is a national meeting of curious computer
|
||
aficionados, journalists, scholars, computer professionals, and
|
||
others, who meet for three days and do what people do at other
|
||
conferences: Discuss common interests and relax."
|
||
|
||
|
||
Hotel Information %%%%%%%%%%%%%%%%%
|
||
|
||
The Allen Park Inn is located along Buffalo Bayou and is approximately
|
||
three minutes away from Downtown Houston. The HoHoCon group room rates
|
||
are $49.00 plus tax (15%) per night, your choice of either single or
|
||
double. As usual, when making reservations you will need to tell the
|
||
hotel you are with the HoHoCon Conference to receive the group rate.
|
||
|
||
Unlike our previously chosen joke of a hotel, the Allen Park Inn is
|
||
not situated next to an airport and this may cause a small
|
||
inconvenience for those of you who will be flying to the conference.
|
||
The hotel is centrally located so you can fly in to either
|
||
Intercontinental or Hobby airport but we are recommending Hobby as it
|
||
is 15 miles closer and much easier to get to from the hotel. Here's
|
||
where it may get a little confusing -
|
||
|
||
If you arrive at Hobby, you will need to take the Downtown Hyatt
|
||
Airport Shuttle to the Hyatt, which departs every 30 minutes and will
|
||
cost you $6.00. When you get to the Hyatt, get out of the shuttle with
|
||
your luggage (for those who may not of figured that out yet) and use
|
||
any of the nearby payphones to call the Allen Park Inn (521-9321) and
|
||
tell them you need a ride. It's just like calling Mom when you need a
|
||
ride home from glee club! The hotel shuttle will be around shortly to
|
||
pick you up and take you to the aforementioned elite meeting place,
|
||
and that ride is free. If all this is too much for you, you can always
|
||
take a cab directly to the hotel which will run you about $20.
|
||
|
||
If you arrive at Intercontinental, you will need to board the Airport
|
||
Express bus and take it to the Downtown Hyatt ($9). Once there, just
|
||
follow the same instructions listed above.
|
||
|
||
We are in the process of trying to get the hotel to provide constant
|
||
airport transportation during the conference, but they've yet to give
|
||
us a definite answer. It is quite possible that we will have our own
|
||
shuttle to bus people between the airports and hotel, so if you'd
|
||
prefer a faster and more direct method of transportation, it would be
|
||
helpful to mail and let us know what time you'll be arriving and at
|
||
what airport. This will give us a chance to coordinate things more
|
||
efficiently.
|
||
|
||
Check-in is 3:00 p.m. and check-out is 12:00 noon. Earlier check-in is
|
||
available if there are unoccupied rooms ready. Free local calls are
|
||
provided, so bring dem 'puterz. I don't know if cable is free also, so
|
||
those who wish to rekindle the memories of yesteryear may want to
|
||
bring their screwdrivers. The hotel has both 24 hour room service, and
|
||
a 24 hour restaurant, The Nashville Room. Call it a wacky coincidence,
|
||
but the hotel bar is called the ATI room and like most of Houston's
|
||
similar establishments, closes at 2 a.m. Good thing Tony still works
|
||
at Spec's...
|
||
|
||
This time around, the hotel is placing the conference guests in the
|
||
rooms surrounding the courtyard/pool area. We are once again
|
||
encouraging people to make their reservations as soon as possible for
|
||
two reasons - first, we were told that if you wait too long and the
|
||
courtyard rooms are all taken, there is a chance that you'll be
|
||
situated at the complete opposite end of the hotel, which isn't so bad
|
||
if you don't mind walking all that way back and forth outside in
|
||
December. Secondly, there is no other hotel exactly next door to this
|
||
one (the closest is about 5 minutes away or so), so if for some odd
|
||
reason all the rooms get rented, you'll get to do some nifty traveling
|
||
every night.
|
||
|
||
|
||
Directions %%%%%%%%%%
|
||
|
||
For those of you who will be driving to the conference, the following
|
||
is a list of directions on how to get to the hotel from most of
|
||
Houston's major freeways that bring traffic in from out of town:
|
||
|
||
I-45 North or South: Exit Allen Parkway on the inside (left side) of
|
||
the freeway. Take the Studemont/Montrose exit off Allen Parkway, then
|
||
make a u-turn at the bridge and head back towards downtown. The hotel
|
||
will be on the right hand side.
|
||
|
||
290: Take 290 to 610 South, then take I-10 East towards downtown. Exit
|
||
Studemont. Right on Studemont, left on Allen Parkway. The hotel will
|
||
be on the right hand side.
|
||
|
||
I-10 West: Exit Studemont. Right on Studemont, left on Allen Parkway.
|
||
The hotel will be on the right hand side.
|
||
|
||
I-10 East: Take I-10 East to I-45 South and follow the same directions
|
||
from I-45 listed above.
|
||
|
||
I-59 North or South: Take I-59 to I-45 North and follow the same
|
||
directions from I-45 listed above.
|
||
|
||
Call the hotel if these aren't complete enough or if you need
|
||
additional information.
|
||
|
||
|
||
Conference Details %%%%%%%%%%%%%%%%%%
|
||
|
||
HoHoCon will last 3 days, with the actual conference being held on
|
||
Saturday, December 19 in the Hermitage Room, starting at 11:00 a.m.
|
||
and continuing until 5 p.m. or earlier depending on the number of
|
||
speakers.
|
||
|
||
We are still in the planning stages at the moment, primarily due to
|
||
time lost in finding a new hotel and getting contracts signed. We have
|
||
a number of speakers confirmed (yes, Goggans will be speaking again)
|
||
and will try to finalize the list and include it in the next update.
|
||
We are definitely still looking for people to speak and welcome
|
||
diverse topics (except for "The wonders and joys of ANSI, and how it
|
||
changed my life"). If you're interested in rattling away, please
|
||
contact us as soon as possible and let us know who you are, who you
|
||
represent (if anyone), the topic you wish to speak on, a rough
|
||
estimate of how long you will need, and whether or not you will be
|
||
needing any audio-visual aids.
|
||
|
||
We would like to have people bring interesting items and videos again
|
||
this year. If you have anything you think people would enjoy having
|
||
the chance to see, please let us know ahead of time, and tell us if
|
||
you will need any help getting it to the conference. If all else
|
||
fails, just bring it to the con and give it to us when you arrive. We
|
||
will also include a list of items and videos that will be present in a
|
||
future update.
|
||
|
||
If anyone requires any additional information, needs to ask any
|
||
questions, wants to RSVP, or would like to be added to the mailing
|
||
list to receive the HoHoCon updates, you may mail us at:
|
||
|
||
dfx@nuchat.sccsi.com
|
||
drunkfux@freeside.com
|
||
drunkfux@ashpool.freeside.com
|
||
359@7354 (WWIV Net)
|
||
|
||
or via sluggo mail at:
|
||
|
||
Freeside Data Network
|
||
Attn: HoHoCon/dFx
|
||
11504 Hughes Road
|
||
Suite 124
|
||
Houston, Texas
|
||
77089
|
||
|
||
We also have a VMB which includes all the conference information and
|
||
is probably the fastest way to get updated reports. The number is:
|
||
|
||
713-866-4884
|
||
|
||
You may also download any of the conference announcements and related
|
||
materials by calling 713-492-2783 and using the username "unix", which
|
||
is unpassworded. The files will be in the "hohocon" directory. Type
|
||
"biscuit" if you wish to gain an account on the system. You can find
|
||
us there too.
|
||
|
||
Conference information and updates will most likely also be found in
|
||
most computer underground related publications, including CuD,
|
||
Informatik, NIA, Mondo 2000, 2600, Phrack, World View, etc. We
|
||
completely encourage people to use, reprint, and distribute any
|
||
information in this file.
|
||
|
||
|
||
Stupid Ending Statement To Make Us Look Good
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
HoHoCon '92 will be a priceless learning experience for professionals
|
||
(yeah, right) and gives journalists a chance to gather information and
|
||
ideas direct from the source. It is also one of the very few times
|
||
when all the members of the computer underground can come together for
|
||
a realistic purpose. We urge people not to miss out on an event of
|
||
this caliber, which doesn't happen very often. If you've ever wanted
|
||
to meet some of the most famous people from the hacking community,
|
||
this may be your one and only chance. Don't wait to read about it in
|
||
all the magazines and then wish you had been there, make your plans to
|
||
attend now! Be a part of what we hope to be our largest and greatest
|
||
conference ever.
|
||
|
||
Remember, to make your reservations, call (800) 231-6310 and tell them
|
||
you're with HoHoCon.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 04 Nov 92 17:06:15 EST
|
||
From: anonymous@mindvox.phantom.com
|
||
Subject: File 4--Re: Worship SPERF of be engulfed in SunDevil Jr. ][+
|
||
|
||
((MODERATORS' NOTE: The following is in response to the
|
||
Greenburgh, NY, "computer hacker bust" reported in NEWSBYTES and
|
||
reprinted in CuD #4.55)).
|
||
|
||
Ok, Look... They were confused all right? If you were a teenager
|
||
with hormones, eating too much pizza and trying to master the art of
|
||
smoking cigarettes, you'd be confused too. But that's not the point
|
||
of this story, this is:
|
||
|
||
It was a dark and stormy night; a shot rang out; the door slowly
|
||
creaked open and a martian chick with three tits peered into the
|
||
darkly lit confines of the room casting a hellish green light upon the
|
||
masses of huddled hackerdom within. She drew open the door and
|
||
proclaimed: "Well, like you know you aren't supposed to be that many
|
||
guests in here right?"
|
||
|
||
10 cops burst in, no 50, yeah that's better, they drew uzi's as the
|
||
SWAT team swooped down from the sky; Yuri, knowing what he had to do,
|
||
ate the monitor and burnt the coded disks while the masses ran around
|
||
in little circles and swallowed the drugZ, booZe and Jelly donuts.
|
||
The police drew their guns, then took out their nightsticks instead
|
||
and beat on the hackers for the amusement value, making racial slurs
|
||
all the while as they forced the pre-teen girls to strip and let them
|
||
take photographs.
|
||
|
||
..meanwhile, unnoticed in the corner, DETH HEYD began an incantation
|
||
to summon SATAN and FUCK THEM ALL TO GODDAMN FUCKING HELL IN UPPERCASE
|
||
|
||
PhA<tZ:
|
||
|
||
50-65 People at Pump(on
|
||
|
||
25-35 Picked Up
|
||
|
||
4-5 processed / set to be arrainged
|
||
|
||
1 Not released on bail -- previous arrest warrant.
|
||
|
||
Generally dudes, drinking, taking drugs, and watching bad TV. Various
|
||
underage chiXx of unknown origin, 3-4 computers (Amigas of course)
|
||
complete with video games and other <o0L WheRez & Demos to watch while
|
||
high, along with an AT&T terminal, painted bright red and scortched
|
||
with the mark of the beast.
|
||
|
||
Dudez used k0dez, karDz and plAyeD with SwiTChez and did naughty
|
||
things. AT&T has said it "wants to persecute to the fullest extent
|
||
of its confusion" and will not stop until its nearly the end.
|
||
|
||
Yuri turned the channel and found himself dazed and Konfused in his
|
||
living room. This not being a foreign state to him (remember its his
|
||
living room), he sat down to eat ding dongs and cheeze whiz and
|
||
contemplate what it all meant; the phone rang, his friend has been
|
||
raided. His friend is lying but the smoke is coming out of Yuri's
|
||
ears since he is THE SECOND TO THE LAST M0[> MEMBER NOT YET IN BIG
|
||
TROUBLE AND THEY'RE COMING TO GET HIM, BECAUSE *THEY* WATCH WITH
|
||
UNBLINKING EYES AND _BIDE_ THEIR TIME UNTIL THE MOMENT IS RIGHT AND
|
||
THEN___ well we'll have none of that, so the world's first underground
|
||
BBS lives once more, and Yuri picks up the phone and RUN! calls us
|
||
and generally FLEE! says silly things with OH NO! the smoke still
|
||
coming out of his ears SHIT! because he is truly freaking out and
|
||
believes he will go to hell now.
|
||
|
||
Shit happens, ya know, sum of it is pretty bad, some of it ain't --it
|
||
is not quite as tragic as we were led to believe, because if you don't
|
||
believe in the power of THE WORD then what is there?
|
||
|
||
Sperf is EVIL
|
||
|
||
PaTriCK/legi!()n of PhAnt0mZ
|
||
|
||
ps: Hi! Lotta dudes got picked up over the weekend/Monday, including
|
||
the man we know and love as Murdering Thugly.
|
||
|
||
Grunt.
|
||
|
||
It seems to be largely ok, as in mild riot/teenage gang-bang, gone
|
||
slightly askew when k0dez karDz and K0kAine entered the picture. They
|
||
were naughty, naughty BAD BAD BAD.
|
||
|
||
()()f
|
||
|
||
z00m!
|
||
|
||
------------------------------
|
||
|
||
Date: 05 Nov 92 18:19:30 EST
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 5--Computer Info off-limits to Federal Prisoners
|
||
|
||
COMPUTER INFORMATION OFF LIMITS FOR FEDERAL PRISONERS
|
||
|
||
WINDOWS magazine reports John D. Caulfield, Warden of the Federal
|
||
Prison Camp at Eglin Air Force Base in Florida, has forbidden the
|
||
distribution of their publication to prisoners in his facility.
|
||
|
||
The publication received a letter from Warden Caulfield after sending
|
||
an issue to an un-named inmate. The complete letter is reprinted on
|
||
page 288 of the October 1992 issue. The letter says in part...
|
||
|
||
I have reviewed the publication entitled WINDOWS, the July
|
||
1992 issue, that was mailed to, (NAME REMOVED), a resident of
|
||
this facility, and have found the programming contents to be
|
||
unacceptable for introduction into this facility. Program
|
||
Statement 1232.3 entitled "Personal Computers" S13, PG,
|
||
states, "There will be no training in programming techniques,
|
||
programming languages, or computer repair."
|
||
|
||
Due to the information cited above, the July publication
|
||
entitled WINDOWS is not suited for introduction into this
|
||
facility.
|
||
|
||
No further explanation is given by the Warden. One wonders why the
|
||
institution feels the need to censor this information. It is true
|
||
that it is of limited usefulness while incarcerated, because the
|
||
inmate probably wouldn't have access to a computer to use, but if
|
||
anything this should _allow_ the distribution of technical
|
||
information, not inhibit it. Publications are often censored because
|
||
of the disruption they might cause within the facility. Clearly an
|
||
inmate attempting to learn C++ without access to a CPU is a threat to
|
||
no one. CuD intends to contact the Warden for more information
|
||
regarding this bizarre rule and will report any additional information
|
||
in a future issue.
|
||
|
||
------------------------------
|
||
|
||
Date: 04 Nov 92 18:32:54 EST
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 6--These Computer Abusers Cost us nearly $100 Billion
|
||
|
||
((MODERATOR'S NOTE: Software piracy, according to the SPA, represents
|
||
up to $4 billion in losses. "Hacker" crime constitutes a few billion
|
||
more, according to some law enforcment assessments. Insider computer
|
||
abuse constitutes at least $15-20 billion more, in the eyes of others.
|
||
Add them all up, and the costs fall far short of the most
|
||
devastatingly dangerous computer abuser of all: THE COMMON PC USER!
|
||
Perhaps it's time to legislate against this scourge of society,
|
||
organize federal dragnets in a national crackdown, and prosecute those
|
||
responsible for the following crimes to the fullest extent of the
|
||
law)).
|
||
+++++++
|
||
|
||
DOES THIS HELP PUT THE SOCIAL COSTS OF THE CU IN PERSPECTIVE?
|
||
|
||
Newsweek reports that approximately $97 Billion of the US gross
|
||
domestic product is being 'futzed away' by workers spending too much
|
||
time 'polishing' their work on PC's. SBT, a California software firm,
|
||
has found that playing around with fancy fonts, over elaborate
|
||
spreadsheets, overpolishing material with snazzy graphics, and endless
|
||
rounds of 'just one more re-write' are among the chief time wasters.
|
||
(From: Communications of the ACM. Nov '92 p. 13)
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.56
|
||
************************************
|
||
|
||
|
||
|