870 lines
39 KiB
Plaintext
870 lines
39 KiB
Plaintext
|
||
|
||
Computer underground Digest Wed May 12 1993 Volume 5 : Issue 35
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Editor: Etaoin Shrdlu, Senrio
|
||
|
||
CONTENTS, #5.35 (May 12 1993)
|
||
File 1--My Thoughts/questions on the "Clipper" chip.
|
||
File 2--Response to Jerry Leichter on Clipper Chip
|
||
File 3--Response to Rich Mackinnon on Clipper
|
||
File 4--Another Letter of Concern to "Hate Speech" Inquiry
|
||
File 5--FBI Raids Telco Manager's Home (TELECOM DIGEST SPECIAL)
|
||
File 6--DEF CON I Update
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) 203-832-8441 NUP:Conspiracy
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in Luxembourg BBS (++352) 466893;
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
Back issues also may be obtained through mailserver at:
|
||
server@blackwlf.mese.com
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Mon, 10 May 1993 22:10:03 CDT
|
||
From: Eric Schnoebelen <eric%cirr.com@HARVUNXW.BITNET>
|
||
Subject: File 1--My Thoughts/questions on the "Clipper" chip.
|
||
|
||
I've seen a lot of hoopla on the "Clipper" chip that the (U.S.)
|
||
government recently announced, and I am not entirely certain what to
|
||
make of it.
|
||
|
||
I'm a little suspicious of the intent, as well as those who created it
|
||
(who exactly did?).
|
||
|
||
But, what I am more concerned about is the exportability of it, and
|
||
how it is going to become a "world-wide" standard, which it will need
|
||
to do, if it is to become accepted at all. The U.S. is no longer the
|
||
center of the universe, and U.S. companies cannot afford to make two
|
||
products, one for distribution in the U.S., and one outside. If
|
||
forced to choose, many will choose to build the "international"
|
||
version exclusively.
|
||
|
||
Another concern is the lack of a description of the algorithm. The
|
||
algorithm is needed if there are to be software implementations, and
|
||
software implementations are sorely needed.
|
||
|
||
I ask because I have been struggling with trying to get the NSA's last
|
||
encryption algorithm, the Data Encryption Standard, exported when used
|
||
for authentication. Our interpretation is that we cannot export any
|
||
form of user accessible routine that implements DES, not even a
|
||
crippled edition of crypt(3), which can do only password
|
||
authentication. Needless to say, this has caused much concern amongst
|
||
our European distributors and customers.
|
||
|
||
We have spent the last two years trying to get an answer from the
|
||
Department of Commerce about the legality of exporting a crippled
|
||
version of crypt(3), which can do only authentication, and gotten
|
||
basically no where. We were finally given the names of a couple of
|
||
folks inside the NSA, but we're almost afraid to talk to them...
|
||
|
||
If the "Clipper" chip is to be viable, it cannot have these sorts of
|
||
problems hanging over it. The algorithms need to be publicly know,
|
||
and implemented, and no export restrictions placed upon either the
|
||
chip or the software. Otherwise, it is worse than useless.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 11 May 93 17:11:42 -0700
|
||
From: Russell Brand <brand@REASONING.COM>
|
||
Subject: File 2--Response to Jerry Leichter on Clipper Chip
|
||
|
||
In CU Digest 5.34, Jerry Leichter <leichter@LRW.COM> attacked Mike
|
||
Godwin's position on the open design principle.
|
||
|
||
While Leichter is correct that in certain environments, an %open
|
||
design' is fact neither partical nor appropriate. CLIPPER is doesn't
|
||
present an instance of this. One of the reasons that an open design
|
||
is important is so that you don't have to worry what advantage someone
|
||
can get by stealing it. Because the a well tested is system is
|
||
supposedly intrinsically strong, you are unlikely to have to replace
|
||
MILLIONS of them in the field because of a person being single bribed
|
||
to betray some of the secrets. [Of course in the CLIPPER system there
|
||
are other people to bribe instead and even if CLIPPER had open design
|
||
there would be other strong reasons to oppose it.]
|
||
|
||
If CLIPPER is commonly used to protect corporate secrets what is the
|
||
logical bribe price? I bet it is more than enough to buy a mere
|
||
government secret but that it isn't enough to quickly factor an
|
||
product of a pair of well chosen 1000 digit primes.
|
||
Date: Tue, 11 May 1993 11:13:41 -0400
|
||
From: Mike Godwin <mnemonic@EFF.ORG>
|
||
Subject: File 3--Response to Rich Mackinnon on Clipper
|
||
|
||
In article <1993Apr27.232320.7422@tic.com> Spartan@cup.portal.com (Rich
|
||
Mackinnon of the University of Texas government department )writes:
|
||
|
||
>How much will the crippled encryption scheme really "chill" our use of
|
||
>emergent communications technology, i.e., threaten our free speech protection
|
||
>to the point that we may opt (if possible) to use other communication
|
||
>media?
|
||
|
||
The fact that it's an emergent medium increases the risk that it can be
|
||
chilled. But note that the risk of a "chilling effect" is only one small
|
||
part of my argument, and not a necessary part. Far more disturbing is the
|
||
increase in the government's power to tell me what *general* forms I'm
|
||
allowed to use when I communicate.
|
||
|
||
>The threat of a warrant does not seem to have a wide chilling
|
||
>effect on the use of standard telephones and postal mail--yet, the possibility
|
||
>of interception is still ever-present.
|
||
|
||
The use of telephones and mail was already a fait accompli when wiretapping
|
||
became widespread. There was no chance that wiretapping would chill an
|
||
emerging technology. Moreover, the character of e-mail is somewhat
|
||
different from that of telephonic communications--it's less ephemeral and
|
||
more "broadcastable." That is, it's easier to store and echo to large
|
||
groups of people. (In comparison, it's somewhat more difficult to tape a
|
||
voice conversation and echo it to the world.)
|
||
|
||
What's more, encryption is likely to increase the expectation of privacy
|
||
with regard to e-mail and all other communications that are encrypted.
|
||
|
||
>Does not the warrant sufficiently address this balance?
|
||
|
||
If you are asking whether we should rely on the search-warrant process to
|
||
protect our privacy when we have access to encryption, my answer is
|
||
"Why rely on the government to do what you can do yourself?"
|
||
|
||
>If the protection that a warrant offers is not
|
||
>sufficient to alleviate our fears of unwarranted search, seizure, and arrest,
|
||
>then perhaps there are bigger problems to deal with other than encryption
|
||
>schemes.
|
||
|
||
Perhaps there are, but an individual does not have to ask the legislature
|
||
for permission to use encryption. Not yet, at any rate. So, encryption
|
||
enables an individual to tackle his own privacy problem without having to
|
||
lobby for a change in the warrant process. Most theorists would regard
|
||
this as empowering to the individual.
|
||
|
||
>I'm nowhere near as qualified as Mike to offer an opinion on this issue,
|
||
>but it seems to me that the "process" is exactly where we should be
|
||
>focusing--the Constitutional issues are fascinating, but distracting.
|
||
|
||
Sigh. The Constitutional issues will be the only ones we are left with.
|
||
Imagine that we have improved the process and had lots of dialog with the
|
||
Administration, and the Clipper initiative remains the result. If the
|
||
process is wonderful and the result is bad, does this mean we have nothing
|
||
to criticize the government about?
|
||
|
||
>I have to believe that the warrant is an acceptable safeguard to both
|
||
>sides of the balance. Given that, it appears that the balance has been
|
||
>disturbed by an unilateral decision with respect to the Clipper Chip.
|
||
|
||
This is a very charitable picture of the government's mistake, Rich.
|
||
You seem to be saying that if the decision had been other than
|
||
"unilateral," the government's decision would be unimpeachable. I beg to
|
||
differ. The whole point of the Bill of Rights is to remove certain rights
|
||
from political debate. As Melville Nimmer comments, a "balancing" test is
|
||
never adequate to protect freedom of speech. As it stands, we have the
|
||
freedom to say things to each other in secret (through encryption). Must
|
||
we surrender this right to the government once the process gets better?
|
||
|
||
> The
|
||
>plan presented by the Clinton Administration, as far as attempting to
|
||
>balance the concerns of government and the people, seems sound.
|
||
|
||
The problem is that the plan "balances" the concerns of government in the
|
||
direction of government. Many people have been critical of the
|
||
government's insistence that being able to guarantee access to private
|
||
communications is the cornerstone of law enforcement. No study of law
|
||
enforcement I know of supports this view.
|
||
|
||
>This is a political problem in that a practical solution is available, but
|
||
>cannot be agreed upon because the process leading to that solution did
|
||
>not allow for the necessary consultation and input to insure its acceptability.
|
||
>I'm certain that once bruised egos are attended to and future assurances
|
||
>of consultation are gained, that the solution settled upon will be very
|
||
>much like the one that stands.
|
||
|
||
This is the kind of myopia I expect from the University of Texas
|
||
Department of Government, a department that privileges process over
|
||
substance. I hope I may be forgiven for being cynical about the
|
||
willingness of government professors to sign our rights away in the name
|
||
of "good process."
|
||
|
||
It's true that, historically, government has been able to compel a
|
||
"balance" between our privacy rights and the government's often-legitimate
|
||
interests. But now we have a technology that enables us to remove our
|
||
privacy from the balancing calculation--a technology that restores the
|
||
status quo ante of the last century, when sophisticated bugging and
|
||
wiretapping technologies did not exist. I don't think the 19th-century
|
||
standard of private interpersonal communications is so threatening to
|
||
government stability as to justify mandatory government access to our
|
||
communications through Digital Telephony and Clipper.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 10 May 1993 02:33:12 -0500
|
||
From: Dave.Harnett@F68.N272.Z1.FIDONET.ORG(Dave Harnett)
|
||
Subject: File 4--Another Letter of Concern to "Hate Speech" Inquiry
|
||
|
||
23 Apr 93
|
||
|
||
Office of Policy Analysis and Development
|
||
NTIA, US Dept of Commerce
|
||
14th St and Constitution Ave NW
|
||
Washington, DC 20230
|
||
|
||
In response to Notice of Inquiry, Docket No. 930349-3049:
|
||
|
||
I stand qualified to respond to this inquiry by virtue of my three
|
||
years experience as the operator of a computer bulletin board and my
|
||
status as a member of three computer bulletin board networks. In the
|
||
five years before I established my computer bulletin board, I
|
||
participated in discussion groups on other computer bulletin boards
|
||
and networks.
|
||
|
||
I harbor grave concerns regarding your inquiry, particularly your
|
||
scrutiny of a relationship between computer bulletin boards and "hate
|
||
crimes." I can summarize my position with a response to one of the
|
||
questions you pose in IV.A.13 of the Supplementary Information
|
||
section. Governments, specifically telecommunications regulators,
|
||
have *no* proper role with respect to the content of messages carried
|
||
over telecommunications channels.
|
||
|
||
Computer bulletin boards are a truly democratic medium. Unlike
|
||
traditional broadcast and print media, few barriers exist to preclude
|
||
an individual from exchanging ideas via computer-based
|
||
telecommunications. The medium is a great equalizer. In the absence
|
||
of visual and aural cues that might reveal race, religion, gender,
|
||
age, education, or disabilities, ideas become more important than the
|
||
person expressing the ideas. Individuals are free to migrate among
|
||
discussion areas, bulletin boards, and networks, even to start their
|
||
own bulletin boards and networks in pursuit of a comfortable niche.
|
||
|
||
This community without boundaries, sometimes known as cyberspace, is
|
||
self-regulating. I participate in a network of computer bulletin
|
||
boards that was forced to expunge a participant. This individual
|
||
repeatedly engaged in offensive behavior. The community treated this
|
||
individual with respect and tolerance, in the hope that our positive
|
||
attitudes could deter anti-social behavior. Through informal means,
|
||
the community reached an consensus for action. Sadly, some members
|
||
withdrew from the community, to protest what they perceived as
|
||
authoritarian censorship. However, this situation keenly illustrates
|
||
that people are capable of resolving problems without interference
|
||
from government statutes and regulations.
|
||
|
||
My greatest fear is people who fear ideas, people who would use the
|
||
force of government to stifle the expression of ideas. The legitimate
|
||
role of government is to punish not ideas, but only actions that
|
||
violate the rights of another person to life, liberty, and property.
|
||
It matters not that some groups or individuals find some ideas hateful
|
||
or offensive, or that ideas can prompt some sociopaths to commit
|
||
violent criminal acts. Political speech can be highly offensive and
|
||
even hateful to some people. The rhetoric of politician David Duke
|
||
comes to mind. Historically though, the courts offer the greatest
|
||
protection to political speech. Let us not allow the hysteria of
|
||
political correctness to compromise the principles of a free society.
|
||
If we have confidence in ourselves and our beliefs, we have nothing to
|
||
fear from the forces of intolerance and hate.
|
||
|
||
Sincerely,
|
||
David A. Harnett
|
||
Computer bulletin board - 914 452 4753
|
||
Electronic mail address - Dave.Harnett@f68.n272.z1.fidonet.org
|
||
USPS - PO Box 188, Poughkeepsie, NY 12602-0188
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 9 May 1993 14:59:47 -0500
|
||
From: TELECOM Moderator <telecom@DELTA.EECS.NWU.EDU>
|
||
Subject: File 5--FBI Raids Telco Manager's Home (TELECOM DIGEST SPECIAL)
|
||
|
||
((MODERATORS' NOTE: The following is reprinted from Telecom Digest,
|
||
available as a mailing list or a Usenet Group. For those who forget,
|
||
Pat Townson, the TD moderator, was the original impetus in the
|
||
founding of CuD)).
|
||
|
||
This news report from the May 9, 1993 %Omaha World Herald% arrived in
|
||
my mail just a few minutes ago.
|
||
|
||
PAT
|
||
|
||
From--jsaker@cwis.unomaha.edu (James R. Saker Jr.)
|
||
Subject--FBI Raid on Curtis Nebr. Telco, Family
|
||
Organization--University of Nebraska at Omaha
|
||
Date--Sun, 9 May 1993 16:34:53 GMT
|
||
|
||
The following article detailing a FBI raid on a small-town family and
|
||
local exchange carrier was printed in this morning's Sunday %Omaha
|
||
World Herald%:
|
||
|
||
"FBI Probe, Raid Anger Curtis Man"
|
||
Stephen Buttry, %Omaha World Herald%, Sunday May 9, 1993
|
||
|
||
Curtis Neb. -- The evening was winding down for the Cole family. Ed
|
||
Cole, general manager of the Curtis Telephone Co., had dozed off on
|
||
the living room couch. His wife, Carol, was running water for her
|
||
bath. The 10-year-old identical twins, Stephanie and Jennifer, had
|
||
gone to bed. Amanda, 14, was watching "48 Hours" on television in the
|
||
living room.
|
||
|
||
"It had something to do with fingerprints and catching criminals,"
|
||
Amanda remembers of the TV show.
|
||
|
||
At 9:40 p.m., Amanda heard a knock and answered the door. In
|
||
marched the FBI. Thus began a year of fear, anger and uncertainty for
|
||
the Coles.
|
||
|
||
Mrs. Cole, 40, still has nightmares about the night of May 13,
|
||
1992, when federal agents stormed into her bedroom, startling her as
|
||
she was undressing for her bath, naked from the waist up.
|
||
|
||
"I used to go to bed and sleep the whole night," she said last
|
||
week. "I can't anymore."
|
||
|
||
Federal agents did not find the illegal wiretapping equipment they
|
||
were seeking, and a year later no one has been charged. The agents
|
||
seized nothing from the house and later returned the cassette tapes
|
||
they took from the phone company office.
|
||
|
||
Ronald Rawalt, the FBI agent in North Platte who headed the
|
||
investigation that led to the raid, declined to comment, referring
|
||
questions to the Omaha office.
|
||
|
||
"It's still a pending investigation, and we're not allowed to make
|
||
a statement," said agent Doug Hokenstad of the FBI's Omaha office. If
|
||
the investigation comes up empty, he said "we normally don't make a
|
||
statement at the end of the investigation."
|
||
|
||
That infuriates Cole, 39, who says the raid cast suspicion on him
|
||
and the phone company and left them with no way to clear their names.
|
||
|
||
"Either file charges or say there's nothing there," he said. "This
|
||
was done in a highly visible manner, and there was no finality to it."
|
||
|
||
Request for Help
|
||
|
||
Cole has asked Sen. Bob Kerrey, D-Neb., to investigate. Beth
|
||
Gonzales, Kerrey's press secretary, said the senator received Cole's
|
||
letter and is assessing the situation.
|
||
|
||
The case that brought FBI agents from Washington, Denver, Houston
|
||
and Omaha, as well as nearby North Platte, to this tiny southwest
|
||
Nebraska town in the Medicine Creek valley apparently started with a
|
||
personnel squabble in the phone company office.
|
||
|
||
Cole said two women complained of their treatment by two other
|
||
workers. The women who complained threatened to quit if the company
|
||
did not take action against the other women, he said.
|
||
|
||
Cole and his assistant manager, Steve Cole, who is not related,
|
||
observed the office workers for a while.
|
||
|
||
"We found the same two making the ultimatum were the aggressors,"
|
||
Ed Cole said.
|
||
|
||
He gave the complaining employees written reprimands, and they quit
|
||
Jan 16, 1992. The two women contended in a hearing concerning state
|
||
unemployment benefits that personality differences with Ed Cole led to
|
||
the reprimands and their resignations.
|
||
|
||
Both women declined to comment on the matter.
|
||
|
||
300-Hertz Tone
|
||
|
||
In an affidavit filed to obtain the search warrants, agent Rawalt
|
||
said one of the two, Carol Zak, contacted the FBI in March 1992 and
|
||
told them of "unusual electronic noises (tapping noises) on her
|
||
telephone line at the inception of a call received."
|
||
|
||
Later in the affidavit, the noise is described not as tapping, but
|
||
as a 300-hertz tone. Steve and Ed Cole demonstrated the tone last week
|
||
on phone company equipment.
|
||
|
||
It is caused, they said, by a defective 5-by-7 circuit board, or
|
||
card. The defect is common, and the company replaces the card if a
|
||
customer complains.
|
||
|
||
The tone is not heard if a customer answers between rings, but if
|
||
the customer answers during a ring, the tone blares into the earpiece
|
||
for an instant, about the duration of the ring. Ed Cole, who has
|
||
placed wiretaps for law officers with warrants, said wiretaps don't
|
||
cause such a sound.
|
||
|
||
"Most wiretaps, don't they have a loud, blasting noise to announce
|
||
there's an illegal wiretap?" he asked sarcastically.
|
||
|
||
Surveillance
|
||
|
||
After Mrs. Zak told agent Rawalt of the noise on her line, the FBI
|
||
began recording her calls, the affidavit says. On April 30, the
|
||
affidavit says, the FBI began surveillance of Ed Cole -- not an easy
|
||
task in a town of 791 people.
|
||
|
||
During the weeks before the raid, phone company employees noticed a
|
||
stranger watching the office and workers' houses. They guessed that a
|
||
private investigator was watching, possibly gathering information for
|
||
the former workers.
|
||
|
||
"When somebody sits around in a car in a small-town Curtis,
|
||
especially at 3:30 when grade school lets out, people take notice,"
|
||
Steve Cole said. "We had a suspicion that we were under surveillance."
|
||
|
||
The affidavit says agent Robert Howan, an electrical engineer from
|
||
FBI headquarters, analyzed tapes of Mrs. Zak's phone calls and
|
||
concluded that a wiretap on the line "is controlled from the residence
|
||
of Eddie Cole Jr. and is facilitated through a device or computer
|
||
program at the Curtis Telephone Company."
|
||
|
||
Based on Rawalt's affidavit, U.S. Magistrate Kathleen Jaudzemis in
|
||
Omaha issued warrants to search Cole's house and company offices.
|
||
Federal agents gathered in North Platte and headed south to Curtis for
|
||
the late-evening raid.
|
||
|
||
Flashlights, Commotion
|
||
|
||
When Amanda Cole opened the door, she said "The first people that
|
||
came in went past me." They rushed through the living room into the
|
||
kitchen to let more agents in the back door.
|
||
|
||
The agents wore black jackets and raincoats, with large, yellow
|
||
letters proclaiming "FBI." Neighbors and passersby began to notice the
|
||
commotion as other agents searched the outside with flashlights.
|
||
|
||
The agents showed Cole the search warrant and told him and Amanda
|
||
to stay in the living room. The agents asked where the other girls
|
||
were, and Cole replied that it was a school night and they were in
|
||
bed.
|
||
|
||
Rather than flipping the hall light switch, the agents went down
|
||
the darkened hall with flashlights, "like they think my kids are going
|
||
to jump up and shoot them," Cole said.
|
||
|
||
The twins recalled that they were puzzled, then scared, to wake up
|
||
as FBI agents shined flashlights on them. The intruders did not enter
|
||
gently, either.
|
||
|
||
"After they left, our doorknob was broken," Jennifer said.
|
||
|
||
Farther down the hall, the agents found the embarrassed and angry
|
||
Mrs. Cole. "They didn't knock or anything, and I was undressing," she
|
||
said. "They told me to get a T-shirt on."
|
||
|
||
After Mrs. Cole put her clothes back on, agents allowed her to go
|
||
with them to get the frightened twins out of bed. Mrs. Cole and the
|
||
twins also were instructed to stay in the living room.
|
||
|
||
Interrogation
|
||
|
||
As agents searched the house, Cole said, Rawalt told him to step
|
||
out on the porch. While he was outside, Mrs. Cole decided to call the
|
||
phone company's attorney.
|
||
|
||
"They told me I couldn't do that," she said. "I worked at the
|
||
Sheriff's Office for several years, and I know no matter what you're
|
||
accused of, you're entitled to an attorney." She called anyway.
|
||
|
||
Meanwhile, according to Cole, Rawalt was interrogating and berating
|
||
him loudly on the front porch, creating what Cole considered a "public
|
||
spectacle."
|
||
|
||
"I've lived here 15 years. I've built up a reputation," said Cole,
|
||
who is president of the Curtis Housing Authority, chairman of the
|
||
Nebraska Telephone Association, and coach of the twins' softball team.
|
||
"And there's cars going by real slow. Here Rawalt brings me out on the
|
||
front porch, turn on the light for everyone to see and starts
|
||
interrogating me."
|
||
|
||
Cole said Rawalt tried to pressure him to admit he was wiretapping
|
||
and tell him where the equipment was. "He pointed at my wife and kids
|
||
and said, 'Look at what you're putting them through,'" Cole said.
|
||
|
||
Three-Hour Search
|
||
|
||
Cole said it would take about 20 minutes for an expert to examine
|
||
the phones in the house -- a teen line, the main line plus two
|
||
extensions, a 24-hour repair prone that rings at his home as well as
|
||
the main office, and an alarm that rings in from the central office.
|
||
|
||
"The search continued for more than three hours, as agents looked
|
||
in closets, cabinets and drawers. The family could hear Garth Brooks
|
||
singing as agents played the children's tapes, apparently hunting for
|
||
recorded phone conversations.
|
||
|
||
At the same time the Coles' house was being searched, agents
|
||
visited Steve Cole and Roger Bryant, a phone company employee who is a
|
||
neighbor of Mrs. Zak's.
|
||
|
||
"They insinuated I had broken into my neighbor's house to put in a
|
||
wiretap," he said. The agents "asked me if I knew if Ed was making
|
||
electrical devices in his basement."
|
||
|
||
(Cole said he wasn't. Agents found no such devices.)
|
||
|
||
The agents told Steve Cole to take them to the phone company office
|
||
so they could search the switch room.
|
||
|
||
Number of Agents
|
||
|
||
The Coles were not sure how many agents participated in the raid.
|
||
They saw at least five at the house but thought they heard others
|
||
outside and entering the back door and going into the basement. They
|
||
said seven agents were at the office, but they weren't sure which
|
||
agents searched both sites.
|
||
|
||
When the agents said they were looking for wiretap equipment, Steve
|
||
Cole said "I told them it just couldn't be right. If Ed were to do
|
||
something or I were to do something, the other one would know."
|
||
|
||
Steve Cole said agents searching the phone company, including
|
||
Howan, did not appear to understand the equipment very well. They
|
||
would not tell him why they suspected a wiretap.
|
||
|
||
After 1 a.m., Ed Cole said, the search of his house ended, with
|
||
agents empty-handed and taking him to the office.
|
||
|
||
About 4 a.m., the agents told Steve Cole about the 300-hertz tone.
|
||
"The minute they told me, I knew what it was," he said. He said he
|
||
quickly found the defective card for Mrs. Zak's line, demonstrated the
|
||
sound for the agents, then replaced it and showed that the sound was
|
||
gone.
|
||
|
||
"I demonstrated it, and then they both got white," Steve Cole said.
|
||
|
||
Card Analyzed
|
||
|
||
Howan then went to Rawalt, who was with Ed Cole outside the switch
|
||
room and explained what had caused the tone, Ed and Steve Cole said.
|
||
|
||
"I'm jubilant," Ed Cole recalled thinking. "I've been exonerated."
|
||
But he said Rawalt told him: "I've investigated this for two months.
|
||
I've flown agents in from around the country ... I may charge you on
|
||
circumstantial evidence."
|
||
|
||
"My heart just sunk," Cole said, "because that means they're not
|
||
here to find the truth. They're just trying to support their pre-
|
||
conceived ideas."
|
||
|
||
He said Rawalt told him he would take the card for analysis.
|
||
|
||
Cole said the searches could have, and should have, been conducted
|
||
without the embarrassing fanfare -- during normal business hours,
|
||
while the children were in school and his wife was at work.
|
||
|
||
Because of the highly public nature of the raid, Cole said, the
|
||
company has hired a lawyer to investigate the investigation. The
|
||
company is trying, with little success, Cole said, to get information
|
||
from the FBI so it can reassure regulators, lenders, stockholders and
|
||
customers of the company's integrity.
|
||
|
||
Tapes of Calls
|
||
|
||
Rawalt visited the Cole's house again in January. Although this
|
||
time it wasn't a raid, his presence upset the family. He returned
|
||
tapes seized in the raid but told Cole that the circuit card was
|
||
still at the FBI lab being analyzed. It still has not been returned,
|
||
Cole said.
|
||
|
||
"The FBI, the most respected law enforcement agency in the world,
|
||
has had this card in their laboratory in Washington, D.C., for almost
|
||
one year, and they still cannot determine if it has a tape recorder
|
||
strapped to it," Cole said.
|
||
|
||
The bureau also has refused to give the phone company of its tapes
|
||
of Mrs. Zak's phone calls, which could show whether the sound on her
|
||
line was the tone from the defective card, Cole said.
|
||
|
||
"It makes one wonder if they'd put a family and a company through
|
||
this just because they don't want to admit a mistake," he said. "If
|
||
they'll just give me my life back by making a public statement, it
|
||
would be over."
|
||
|
||
|
||
(End of article forwarded to TELECOM Digest.)
|
||
|
||
Jamie Saker jsaker@cwis.unomaha.edu
|
||
Systems Engineer Business/MIS Major
|
||
Telenational Communications Univ. Nebraska at Omaha
|
||
(402) 392-7548
|
||
|
||
[Moderator's Note: Thank you very much for sending along this report.
|
||
This is just another example of the clumsy, oafish and unprofessional
|
||
organization which has become such a big joke in recent years in the
|
||
USA: The Federal Bureau of Inquisition. Imagine: a telephone line out
|
||
of order which turns into a massive FBI assault on a private family.
|
||
And of course there will be no apology; no reparations; nothing like
|
||
that. The FBI is too arrogant and powerful to bother with making
|
||
amends for the damage they have done. I hope Ed Cole and his telco
|
||
demand and obtain revenge on everyone concerned, including first and
|
||
foremost Mrs. Zak, the scorned woman who set the whole thing in motion
|
||
when she got fired for her bad attitude at work. I know if it was
|
||
myself, I would not be content until I had turned the screws very hard
|
||
on all of them, especially her. PAT]
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 12 May 1993 17:00:53 PDT
|
||
From: "The Dark Tangent" <dtangent@DTANGENT.WA.COM>
|
||
Subject: File 6--DEF CON I Update
|
||
|
||
D E F C O N I C O N V E N T I O N
|
||
|
||
>> READ AND DISTRIBUTE AND READ AND DISTRIBUTE AND READ AND DISTRIBUTE <<
|
||
|
||
Finalized Announcement: 5/08/1993
|
||
|
||
We are proud to announce the 1st annual Def Con.
|
||
|
||
If you are at all familiar with any of the previous Con's, then
|
||
you will have a good idea of what DEF CON I will be like. If you don't
|
||
have any experience with Con's, they are an event on the order of a
|
||
pilgrimage to Mecca for the underground. They are a mind-blowing orgy
|
||
of information exchange, viewpoints, speeches, education,
|
||
enlightenment... And most of all sheer, unchecked PARTYING. It is an
|
||
event that you must experience at least once in your lifetime.
|
||
|
||
The partying aside, it is a wonderful opportunity to met some of
|
||
the celebrities of the underground computer scene. And those that
|
||
shape its destiny - the lawyers, libertarians, and most of all the
|
||
other There will be plenty of open-ended discussion on security,
|
||
telephones and other topics. As well as what TIME magazine calls the
|
||
"Cyberpunk Movement".
|
||
|
||
Las Vegas, is as you might have guessed a great choice for the
|
||
Con. Gambling, loads of hotels and facilities, cheap air fare and
|
||
room rates. It's also in the West Coast making it more available to a
|
||
different crowd than the former Cons have been.
|
||
|
||
Your foray into the scene and your life will be forever incomplete if
|
||
by some chance you miss out on DEF CON I. Plan to be there!
|
||
|
||
|
||
WHO: You know who you are.
|
||
WHAT: Super Blowout Party Fest, with Speakers and Activities.
|
||
WHERE: Las Vegas, Nevada
|
||
WHEN: July 9th, 10th and 11th (Fri, Sat, Sun) 1993
|
||
WHY: To meet all the other people out there you've been talking to for
|
||
months and months, and get some solid information instead of rumors.
|
||
|
||
|
||
DESCRIPTION:
|
||
|
||
So you're bored, and have never gone to a convention? You want to
|
||
meet all the other members of the so called 'computer underground'?
|
||
You've been calling BBS systems for a long time now, and you
|
||
definitely have been interacting on the national networks. You've
|
||
bullshitted with the best, and now it's time to meet them in Vegas!
|
||
For me I've been networking for years, and now I'll get a chance to
|
||
meet everyone in the flesh. Get together with a group of your friends
|
||
and make the journey.
|
||
|
||
We cordially invite all hackers/phreaks, techno-rats,
|
||
programmers, writers, activists, lawyers, philosophers, politicians,
|
||
security officials, cyberpunks and all network sysops and users to
|
||
attend.
|
||
|
||
DEF CON I will be over the weekend in the middle of down town Las
|
||
Vegas at the Sands Hotel. Why Las Vegas? Well the West Coast hasn't
|
||
had a good Convention that I can remember, and Las Vegas is the place
|
||
to do it. Cheap food, alcohol, lots of entertainment and, like us, it
|
||
never sleeps. We will have a convention room open 24 hours so
|
||
everyone can meet and plan and scheme till they pass out. Events and
|
||
speakers will be there to provide distraction and some actual
|
||
information and experiences from this loosely knit community.
|
||
|
||
This is an initial announcement. It is meant only to alert
|
||
you to the time, dates and location of the convention. Future
|
||
announcements will inform you about specific speakers and events.
|
||
|
||
An information pack is FTPable off of the internet at
|
||
nwnexus.wa.com, in the cd/pub/dtangent directory. The IP# is
|
||
192.135.191.1 Information updates will be posted there in the future
|
||
as well as scanned map images and updated speaker lists.
|
||
|
||
FINAL NOTES:
|
||
|
||
COST: How you get there is up to you, but United Airlines
|
||
will be the official carrier (meaning if you fly you get a 5% to 10%
|
||
price reduction off the cheapest available fare at the time of ticket
|
||
purchase) When buying airline tickets, call 1-800-521-4041 and
|
||
reference meeting ID# 540ii. Hotel Rooms will cost $62 per night for
|
||
a double occupancy room. Get your friends together and split the cost
|
||
to $31. Food is inexpensive. The entertainment is free inside the
|
||
hotel. Reference the DEF CON I convention when registering, as we
|
||
have a block of rooms locked out, but once they go it will be first
|
||
come, fist serve. Call 1-800-634-6901 for the reservations desk.
|
||
|
||
The convention itself will cost $30 at the door, or $15 in
|
||
advance. It pays to register in advance! Also it helps us plan and
|
||
cover expenses! Mail checks/money orders/cashiers checks to: DEF CON
|
||
I, 2709 East Madison Street, #102, Seattle, WA, 98112. Make them
|
||
payable to: "DEF CON" we're not tring to make money, we will be tring
|
||
to cover costs of the conference room and hotel plus air fair for the
|
||
speakers who require it. Don't bother mailing it a week in andvance,
|
||
that just won't happen. Advanced registration gets you a groovy 24
|
||
bit color pre-generated name tag. Include with your payment the name
|
||
you want listed, your association/group affiliation/bbs/whatever,
|
||
email address, and/or bbs number for sysops. Last day for the
|
||
registrations to reach me will be July 1st.
|
||
|
||
SPEAKERS: We have solicited speakers from all aspects of the
|
||
computer underground and associated culture (Law, Media, Software
|
||
Companies, Cracking Groups, Hacking Groups, Magazine Editors, Etc.)
|
||
If you know of someone interested in speaking on a self selected
|
||
topic, please contact The Dark Tangent to discuss it.
|
||
|
||
FOR MORE INFORMATION:
|
||
|
||
For initial comments, requests for more information, information
|
||
about speaking at the event, or maps to the section where prostitution is
|
||
legal outside Las Vegas (Just Kidding) Contact The Dark Tangent by leaving
|
||
me mail at: dtangent@dtangent.wa.com on the InterNet.
|
||
|
||
Or call: 0-700-TANGENT for conference information/updates and to leave
|
||
questions or comments.
|
||
Or Snail Mail (U.S. Postal Service) it to DEF CON, 2709 East Madison Street,
|
||
#102, Seattle, WA, 98112.
|
||
|
||
Future information updates will pertain to the speaking agenda.
|
||
|
||
++++++++++++++++++++++
|
||
Updates since the last announcement:
|
||
|
||
>> The Secret Service is too busy to attend.
|
||
>> New Media Magazine, Unix World and Robert X. Cringly have stated they will
|
||
attend.
|
||
>> We got a voice mail system working (I think) for comments and questions.
|
||
>> We don't have enough $$$ to fly out the EFF or Phillip Zimmerman (Author
|
||
of PGP) or Loyd Blankenship.
|
||
>> Judy Clark will be representing the CPSR and a few other organizations
|
||
|
||
Don't forget to bring a poster / banner representing any of the groups
|
||
you belong to. I want to cover the conference room walls with a
|
||
display of all the various groups / people attending. (Break out the
|
||
crayons and markers)
|
||
|
||
+++++++++++++++++++++++++++++=
|
||
|
||
DEF CON I CONVENTION [PROPOSED SPEAKING SCHEDULE 5.08.1993]
|
||
|
||
Saturday the 10th of July 10am, Sands Hotel, Las Vegas
|
||
|
||
INTRODUCTION Welcome to the convention
|
||
*The Dark Tangent (CON Organizer)
|
||
|
||
Keynote speaker Cyberspace, Society, crime and the future.
|
||
|
||
To hack or not to hack, that is not the question
|
||
*Ray Kaplan
|
||
|
||
Civil Libertarians
|
||
-CPSR Computer Privacy/1st Amendment/Encryption
|
||
*Judy Clark
|
||
|
||
-USC Comp. Law Legalities of BBS Operation, message content
|
||
laws and network concerns.
|
||
*Allen Grogan, Editor of Computer Lawyer
|
||
|
||
'The Underworld'
|
||
-Networking Concerns of National Networking
|
||
of CCi Net.
|
||
*Midnight Sorrow.
|
||
|
||
Corporations
|
||
-Packet Switching
|
||
SPRINT Concerns/security and the future
|
||
MCI of packet switching.
|
||
(*Jim Black, MCI Systems Integrity)
|
||
|
||
|
||
System 75 Common misbeliefs and rumors of the underground
|
||
*Scott Simpson
|
||
|
||
-Virtual Reality The law, and it's intersection with VR
|
||
*Karnow
|
||
|
||
-System Administrator Security Concerns of an Administrator
|
||
*Terminus
|
||
|
||
The 'Underworld'
|
||
-Internet The security problems with Internet/Networks
|
||
Overview of hacking
|
||
*Dark Druid
|
||
|
||
-Getting Busted The process of getting "busted"
|
||
*Count Zero
|
||
|
||
-How to be a nobody Hiding your identity in the high-tech future, or
|
||
The payphone is your friend.
|
||
*Anonymous
|
||
|
||
-The Prosecutors Their concerns/problems and
|
||
Hacker Hunters suggestions for the 'underworld'/Q&A
|
||
|
||
-The Media The effect of the media on public perceptions
|
||
*Erik Bloodaxe / Phrack Magazine
|
||
|
||
CONCLUSION General Q&A
|
||
|
||
|
||
This itinerary is proposed, and topics and speakers will be marked as
|
||
permanent once a confirmation is recieved. This is by no means the exact
|
||
format of DEF CON I. Any Questions / Comments Contact:
|
||
|
||
dtangent@dtangent.wa.com
|
||
Voice Mail 0-700-TANGENT
|
||
++++++++++++++++++++++++
|
||
Sorry for the huge signature, but I like privacy on sensitive matters.
|
||
+-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||
Version: 2.2
|
||
|
||
mQCNAiviMB8AAAEEANO4XmnggG8h8XWtfxShMvRUarlpj2OBSPMrzUNRAKEjupUj
|
||
f/FfszMk0G60GSiCfiosw/m2JcKPQ6OZgQCxfElFUcYkKx/rYjgU3viEmNasjAwN
|
||
jR/9l0WSXlv4CjCUtH/t4rm1C1bs8i6iznmu/dCeuUEZQoRm0Lrdt/10TGt3AAUT
|
||
tCtUaGUgRGFyayBUYW5nZW50IDxkdGFuZ2VudEBkdGFuZ2VudC53YS5jb20+
|
||
=DxKN
|
||
+-----END PGP PUBLIC KEY BLOCK-----
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.35
|
||
************************************
|
||
|
||
|
||
|