916 lines
47 KiB
Plaintext
916 lines
47 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun July 11 1993 Volume 5 : Issue 51
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Editor: Etaoin Shrdlu, Seniur
|
||
|
||
CONTENTS, #5.51 (July 11 1993)
|
||
File 1--Introduction to the AIS BBS Controversy
|
||
File 2--Response to RISKS' Anonymous Post attacking AIS BBS
|
||
File 3--Response to Anonymous: AIS BBS
|
||
File 4--A User's View of AIS BBS
|
||
File 5--Fear and Loathing: On the Virus Code Trail at AIS
|
||
File 6--Media, Anti-virus personnel, Ethics, and AIS
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Thu, 8 July 1993 21:39:01 CDT
|
||
From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 1--Introduction to the AIS BBS Controversy
|
||
|
||
A recent (Vol 14, #58) issue of Risks Digest contained an anonymous
|
||
post that attacked AIS BBS and it's sysop, Kim Clancy. The AIS board
|
||
is a service of the U.S. Department of Treasury's Bureau of Public
|
||
Debt. "AIS' is an acronym for "Automated Information System," and the
|
||
board provides security-related information to its users.
|
||
|
||
AIS downloadable files included a broad range of texts files related
|
||
to computer security, "hacker" culture, and computer technology, along
|
||
with other files readily available on any public access system. A few
|
||
anti-virus folk complained about the virus source code that was
|
||
available on the board. According to CuD sources, at least one British
|
||
anti-virus specialist publicly condemned the board and urged
|
||
colleagues to voice complaints.
|
||
|
||
An "anonymous" poster, later revealed to be Paul Ferguson, an
|
||
anti-virus specialist, wrote the anonymous Risks post. The story was
|
||
picked up by Joel Garreau of the Washington Post a few weeks later,
|
||
and on July 6 prompted Edward J. Markey, Chair of the House
|
||
Subcommittee on Telecommunications and Finance, to contact Lloyd
|
||
Bentsen, Secretary of the Department of the Treasury, to voice
|
||
concerns (see forthcoming CuD 5.52 for comments from Rep. Markey's
|
||
office) about the AIS BBS.
|
||
|
||
In my view, this incident has been blown out of proportion by some of
|
||
the anti-virus crowd and their supporters, by the media, and
|
||
especially by Rep. Markey. In this issue, we examine the background
|
||
of the incident as it began in Risks, and include some commentary.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 21 Jun 93 22:54:12 CDT
|
||
From: Jim Thomas <cudigest@mindvox.phantom.com>
|
||
Subject: File 2--Response to RISKS' Anonymous Post attacking AIS BBS
|
||
|
||
((The following appeared in Risks Digest, #14.68, ten issues after
|
||
the original post appeared)).
|
||
|
||
In Risks (Vol 14 #58) appeared a post, part of which is reprinted
|
||
below, that makes us appreciate freedom of speech and information
|
||
exchange we enjoy in the U.S. The primary risk I've learned after
|
||
reading the post is that anonymous posters with an axe to grind are
|
||
potential threats to freedom of expression.
|
||
|
||
Two anonymous posters falsely depict AIS BBS, a bulletin board run by
|
||
Dept of Treasury/Office of Public Debt personnel as a public
|
||
information service, as a board engaged in "unethical, immoral, and
|
||
possibly illegal activities:"
|
||
|
||
>Date: Fri, 7 May 93 11:18:17 -0500
|
||
>From: Anonymous <nowhere@bsu-cs.bsu.edu>
|
||
>X-Notice: This message was forwarded by a software-
|
||
> automated anonymous remailing service.
|
||
>
|
||
>This text was forwarded to me by a friend and professional colleague
|
||
>in the UK. I am dismayed that this type of activity is being condoned
|
||
>by an American Governmental Agency. I can only hope that this
|
||
>operation is shut down and the responsible parties are reprimanded. I
|
||
>am extremely disturbed by the thought that my tax money is being used
|
||
>for, what I consider, unethical, immoral and possibly illegal
|
||
>activities.
|
||
>
|
||
> ---- begin forwarded message -------------
|
||
>
|
||
>AIS BBS Capture log.
|
||
>
|
||
>To: all interested parties, especially Americans who may wish to ask
|
||
>relevant questions of relevant people.
|
||
>
|
||
>Capture log from a BBS that claims to be run by the US Treasury
|
||
>Department, Bureau of the Public Debt. Notice - I have not verified
|
||
>that the US government is actually running this BBS, only that the BBS
|
||
>claims that it is.
|
||
|
||
The remainder of the anonymous post presents screen captures of
|
||
directories and files to which the poster objects. Especially
|
||
troublesome for the anonymous accusers are virus-oriented files.
|
||
|
||
AIS is a reputable and professionally run open-access BBS.
|
||
It has one of most extensive collections of text and other files
|
||
related to all aspects of security in the country. Some may object
|
||
to some of the materials, just as some might object to RISKS DIGEST or
|
||
CuD being "funded" with taxpayers money. It strikes me as
|
||
reprehensible to take selected material out of context and piece
|
||
together an image of immorality or worse by presenting a misleading
|
||
image of the materials on the BBS and the purposes for which those
|
||
materials are intended. That the accusers make their claims while
|
||
hiding behind the cloak of anonymity strikes me as the type of
|
||
cowardice associated with witch hunts.
|
||
|
||
The anonymous posters seem to be bothered by the existence of virus
|
||
source code on the board. I wager one would learn far more about virus
|
||
writing and distribution tactics from VIRUS-L than from the AIS files,
|
||
but the two anonymous posters seem to be part of a handful of strident
|
||
pseudo-moral entrepreneurs who feel that only the information they
|
||
judge as appropriate for public consumption should be made available.
|
||
I'm surprised that the anonymous critics did not also include a demand
|
||
that public libraries also be closed.
|
||
|
||
It is one thing to disagree with the position of another and raise the
|
||
contentious issues as a matter of public debate. It is quite another
|
||
to engage in the cowardly act of anonymously distorting the function
|
||
of a legitimate and widely-used BBS by insinuating "unethical,
|
||
immoral, and possibly illegal activities."
|
||
|
||
CuD ran an interview with the AIS BBS personnel (CuD 4.37, 1992), and
|
||
a few excerpts may put the purposes of AIS BBS in perspective:
|
||
|
||
*** begin excerpts ***
|
||
|
||
Q: What is this Board? (name, number, who runs it (dept & sysop).
|
||
What kind of software are you using? When did the Board go
|
||
on-line?
|
||
|
||
A: The Bulletin Board System (BBS) is run by the Bureau of the
|
||
Public Debt's, Office of Automated Information System's Security
|
||
Branch. The mission of the Bureau is to administer Treasury's
|
||
debt finance operations and account for the resulting debt. The
|
||
OAIS security branch is responsible for managing Public Debt's
|
||
computer systems security. The AIS BBS is open to the public and
|
||
the phone number for the Board is (304) 420-6083. There are
|
||
three sysops, who manage the Remote Access software. The BBS
|
||
operates on a stand-alone pc and is not connected to any of other
|
||
Public Debt systems. The Board is not used to disseminate
|
||
sensitive information, and has been up operating for the past 15
|
||
months. <<This interview was as of mid-1992 - jt>>
|
||
|
||
Q: What are the goals and purposes of the Board?
|
||
|
||
A: The BBS was established to help manage Public Debt's security
|
||
program. Security managers are located throughout Public Debt's
|
||
offices in Parkersburg, WV and Washington DC. The security
|
||
programmers saw a need to disseminate large amounts of
|
||
information and provide for communication between program
|
||
participants in different locations. Because the Board was
|
||
established for internal purposes, the phone number was not
|
||
published. However, the number was provided to others in the
|
||
computer security community who could provide information and
|
||
make suggestions to help improve the bureau's security program.
|
||
Gradually, others became aware of the Board's existence.
|
||
|
||
Q: What kinds of files and/or programs do you have on the Board?
|
||
Why/how do you choose the files you have on-line?
|
||
|
||
A: There is a wide variety of files posted. In the beginning, we
|
||
posted policy documents, newsletter articles from our internal
|
||
security newsletter, bulletins issued by CERT, such as virus
|
||
warnings, and others for internal use. I located some
|
||
"underground" files that described techniques for circumventing
|
||
security on one of the systems we manage. The information, from
|
||
Phrack magazine, was posted for our security managers to use to
|
||
strengthen security. When we were called by others with the same
|
||
systems, we would direct them to those files as well.
|
||
Unexpectedly, the "hacker" that had written the file contacted me
|
||
through our BBS. In his article he mentioned several automated
|
||
tools that had helped him take advantage of the system. I
|
||
requested that he pass on copies of the programs for our use. He
|
||
agreed. This is how our "hacker file areas" came to be. Other
|
||
hackers have done the same, and have we also received many files
|
||
that may be useful. It is, indeed, an unusual situation when
|
||
hackers and security professionals work together to help secure
|
||
systems. However, this communication has been beneficial in
|
||
strengthening an already secure system.
|
||
|
||
Q: How did you get the idea to set it up?
|
||
|
||
A: The security branch accesses many BBSs on a daily basis for
|
||
research purposes, information retrieval and to communicate with
|
||
others. Since our security program is decentralized, the BBS
|
||
seemed to be an effective way of communicating with program
|
||
participants in diverse locations.
|
||
|
||
<end excerpts>
|
||
|
||
Perhaps the anonymous accusers are correct: Some types of information
|
||
may pose a risk if abused. But, in an open democracy, the potential
|
||
for abuse has been neither a necessary nor a sufficient justification
|
||
to silence those with whom we disagree. If potential for abuse were a
|
||
primary criterion for suppressing the flow of information and freedom
|
||
of expression, we would live in a rather silent world, and there would
|
||
likely be no RISKS digest (which arguably subverts the national
|
||
interest by undermining faith in computers and in government, all of
|
||
which is largely done with public funding).
|
||
|
||
Hiding behind anonymity to reduce the risks of accounting for their
|
||
accusations, the anonymous posters call not only for silencing, but
|
||
for sanctions against the sysops.
|
||
This suggests several risks:
|
||
|
||
1) Posters who are unwilling to accept responsibility for their
|
||
claims are more able to distort information in ways that
|
||
leave the target vulnerable and unable to face their accusers.
|
||
|
||
2) Anonymous posters who call for silencing and sanctions on the
|
||
basis of unexamined and questionable claims create a chilling
|
||
effect on freedom of expression.
|
||
|
||
3) Anonymous posters with an apparent axe to grind contribute to
|
||
poisoning the well of free information and reduce the opportunity to
|
||
openly discuss and debate issues.
|
||
|
||
Our society can far more readily tolerate the existence of information
|
||
that some may find inappropriate than we can risk the censorship of
|
||
information because it offends a few zealots engaged in a form of
|
||
cyber-guerilla warfare by making anonymous claims.
|
||
|
||
Jim Thomas
|
||
Cu-Digest
|
||
Sociology/Criminal Justice
|
||
Northern Illinois University
|
||
DeKalb, IL 60115
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 13 May 93 12:46:19 EDT
|
||
From: Frank Tirado <SYSADMIN@ERS.BITNET>
|
||
Subject: File 3--Response to Anonymous: AIS BBS
|
||
|
||
I'm concerned about the implications of message contributed by
|
||
"Anonymous" on the AIS BBS. The message implies that surely any
|
||
"right-thinking" person would agree with the statements presented. So
|
||
sorry! I have a totally different opinion as regards the conclusions
|
||
presented by "Anonymous".
|
||
|
||
First, lets get a few things out in the open:
|
||
|
||
a. The AIS BBS is a real BBS run by the Bureau of Public Debt.
|
||
b. Its phone number is (304)420-6083
|
||
c. While the BBS does post virus source code, these comprise at most
|
||
about 40 files, a minute fraction of the files available on the
|
||
board. (In fact, I have several HUNDRED virus sources in my
|
||
collection, none of them acquired from the AIS BBS)
|
||
|
||
Both "Anonymous" and his/her UK colleague decry the fact that virus
|
||
source code is available from the BBS and label it a virus exchange
|
||
board. The truth is that the board provides these and other files to
|
||
individuals who are for the most part security professionals who have
|
||
a very real interest in the workings of viruses and other types of
|
||
underground activities.
|
||
|
||
"But", you say, "there's no security! Anyone could get on the board
|
||
and get access to all that nasty source code!" Well, its possible but
|
||
so what? What about all those underground boards where it is possible
|
||
to leech entire file bases of virus source code AND live viruses?! By
|
||
comparison, attacking a board which serves mainly security
|
||
professionals is a purely picayune endeavor. Besides, almost to a one
|
||
those who frequent virus exchange boards are leery of the AIS BBS
|
||
because its a FEDERAL BOARD! It just HAS to be a sting!
|
||
|
||
"Anonymous" expresses concern about what he/she considers "unethical,
|
||
immoral and possibly illegal activities". This is simply an opinion;
|
||
obviously, my opinion is diametrically opposite, and just as strongly
|
||
held as that of "Anonymous". Who's to say who's right, who's wrong?
|
||
Besides, the law that says viruses are illegal has yet to be passed,
|
||
not to mention formulated, here in the US. In addition, "Anonymous"
|
||
neglects to point out in what way virus source code is immoral and
|
||
unethical. I imagine that falls under the category of what every
|
||
right-thinking person "knows".
|
||
|
||
"Anonymous" and his/her colleague pretend to remain anonymous for
|
||
reasons of privacy and fear of reprisals. Let's be real here! Is the
|
||
Bureau of Public Debt going to send the BBS police to their homes to
|
||
rip out their PC's?; hire a squad of Palestinian hitmen to shoot them
|
||
full of holes? For having simply expressed their opinions? Not at
|
||
all. The only possible reason for anonymity is that they have some
|
||
kind of vested interest in shutting down this BBS. The original
|
||
message was forwarded to "Anonymous" by his/her colleague in the UK.
|
||
The UK? Gee, that's odd. At a recent conference in New York, Alan
|
||
Solomon specifically targeted the AIS BBS. Could it be these two
|
||
individuals are one and the same?....... Perhaps if "Anonymous" and
|
||
colleague reveal their real names we'll have a better idea of their
|
||
true motives.
|
||
|
||
Then again, maybe I'm the one who's wrong. I should join them and
|
||
after we shut down the AIS BBS we can shut down the boards which carry
|
||
hacker files. We can follow that up by shutting down the ones which
|
||
provide information on how to build explosive devices. We can
|
||
continue with the libraries, because they're bound to have something
|
||
offensive, too.
|
||
|
||
Knowledge is not going to go away just because we don't like it or
|
||
because we don't want it in someone else's hands. Shutting down a BBS
|
||
simply because it carries source code is, in this case, at best petty.
|
||
Shutting down the AIS BBS for this reason will deny security
|
||
professionals a valuable resource. Most importantly, shutting down the
|
||
AIS BBS will do nothing to stop the proliferation of virus source and
|
||
live viruses. "Anonymous" and his/her colleague will have achieved
|
||
nothing, no one will have benefited.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 20 May 93 11:52:18 EDT
|
||
From: Paul Melka <no.net@address>
|
||
Subject: File 4--A User's View of AIS BBS
|
||
|
||
After reading the Risks 14.58 issue concerning the US Treasury
|
||
Department's Bureau of Public Debt BBS, AIS BBS, I feel like I must
|
||
respond to some of the claims of the anonymous writer. First, as a
|
||
security professional, I have found the information on the AIS BBS
|
||
extremely helpful to me in the performance of my job. This
|
||
information is provided primarily for the use of the BPD, and is made
|
||
available upon request to other interested parties. This board is not
|
||
the only security-related board in the country. There are a number of
|
||
other boards, such as ComSec, that provide similar information to
|
||
security professionals.
|
||
|
||
Second, although the board does provide virus disassemblies and hacker
|
||
files, this information is for the use of security professionals to
|
||
help in their understanding of the inner workings of viruses, or to
|
||
see possible security holes in their systems that are common knowledge
|
||
to crackers and phreakers. This information is of little or no use to
|
||
budding virus writers or hackers because there already are a plethora
|
||
of virus exchange boards or hacking boards that are very easy to get
|
||
access to. In fact you can go to your local book store and order a
|
||
copy of Mark Ludwig's Little Black Book of Computer Viruses. This
|
||
book would be much more helpful in learning about how to write a
|
||
computer virus, than any disassembly could possibly be. Maybe we
|
||
should go back to book burnings too!
|
||
|
||
Third, the board provides a neutral area for security professionals
|
||
and "hackers" to have the opportunity to exchange view points. All
|
||
someone has to do is scan the user list to see the number of security
|
||
professionals and anti-virus professionals that have been on the
|
||
board. If this board is so tainted, what are all these respected
|
||
professionals doing on the board?
|
||
|
||
Finally, the anonymous writer's fear of reprisal is ridiculous. The
|
||
last thing that the FBI or Secret Service or anyone else is going to
|
||
worry about is a board that is legitimately helping to increase the
|
||
level of security awareness among professionals. What is the Treasury
|
||
Department going to do to this individual - raise his taxes?
|
||
|
||
This board is very professionally run and is one of the most positive
|
||
benefits of my tax dollars that I have seen. The anonymous sender
|
||
ends by asking, "Who watches the watchers?" and I can only respond,
|
||
each and every one of us. If this board were as evil as we are led to
|
||
believe, there would be such an outcry from security professionals all
|
||
over the country to shut it down. But when hundreds of people are
|
||
getting positive benefits from it and only a handful of people have a
|
||
problem with it, I say leave it alone. The AIS BSS was designed to be
|
||
used by security professionals and security professionals are
|
||
benefiting from it. Certainly the anonymous sender is entitled to his
|
||
opinion and feelings, but so are the rest of us.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 21 Jun 93 21:18:31 EDT
|
||
From: Urnst Kouch <70743.1711@COMPUSERVE.COM>
|
||
Subject: File 5--Fear and Loathing: On the Virus Code Trail at AIS
|
||
|
||
((Urnst Kouch is editor of CRYPT NEWSLETTER. Additional details on the
|
||
background of the incident and those involved can be found
|
||
in CRYPT NEWSLETTER #16)).
|
||
|
||
FEAR AND LOATHING: ON THE VIRUS CODE TRAIL AT AIS
|
||
|
||
On Saturday, June 19, the national press suddenly reared up and
|
||
without warning, mangled the reputation of one of the finest, most
|
||
professional security experts I know, Kim Clancy of the Bureau of
|
||
Public Debt's Security Branch.
|
||
|
||
I rolled out of bed Saturday morning, plugged into Compuserve's
|
||
Today's News and was promptly crushed by the brazen stupidity of
|
||
reporter Charles Bowen's newspiece, "GOVERNMENT BBS SAID TO HAVE AIDED
|
||
COMPUTER INTRUDERS AND VANDALS".
|
||
|
||
Bowen plagiarized the lead, "A government spokesman says an obscure
|
||
bulletin board system run by a federal agency apparently helped
|
||
computer vandals commit electronic sabotage," directly from a same-day
|
||
Associated Press story called "Dial-A-Virus".
|
||
|
||
But neither Bowen nor the AP offered a solitary shred of proof, other
|
||
than this outrageously leading statement, loosely attributed to Public
|
||
Debt spokesman Peter Hollenbach, that Kim Clancy's AIS BBS has ever
|
||
been responsible for abetting documented cases of hacker intrusion or
|
||
computer vandalism by virus.
|
||
|
||
Further, Bowen reported, "The [Washington] Post says that among the
|
||
visitors to the system were computerists using handles such as 'The
|
||
Internet Worm,' 'Satan's Little Helper' and 'Dark Avenger's Mutation
|
||
Engine.'" The Washington Post story, reported by Joel Garreau, said
|
||
nothing of the kind, leading me to believe Bowen is either a
|
||
functional illiterate or willfully slack. Indeed, anyone who has
|
||
visited AIS knows beyond a shadow of a doubt that the system NEVER
|
||
supported handles of such nature. [Of course, Bowen can respond by
|
||
blaming it on a copy editor and/or tight deadline, the last, best
|
||
defense of lazy, inaccurate newsmen the country over.]
|
||
|
||
These vague insinuations, however, were as nothing compared to the
|
||
wellspring of the controversy, Garreau's "Treasury Exposed Computer
|
||
Virus Info; Whistleblowers Halted Display Available To Anyone With A
|
||
Modem" which brought into the public glare the chain of events that
|
||
resulted in the removal of hacker tools, text files and commented
|
||
virus source code from AIS.
|
||
|
||
Although Garreau's story attempted to present a number of sides it was
|
||
packaged so that a general reader would get a picture of a mad-dog
|
||
government agency, finally "muzzled" after distributing dangerous code
|
||
to "every maladjusted sociopath with Coke-bottle-bottom glasses." More
|
||
savagely irresponsible was the sideborn statement that treasury
|
||
officials had neglected to "discipline" Clancy, instead merely
|
||
removing the dangerous information from her system.
|
||
|
||
It was a real rabbit punch; a cheapjack, ham-handed slam on Kim
|
||
Clancy, successful in portraying her as someone who spends her
|
||
worktime beta-testing intrusion software against her own department so
|
||
that hackers might optimize their methods for computer subversion and
|
||
vandalism. This is hair-raising stuff, to be sure, for a general
|
||
readership, but not the real truth. It is my understanding, and
|
||
something I've seen Kim Clancy make clear in lectures to many computer
|
||
workers, that the whole point of working with hackers on the
|
||
development of "Tone-Loc" software was so that it COULD and WOULD be
|
||
supplied to interested security personnel who would use it to gain an
|
||
understanding of how to harden their systems against tools employing
|
||
similar technology.
|
||
|
||
This is emphatically not the handiwork of someone who should be
|
||
disciplined or professionally tarred, but the work of someone who
|
||
Bruce Sterling, not me, says is "probably THE BEST THERE IS [emphasis
|
||
mine] in the federal government who's not military or NSA. Probably
|
||
better than most CIA."
|
||
|
||
Unfortunately, Sterling's appraisal was buried near the end of the
|
||
story, after all the cracked shouting about aiding hackers and
|
||
computer criminals.
|
||
|
||
But I've walked away from the real nut of the matter: the presence of
|
||
commented virus source code at AIS. The significance of this is, in
|
||
my opinion, beyond the current ability of mainstream journalists to
|
||
evaluate simply because the vast majority of them have little
|
||
technical grasp of the byzantine reality of computer security, what
|
||
viruses are, how they work and don't work and where you find virus
|
||
source code. Certainly, The Washington Post story did nothing to
|
||
convince otherwise.
|
||
|
||
Consider these statements from The Post and some stony facts:
|
||
|
||
>>According to software writers, with the AIS information
|
||
"relative amateurs, could create new viruses."
|
||
|
||
This is dangerously misleading. As point of fact, relative amateurs
|
||
DO, not could, create new viruses from source code and they've done so
|
||
for a long time before the advent of AIS. That AIS would be
|
||
responsible for such a development, which is already fact, is frankly
|
||
idiotic.
|
||
|
||
>>Virus source code at AIS "is worse than making live
|
||
viruses available. A person without the skill to write
|
||
a brand new virus could nonetheless produce a variation
|
||
on an existing one . . . If sufficiently mutated, the
|
||
virus might slip past anti-virus programs designed to
|
||
look for known products."
|
||
|
||
This presumes that most virus-writers, would-be virus-writers and
|
||
"Coke-bottle glasses-variety sociopaths" have little access to source
|
||
code. This is not even close to being true. Virus source code is now
|
||
commonplace on professional, semi-professional and amateur BBS's run
|
||
by every stripe of user across the country. In fact, it is almost as
|
||
common as pirated software and pornography in some locales.
|
||
Surprisingly, the higher quality virus disassemblies stocked on such
|
||
BBS's are often the handiwork of anti-virus researchers and software
|
||
developers. Strangely, this has never been reported by a mainstream
|
||
newsman, perhaps because "designated experts" often come from the same
|
||
pool of researchers and developers.
|
||
|
||
". . . some computer professionals minimize the risk, saying
|
||
the software on [AIS] was acquired through the computer
|
||
underground in the first place, and thus has always been
|
||
available to miscreants with sufficient contacts, tenacity and
|
||
skill."
|
||
|
||
This is a particularly nasty one because its presented as
|
||
justification by those attacked and seems true. It's not. It
|
||
requires NO tenacity or particular skill to get hundreds of viruses
|
||
and assorted source code listings. Unlike the stunt of hacking a
|
||
mainframe from a dial-up, which often requires great patience, a
|
||
brute-force approach or some technical skill as substitute, from
|
||
teenagers to middle-age men, anyone with a PC and a modem can dig up a
|
||
BBS devoted to virus code in almost no time. Yes, they are that
|
||
common.
|
||
|
||
Why should this be? Where have all those live viruses come from?
|
||
Paradoxically, many of the virus files on these BBS's bear the
|
||
electronic mark of software developers like Certus International, S&S
|
||
International and security organizations such as the National Computer
|
||
Security Association. Damn. How DO "relative amateurs" get ahold of
|
||
those samples? Of course, they could all be forgeries, the work of
|
||
some dangerous psychopath. Yeah, right.
|
||
|
||
In any case, the only people who can't access the hacker files anymore
|
||
are the security people. And the real story may boil down to what I
|
||
call the "You dunno this information, it's too dangerous and and you
|
||
don't have any business knowing about viruses and hacker files so
|
||
leave it to us anonymous security experts and anti-virus researchers
|
||
because we're here to serve and protect and we'll take care of all
|
||
that stuff, thank you" explanation. It is the very essence of
|
||
professional arrogance and hubris, in my estimation.
|
||
|
||
There is, obviously, much more which should have been addressed by the
|
||
mainstream media. Why hasn't it, then? Because it's not as sexy a
|
||
story as the visceral blurt of noble civil servant whistleblowers
|
||
bringing down a renegade government security BBS pursuing new ways to
|
||
pervert the public trust out on the rim of cyberspace. And it would
|
||
take time; it's a story that couldn't be researched and rushed into
|
||
print in a week. It's complex, you see, and would be a great deal
|
||
longer than the piece which ran in America's finest newspaper, The
|
||
Washington Post. So maybe we should all forget about fairness,
|
||
because if it can't get into print at The Post, where will it?
|
||
|
||
I hope Kim can continue her fine work and I'm angry at the stupid
|
||
treatment this controversy has received at the hands of the newsmedia,
|
||
so I'm writing to you about it because if I don't, I just might have
|
||
to scream.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 9 July 1993 23:11:17 CDT
|
||
From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 6--Media, Anti-virus personnel, Ethics, and AIS
|
||
|
||
There are no winners in the AIS BBS incident. The sysop, considered an
|
||
exceptionally professional and helpful security specialist, is known
|
||
for attempting to bridge barriers between competing groups, such as
|
||
law enforcement and "hackers," in the belief that one way to reduce
|
||
abuses by all sides is through education. The anonymous poster(s) won
|
||
a short-term victory in that the "underground" files were removed from
|
||
the board. Peter Hollenbeck, Department of Treasury spokesperson for
|
||
the incident, indicated that there were no plans to take the board
|
||
down. However, he explained that after a review of the board's
|
||
mission, it was decided that "underground" files, which included Cu
|
||
Digest, would be removed. As of 11 July, AIS was still functioning,
|
||
and the following log-in screen appeared:
|
||
|
||
+++ begin login screen +++
|
||
|
||
|
||
immmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm<
|
||
> U.S. Department of the Treasury >
|
||
mmmmmmmmmm9 Bureau of the Public Debt lmmmmmmmmmm
|
||
> Office of Automated Information Systems >
|
||
mmmmmmmmmm9 A.I.S. Security Branch lmmmmmmmmmm
|
||
> On-Line Information System >
|
||
mmmmmmmmmm9 (call 304-480-6083 after 6/21/93) lmmmmmmmmmm
|
||
hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm#
|
||
|
||
We recently reviewed the information posted on this bulletin board. As a
|
||
result of this review we have decided to remove the "underground" files and
|
||
will not post similar information in the future.
|
||
|
||
We concluded that making this type of information available through this
|
||
facility is not in the best interest of the Bureau of the Public Debt.
|
||
|
||
+++ end login screen +++
|
||
|
||
Should the AIS BBS have made available to the public so-called
|
||
"underground" files that included virus source code? Persuasive
|
||
arguments can be made on both sides. My intent here isn't to recreate
|
||
those arguments, but to briefly examine the process by which the
|
||
incident evolved. Here are a few points overlooked by the media and
|
||
others.
|
||
|
||
First, according to CuD sources, attacks on the AIS BBS began as early
|
||
as March, 1993, at the IEEE Computer Security seminar in New York
|
||
City. One vocal participant, believed by many to be one of the
|
||
anonymous Risks Digest posters, encouraged his listeners to "do
|
||
something" about AIS BBS. The tandem "anonymous" posts were less than
|
||
honest to the extent that, according to one AIS BBS user who did
|
||
periodic log captures, the name of at least one of the posters, Paul
|
||
Ferguson, had been listed in user files well before the anonymous
|
||
post. Assuming that the "Paul Ferguson" on AIS BBS and the Paul
|
||
Ferguson of the anonymous post are the same, the cryptic posturing of
|
||
the anonymous Risks posts would seem dramatically deceptive. The
|
||
feigned ignorance about aspects of the BBS, the professed fear of
|
||
"retaliation," and the vengeful (and anonymous) call for punitive
|
||
sanctions against the sysop seem more in line with an intentionally
|
||
planned assault than with an ethical attempt to raise issues and
|
||
generate debate.
|
||
|
||
No doubt that Paul Ferguson is sincere in his concerns about the
|
||
"ethics" of making certain types of files available on a government
|
||
BBS. However, it should also be noted that Paul Ferguson may stretch
|
||
the ethical boundaries of truth when it suits him. For example, CuD
|
||
has been informed that a letter over the sig of "Paul Ferguson" in
|
||
which "reply" reached the same Paul Ferguson who acknowledged writing
|
||
the anonymous Risks post, appeared to misrepresent himself in
|
||
attempting to solicit information from a government employee. To
|
||
establish credibility, he allegedly claimed to be working with the EFF
|
||
and CPSR on issues that affect the computer and networking public at
|
||
large. CuD contacted officials in both organizations, and the
|
||
responses ranged form "we don't know him" to "it's news to us."
|
||
Anonymous postings calling for retributive sanctions and seemlying false
|
||
misrepresentation of affiliations do not generally give one
|
||
credibility.
|
||
|
||
A Fidonet reader forwarded a post that we find interesting. In a FIDO
|
||
Virus_Info post under Paul Ferguson's header, the following appeared
|
||
in response to a CRYPT NEWSLETTER article:
|
||
|
||
Date: 12:38 pm Sun Jun 27, 1993 Number : 408 of 418 From:
|
||
Paul Ferguson Base : FIDO - VIRUS_INFO To :
|
||
All Refer #: None Subj: AIS debate
|
||
(part 1) Replies: None Stat: Sent
|
||
Origin : 26 Jun 93 00:45:00
|
||
|
||
Mr. Corey Tucker sent an "advance" copy article written by George
|
||
Smith (aka Urnst Kouch) which implied several items which were
|
||
conjectured and seemingly allusions. I posted a prior response,
|
||
but additionally, I'd like to post an article also written by
|
||
Kouch which outlines Clancy in the CRYPT newsletter #13, in which
|
||
more altruistic mentalities are discussed. I believe this is
|
||
valid; it reflects the entirety in which this whole fiasco
|
||
existed.
|
||
|
||
Additionally, I am also posting the Washington Post article, in
|
||
its entirety, for information purposes.
|
||
|
||
If the truth be known, Mr. Smith did the most damage to Kim
|
||
Clancy's underground organiztion (and BBS) than anyone who maay
|
||
have followed, by the publication of this very article.
|
||
|
||
No need to call this number, it ain't there anymore. Not only did
|
||
Mr. Smith (Kouch) nail Clancy's coffin, he enabled others to do
|
||
so on his behalf.
|
||
|
||
Several questions arise, including the following:
|
||
|
||
First, what is the "underground organization" that Kim Clancy
|
||
allegedly "has"? From law enforcement indictments, search/seizure
|
||
affidavits and warrants, and press releases that we have seen in the
|
||
past, such a phrase could, for the clueless, constitute felonious
|
||
conspiracy. This is neither neutral nor innocent wording. It is the
|
||
type of irresponsible accusation that (as we've seen from media
|
||
accounts such as the Washington Post or Rep. Markey's letter to
|
||
Secretary Bentsen) assumes a reality of its own. Is Paul Ferguson
|
||
suggesting, as the post implies, that Kim Clancy runs an "underground"
|
||
organization? Does Paul Ferguson actually believe that Kim Clancy is
|
||
involved with illegal activity? Judging from his anonymous post, he
|
||
actually so-believes. If so, perhaps he could present evidence of
|
||
illegal activity or "underground" leadership as he implies. If he
|
||
cannot, then he owes Kim Clancy a public apology for subjecting her to
|
||
the type of innuendo that has tarnished the reputation and threatened
|
||
the career of a dedicated civil servant.
|
||
|
||
Second, Paul Ferguson strongly suggests that the board is no longer in
|
||
service. Consider this wording:
|
||
|
||
No need to call this number, it ain't there anymore. Not only did
|
||
Mr. Smith (Kouch) nail Clancy's coffin, he enabled others to do
|
||
so on his behalf.
|
||
|
||
Let's keep some facts straight. "Mr. Smith (Kouch)" did *not* "nail
|
||
Clancy's coffin." Paul Ferguson and his friends did with anonymous
|
||
inflammatory posts and with other posts that irresponsibly suggest
|
||
illegal and "underground" activity. Contrary to Paul Ferguson's
|
||
claim, the board remains operative. Notices, announcements, and other
|
||
information sources over the past few months alerted callers to the
|
||
Parkersburg Bureau of Public Debt offices that the old prefix would
|
||
be changed to "480." One CuD informant indicated that Ferguson knew of
|
||
this change prior to the date listed on the above post. If so, the
|
||
wording of the passage cited above is duplicitous. If Paul Ferguson
|
||
did not know of the change, then his professed knowledge of AIS BBS is
|
||
less than credible.
|
||
|
||
Now, let's examine the Washington Post article (June 19, P. 1) that
|
||
covered the story. Joel Garreau, the author, is reputable and has
|
||
established his credentials as a fair journalist. We have no doubt
|
||
that he tried to present a balanced view of what he considered a
|
||
newsworthy story. However, there are several troubling aspects of the
|
||
story.
|
||
|
||
The story begins:
|
||
|
||
*Treasury* Told Computer Virus Secrets Whistleblowers Halted
|
||
Display Available to Anyone With a Modem.
|
||
|
||
The Washington Post, June 19, 1993, FINAL Edition
|
||
By: Joel Garreau, Washington Post Staff Writer
|
||
Section: A SECTION, p. a01
|
||
|
||
For more than a year, computer virus programs that can
|
||
wreak havoc with computer systems throughout the world
|
||
were made available by a U.S. government agency to
|
||
anyone with a home computer and a modem, officials
|
||
acknowledged this week.
|
||
|
||
At least 1,000 computer users called a Treasury
|
||
Department telephone number, spokesmen said, and had
|
||
access to the virus codes by tapping into the department's
|
||
Automated Information System bulletin board before it was
|
||
muzzled last month.
|
||
|
||
The bulletin board, run by a security branch of the
|
||
Bureau of Public Debt in Parkersburg, W.Va., is aimed at
|
||
professionals whose job it is to combat such malicious
|
||
destroyers of computer files as "The Internet Worm,"
|
||
"Satan's Little Helper" and "Dark Avenger's Mutation
|
||
Engine." But nothing blocked anyone else from gaining access
|
||
to the information.
|
||
|
||
Let's look at just a few issues. First, there is considerable room for
|
||
legitimate disagreement over whether this is a newsworthy story.
|
||
However, if it is deemed newsworthy that one government agency
|
||
provides information that some see as "dangerous," then the same
|
||
standards of newsworthyness ought be applied to all other government
|
||
agencies that release "sensitive" information in a variety of
|
||
documents that is equally "dangerous." In fact, what the reporter
|
||
completely ignored in the story is the issue of accessibility to all
|
||
types of information. If we are going to "muzzle" a single information
|
||
source, then why not "muzzle" government-funded libraries as well?
|
||
Where does the "muzzling" line end? Who makes the decisions and by
|
||
what criteria?
|
||
|
||
Second, the story emphasizes the concerns of AIS critics and
|
||
despite interviews with persons who minimized the dangers and
|
||
significance of the AIS BBS files, the counter interpretation was
|
||
considerably downplayed.
|
||
|
||
Third, this was not a "whistleblowing" incident any more than would be
|
||
a similar incident when an irate member of the public complains
|
||
anonymously about the local public library carrying Playboy.
|
||
Framing it as such distorts events.
|
||
|
||
Fourth, and although minor but not insignificant, the wording of the
|
||
article is less than neutral. Exaggerating the "virus" dangers,
|
||
framing the incident as "whistleblowing," referring to "hacker tools"
|
||
without also explaining their relatively innocuous nature and public
|
||
availability of these specific "tools," and other rhetorical ploys
|
||
seemed to pander to public virus hysteria. Further, although a small
|
||
point, it is not insignificant that a major quote was wrong. The
|
||
anonymous post in the Post article was reprinted as follows:
|
||
|
||
"I am dismayed that this type of activity
|
||
is being condoned by an American governmental
|
||
agency. I am extremely disturbed by the thought that
|
||
my tax money is being used for what I consider
|
||
unethical, immoral and possibly illegal
|
||
activities...."
|
||
|
||
The original post read:
|
||
|
||
I am dismayed that this type of activity is being condoned
|
||
by an American Governmental Agency. I can only hope that
|
||
this operation is shut down and the responsible parties are
|
||
reprimanded. I am extremely disturbed by the thought that
|
||
my tax money is being used for, what I consider, unethical,
|
||
immoral and possibly illegal activities.
|
||
|
||
A seemingly minor alteration, but the elimination of the second
|
||
sentence (without an elide or other indication) that calls for
|
||
silencing and sanctions against the sysop omits a crucial bit of
|
||
information.
|
||
|
||
It's also worth noting that the story refers to CuD as The magazine
|
||
|
||
"...followed by those interested in the murky world of
|
||
"hackers, crackers and phone phreaks. It is edited by Jim
|
||
Thomas, of the sociology and criminal justice department of
|
||
Northern Illinois University."
|
||
|
||
This would be akin to saying that The Washington Post is the preferred
|
||
paper of drug kingpins interested in following the predatory exploits
|
||
of their competition....while perhaps true in some vague sense, it
|
||
conveys a grossly inaccurate image of both publications. CuD, as I
|
||
carefully explained to the reporter, is read by a conservatively
|
||
estimated readership of 80,000, most of whom are computer
|
||
professionals, journalists, attorneys, academics, law enforcement, and
|
||
others who are primarily interested in computer culture. CuD is read,
|
||
as near as I can determine, by those looking for news, book reviews,
|
||
conference information, research articles, debates, computer-related
|
||
legislation, and information on virtually *all* aspects of computer
|
||
culture. And, "Jim Thomas" and not simply "of" the sociology/criminal
|
||
justice department at NIU, but a full professor with a credible list
|
||
of books and articles on his vita, which I explicitly told the
|
||
reporter. I'm normally quite modest about such things. However, the
|
||
wording of the Post article is deceptively glib and irresponsibly
|
||
distorts both the editorial purpose and content of CuD and the
|
||
editor's status. This might sound picky. Sadly, we've seen the Post
|
||
article cited in Rep. Markey's letter to Treasury Secretary Bentsen,
|
||
and I'd hate to have some "whistleblower" come unglued thinking that
|
||
NIU is making hacker information (or worse) available to the public.
|
||
The story also errs (despite information the reporter was given) in
|
||
claiming that the AIS BBS revealed its number in CuD last November.
|
||
This is simply wrong. CuD possessed the number and contacted board
|
||
personnel for an interview. The interview was cleared through the
|
||
appropriate supervisors and spokespersons prior to publishing, and it
|
||
was *NOT* revealed at the initiative of AIS personnel as the story
|
||
claims. The reporter presumably had this information.
|
||
Another small error, but one recreated in Rep. Markey's letter to
|
||
Treasury Secretary Bentsen with a demand for accountability for the
|
||
act, which in fact did not occur.
|
||
|
||
These are not the only errors or problems with the story.
|
||
Individually, they are relatively minor. But, in the
|
||
aggregate, they create an inaccurate image of events and exaggerate
|
||
the significance of the "story." Because of the visibility of the
|
||
Post, the story became national news and was carried on, among other
|
||
outlets, CNN and the Associated Press wires. For some, appearance of
|
||
"facts" in national media are sufficient to verify accuracy, and
|
||
little attempt is made to dig below the surface. Although the Post
|
||
reporter was far more conscientious than most media folk, and although
|
||
he was sincere in his attempt to present a balanced story, the final
|
||
product was questionable. To my mind, this may say more about the
|
||
nature of media and the emphasis on a "sexy" slant and the appropriate
|
||
discourse for such a slant than on the abilities of the reporter, Joel
|
||
Garreau, for whom I have considerable personal and professional
|
||
respect.
|
||
|
||
A final point is worth noting. The Post article quotes the anonymous
|
||
risk poster (Paul Ferguson) early in the story. Then, in the paragraph
|
||
immediately following, it quotes Paul Ferguson to give credibility to
|
||
and elaborate on the anonymous post without mentioning that Paul
|
||
Ferguson was the anonymous poster. The reporter was told by voice and
|
||
by e-mail *prior* to the story that Ferguson and the anonymous poster
|
||
were the same. Yet, no mention was made, and the two quotes were
|
||
sequenced as if they were separate voices. Others can judge the
|
||
ethical implications of this for themselves.
|
||
|
||
Because of the Risks post and the Post story, the AIS BBS incident
|
||
has assumed a significance beyond any reasonable reality.
|
||
One writer of "cyberspace" fiction and non-fiction reportedly called
|
||
Kim Clancy the "Cyber Joan of Arc." It fits. Ms. Clancy is not a
|
||
politician, not a political activist, and not a trouble-making
|
||
bureaucrat. She is a sensitive, dedicated government official who
|
||
believes that sharing legal information and engaging in dialogue is
|
||
the best way to curtail computer abuse. Her "crime" was in
|
||
over-estimating the good-will of others and in assuming that her
|
||
critics preferred dialogue to mean-spirited action. This incident is
|
||
not one of a "victimized" class resisting the tyrany of a powerful
|
||
government official. Instead, it reflects a sad situation in which
|
||
some persons, both intentionally and inadvertently, combined to create
|
||
a nasty situation based on innuendo and misinformation to create a
|
||
drama in which there are only losers.
|
||
|
||
Sadly, I must make one final comment. It's said that some people,
|
||
angered at this affair, are planning to retaliate against those judged
|
||
responsible. This would be an ethically bankrupt response. Predatory
|
||
behavior decivilizes cyberspace just as it does the "real world." The
|
||
best response to cyber-conflict usually is to air disputes in public
|
||
and debate them aggressively and honestly. We need fewer, not more,
|
||
razorblades in the sand if we're to create a civilized environment.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.51
|
||
************************************
|
||
|
||
|