857 lines
42 KiB
Plaintext
857 lines
42 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Sep 26 1993 Volume 5 : Issue 75
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copie Editor: Etaoin Shrdlu, III
|
||
|
||
CONTENTS, #5.75 (Sep 26 1993)
|
||
File 1--THE ANARCHISTS AMONGST US: Is PBS One of *THEM?*
|
||
File 2--Elansky/Hartford BBS Update, 25 Sept '93
|
||
File 3--Raising the Issue of Copyright on the Nets
|
||
File 4--Ethics of reposting
|
||
File 5--Number of CuD Articles
|
||
File 6--CuD Posting Policies and Processes (A Response)
|
||
File 7--September 29 BBLISA meeting]
|
||
File 8--The State of Security of Cyberspace (SRI Research Summary)
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
UNITED STATES:
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
||
ftp.eff.org (192.88.144.4) in /pub/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Thu, 23 Sep 1993 14:18:00 -0400 (EDT)
|
||
From: soneill@NETAXS.COM
|
||
Subject: File 1--THE ANARCHISTS AMONGST US: Is PBS One of *THEM?*
|
||
|
||
Since, as far as anyone can tell, the crux of the Elansky case lies in
|
||
the "anarchy" file found on his BBS, the following information may be
|
||
of interest to the West Hartford prosecutor and judge in the case, and
|
||
may be of special interest to Elansky's defense lawyer.
|
||
|
||
Last week, on Sept. 15, to be exact, the local PBS outlet here in
|
||
Philadelphia showed a program called "Your Toxic Trash", narrated by
|
||
Ed Begley, Jr, and produced by station KERA of Dallas/Ft. Worth. The
|
||
theme of this program was how much of our trash is composed of
|
||
dangerous chemicals and how we should properly dispose of them. To
|
||
demonstrate how dangerous the accidental combination of substances
|
||
could be, the producers had a Professor of Chemistry at U.C. Berkeley,
|
||
Prof. William Lester, show what happens when you mix powdered pool
|
||
chlorine and brake fluid. The combination resulted in an immediate and
|
||
intense flame which reduced the pool chlorine to a charred black lump
|
||
in seconds. He also showed that when pool chlorine is mixed with an
|
||
ordinary soda, like Coca-Cola, free chlorine is released in great
|
||
quantity.
|
||
|
||
As I sat watching this, it occurred to me that anyone with an interest
|
||
in setting fire to things, or in poisoning people had just been given
|
||
the necessary information to do either or both. And this was done by
|
||
highly reputable people working for equally reputable organizations.
|
||
|
||
Therefore, if the law in West Hartford thinks that such information as
|
||
was found on Elansky's board is dangerous and should never be publicly
|
||
disseminated, what in the world are they going to make of "Your Toxic
|
||
Trash"? More important, this perfectly makes the point that whatever
|
||
was in the file is public knowledge, easily obtainable, in some cases,
|
||
from as unexpected a source as Public Television
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 25 Sep 93 15:58:21 CDT
|
||
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
Subject: File 2--Elansky/Hartford BBS Update, 25 Sept '93
|
||
|
||
There is little change on the status of Michael Elansky, the sysop of
|
||
a Hartford BBS arrested in August because of the contents of two
|
||
"Anarchy files" on his system (See CuD 5.69, 5.71). We are told that
|
||
nothing of substance occurred at his hearing on Thursday, Sept. 24:
|
||
|
||
1) As of Friday, Sept. 25, Elansky remained in jail, unable to
|
||
post $500,000 bond.
|
||
2) The hearing was postponed until early October
|
||
3) We have been told, but have NOT YET confirmed, that no motions
|
||
were filed by the defense at the hearing. This, we are told,
|
||
includes no motions for bail reduction.
|
||
|
||
In short, Elansky seems to be languishing in jail and little seems to
|
||
be done about. The case gets odder and odder.....
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 9 Sep 93 14:19:16 EDT
|
||
From: gray@ANTAIRE.COM(Gray Watson)
|
||
Subject: File 3--Raising the Issue of Copyright on the Nets
|
||
|
||
In CuD #5.70, File 2 ("Big time hacker from the small town"),
|
||
an article began:
|
||
|
||
>"POLICE NAB OBSCENE CALLER" by Bill Latimer (reprinted without asking)
|
||
^^^^^^^^^^^^^^^^^^^^^^^^
|
||
|
||
I don't think CUD should have allowed this. I send out a standard
|
||
message when I see such posts and it is applicable here:
|
||
|
||
>For your information, including a significant amount of text
|
||
>from copyright publications in posts is a breach of
|
||
>copyright law. The publishing industry will *never* adopt
|
||
>digital distribution if the net does not honor the copyright
|
||
>laws.
|
||
>
|
||
>If possible in the future, please try to contact the author
|
||
>and ask for a limited release of the document. If this is
|
||
>not unavailable, please consider posting a summary of the
|
||
>work instead.
|
||
|
||
If the legalities of an electronic issue are ill-defined then we must
|
||
look to the physical world as our guide. No publication, commercial,
|
||
non-profit, nor educational, republishes copyrighted works without
|
||
first gaining permission.
|
||
|
||
I believe that if we in cyberspace are ever going to achieve the same
|
||
rights as physical publishers, broadcasters, and speakers, we must
|
||
consider our electronic actions to actually _be_ the same as their
|
||
physical equivalents -- in terms of the legalities. If we don't think
|
||
twice about duplicated works that are copyrighted, then we are asking
|
||
for special treatment -- and with the obvious benefits come serious
|
||
detriments.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 24 Aug 1993 23:39:05 CDT
|
||
From: Eric Schnoebelen <eric@cirr.com>
|
||
Subject: File 4--Ethics of reposting
|
||
|
||
CuD #5.61, file 11, contained a message by William Reeder of Sun
|
||
Microsystems which was in reply to a message of mine, describing a
|
||
successful breaking and entering of the Sun internal network.
|
||
|
||
These messages were originally posted to a private list for system
|
||
managers in the Dallas/Ft Worth area, with the expectation of
|
||
confidentiality. Neither William Reeder or myself were consulted
|
||
before the message was sent to CuD by a third party.
|
||
|
||
Mr Reeder's message was posted in response to a comment of mine about
|
||
the happenings with texsun, a major UUCP hub in the Dallas/Ft Worth
|
||
region. texsun was/is operated by the SUN Central region as a
|
||
community service. The message was not intended to be distributed
|
||
outside the scope of the list. It was certainly not intended for
|
||
general distribution.
|
||
|
||
This reposting does bring to the foreground the ethics and issues of
|
||
reposting messages. I believe, and many on the list in question do as
|
||
well, that the list was private, or semi-private at worst, and that
|
||
the information on it is generally considered confidential. Most also
|
||
believe it was impolite to repost the message to another list, or
|
||
any other forum with out the consent of the author(s), William Reeder
|
||
and myself in this case.
|
||
|
||
The expectation of privacy on mailing lists is another issue that
|
||
arises from this. There are several forms of mailing lists on the
|
||
internet today. There are lists that can be joined by invitation
|
||
only, usually sponsored by an existing list member.
|
||
|
||
There are lists that are can only be joined by folks meeting a certain
|
||
set of criteria, such as being a female computer
|
||
scientist/researcher/developer, or being gay/bisexual.
|
||
|
||
There are lists which are well known in an (geographic or technical)
|
||
area, but are not well know out side of that area. Prospective new
|
||
list members are usually told about the list by current members, but
|
||
it up to the new folks to actually do something about subscribing.
|
||
Lists like this are frequently used for discussion and dissemination of
|
||
information amongst system managers, etc.
|
||
|
||
Then there are lists that are well know, and there are no restrictions
|
||
on membership. CuD is an example of such a list.
|
||
|
||
And beyond that, there are USENET newsgroups.
|
||
|
||
Of course, there are other types of lists as well.
|
||
|
||
The last two types, wide open lists, and USENET groups are pretty much
|
||
broadcast mediums, with corresponding expectations upon readership and
|
||
privacy.
|
||
|
||
The first three types of lists have a higher expectation of privacy
|
||
and confidentiality. People on these lists believe that what they say
|
||
will not be taken out of context, where perhaps it may cause problems
|
||
for the poster, or others. Reposting something from such a list,
|
||
without permission of the original poster is somewhat analogous to
|
||
submitting a personal letter from a third party to a news paper for
|
||
publication in the letters to the editor column.
|
||
|
||
It boils down to this: Just because something is easy to
|
||
re-distribute does not mean that it is ethical to do so. If we of
|
||
cyberspace cannot handle this responsibility with our own intellectual
|
||
property, it will be impossible to convince (non-cyber) institutions
|
||
that we can respect their copyrights and other intellectual property.
|
||
|
||
Another issue is that of copyright violation. Since the United States
|
||
adopted the Bern Convention Copyright Treaty in 1986 (I believe),
|
||
everything written is copyrighted from the moment it looks like text.
|
||
(aka, this message is implicitly copyright, 1993, Eric Schnoebelen)
|
||
Most of the rest of the developed nations have been a signer of the
|
||
Bern Convention longer than the US, so the same rules apply.
|
||
|
||
Solutions? Courtesy. Before reposting anything, it is polite to ask
|
||
the original author(s) if reposting is acceptable. The original author
|
||
may wish that his words not be redistributed, or at least may wish the
|
||
chance to edit them.
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 5 Sep 1993 06:59:57 -0800 (PDT)
|
||
From: ygoland@HURRICANE.SEAS.UCLA.EDU
|
||
Subject: File 5--Number of CuD Articles
|
||
|
||
I like CuD very much and have contributed to the overloading of your
|
||
mail programs by turning many people on to it. I'v even submitted
|
||
several news pieces that you later included in CuD. So please
|
||
understand my comments in context:I LIKE CuD.
|
||
|
||
When I first started reading CuD it was basically a 'news magazine' which
|
||
included many short articles on a variety of topics, occasional
|
||
'theme' issues, and some good editorial content. Lately I've noticed
|
||
that it's character is changing. It has gone from a pre-processed
|
||
information source to a news clipping service. Every time something of
|
||
interest happens it is immediately sent out to CuD (usually the
|
||
original document announcing the occurrence is just re-posted). This is
|
||
not necessarily bad, I never liked anyone volunteering their opinion
|
||
anyway. =) However I think if this is the trend that CuD is going to
|
||
follow that you might want to consider a different format for your
|
||
articles. Instead of sending them out why not put them on a gopher (or
|
||
better yet) WWW server? That way one can not only quickly get to
|
||
useful information but that information will stick around after the
|
||
article is autodeleted (I read CuD through usenet) a week or so after
|
||
it's posted. Using gopher or WWW formats is also much easier to deal
|
||
with than ftp.
|
||
|
||
I hope CuD decides to develop a split personality. I like having a
|
||
'human' going through the net and pulling out interesting information
|
||
but I also liked the articles, commentary, etc. that used to the
|
||
mainstay of CuD. And of course, being a big believer in putting your
|
||
money where your mouth is, I would be willing to help set up (i.e.
|
||
learn how to) and maintain (i.e. donate time) a gopher or WWW server.
|
||
|
||
Never the less CuD is doing a great job and is a definite must read
|
||
for anyone who wants to understand the legal aspects of the computer
|
||
world.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 23 Sep 1993 17:31:01 CDT
|
||
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 6--CuD Posting Policies and Processes (A Response)
|
||
|
||
Eric Schnoebelen, Yaron Goland, and Gray Watson provide us with the
|
||
opportunity to address several issues with which we constantly
|
||
grapple, often without successful resolution. Their concerns raise
|
||
issues of the rights, responsibilities, and other problems facing
|
||
electronic media. We have tried to frame our answers in three ways.
|
||
First, we attempt to address the concerns raised by Eric, Gray, and
|
||
Yaron. Second, we attempt to place them in a context that provides
|
||
insights into putting out CuD. Finally, we expand our responses to
|
||
include similar questions and concerns expressed by readers.
|
||
|
||
What follows may be excessively self indulgent for some, but we feel
|
||
it necessary in part to address some of the concerns raised, but also
|
||
to provide a clearer sense of the backstage CuD region.
|
||
|
||
RESPONSE TO GRAY
|
||
|
||
Gray observes that we re-published a lengthy news article without
|
||
permission and even included the original line indicating that
|
||
permission was not obtained. He finds this troubling. So do we.
|
||
|
||
We assume that readers have obtained permission to reprint articles
|
||
UNLESS OTHERWISE STATED. If it's clear that permission has not been
|
||
obtained, if the article warrants publishing, we will edit down to
|
||
fair-use limitations. Sometimes we judge it necessary to reprint an
|
||
entire article because either editing would distort the meaning,
|
||
or--when doing a media critique--the entire article is necessary to
|
||
avoid risk of seeming to take isolated quotes out of context.
|
||
Although "fair-use" remains ambiguously broad, CuD is in that category
|
||
of publications in which fair-use is flexible: We are non-profit and
|
||
educational. Despite the latitude, we do our best to err on the side
|
||
of caution.
|
||
|
||
In the case of the article that Gray cites, we simply goofed. The
|
||
article was in the "to-edit" pile, and somehow it simply slipped into
|
||
the "go" pile when the posts for the issue were assembled. Although
|
||
time and other constraints do not excuse us, we hope they at least
|
||
explain it, as we indicate below in our response to Yaron. Sometimes
|
||
mistakes happen, and while we're pleased that they seem to happen
|
||
relatively infrequently, we remain red-faced when they occur. For
|
||
this reason, we continually urge readers to do one of three things
|
||
when sending reprints: 1) Obtain permission for long articles (fair
|
||
use applies for short articles); or 2) Edit the article with a series
|
||
of quotes and summaries; or 3) Indicate that permission was *not*
|
||
obtained, and we will try to edit. Unfortunately, time is scarce, so
|
||
especially long pieces may not be printed. Nonetheless, all articles
|
||
are appreciated, because they keep us abreast of the news, and we add
|
||
them to our own files.
|
||
|
||
RESPONSE TO ERIC
|
||
|
||
Eric raises a few serious issues that, despite passionate debate on
|
||
all sides, remain unresolved. He notes that we ran a post from a
|
||
semi-private discussion list without first obtaining permission. We
|
||
resolved the case to which Eric alludes in private e-mail. The
|
||
persons directly affected were reasonable, understanding, and helpful.
|
||
We apologized privately, and we apologize again for any inconvenience
|
||
we may have caused them. We did not understand the context of the post
|
||
and assumed it was a public announcement. This was our
|
||
misunderstanding and *not* the fault of the person who sent the
|
||
original post to us or anybody else. But, this raises other issues.
|
||
|
||
1) CuD POLICY ON RE-PRINTING POSTS
|
||
|
||
When we intend to reprint a piece posted elsewhere, we try to assure
|
||
in writing that we have permission. Some frequent contributors provide
|
||
blanket permission. Others we write to obtain permission. Sometimes
|
||
we receive posts that are for our information and not to be reprinted.
|
||
However, we assume that any article that is obviously not personal
|
||
mail that does not indicate NOT FOR PUBLICATION is sent for
|
||
consideration. Generally, there are few slips, either by CuD or by
|
||
contributors. Sometimes there is a gray area. Sometimes what we or a
|
||
contributor find acceptable is not deemed so by original authors.
|
||
|
||
2) MAY PUBLIC POSTS BE REPRINTED WITHOUT PERMISSION?
|
||
|
||
Eric's concerns raise a fundamental question for electronic
|
||
communication. The status of public electronic posts remains unclear.
|
||
In our view, a public e-post is fair game in the same sense as a
|
||
public speech or other public behavior. We often receive relevant
|
||
informational posts cross-posted on Usenet newsgroups. In these cases,
|
||
we assume that wide distribution was intended by the original poster
|
||
and that reprint permission is assumed. If we receive articles that
|
||
include one or more posts from elsewhere, we assume that publication
|
||
of the enclosed comments are acceptable. It is simply impossible to
|
||
track down every poster or check every fact in articles. Nor do we
|
||
avoid publishing a piece that we judge to be proper simply because
|
||
somebody may criticize us for running it. But, we do our best to
|
||
follow Internet norms, and those norms generally hold that permissions
|
||
to reprint ought be obtained when possible.
|
||
|
||
There is another issue, however, one relevant especially for
|
||
researchers. Should PUBLIC posting areas be a research ground for
|
||
graduate students and others? Is it proper to use public posts in
|
||
research? Is it proper to do statistical analyses of public posts
|
||
without obtaining permission from those on the list? In our own view,
|
||
the nature of most research and the pre/proscriptions of professional
|
||
codes of ethics cover this: Research in public places is fully
|
||
permissible without notifying those being observed. Therefore,
|
||
counting flames on alt.feminism, or using snippets from a given
|
||
newsgroup to display social processes of, for example,
|
||
computer-mediated communication, is neither illegal nor unethical if
|
||
done in accordance with existing professional standards of conduct.
|
||
|
||
We take Eric's concerns sufficiently seriously that we intend to
|
||
address them soon in a future conference paper. We do not see any
|
||
easy answers, and certainly none likely to generate consensus. But, a
|
||
healthy debate helps clarify what's at stake and hopefully minimizes
|
||
abuse and increases responsibility, and Eric's comments are helpful
|
||
for this.
|
||
|
||
RESPONSE TO YARON
|
||
|
||
Yaron Goland is probably correct in noting the changes in CuD over
|
||
the years. We think there are several reasons for this:
|
||
|
||
1) The "cyberworld" has changed from our early days, and we reflect
|
||
the climate.
|
||
|
||
2) the basic issues that we addressed (eg, Sundevil, Bill Cook, etc)
|
||
have receded into the background, and the conflicts have generally
|
||
taken more genteel forms low on drama but high on import, such as
|
||
legislative lobbying for California's electronic access bill,
|
||
lobbying efforts opposing encryption control, or the backstage efforts
|
||
of groups such as CPSR or EFF that quietly file FOIA requests and
|
||
adapt slow-moving legal tactics.
|
||
|
||
3) Our readership has grown dramatically---our first issue had less
|
||
than 200 readers in March, 1990--all on a mailing list. Today, we
|
||
have over 80,000 from usenet, the mailing list, BBSes, public access
|
||
systems, ftp/etc, and the diversity means we try to match our articles
|
||
to the broader-based interests. We are not sure that this is good,
|
||
but on the other hand, we decided to let things just take their
|
||
course;
|
||
|
||
4) The readers themselves change---and their interests follow.
|
||
|
||
5) There are simply more issues and much more information available.
|
||
|
||
THE GENESIS OF CuD -- Maturity or Senility?
|
||
|
||
At the heart of Yaron's comment lies a broader issue: What are the
|
||
crucial issues affecting cyberspace and what is the best way to
|
||
disseminate information and encourage discussion amongst those who do
|
||
not have easy access to a forum to express their views? What is the
|
||
role of Cu Digest, RISKS, TELECOM Digest, and others in providing such
|
||
a forum? What obligations do such digests have to readers, and how can
|
||
editors or moderators assure that they reflect crucial issues and
|
||
diverse points of view without becoming a self-indulgent platform for
|
||
idiosyncratic opinions?
|
||
|
||
CuD has changed: Some have complimented (or criticized) us for
|
||
"mellowing out" and refining (or dulling) the gadfly edge. The
|
||
observation does have some merit. CuD originated as a temporary
|
||
mailing list to handle posts related to the Phrack and Len Rose cases
|
||
and to generate related discussion that TELECOM Digest could not
|
||
publish. As a consequence, the CuD editors had no long-range goals
|
||
or unifying vision. The early style of posters and editors reflected
|
||
passion and urgency--not always wisely expressed in the immediacy and
|
||
heat of the moment--to rectify perceived injustice. We saw little
|
||
reason at the time for caution, because we did not believe we would be
|
||
pursuing the issues for very long. Then came Sun Devil and a new
|
||
round of discussions. Chip Rosenthal's initiative in making CuD a
|
||
Usenet group expanded the readership, Bob Krause set up a mail
|
||
archive, Brendan Kehoe set up the ftp archives, and we became
|
||
"establishment." With the expanded sites and growing readership, we
|
||
were no longer speaking to a small audience, but to a group with
|
||
dramatic diversity in perspectives, interests, and background. The
|
||
posters comments and articles reflected this diversity, and we try to
|
||
reflect it in the posts we publish.
|
||
|
||
Both CuD editors are academics at heart, so the tenor of the posts
|
||
perhaps over-represents conferences, reviews, research, and other
|
||
material of fairly specialized interest. On the other hand, the
|
||
overwhelming bulk of CuDs Net readers come from academia as scholars,
|
||
programmers, or students, or from an areas sharing similar interests
|
||
(media personnel, attorneys). BBS readers, by contrast, are more
|
||
varied, and from them we often receive suggestions to expand the range
|
||
of articles even further to cover the BBS world more thoroughly.
|
||
|
||
Unfortunately, putting out CuD is time consuming. We say this without
|
||
complaint, and note it as a simple fact of life that significantly
|
||
shapes what we do. Managing the mailing list, writing our own
|
||
comments, formatting posts, responding to considerable mail, digging
|
||
up any information for news notes that we ourselves write, trying to
|
||
edit news stories to fit within "fair use" restrictions, and other
|
||
small tasks take, in the aggregate, on average of 25-30 hours a week.
|
||
Both editors have "real jobs" unrelated to CuD that require at least
|
||
50 hours a week. With no resources, no staff, and no other incentive
|
||
than a naive passion for information, we often cannot put the effort
|
||
into obtaining, writing, or editing news that we would like.
|
||
Sometimes we goof, as Gray and Eric noted above. On the other hand,
|
||
the initiative of readers in sending us information, of posters who
|
||
provide not-for-publication thought-provoking comments, and the
|
||
networking aspect of putting out a 'Zine is rewarding because of the
|
||
people we meet face-to-face and electronically and the intellectual
|
||
rewards that accrue.
|
||
|
||
Our intent here is not simply self-indulgence. Rather, by laying out
|
||
the genesis and structure of what happens behind the scenes, we hope
|
||
that readers will have a better understanding of the editorial
|
||
processes and, if they have suggestions for changes in direction or
|
||
content, make them within the context of these processes.
|
||
|
||
How are CuDs Put Out?
|
||
|
||
We're periodically asked how we put out an issue. It's rather simple:
|
||
1) posts arrive in our mailbox or by disk and we sort through them. We
|
||
do not run "Usenet" type posts in which a poster simply responds with
|
||
a few lines, but we do try to present any reasonable post that raises
|
||
issues or presents new information. We do not censor content, and we
|
||
occasionally ask posters to revise to clarify or elaborate on their
|
||
points. We're occasionally asked why we run a particular piece,
|
||
because it may seem offensive, unrelated to readers' interests, or
|
||
otherwise inappropriate. The answer is simple: We try to give
|
||
everybody a chance to speak, and diversity of ideas and perspectives
|
||
beats the opposite. 2) We select about 800 lines (40 K), give or take
|
||
10 percent. As a consequence, some posts might be delayed because of
|
||
space constraints and "fit." 3) We usually format to 70 characters per
|
||
line and edit the subject headers to try about 50 characters, and
|
||
remove sigs and control characters. 4) We assemble the articles, run a
|
||
spell check, and then add the "Administrivia" and index. 5) We sent
|
||
out three separate files: One to Usenet, one to the Central Michigan
|
||
U. listserv, and one to the bad addresses that the listserv can't
|
||
read. 6) We wait for the bounces, usually about 15 each issue, of
|
||
which about half are "anomalies" (full mailboxes, down systems) and
|
||
the rest are "user not known" or "unknown domain." After three
|
||
consecutive bounces, a user is notified of deletion from the mailing
|
||
list with an explanation and instructions for resubbing (assuming the
|
||
notification does not bounce, which they usually do).
|
||
|
||
We've tried the various suggestions and mini-programs that readers
|
||
have send over as a way of automating each issue, but the system from
|
||
which we work can't accommodate most of them, so we rely on primitive
|
||
batch files when possible. Deletions, subscriptions, and other tasks
|
||
are done semi-manually.
|
||
|
||
Gordon lives and works in the Chicago suburbs, and Jim lives about 60
|
||
miles west in DeKalb. They try to coordinate as much as possible by
|
||
e-mail and telephone. Imperfect, but it works.
|
||
|
||
So, for those who've asked in the past, now ya probably know more than
|
||
you ever wanted.
|
||
|
||
SOME SUGGESTIONS
|
||
|
||
Readers have suggested a variety of things CuD could do.
|
||
|
||
In an unpublished section of his post, Yaron urged that we set up a
|
||
gopher site. An interesting idea, and we're open to suggestions.
|
||
Yaron also suggested recruiting readers to perform certain tasks
|
||
on a regular basis. For example, we could add a book review editor,
|
||
a media commentator, somebody willing to conduct an interview
|
||
with newsworthy cyberfolk once every few months, or other tasks.
|
||
The suggestion of periodic special issues by guest editors is also
|
||
a possibility.
|
||
|
||
Other readers have suggested that we focus more on specific issues
|
||
(e.g., law, BBSes, research papers, interviews with newsworthy
|
||
cyberpersonalities). We like all of these ideas, but they are
|
||
time-consuming. We especially like the idea of interviews, but a
|
||
one-issue interview would require at least an hour of the interview
|
||
itself, about 3 hours for transcribing, and another hour of editing,
|
||
plus incidental time of set-up and other tasks. That's a day's work,
|
||
and time is scarce. Perhaps readers could conduct interviews on
|
||
occasion and send them over.
|
||
|
||
The suggestion of assembling issues into themes so they could be
|
||
discarded more easily if readers weren't interested in the theme is
|
||
tempting. For example, conference notices could be placed in one
|
||
issue, bibliographies in one issue, news blurbs in a single
|
||
issue--we'll consider it.
|
||
|
||
Expanding CuDs to three issues a week? Probably not wise. Two issues
|
||
seems about the limit of tolerance for most readers.
|
||
|
||
Then there are the mixed/contradictory suggestions: More writing by
|
||
CuD editors/Less writing by CuD editors; Some fiction and creative
|
||
writing/No fiction or fluff stuff; Don't stray so far from explicitly
|
||
cyber-issues/More straying; Don't be so leftist/Move to the right; Set
|
||
an example/challenge convention; Be more serious/Lighten up a
|
||
bit.......the list goes on. While we may appear unresponsive to
|
||
suggestions/criticisms, we actually do take most of them seriously.
|
||
|
||
All of this is a terribly verbose way of saying that, given the growth
|
||
of CuD, it's time to reassess what a CuD is. If you have ideas for
|
||
guidance in the coming year(s), let us know.
|
||
|
||
For those who have read this far and haven't been hit by the MEGO ("my
|
||
eyes glazeth over") effect, our intent has been to explain, *not*
|
||
justify, how and why errors occur, and to give a sense of what goes on
|
||
at this end of the screen. Hopefully, it will reduce some of the
|
||
misunderstandings that some media and law enforcement folk have about
|
||
CuD. It might also provide a few paragraphs for the occasional student
|
||
paper inquiry we receive. Most responses to "whither CuD" are "keep
|
||
up what you're doing," but we're open to suggestions and especially
|
||
receptive to articles of relevance.
|
||
|
||
Jim and Gordon
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 24 Sep 1993 15:18:56 -0700
|
||
From: Brendan Kehoe <brendan@LISA.CYGNUS.COM>
|
||
Subject: File 7--September 29 BBLISA meeting]
|
||
|
||
+------ Forwarded Message
|
||
From--etnibsd!vsh@uunet.uu.net
|
||
Message-Id--<9309242000.AA02698@grumpy>
|
||
Subject--September 29 BBLISA meeting
|
||
To--sage-announce@usenix.org, nneuug@coos.dartmouth.edu
|
||
Date--Fri, 24 Sep 93 16:00:56 EDT
|
||
|
||
[ apologies if this is a duplicate posting -- vsh ]
|
||
|
||
ANNOUNCEMENT
|
||
|
||
September 29 BBLISA meeting
|
||
|
||
Topic: Computer Crime
|
||
|
||
Jim Powers of the FBI and a prosecutor from the Attorney General's
|
||
office will be the speakers next Wednesday's Back Bay LISA meeting.
|
||
They will be addressing what you should be aware of when administering
|
||
your site, what we can do to protect ourselves, and what steps you
|
||
should take when you suspect your system is being wrongly used.
|
||
|
||
Date: Wed., Sept. 29, 7:30pm *[note the changed time]*
|
||
|
||
Where: MIT
|
||
Room 329
|
||
Building E51
|
||
70 Memorial Drive (entrance at corner of Wadworth and Amherst)
|
||
Cambridge, MA
|
||
|
||
Directions:
|
||
|
||
Car: For folks driving, follow Memorial Drive to Wadsworth St. which
|
||
will take you to the rear of the building. Entrance and parking are
|
||
at the rear.
|
||
|
||
T: Red Line Kendall Square stop. Head over to Au Bon Pain, take
|
||
a right onto Wadsworth St. E51 is at the corner of Wadsworth and
|
||
Amherst.
|
||
|
||
Back Bay LISA (BBLISA) holds monthly meetings, on the last Wednesday
|
||
of each month, except November and December. Meetings are usually at
|
||
a Boston-Metro location. Meetings feature a speaker, or a panel of
|
||
speakers, and time for announcements and group discussion. Topics
|
||
include all aspects of system administration (both large and small),
|
||
networking, security, privacy, etc.
|
||
|
||
Membership in the group is FREE. To become a member, join one of the
|
||
following mailing lists. You'll receive full details of forthcoming
|
||
meetings, locations, precise dates, etc.
|
||
|
||
BLISA information is distributed by email, only. To join the
|
||
announcement mailing list, send email to the list server at
|
||
%bblisa-announce-request@cs.umb.edu' with a text line of %subscribe'.
|
||
|
||
There is also a BBLISA discussion list. To join this list, send a
|
||
subscribe message to %bblisa-request@cs.umb.edu'. All announcement
|
||
messages are automatically relayed to this list, so you don't need to
|
||
join both.
|
||
|
||
+ --
|
||
Steve Harris - Eaton Corp. - Beverly, MA - etnibsd!vsh@uunet.uu.net
|
||
|
||
++++++- End of Forwarded Message
|
||
|
||
------------------------------
|
||
|
||
|
||
NEW HAVEN (AP)--A federal grand jury indicated a Redding (Conn)
|
||
man Wednesday, charging him with conspiring with others to import
|
||
child pornography into the United States, authorities said.
|
||
|
||
The four-count indictment charging John Looney, 51, is part of
|
||
"Operation Longarm," a U.S. Department of Justice and Customs Service
|
||
effort focusing on the use of computers to import pornographic
|
||
materials from Denmark. Search warrants have been issued in 15 states.
|
||
|
||
------------------------------
|
||
|
||
Date: 24 Sep 1993 11:26:49 -0800
|
||
From: "AJ Bate" <AJ_Bate@QM.SRI.COM>
|
||
Subject: File 8--The State of Security of Cyberspace (SRI Research Summary)
|
||
|
||
THE STATE OF SECURITY OF CYBERSPACE
|
||
|
||
A Summary of Recent Research
|
||
|
||
by
|
||
|
||
SRI International
|
||
|
||
June 1993
|
||
|
||
SRI International (SRI) conducted a worldwide study in 1992 of a
|
||
broad range of security issues in "cyberspace." In brief, cyberspace
|
||
comprises all public and private communications networks in the United
|
||
States and elsewhere, including telephone or public switched telephone
|
||
networks (PSTNs), packet data networks (PDNs) of various kinds, pure
|
||
computer networks, including the Internet, and wireless communications
|
||
systems, such as the cellular telephone system. We did not address
|
||
security vulnerabilities associated with classified, secure
|
||
communications networks used by and for governments, nor did we
|
||
explore toll fraud issues.
|
||
|
||
The study was conducted as part of our ongoing research into the
|
||
vulnerabilities of various software components of cyberspace. Our
|
||
approach was to conduct research through field interviews with a broad
|
||
range of experts, including people we characterize as "good hackers,"
|
||
into security issues and vulnerabilities of cyberspace and the
|
||
activities of the international "malicious hacker" community.
|
||
|
||
While the specific results of the study are proprietary to SRI, this
|
||
brief report summarizes our general conclusions for the many
|
||
individuals who kindly participated in our field interviews. As we
|
||
indicated during the interviews, the original research for this
|
||
project was not part of any other kind of investigation, and we have
|
||
not revealed the identity of any of our respondents.
|
||
|
||
The study aimed to understand "malicious hackers"-that is, people
|
||
who have and use the technical knowledge, capability, and motivation
|
||
to gain unauthorized access, for various reasons, to systems in
|
||
cyberspace. It is important to understand that by no means all
|
||
hackers are malicious, nor does most hacking involve unauthorized
|
||
access to cyberspace systems; indeed, only a small fraction of
|
||
computer hacking involves such activities but this fraction gives
|
||
hacking an otherwise undeserved bad reputation. While we intended to
|
||
focus on technical (software) vulnerabilities, our interviews led us
|
||
to look more at the broader motivations for, and different approaches
|
||
to, cracking into various networks and networked systems.
|
||
|
||
MAIN CONCLUSIONS
|
||
|
||
Our main conclusion is that social, organizational, and technological
|
||
factors still combine in ways that make much of cyberspace relatively
|
||
vulnerable to unauthorized access. The degree of vulnerability varies
|
||
from one type of communications system to another. In general, the
|
||
PSTN is the least vulnerable system, the PDNs are somewhat more
|
||
vulnerable than the PSTN, the Internet is relatively insecure, and as
|
||
is widely known, the cellular phone system is the most vulnerable of
|
||
the four major areas we addressed.
|
||
|
||
The main vulnerabilities in most communications networks involve
|
||
procedural, administrative, and human weaknesses, rather than purely
|
||
technical vulnerabilities of network management, control systems,
|
||
hardware, and software.
|
||
There are technical vulnerabilities-poor system design and specific
|
||
security flaws in software-but they are exploitable mainly because of
|
||
the above-cited problems.
|
||
|
||
Highlights of the study's conclusions include:
|
||
|
||
o Malicious attacks on most networks and networked systems cannot be
|
||
completely prevented, now or in the future. More than enough
|
||
information is publicly available to hackers and other technically
|
||
literate people to preclude attempts at prevention of intrusions.
|
||
|
||
o It is possible that individuals or groups could bring down
|
||
individual systems or related groups of systems, on purpose or by
|
||
accident. However, security is generally improving as a result of
|
||
dealing with past threats and challenges to system security. For
|
||
instance, responses to the most recent serious threat to the Internet,
|
||
the so-called Internet Worm in 1989, included improved security at
|
||
sites vulnerable to this type of worm.
|
||
|
||
o We found no evidence that the current generation of U.S. hackers is
|
||
attempting to sabotage entire networks. On the contrary, doing so is
|
||
inconsistent with the stated ethics and values of the hacker
|
||
community, which are to explore cyberspace as a purely intellectual
|
||
exercise without malicious intent or behavior. Some individuals who
|
||
operate outside this informal ethical framework, however, can and do
|
||
damage specific systems and occasionally use systems for personal gain
|
||
or vindictive activities.
|
||
|
||
o There is some evidence that the newest generations of hackers may be
|
||
motivated more by personal gain than by the traditional motive of
|
||
sheer curiosity. This development could mean that networks and
|
||
networked systems could become more likely targets for attacks by
|
||
hardened criminals or governments' intelligence services or their
|
||
contractors (i.e., employing malicious hackers). This threat does not
|
||
appear to be significant today but is a possible future scenario.
|
||
|
||
o The four major areas of vulnerability uncovered in our research have
|
||
little or nothing to do with specific software vulnerabilities per se.
|
||
They relate more to the ways in which hackers can gain critical
|
||
information they need in order to exploit vulnerabilities that exist
|
||
because of poor systems administration and maintenance, unpatched
|
||
"holes" in networks and systems, and so on.
|
||
|
||
- The susceptibility of employees of businesses, public organizations,
|
||
schools, and other institutions to "social engineering" techniques
|
||
|
||
- Lax physical and procedural controls
|
||
|
||
- The widespread availability of nonproprietary and of sensitive and
|
||
proprietary information on paper about networks and computer systems
|
||
|
||
- The existence of "moles," employees of communications and computer
|
||
firms and their suppliers who knowingly provide proprietary
|
||
information to hackers.
|
||
|
||
o The vulnerabilities caused by shortcomings in software-based access
|
||
controls and in hardware-related issues constitute significantly lower
|
||
levels of risk than do the four areas discussed above on more secure
|
||
networks such as the PSTN and PDNs. However, on the Internet and
|
||
similar systems, software-based access controls (for instance,
|
||
password systems) constitute significant problems because of often
|
||
poor system maintenance and other procedural flaws.
|
||
|
||
RECOMMENDATIONS
|
||
|
||
On the basis of our research, we recommend the following:
|
||
|
||
1. Protection of organizational information and communications assets
|
||
should be improved. Issues here range from those involving overall
|
||
security systems to training employees in, and informing customers of
|
||
the importance of, maintenance of security on individual systems,
|
||
handling and disposition of sensitive printed information, and dealing
|
||
with social engineering.
|
||
|
||
2. Techniques used to protect physical assets should be improved.
|
||
For example, doors and gates should be locked properly and sensitive
|
||
documents and equipment guarded appropriately.
|
||
|
||
3. Organizations and their employees should be made aware of the
|
||
existence of moles and their role in facilitating and enabling hacker
|
||
intrusions, and care should be taken in hiring and motivating
|
||
employees with the mole problem in mind.
|
||
|
||
4. Software- and hardware-based vulnerabilities should also be
|
||
addressed as a matter of course in systems design, installation, and
|
||
maintenance.
|
||
|
||
5. Organizations concerned with information and communications
|
||
security should proactively promote educational programs for students
|
||
and parents about appropriate computer and communications use,
|
||
personal integrity and ethics, and legitimate career opportunities in
|
||
the information industry; and they should reward exemplary skills,
|
||
proficiency, and achievements in programming and ethical hacking.
|
||
|
||
6. Laws against malicious hacking should be fairly and justly
|
||
enforced. SRI's believes that the results of this study will provide
|
||
useful information to both the operators and users of cyberspace,
|
||
including the hacker community. We plan to continue our research in
|
||
this area during 1993 within the same framework and conditions (i.e.,
|
||
anonymity of all individuals and organizations) as those that governed
|
||
the 1992 research. We invite hackers and others who are interested in
|
||
participating in this work through face-to-face, telephone, or e-mail
|
||
interviews to contact the following member of the SRI project team:
|
||
|
||
A. J. Bate SRI International
|
||
Phone:415 859 2206
|
||
Fax:415 859 3154
|
||
E-mail:aj@sri.com
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.75
|
||
************************************
|
||
|
||
|
||
|