921 lines
43 KiB
Plaintext
921 lines
43 KiB
Plaintext
Computer underground Digest Thu Mar 10, 1994 Volume 6 : Issue 23
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe (He's Baaaack)
|
|
Acting Archivist: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Copita Editor: Sheri O'Nothera
|
|
|
|
CONTENTS, #6.23 (Mar 10, 1994)
|
|
File 1--Time Magazine on Clipper
|
|
File 2--Some Thoughts on Clipper (by Jim Bidzos)
|
|
File 3--Dennings' Newsday piece is Convincing (Re CuD #6.20)
|
|
File 4--Re: Newsday Clipper Story (CuD 6.19)
|
|
File 5--Newsday's Encryption and Law Enforcement (Re: CuD 6.19)
|
|
File 6--DOS is not dead yet. . . .
|
|
File 7--Response to Frisk (Re CuD 6.19)
|
|
File 8--Re: "Hackers" Whack Harding (CuD 6.19)
|
|
File 9--"Porn Press Release" from EFF is a Hoax
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|
|
|
FTP: UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
nic.funet.fi
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Sun, 6 Mar 1994 14:13:18 -0500
|
|
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
|
Subject: File 1--Time Magazine on Clipper
|
|
|
|
Time Magazine, March 14, 1994
|
|
|
|
TECHNOLOGY
|
|
|
|
WHO SHOULD KEEP THE KEYS?
|
|
|
|
The U.S. government wants the power to tap into every phone, fax and
|
|
computer transmission
|
|
|
|
BY PHILIP ELMER-DEWITT
|
|
|
|
... (general background)
|
|
|
|
... (general info on techo advances)
|
|
|
|
|
|
Thus the stage was set for one of the most bizarre technology-policy
|
|
battles ever waged: the Clipper Chip war. Lined up on one side are the three-
|
|
letter cloak-and-dagger agencies -- the NSA, the CIA and the FBI -- and key
|
|
policymakers in the Clinton Administration (who are taking a surprisingly
|
|
hard line on the encryption issue). Opposing them is an equally unlikely
|
|
coalition of computer firms, civil libertarians, conservative columnists and
|
|
a strange breed of cryptoanarchists who call themselves the cypherpunks.
|
|
|
|
At the center is the Clipper Chip, a semiconductor device that the NSA
|
|
developed and wants installed in every telephone, computer modem and fax
|
|
machine. The chip combines a powerful encryption algorithm with a ''back
|
|
door'' -- the cryptographic equivalent of the master key that opens
|
|
schoolchildren's padlocks when they forget their combinations. A ''secure''
|
|
phone equipped with the chip could, with proper authorization, be cracked by
|
|
the government. Law-enforcement agencies say they need this capability to
|
|
keep tabs on drug runners, terrorists and spies. Critics denounce the Clipper
|
|
-- and a bill before Congress that would require phone companies to make it
|
|
easy to tap the new digital phones -- as Big Brotherly tools that will strip
|
|
citizens of whatever privacy they still have in the computer age.
|
|
|
|
|
|
In a Time/CNN poll of 1,000 Americans conducted last week by Yankelovich
|
|
Partners, two-thirds said it was more important to protect the privacy of
|
|
phone calls than to preserve the ability of police to conduct wiretaps. When
|
|
informed about the Clipper Chip, 80% said they opposed it.
|
|
|
|
|
|
|
|
The battle lines were first drawn last April, when the Administration
|
|
unveiled the Clipper plan and invited public comment. For nine months
|
|
opponents railed against the scheme's many flaws: criminals wouldn't use
|
|
phones equipped with the government's chip; foreign customers wouldn't buy
|
|
communications gear for which the U.S. held the keys; the system for giving
|
|
investigators access to the back-door master codes was open to abuse; there
|
|
was no guarantee that some clever hacker wouldn't steal the keys. But in the
|
|
end the Administration ignored the advice. In early February, after computer-
|
|
industry leaders had made it clear that they wanted to adopt their own
|
|
encryption standard, the Administration announced that it was putting the NSA
|
|
plan into effect. Government agencies will phase in use of Clipper technology
|
|
for all unclassified communications. Commercial use of the chip will be
|
|
voluntary -- for now.
|
|
|
|
It was tantamount to a declaration of war, not just to a small group of
|
|
crypto-activists but to all citizens who value their privacy, as well as to
|
|
telecommunications firms that sell their products abroad. Foreign customers
|
|
won't want equipment that U.S. spies can tap into, particularly since
|
|
powerful, uncompromised encryption is available overseas. ''Industry is
|
|
unanimous on this,'' says Jim Burger, a lobbyist for Apple Computer, one of
|
|
two dozen companies and trade groups opposing the Clipper. A petition
|
|
circulated on the Internet electronic network by Computer Professionals for
|
|
Social Responsibility gathered 45,000 signatures, and some activists are
|
|
planning to boycott companies that use the chips and thus, in effect, hand
|
|
over their encryption keys to the government. ''You can have my encryption
|
|
algorithm,'' said John Perry Barlow, co-founder of the Electronic Frontier
|
|
Foundation, ''when you pry my cold dead fingers from my private key.''
|
|
|
|
... (history of Public Key encryption).
|
|
|
|
|
|
... (history of PGP)
|
|
|
|
Rather than outlaw PGP and other such programs, a policy that would
|
|
probably be unconstitutional, the Administration is taking a marketing
|
|
approach. By using its purchasing power to lower the cost of Clipper
|
|
technology, and by vigilantly enforcing restrictions against overseas sales
|
|
of competing encryption systems, the government is trying to make it
|
|
difficult for any alternative schemes to become widespread. If Clipper
|
|
manages to establish itself as a market standard -- if, for example, it is
|
|
built into almost every telephone, modem and fax machine sold -- people who
|
|
buy a nonstandard system might find themselves with an untappable phone but
|
|
no one to call.
|
|
|
|
That's still a big if. Zimmermann is already working on a version of PGP
|
|
for voice communications that could compete directly with Clipper, and if it
|
|
finds a market, similar products are sure to follow. ''The crypto genie is
|
|
out of the bottle,'' says Steven Levy, who is writing a book about
|
|
encryption. If that's true, even the nsa may not have the power to put it
|
|
back.
|
|
|
|
Reported by David S. Jackson/San Francisco and Suneel Ratan/Washington
|
|
|
|
------------------------------
|
|
|
|
Date: Tue Mar 8 12:07:47 1994
|
|
>From jim@RSA.COM
|
|
Subject: File 2--Some Thoughts on Clipper (by Jim Bidzos)
|
|
|
|
SOME THOUGHTS ON CLIPPER, NSA, AND ONE KEY ESCROW ALTERNATIVE
|
|
|
|
In a recent editorial, Dr. Dorothy Denning of Georgtown University
|
|
argued in support of the U.S. government's proposed Clipper Chip, a
|
|
security device that would allow law enforcement to decipher the
|
|
communications of users of such devices.
|
|
|
|
Dr. Denning attempts to argue that Clipper is necessary for law
|
|
enforcement agencies to be able to do their job. I'm not going to
|
|
argue that one; there are plenty of people who can argue that
|
|
compromising privacy for all citizens in order to aid law enforcement
|
|
is a bad idea more effectively than I, particularly in the Clipper
|
|
case, where the arguments from law enforcement are dubious at best.
|
|
(The current justification is inadequate; there may be better reasons,
|
|
from a law enforcement perspective, but we haven't heard them yet.)
|
|
|
|
Without doubt, law enforcement and intelligence are huge stakeholders
|
|
in the debate over encryption. But every individual and corporation in
|
|
the U.S. must be included as well. Are NSA's actions really in the
|
|
best interests of all the stakeholders? Are there alternatives to the
|
|
current key escrow program?
|
|
|
|
If one steps back and looks at what has happened over the last few
|
|
years, one might well question the government's approach with Clipper,
|
|
if not its motivation, for dealing with this problem. (I believe it
|
|
may even be possible to conclude that Clipper is the visible portion
|
|
of a large-scale covert operation on U.S. soil by NSA, the National
|
|
Security Agency.) Over a number of years, through their subversion of
|
|
the Commerce Department (who should be championing the causes of U.S.
|
|
industry, not the intelligence agencies), NSA has managed to put many
|
|
U.S. government resources normally beyond their control, both legally
|
|
and practically, to work on their program of making U.S. and
|
|
international communications accessible.
|
|
|
|
The first step was the MOU (Memorandum of Understanding) between the
|
|
Commerce Department's National Institute of Standards and Technology
|
|
(NIST) and the Defense Department's NSA. This document appears to
|
|
contravene the provisions of the Computer Security Act of 1987, the
|
|
intent of which was to give NIST control over crypto standards-making
|
|
for the unclassified government and commercial sectors. The MOU
|
|
essentially gave NSA a veto over any proposals for crypto standards by
|
|
NIST.
|
|
|
|
By using the standards making authority of NIST, NSA is attempting to
|
|
force the entire U.S. government to purchase Clipper equipment since
|
|
only NIST-standard equipment may be purchased by government agencies.
|
|
This purchasing power can then be used to force U.S. manufacturers to
|
|
build Clipper products or risk losing government business. (GSA is
|
|
currently questioning NSA's authority to control government-wide
|
|
procurement, and should continue to do so.) This of course not only
|
|
subsidizes Clipper products, but could make Clipper a de facto
|
|
standard if the costs associated with alternatives are too high.
|
|
These costs to industry, of ignoring Clipper, come in the form of lost
|
|
government market share, costly support for multiple versions of
|
|
incompatible products, and non-exportability of non-Clipper products.
|
|
|
|
It also appears that NSA is desperately seeking a digital signature
|
|
standard that would force users to take that signature capability
|
|
wrapped up with a Clipper chip. If this is the case, as it appears to
|
|
be, then NSA has is trying to use what is probably the most powerful
|
|
business tool of the information age as a means to deny us its
|
|
benefits unless we subsidize and accept Clipper in the process. This
|
|
would, if true, be an unprecedented abuse of government power to
|
|
influence U.S. industry and control individual privacy. (Clipper is
|
|
part of a chip called Capstone, which is where their proposed digital
|
|
signature standard would be used.)
|
|
|
|
The overall cost of these policies is unknown. We only know that NSA
|
|
has spent a considerable amount of money on the program directly.
|
|
Other costs are not so obvious. They are:
|
|
|
|
- A burdened U.S. industry, which will have to build multiple products
|
|
or more expensive products that support multiple techniques;
|
|
|
|
- A low-intensity "trade war" with the rest of the world over
|
|
encryption;
|
|
|
|
- Lost sales to U.S. companies, since international buyers will surely
|
|
go to non-U.S. suppliers for non- Clipper encryption, as may buyers in
|
|
the U.S.;
|
|
|
|
- Potential abuses by government and loss of privacy for all citizens.
|
|
|
|
Does NSA truly believe they can displace other methods with Clipper?
|
|
With over three million licensed, documented RSA products, the
|
|
technology they feel threatened by, in use in the U.S. today? Not
|
|
likely; therefore, they have already decided that these costs are
|
|
acceptable even if they only delay the inevitable, and that U.S.
|
|
industry and U.S. taxpayers should bear these costs, whatever they
|
|
are. This policy was apparently developed by unelected people who
|
|
operate without oversight or accountability. Does the White House
|
|
really support this policy?
|
|
|
|
It has been reported that NSA is attempting to gain support from
|
|
foreign governments for escrow technology, especially if "local
|
|
control" is provided. Even if NSA can convince their sister
|
|
organizations around the world to support key escrow (by offering
|
|
Clipper technology with a do-your-own-escrow option), will these other
|
|
organizations succeed in selling it to their government, industry and
|
|
citizens? Most countries around the world have much stronger privacy
|
|
laws and a longer history of individual privacy than the U.S.
|
|
|
|
WHY AGAIN WHEN IT DIDN'T WORK THE FIRST TIME?
|
|
|
|
Many seem to have forgotten or are not aware that the Clipper program
|
|
is not new, and it's also not the first time NSA has attempted to
|
|
force communications security on U.S. industry that it could
|
|
compromise. In the mid-80's, NSA introduced a program called the
|
|
Commercial COMSEC Endorsement Program, or CCEP. CCEP was essentially
|
|
Clipper in a black box, since the technology was not sufficiently
|
|
advanced to build lower-cost chips. Vendors would join CCEP (with the
|
|
proper security clearances) and be authorized to incorporate
|
|
classified algorithms into communications systems. NSA had proposed
|
|
that they themselves would actually provide the keys to end-users of
|
|
such systems. The new twist is access by key escrow.
|
|
|
|
To see how little things have changed, consider this quote: "...RSA
|
|
Data Security, Inc. asserts that since CCEP-2 is not published and
|
|
therefore cannot be inspected by third parties, the NSA could put a
|
|
'trap door' in the algorithm that would enable the agency to inspect
|
|
information transmitted by the private sector. When contacted, NSA
|
|
representative Cynthia Beck said that it was the agency's policy not
|
|
to comment on such matters." That was in 1987. ("The Federal Snags in
|
|
Encryption Technology," Computer and Communications Decisions, July
|
|
1987, pp. 58-60.)
|
|
|
|
To understand NSA's thinking, and the danger of their policies,
|
|
consider the reply of a senior NSA official when he was asked by a
|
|
reporter for the Wall Street Journal if NSA, through the CCEP program,
|
|
could read anyone's communications: "Technically, if someone bought
|
|
our device and we made the keys and made a copy, sure we could listen
|
|
in. But we have better things to do with our time." (The Wall Street
|
|
Journal, March 28, 1988, page 1, column 1, "A Supersecret Agency Finds
|
|
Selling Secrecy to Others Isn't Easy," by Bob Davis.) Another NSA
|
|
official, in the same Journal story, said "The American Public has no
|
|
problem with relying on us to provide the technology that prevents the
|
|
unauthorized launch of nuclear weapons. If you trust us to protect
|
|
against that, you can trust us to protect private records." Remember
|
|
that the Cold War was still on at that time.
|
|
|
|
Law enforcement and intelligence gathering are certainly impeded by
|
|
the use of cryptography. There are certainly legitimate concerns that
|
|
these interests have. But is the current approach really the way to
|
|
gain support from industry and the public? People with a strong
|
|
military and intelligence bias are making all the decisions. There
|
|
seem to be better ways to strike a balance.
|
|
|
|
AN ALTERNATIVE PROPOSAL
|
|
|
|
One approach would be to have NIST develop a standard with three
|
|
levels. The first level could specify the use of public-key for key
|
|
management and signatures without any key escrow. There could be a
|
|
"Level II" compliance that adds government key escrow to message
|
|
preparation. "Level III" could be key escrow controlled by the user,
|
|
typically a corporation. Would this work? The first level, meeting
|
|
the standard by itself, would back up the government's claim that key
|
|
escrow is voluntary; if I want privacy and authentication without key
|
|
escrow, then I can have it, as the government has claimed I can.
|
|
Actions speak louder than words.
|
|
|
|
Why would any vendors support Level II? There would be several
|
|
reasons. They would find a market in the government, since the
|
|
government should purchase only Level II products. (I would certainly
|
|
like our public servants to use key escrow, just as I want work
|
|
product paid for by my corporation to be accessible. Of course, anyone
|
|
can buy Level I products for home and personal use.) So the
|
|
government can still influence the private sector by buying only
|
|
products that include Level II compliance. Also, Level II products
|
|
would be decontrolled for export. This way the market can decide;
|
|
vendors will do what their customers tell them to. This satisifies
|
|
the obvious desire on the part of the government to influence what
|
|
happens with their purchasing power.
|
|
|
|
Level III would allow any user to insert escrow keys they control into
|
|
the process. (Level II would not be a prerequisite to Level III.) My
|
|
company may want key escrow; I, as an individual, may want to escrow
|
|
my keys with my attorney or family members; a standard supporting
|
|
these funtions would be useful. I don't necessarily want or need the
|
|
government involved.
|
|
|
|
NIST already knows how to write a FIPS that describes software and
|
|
hardware implementations, and to certify that implementations are
|
|
correct.
|
|
|
|
This approach cetainly isn't perfect, but if the administration really
|
|
believes what it says and means it, then I submit that this is an
|
|
improvement over a single key escrow FIPS foisted on everyone by NSA,
|
|
and would stand a much better chance of striking a workable balance
|
|
between the needs of the government and the right of individuals to
|
|
privacy. Therefore, it RISKS much less than the current plan.
|
|
|
|
The real problem with the way NSA works is that we don't find out what
|
|
they're really doing and planning for decades, even when they're
|
|
wrong. What if they are?
|
|
|
|
In the 60's and 70's, the CIA was out of control, and the Congress,
|
|
after extensive hearings that detailed some of the abuses of power by
|
|
the CIA, finally moved to force more accountability and oversight. In
|
|
the 80's and 90's, NSA's activities should be equally scrutinized by a
|
|
concerned Congress.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 3 Mar 1994 11:59:00 GMT
|
|
From: chris.hind@MAVERICKBBS.COM(Chris Hind)
|
|
Subject: File 3--Dennings' Newsday piece is Convincing (Re CuD #6.20)
|
|
|
|
I dunno, but I think the Encryption and Law Enforcement letter by
|
|
Dorothy Denning has convinced me that the Clipper Chip is safe.
|
|
Multiple people hold the keys to tapping the line and it has the
|
|
strongest encryption method created so far. I believed CUD earlier
|
|
that it was bad for the US, but now I see its advantages as long as
|
|
they don't outlaw other forms of encryption its okay with me. I mean,
|
|
its not like Big Brother can't tap into our line right now with us
|
|
knowing it! This technology isn't really new, its just a bit more
|
|
sophisticated and thats what scares us. Please tell me if I'm wrong!
|
|
As well as encryption, the clipper chip should also be modified to
|
|
give superior compression so more information can be sent over the
|
|
lines and during disaster they wouldn't be down. And as for the
|
|
Digital Telephony Bill, simple PGP encryption will scramble data
|
|
beyond recognition since it uses powerful public-key encryption. Sure,
|
|
this security might catch some, but some criminals they'll never be
|
|
able to catch anyways since they'll have the money to pay for even
|
|
more powerful encryption. I usually don't change my opinions easily so
|
|
it makes me wonder how many other people on the net have changed their
|
|
opinions also.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 28 Feb 1994 13:25:25 -0500 (EST)
|
|
From: The Advocate <cudigest@mindvox.phantom.com>
|
|
Subject: File 4--Re: Newsday Clipper Story (CuD 6.19)
|
|
|
|
> Newsday, Tuesday, February 22, 1994, Viewpoints
|
|
> The Clipper Chip Will Block Crime
|
|
> By Dorothy E. Denning
|
|
|
|
Before We go any further, let your old friend the Advocate join the
|
|
greek chorus, of people singing their personal respect and admiration
|
|
for Dr Denning. Her work in the Neidorf case was without par and her
|
|
commitment to issues in Cyberspace are intellectually rigorous and
|
|
passionate. It thus doubly pains me when such an old and respected
|
|
friend seems to have gone astray.
|
|
|
|
|
|
> Hidden among the discussions of the information highway is a fierce
|
|
> debate, with huge implications for everyone. It centers on a tiny
|
|
> computer chip called the Clipper, which uses sophisticated coding to
|
|
> scramble electronic communications transmitted through the phone
|
|
> system.
|
|
|
|
Just like other systems already in use for military and government
|
|
or commercial transactions.
|
|
|
|
>
|
|
> The Clinton administration has adopted the chip, which would allow
|
|
> law enforcement agencies with court warrants to read the Clipper codes
|
|
> and eavesdrop on terrorists and criminals. But opponents say that, if
|
|
|
|
or agencies with corrupt motives to spy on virtually every transaction
|
|
telephonic or datic that moves on the information highway.
|
|
|
|
future expansion of network systems will allow easy access to virtually
|
|
all data, without regard, and with intrusion, without detection.
|
|
|
|
> this happens, the privacy of law-abiding individuals will be a risk.
|
|
individuals and corporations.
|
|
|
|
> They want people to be able to use their own scramblers, which the
|
|
> government would not be able to decode.
|
|
|
|
WOuld not be able to decode? no, would not be able to decode without
|
|
spending some money. Dr Denning forgets that we spend an estimated
|
|
$27 Billion dollars per year on the NSA, an agency devoted entirely
|
|
to signals interception, decryption and analysis. THis same agency
|
|
has been involved in the Clipper developement and has refused to make
|
|
any of it's files available and has instead crowded the field with
|
|
classified segments.
|
|
|
|
> If the opponents get their way, however, all communications on the
|
|
> information highway would be immune from lawful interception. In a
|
|
|
|
Hardly. It merely means that interception would require either
|
|
more detailed de-crpyption efforts or attack at sources of
|
|
transmission or reception.
|
|
|
|
These same complaints are repackaged complaints about miranda rights,
|
|
the exclusionary rule and every other legal reform of this century.
|
|
|
|
> world threatened by international organized crime, terrorism, and rogue
|
|
> governments, this would be folly. In testimony before Congress, Donald
|
|
|
|
International organised crime? you mean like the Mafia, whom the
|
|
CIA helped set up? and who work routinely as government agents?
|
|
|
|
Terrorism? in this country of 250 million people less the 15 people
|
|
per year die on average from terrorist activities. considering
|
|
50,000 americans die every year on the roads, someone needs to get
|
|
their priorities re-aligned.
|
|
|
|
Rogue governments? like the libyans, or Iraq and iran? how will clipper
|
|
harm a foreign government? not to mention these countries are all
|
|
paper tigers. the last time we dealt with traq, i seem to recall
|
|
we waxed their army without breaking a sweat. i am not worried.
|
|
|
|
> Delaney, senior investigator with the New York State Police, warned
|
|
> that if we adopted an encoding standard that did not permit lawful
|
|
> intercepts, we would have havoc in the United States.
|
|
|
|
But don forgets that his standard allows un-lawful intercepts.
|
|
|
|
lets look at this word havoc. that means a state of chaos or confusion.
|
|
If i go to anacostia on a friday night, i would say havoc exists. if i
|
|
go into a DC school by day, i could say havoc exists. when LA burned
|
|
last year havoc ran rampant, and certainly this had little to do
|
|
with the lack of a proper data encryption standard. The operation
|
|
of the polis has little to do with the effectiveness of our secret
|
|
police.
|
|
|
|
>
|
|
> Moreover, the Clipper coding offers safeguards against casual
|
|
> government intrusion. It requires that one of the two components of
|
|
|
|
Not neccesarily. Although Dr denning and a team of independent
|
|
scientists reviewed the clipper standard, they are not specialists
|
|
in code breaking. I do not know how immune clipper is to corruption
|
|
once partial knowledge is attained. knowledge of header blocks,
|
|
and access to partial keys and key fragments may make closure of
|
|
the cryptic circle a simpler proposition then her analysis indicated.
|
|
|
|
> a key embedded in the chip be kept with the Treasury Department and the
|
|
|
|
The dept that brought us the Secret service and the ATF? i don't think
|
|
so.
|
|
|
|
> other component with the Commerce Department's National Institute of
|
|
> Standards and Technology. Any law enforcement official wanting to
|
|
|
|
who work hand in glove with the NSA?
|
|
she forgets a single compromised official may be able to subvert
|
|
the entire system as mr Ames so easily demonstrated last week.
|
|
|
|
> wiretap would need to obtain not only a warrant but the separate
|
|
> components from the two agencies. This, plus the superstrong code and
|
|
> key system would make it virtually impossible for anyone, even corrupt
|
|
> government officials, to spy illegally.
|
|
|
|
I think this is optimism in action.
|
|
|
|
> But would terrorists use Clipper? The Justice Department has
|
|
would Clipper stop terrorism? Seriously can anyone guarantee
|
|
that this technology will end terrorism? will clipper end
|
|
drug trafficking?
|
|
|
|
> their calls with their own code systems. But then who would have
|
|
> thought that the World Trade Center bombers would have been stupid
|
|
> enough to return a truck that they had rented?
|
|
|
|
Considering the people who bomber the world trade center were keystone
|
|
terrorists, i would hardly hold them up as examples.
|
|
|
|
I would look at people like Carlos the Jackal, THe Red Army,
|
|
Black September, Islamic Jihad, etc...
|
|
These are highly sophisticated, well trained killers, and far more
|
|
effective and dangerous.
|
|
|
|
> Court-authorized interception of communications has been essential
|
|
> for preventing and solving many serious and often violent crimes,
|
|
|
|
for all the crime and violence in our society, i doubt law enforcement
|
|
is doing a good job. what we see is another band-aid on serious social
|
|
problems.
|
|
|
|
> including terrorism, organized crime, drugs, kidnaping, and political
|
|
> corruption. The FBI alone has had many spectacular successes that
|
|
> depended on wiretaps. In a Chicago case code-named RUKBOM, they
|
|
> prevented the El Rukn street gang, which was acting on behalf of the
|
|
> Libyan government, from shooting down a commercial airliner using a
|
|
> stolen military weapons system.
|
|
|
|
Dr Dennings faith is touching here. The El Rukns were done in
|
|
in part because the government compromised their lawyer. And also
|
|
had several agents inside the organization. Please a better example
|
|
must be out there.
|
|
|
|
> To protect against abuse of electronic surveillance, federal
|
|
> statutes impose stringent requirements on the approval and execution
|
|
> of wiretaps. Wiretaps are used judiciously (only 846 installed
|
|
> wiretaps in 1992) and are targeted at major criminals.
|
|
|
|
and how many wiretaps are installed il-legally? considering during the
|
|
gulf war the FBI was wire-tapping the homes of arab-americans
|
|
i wonder how well they use the legal process.
|
|
|
|
also if we are talking 846 wiretaps, and say, 200 hours of tape
|
|
from each, we are talking about 200,000 hours of conversation.
|
|
i am certain that the NSA has the facility to de-crypt this number
|
|
of calls. And if they don't why don't they? they must listen to
|
|
foreign conversations, and i am sure the russians are not so
|
|
accomodating as to use clear voice signaling.
|
|
|
|
> Now, the thought of the FBI wiretapping my communications appeals to
|
|
> me about as much as its searching my home and seizing my papers.
|
|
> But the Constitution does not give us absolute privacy from
|
|
> court-ordered searches and seizures, and for good reason. Lawlessness
|
|
> would prevail.
|
|
|
|
But the constitution does not forbid me from keeping safes, or
|
|
cryptic records or speaking in navajo, either. Dr Denning must have
|
|
far less faith in the body politic then I do. besides if you want
|
|
to see lawlessness, look at the beltway on friday afternoon.
|
|
|
|
> Encoding technologies, which offer privacy, are on a collision
|
|
> course with a major crime-fighting tool: wiretapping. Now the
|
|
|
|
wiretapping is a minor crime fighting tool. for all the law enforcement
|
|
personnell we have, and all the cases brought each year, less then 1%
|
|
involve wiretapping to start with. these same complaints have been
|
|
made about facsimile transmission, computer data, cell phones
|
|
and cars. technology changes and law enforcement adapts. this is the
|
|
first time, i have ever seen law enforcement try to cripple a technology
|
|
befoe it becomes prevalent.
|
|
|
|
ASk yourself a question Dr Denning. Cars are used in crime, criminals
|
|
often escape from the police. why shouldn't all cars be restricted
|
|
to 35MPH, by design so the police can always capture and pursue?
|
|
fast cars, like the ferrari have not brought chaos to our society.
|
|
why should cryptography?
|
|
|
|
> Clipper chip shows that strong encoding can be made available in a way
|
|
> that protects private communications but does not harm society if it
|
|
> gets into the wrong hands. Clipper is a good idea, and it needs
|
|
|
|
how will clipper prevent the wrong hands from getting strong encoding?
|
|
will only outlaws have strong crypto?
|
|
|
|
> support from people who recognize the need for both privacy and
|
|
> effective law enforcement on the information highway.
|
|
|
|
sure we need law enforcement on the info highway, but i don't
|
|
need a trooper in the back seat to listen to me talk to
|
|
my girlfirend as we drive. i just need a trooper to watch for
|
|
speeders and drunk drivers.
|
|
|
|
Dr Denning was part of the clipper review team, and as such
|
|
may be psychologically and emotionally committed to the project.
|
|
I hope her earlier effort shave not clouded her ability to conduct a
|
|
dispassionate social and policy analysis.
|
|
|
|
Also Louis Freeh was interviewed by John Markoff in an article in
|
|
todays NYT about the return of the Digital Telephony Standard.
|
|
Freeh said "If we are to have a peaceful and orderly society,
|
|
people will have to sacrifice a little privacy". I couldn't
|
|
believe this. Didn't jefferson say something on the lines of
|
|
those who sacrifice liberty for a little peace deserve neither?
|
|
or was that heinlein?
|
|
|
|
The other interesting factoid to counter all the discussion on
|
|
Terrorism, Nuclear death threats and Drug Dealing, is that
|
|
Aldrich Ames was arrested last week in the biggest spy scandal
|
|
this century since the Rosenbergs. Ames who was the CIA chief of
|
|
CounterIntelligence/Soviet-Eastern Division was as well trained in
|
|
tradecraft as one can be.
|
|
|
|
He never used any telephonic encryption, despite total access to
|
|
all these devices.
|
|
|
|
Sorry if the spys aren't using them, then why do we need a
|
|
way to break them?
|
|
|
|
Your friend
|
|
The Advocate.
|
|
|
|
PS Advocate prediction #13. That to push the clipper chip,
|
|
supporters will claim that Child pornographers are distributing
|
|
Snuff films in unbreakable crypto-form so that they can't be
|
|
detected.
|
|
|
|
------------------------------
|
|
|
|
Date: 3 Mar 1994 12:12:08 -0500
|
|
From: hovaness@PANIX.COM(Haig Hovaness)
|
|
Subject: File 5--Newsday's Encryption and Law Enforcement (Re: CuD 6.19)
|
|
|
|
With all due respect to Professor Denning, I offer the following
|
|
observations in response to the material in her recent posting.
|
|
|
|
1. Professor Denning's views are representative of a small minority in
|
|
the US academic community. However, through her energetic campaign to
|
|
promote pro-Clipper arguments, a casual observer of the debate would
|
|
conclude that her position is representative of a substantial segment of
|
|
academic opinion. This was especially evident in the ACM Communications
|
|
"dialogue" on Clipper, in which Professor Denning's comments occupied
|
|
almost half of the editorial space.
|
|
|
|
2. Professor Denning's efforts to advance her views are not limited to
|
|
journalistic advocacy and Usenet postings. Her presence on the ACM
|
|
committee studying Clipper has contributed to the success of the
|
|
pro-Clipper faction in deadlocking the committee, and thus preventing
|
|
the largest computing professional society from taking an anti-Clipper
|
|
position, a position that would reflect the sentiments of the majority
|
|
of the membership.
|
|
|
|
3. Professor Denning consistently makes generous assumptions about the
|
|
proper and lawful actions of government officials - assumptions that
|
|
anyone familiar with recent American history knows to be naive. For
|
|
example, the political manipulation of information gathered by J. Edgar
|
|
Hoover, former Director of the F.B.I. is common knowledge.
|
|
|
|
4. Professor Denning relies heavily on anecdotal evidence of crimes
|
|
"prevented" through communications intercepts without presenting accurate
|
|
data on the (very small) number of crimes in which the intercept was
|
|
essential to the success of law enforcement. Others have posted the
|
|
figures, and they suggest that the practical value of such intercepts is
|
|
greatly overstated.
|
|
|
|
5. Professor Denning maintains that secure encryption is a difficult
|
|
technology to master and is not readily available to the general public.
|
|
In view of the existence of PGP, and the likely availability of its
|
|
voice-scrambling successor, this is a ludicrous claim.
|
|
|
|
6. Professor Denning offers no explanation for how a US national
|
|
standard restricting encryption can be viable in the context of
|
|
worldwide voice and data communications. How can the US government
|
|
possibly assert control of information packets crossing US "cyberspace?"
|
|
|
|
7. Professor Denning omits to mention that polls reveal that the
|
|
majority of the US public are opposed to telephone wiretaps. All
|
|
available evidence suggests that Clipper would never survive a public
|
|
referendum.
|
|
|
|
8. Professor Denning neglects to mention that the entire commercial
|
|
sector of the US computing industry is united in opposition to Clipper.
|
|
Moreover, much of the business community is also hostile to the concept
|
|
of Government interception of business communications.
|
|
|
|
9. Professor Denning's arguments are ultimately authoritarian. She
|
|
believes that the judgement of government officials must carry greater
|
|
weight than the will of the people. This is a profoundly
|
|
anti-democratic position.
|
|
|
|
Haig Hovaness
|
|
Pelham Manor, NY
|
|
hovaness@panix.com
|
|
|
|
------------------------------
|
|
|
|
Date: 8 Mar 94 16:23:23 GMT
|
|
From: dbatterson@ATTMAIL.COM(David Batterson)
|
|
Subject: File 6--DOS is not dead yet. . . .
|
|
|
|
Is DOS dead? Definitely not, says SPC
|
|
|
|
While millions of PC users own and use Windows regularly, many of
|
|
us grouse about its idiosyncrasies. Meanwhile, innumerable users
|
|
continue to use DOS applications, especially word processing programs.
|
|
|
|
The DOS flavors of WordPerfect (versions 5.0 and later) have
|
|
their legions of fans, along with Microsoft Word, WordStar and
|
|
Professional Write. Although I use Ami Pro for Windows, I also
|
|
occasionally use Professional Write (Ver. 2.2) which has been around
|
|
for several years.
|
|
|
|
Although WordPerfect users often turn up their noses at
|
|
Professional Write, I have always preferred ProWrite to
|
|
Word(not-so)Perfect. In fact, I never could understand why Software
|
|
Publishing Corp. (SPC) didn't update the program. They did come out
|
|
with a Windows version (Professional Write PLUS), but it didn't sell
|
|
very well.
|
|
|
|
Professional Write 3.0 is finally here, and should be in software
|
|
stores soon. "This new version was primarily driven by the large
|
|
number of customers who requested it," said Chris Randles, SPC's vice
|
|
president of marketing. It seems a bit overpriced (at $249 list) for a
|
|
program that has had only a modest facelift/update, though.
|
|
|
|
Randles said that "DOS word processing is one of the most widely
|
|
used applications in rapidly-growing niche markets such as small
|
|
business and the home office." In that market, PC users don't want to
|
|
mess around with memory problems, Windows GPFs (General Protection
|
|
Faults), or word processing programs that have become monster
|
|
applications akin to desktop publishing software.
|
|
|
|
Professional Write 3.0 is pretty much the same program, so the
|
|
learning curve is nil. There are some improvements that reflect the
|
|
changing PC arena. Now you can use a mouse; I missed having that
|
|
feature in Ver. 2.2. And SPC realizes that LANs are routine now, so
|
|
made it network-ready. The program supports Novell, IBM, Banyan,
|
|
Artisoft's LANtastic and Microsoft LAN Manager.
|
|
|
|
Marlise Parker of Ad Hoc Associates, a Denver-based computer
|
|
training and consulting firm, noted that "people are going back to the
|
|
belief that the finest things in life are the most simple, and for
|
|
many of us, that also applies to the software we use. Professional
|
|
Write is one of those rare software gems that keeps getting better,
|
|
without losing its simplicity," Parker added.
|
|
|
|
Want to import .PCX graphics into a document? Sorry, you can't
|
|
do it. You CAN include graphs produced with the DOS versions of
|
|
Harvard Graphics (2.0 or higher). Want to make fancy newsletters and
|
|
DTP documents? Forget it! SPC wisely decided to forego the "bells and
|
|
whistles," says Parker, because most users don't want or need them.
|
|
|
|
Software Publishers Association (SPA) reported recently that DOS
|
|
word processing software sales increased a bit in 1993 over 1992.
|
|
This occurred while sales of other DOS applications declined, as the
|
|
Windows Juggernaut continued.
|
|
|
|
So as far as word processing is concerned, rumors about the death
|
|
of DOS are greatly exaggerated. Remember, the most popular offline
|
|
mail readers are Blue Wave, Silver Xpress and OLX--all DOS programs.
|
|
Professional Write 3.0 should do well, I think. I would have liked to
|
|
have seen it at a $150 list price, however.
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 5 Mar 1994 13:57:23 -0500
|
|
From: "USENET News System" <news@INDIANA.EDU>
|
|
Subject: File 7--Response to Frisk (Re CuD 6.19)
|
|
|
|
frisk@COMPLEX.IS(Fridrik Skulason) wrote:
|
|
> A poster in CuD #6.19 wrote:
|
|
|
|
> >I even created a virus or two in my years of computing, but never with
|
|
> >the purpose of trying to harm another user's system! I create them only
|
|
> >for testing purposes, and when I find one that fails a scanned test, I
|
|
> >forward it to the company that created the anti-virus software.
|
|
>
|
|
> Do you really think you are doing anybody a favour by doing that ?
|
|
> Anti-virus companies already receive on the average 7 new viruses per
|
|
> day right now...we really don't need any more.
|
|
|
|
Fridrik:
|
|
It seems to me that one of the purposes of creating anti-virus software
|
|
is to combat viruses. *ahem* What better way to do so than to receive virus
|
|
programs from a "tester" and then write code to prevent similar
|
|
programs from proliferating from a less honest individual?
|
|
|
|
I don't see any validity in the argument against writing viruses
|
|
to be sent into anti-virus software companies. If these people
|
|
don't write test viruses, someone else will come up with similar
|
|
ones and use them unscrupulously.
|
|
|
|
If anti-virus companies are receiving "too many" new viruses every
|
|
day, then perhaps they need to deal with the backlog. A representative
|
|
such as yourself (I take it from your statementd that you work
|
|
with such a company) certainly shouldn't be ranting and raving at
|
|
people who are using their valuable time trying to help.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 28 Feb 1994 09:34:40 GMT-0600
|
|
From: "Jeff Miller" <JMILLER@TERRA.COLOSTATE.EDU>
|
|
Subject: File 8--Re: "Hackers" Whack Harding (CuD 6.19)
|
|
|
|
Re: Media "Hackers" Whack Harding's E-Mail, CuD #6.19:
|
|
|
|
> LILLEHAMMER, Norway--In what was described as a "stupid,
|
|
> foolish mistake," perhaps as many as 100 American
|
|
> journalists peeked into figure skater Tonya Harding's
|
|
> private electronic mailbox at the Olympics.
|
|
|
|
++++++++++++++++
|
|
|
|
This story was mentioned on alt.2600 (an Internet news group dedicated
|
|
to the magazine "2600"). It annoys me now as much as when I first
|
|
read it. Here is the follow up I posted:
|
|
|
|
Well, I personally know many hackers who have entered systems with
|
|
someone elses password, looked around, and logged out. Did nothing
|
|
more. They all lost *all* their computer equipment, and many
|
|
non-computer related items, not to mention the thousands of dollars
|
|
in lawyer and court costs, just to get the felony and misd charges
|
|
slapped on them lowered to a misd.
|
|
|
|
These reporters have just admitted to committing the exact same
|
|
crime. Will they have all their equipment confiscated? Will they be
|
|
raided by the secret service with guns pointed at their mothers at
|
|
5am? I think not.
|
|
|
|
What a bunch of shit.
|
|
|
|
Even if Norway's computer crime laws do not apply here, and the
|
|
Olympic committee does not wish to take action against these
|
|
reporters, it really makes me sick that THESE hackers are given the
|
|
image of some responsible adults just having fun at 2AM while eating
|
|
pizza, while the other hackers you read about are juvenile delinquents
|
|
bent on moving satellites out of orbit and abusing the E911 system.
|
|
|
|
Just a hypothetical thought: What would have happened if a US hacker
|
|
was the one who broke into Harding's account instead of one of these
|
|
journalists?
|
|
|
|
------------------------------
|
|
|
|
Date: 10 Mar 1994 10:46:04 -0500
|
|
From: mnemonic@eff.org (Mike Godwin)
|
|
Subject: File 9--"Porn Press Release" from EFF is a Hoax
|
|
|
|
At EFF, we have been receiving a number of queries about an alleged EFF
|
|
"press release" or "statement" announcing the following:
|
|
|
|
"Senator Jess Helms (R-NC) requested that the FBI become more involved in
|
|
the fight to stop adult images from being distributed on electronic
|
|
bulletin boards and the Internet."
|
|
|
|
Typically, the "press release" has included the following:
|
|
|
|
: "The EFF has issued a warning to sysops that the following files
|
|
: which depict any of the following acts are illegal in all 50
|
|
: states, and can subject the sysop to prosecution regardless of
|
|
: whether the sysop knows about the files or not.
|
|
:
|
|
: "--Depiction of actual sex acts in progress"
|
|
:
|
|
: "--Depiction of an erect penis"
|
|
|
|
*There is no such press release.*
|
|
|
|
*The press release is a hoax.*
|
|
|
|
Several people seem to have been fooled by the false press release,
|
|
including the new publication SYSOP NEWS, which reprinted it uncritically
|
|
in its first issue.
|
|
|
|
I urge you to spread this announcement to every BBS of which you a member.
|
|
|
|
Thank you for helping us stop the unethical people who spread this
|
|
misinformation.
|
|
|
|
--Mike
|
|
|
|
Mike Godwin, (202) 347-5400 |"And walk among long dappled grass,
|
|
mnemonic@eff.org | And pluck till time and times are done
|
|
Electronic Frontier | The silver apples of the moon,
|
|
Foundation | The golden apples of the sun."
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #6.23
|
|
************************************
|
|
|