936 lines
47 KiB
Plaintext
936 lines
47 KiB
Plaintext
|
|
Computer underground Digest Wed Mar 16, 1995 Volume 7 : Issue 21
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe
|
|
Semi-retiring Shadow Archivist: Stanton McCandlish
|
|
Correspondent Extra-ordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Monster Editor: Loch Nesshrdlu
|
|
|
|
CONTENTS, #7.21 (Wed, Mar 16, 1995)
|
|
|
|
File 1--CuD Listserv at UIUC having some problems
|
|
File 2--Seizure of italian BBS - UPDATE
|
|
File 3--(fwd) U. of Pittsburgh Netnews Policy (fwd)
|
|
File 4--S. 314, Realism, Unanswered Questions
|
|
File 5-- Dutch Hacker Arrested
|
|
File 6--(fwd) Eyewitness account of 2/21 San Jose hearing, by C. Kaun
|
|
File 7--Cu Digest Header Info (unchanged since 26 Feb, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Fri, 10 Mar 1995 15:24:43 (CST)
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 1--CuD Listserv at UIUC having some problems
|
|
|
|
The UIUC Listserv is having some problems. People subscribing to
|
|
CuD with standard internet addresses should be relatively
|
|
unaffected. Those with BITNET addresses will likely not
|
|
receive CuD this (or next) issue.
|
|
|
|
Sorry for the inconvenience.......
|
|
|
|
|
|
|
|
Jim and Gordon
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 15 Mar 1995 11:07:11 +0000 (CUT)
|
|
From: Luc Pac <lpaccagn@RISC1.GELSO.UNITN.IT>
|
|
Subject: File 2--Seizure of italian BBS - UPDATE
|
|
|
|
Press Release 13 March 1995
|
|
|
|
BITS Against the Empire BBS, a node of the Italian Cybernet computer
|
|
network), remains shut down due to police investigations. According
|
|
to the authorities, the bulletin board's activities in pursuit of
|
|
free communication and counter-information represent a danger to the
|
|
democratic order.
|
|
|
|
Ten days after police raids on the homes of a dozen activists, all
|
|
hard copy materials, along with one of the computers seized, have been
|
|
returned. The authorities remain in possession of the bulletin board
|
|
computer itself, however, as well as all the floppy disks
|
|
appropriated, in order that they might pursue a 'deeper analysis' of
|
|
such electronic material.
|
|
|
|
Clearly no-one has explained to them that hard disks and diskettes
|
|
can be copied in a matter of minutes. Meanwhile, those facing
|
|
prosecution, as well as the hundreds of users of the BITS Against the
|
|
Empire BBS, must continue to wait as the police force's computer
|
|
experts work to uncover not only the DOS 'copy' command, but also
|
|
that very dangerous information - from publicly available electronic
|
|
journals, articles and academic essays on the social use of new
|
|
technology, to publicly accessible electronic discussion groups -
|
|
which has inspired the charge of subversive association with
|
|
terrorist intent (associazione eversiva con finalita' di terrorismo -
|
|
art. 270 bis of the Italian penal code).
|
|
|
|
BITS Against the Empire Labs
|
|
Underground Research & Documentation
|
|
Italy
|
|
|
|
CyberNet 65:1400/1 (currently down)
|
|
ECN 45:1917/2
|
|
Fidonet 2:333/412 (currently down)
|
|
Internet lpaccagn@risc1.gelso.unitn.it
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 6 Mar 1995 01:27:49 -0600 (CST)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 3--(fwd) U. of Pittsburgh Netnews Policy (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
|
|
PITT ADOPTS NEW COMPUTER ACCESS POLICY
|
|
|
|
PITTSBURGH, March 2 -- The University of Pittsburgh will establish a
|
|
standing committee to help determine which of the more than 10,000
|
|
USENET news groups on the Internet will be carried on the University's
|
|
computer network. This is one aspect of a new policy, approved by the
|
|
University's senior administration, that was developed by the ad hoc
|
|
committee formed to review the use of University computer resources to
|
|
access, display, post or print materials that may have obscene or
|
|
sexually explicit content.
|
|
|
|
The policy addresses the need to provide appropriate protection
|
|
for First Amendment rights, while, at the same time, adhering to
|
|
federal and state statutes governing obscenity and sexually explicit
|
|
material.
|
|
|
|
The new standing committee, which will have faculty, staff and
|
|
student members, will be charged with developing guidelines for use by
|
|
the University's Computing and Information Services staff when making
|
|
decisions about adding, deleting or retaining news groups. The
|
|
guidelines will be content-neutral, except with respect to obscenity,
|
|
or other speech not protected by the First Amendment.
|
|
|
|
The committee will also formulate guidelines for separating the
|
|
news groups into two categories: 1) those with content, as defined by
|
|
state or federal law, that is likely to be obscene or sexually
|
|
explicit and harmful to minors, and 2) those without such content.
|
|
All authorized users under the age of 18 would be granted access only
|
|
to the second group.
|
|
|
|
The new policy also calls for the suspension of computing
|
|
privileges as well as the possible imposition of additional sanctions
|
|
upon anyone who is found to have employed University computer
|
|
resources to use obscene or sexually explicit material in a way that
|
|
violates University policies and guidelines. At the ad hoc
|
|
committee's suggestion, the University will review its existing
|
|
policies regarding "Computer Access and Use," "Sexual Harrassment,"
|
|
and "Computing Ethics and Guidelines" to make sure that they
|
|
adequately deal with issues such as the display of obscene or sexually
|
|
explicit materials on computer screens.
|
|
|
|
# # #
|
|
|
|
|
|
AD HOC COMMITTEE PROPOSAL
|
|
|
|
Accepted as University Policy by Executive Staff
|
|
January, 1995
|
|
|
|
For use until formally issued as a University policy.
|
|
|
|
Our group has been charged with recommending a policy to ECAC
|
|
regarding the use of University computer resources to access, display,
|
|
post, and print materials which have possibly obscene and/or sexually
|
|
explicit content. There exist both Federal and Pennsylvania statutes
|
|
which govern obscene and/or sexually explicit material. Pitt is a
|
|
state-related University, and, as such, must support and protect First
|
|
Amendment rights.
|
|
|
|
1. We suggest that University of Pittsburgh Policies 10-02-05
|
|
(Computer Access and Use) and 07-06-04 (Sexual Harassment Policy), and
|
|
CIS' "Computing Ethics and Guidelines," be reviewed by the University
|
|
to make sure that they adequately deal with issues such as the display
|
|
of obscene and/or sexually explicit materials on computer screens.
|
|
|
|
2. There are approximately 10,000 USENET news groups on the Internet,
|
|
the vast majority of which do not deal with obscene and/or sexually
|
|
explicit material. CIS resource limitations prevent us from carrying
|
|
all of those groups, even if we would want to do so. While the topics
|
|
discussed by a group are generally assumed to be well described by the
|
|
group's name and statements about its purpose, a group is the
|
|
electronic analogue of a large bulletin board with open access.
|
|
Anyone may post anything he/she wishes on the board; thus obscene
|
|
and/or sexually explicit material may well exist in news groups with
|
|
innocuous titles. It is impossible to review the content of all
|
|
groups Pitt carries, even if we wished to do so. We propose that the
|
|
University form a standing committee, with faculty, staff, student,
|
|
and Office of General Counsel representation, which will draft,
|
|
review, and update guidelines, on the basis of which a CIS staff
|
|
member will add, delete, and retain news groups on the CIS system.
|
|
Except with respect to obscenity, or other speech not protected by the
|
|
First Amendment, the guidelines will be content-neutral. CIS
|
|
currently has a process for selecting news groups; our proposal
|
|
broadens the group involved in setting the policies to be followed and
|
|
enhances legal safeguards to the policy-making process.
|
|
|
|
3. We recommend that the standing committee mentioned in the paragraph
|
|
above formulate guidelines, on the basis of which CIS will segregate
|
|
news groups into two categories: (1) those with content which is
|
|
likely to be obscene or sexually explicit and harmful to minors, as
|
|
defined by Federal and State law, and (2) those without. Matriculated
|
|
students, faculty, and staff, age 18 and older, would automatically be
|
|
granted access to all news groups being carried. All those under age
|
|
18 would normally be granted access to only the second news group. We
|
|
recommend the establishment of a process and a set of guidelines by
|
|
which those persons could apply for access to the other set of news
|
|
groups under appropriate circumstances.
|
|
|
|
4. Computing privileges may be suspended or other sanctions imposed
|
|
upon anyone found to have used University resources to display, print,
|
|
or circulate obscene material, where "obscene" is defined by Federal
|
|
and State law; anyone who circulates, to persons under the age of 18,
|
|
sexually explicit materials which are defined by law as being harmful
|
|
to minors; and anyone found to have used University resources to use
|
|
obscene and/or sexually explicit material in a way which violates
|
|
University policies and guidelines. The standing committee mentioned
|
|
above will make recommendations to CIS for suspension of computing
|
|
privileges or other sanctions in each case involving faculty or staff
|
|
members. In cases involving students, the existing Student Judiciary
|
|
Board will have jurisdiction. In addition, as noted in the August
|
|
1993 "Computing Ethics and Guidelines," "... failure to adhere to
|
|
these guidelines can result in the suspension of computing privileges
|
|
and prosecution under Federal and State law, where applicable." The
|
|
University will fully cooperate with all such prosecutions.
|
|
|
|
------------------------------
|
|
|
|
From: timk@WORLD.STD.COM(Tim King)
|
|
Subject: File 4--S. 314, Realism, Unanswered Questions
|
|
Date: Fri, 10 Mar 1995 13:19:13 -0500 (EST)
|
|
|
|
Brad Hicks wrote:
|
|
|
|
> If you want it to be legal for people to use [the Internet for
|
|
> transmitting hard-core pornographic material in a manner which
|
|
> would be illegal over a phone line under the existing law]...
|
|
> well, then say so!
|
|
|
|
To which Rhys Weatherley replied:
|
|
|
|
> Very few free speech supporters, myself included, want that
|
|
> kind of crap distributed on the Internet or anywhere...
|
|
|
|
Um... Er... This does seem to be the point. The question is not
|
|
whether anyone _wants_ it to happen. I'm sure that no one _wants_ it
|
|
to happen. The question is whether or not "you want it to be legal."
|
|
But, it appears, Brad thinks that the objections to S. 314 have been
|
|
blown way out of proportion in an attempt to dodge the real issue.
|
|
Now, far be it from me to assume to know Brad's thoughts and motives.
|
|
Nevertheless, if I am correct in this interpretation, his assessment
|
|
would seem to me to be a plausable one.
|
|
|
|
There are several points that I have not yet seen addressed, but which
|
|
appear to be intimately applicable to the debate. The first is that
|
|
the current law seems to already apply to any service provider that
|
|
makes obscene material avaiable over telephone lines. What
|
|
differentiates any Internet provider or BBS operator from anyone else
|
|
who "makes (directly or by recording device) any obscene [telephone]
|
|
communication for commercial purposes to any person?" Now we can
|
|
discuss whether or not the current law is appropriate for modern
|
|
computer-based communication, but it still seems that Sen. Exon's bill
|
|
would have negligible effect on many service providers.
|
|
|
|
Secondly, how does the current law apply to pay-services, like singles
|
|
lines, that provide PRIVATE messaging facilities? I've never actually
|
|
used such a service, but my understanding is that they allow users to
|
|
leave voice messages for other users. Now, when one user leaves an
|
|
obscene message for another user, is the service provider deemed
|
|
responsible? Or does someone really listen to every message left by
|
|
every user before forwarding it to its destination voice mailbox?
|
|
However the law applies, we can still discuss whether or not it is
|
|
appropriate. But it seems to me that any requirements that can
|
|
reasonably be made relating to private voice-mail messages can
|
|
reasonably pertain to private email as well.
|
|
|
|
Furthermore, the current law gives seemingly special protection to
|
|
"common carriers." It is my understanding, however, that network
|
|
operators, Internet providers, and BBS operators do not fall into this
|
|
category. If so, isn't this point of more paramount concern? In
|
|
other words, if this bill is going to be considered by congress,
|
|
shouldn't it at least include provisions to restrict the liability of
|
|
telecommunications services for data that they did not publish?
|
|
|
|
I would be most grateful if someone could enlighten me with informed
|
|
answers to these questions.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 14 Mar 1995 18:25:21 EST
|
|
From: "Rob Slade, Social Convener to the Net" <roberts@MUKLUK.DECUS.CA>
|
|
|
|
VIRETHIC
|
|
|
|
Viral Morality: A Call for Discussion
|
|
|
|
"Computer ethics" has been an ongoing study in the technical world.
|
|
On the one hand is the study of the ethical, moral, or proper use of
|
|
computers. On the other, is the study of computer crime and
|
|
vandalism. Lately, I have noted a rather desperate interest in
|
|
courses or training in computer ethics, as well as an increase in the
|
|
frequency and depth of discussions regarding the ethics of virus
|
|
writing. I would like to address this latter topic, specifically.
|
|
|
|
One problem with current discussions and literature regarding the
|
|
ethics of virus writing and distribution is the lack of dialogue
|
|
between two opposing camps. This paper is not intended to present any
|
|
final answer, nor to add to the literature in the field, but to open
|
|
the field for comment. My purpose in writing this is to provide an
|
|
initial overview and to elicit feedback from any and all concerned
|
|
with the topic.
|
|
|
|
For those of traditional moral stance, the current situation is
|
|
discouraging. Peter Denning's "Computers Under Attack" (cf.
|
|
BKDENING.RVW) has a very thorough survey of the field, but it provides
|
|
little in the way of answers or hope. Deborah Johnson's work
|
|
"Computer Ethics" (cf. BKCMPETH.RVW) is pre-eminent in the field, but
|
|
serves only to clarify the problem. Sarah Gordon's interviews with
|
|
computer students show responses typical of almost all such studies.
|
|
The base attitude appears to be, "If I find it interesting, and I can
|
|
do it, why do you say I shouldn't?"
|
|
|
|
The proponents of security-breaking activities often question the
|
|
traditional ethical position by asking, "Where's the harm?" This
|
|
query is directly relevant to discussions of the morality of virus
|
|
writing.
|
|
|
|
I should begin by defining two generally opposed groups in this area.
|
|
First is the "antivirus", or "AV", research community. Many, though
|
|
not all, of the members of this group would be involved in producing
|
|
antiviral software. All would study viral programs with a view to
|
|
eliminating viral programs in the normal computing environment. They
|
|
take a rather paranoid, and almost obsessive, position with regard to
|
|
the sharing and distribution of viral code. (They would rejoin this
|
|
last by pointing out that it isn't paranoia if someone is *really* out
|
|
to get you.)
|
|
|
|
The AV community is not really opposed to the writing of viral
|
|
programs. It is seen as a trivial, and therefore pointless, exercise;
|
|
but not necessarily evil, in itself. The communication of viral
|
|
program code is also a normal professional and academic activity, as
|
|
long as it is limited, done for a stated purpose, and the recipients
|
|
are known. It is the unregulated exchange of virus code and source,
|
|
providing open access to anyone with a computer and a modem, that is
|
|
upsetting. The opposing group is therefore described as the virus
|
|
exchange community, or "vx" for short. (This designation was first
|
|
used by Sarah Gordon.) For the purposes of this paper, therefore,
|
|
references to "virus writing", "virus exchange" or "vx" will mean the
|
|
uncontrolled or unregulated exchange or provision of access to virus
|
|
source and object code.
|
|
|
|
(This does not necessarily mean deliberate distribution of infected
|
|
programs by such means as infecting a legitimate program and then
|
|
posting it, without warning, to a bulletin board system.
|
|
"Trojanizing" of normal software or malicious invasion of systems is
|
|
certainly happening in some areas, but it is not needed in the current
|
|
computing situation. While there is debate over the relative
|
|
contribution of "natural spread" and virus exchange to the current
|
|
virus problem, it is known that code made available only as openly
|
|
published material does eventually infect machines in the normal
|
|
computing environment. The term vx does not, therefore, require any
|
|
imputation of sinister motives or hidden activity for the purposes of
|
|
this discussion.)
|
|
|
|
There are some grey areas between these two poles. Some people have
|
|
both written antiviral software *and* contributed to viral spread.
|
|
Given, however, that one could expect a continuum of opinion, those in
|
|
the middle are remarkably few. Either you are for virus exchange, or
|
|
against it.
|
|
|
|
One other, separate, group should be noted. Viral programs are often
|
|
cited as an example of "artificial life", and the research community
|
|
in that field, both professional and amateur, have a legitimate
|
|
interest in viral programming. Work in the a-life field, however,
|
|
does not justify unregulated code and source exchange. For one thing,
|
|
current viral programs "in the wild" (those which are to be found in
|
|
normal home and business computers, as opposed to those which exist
|
|
only in a research or laboratory environment) have only the most
|
|
tenuous claim to artificial life. Common viral programs are
|
|
simplistic snippets of code without anything like the complexity of
|
|
the simplest known natural life forms. In addition, those who really
|
|
do work in the artificial life area will be well aware that it does
|
|
carry possible dangers, and that research should be subject to
|
|
controls similar to those imposed on biological and genetic study.
|
|
|
|
The most common argument for virus-writing tends to boil down to, "You
|
|
can't stop me." Many promote virus writing on the grounds of freedom
|
|
of speech, a rather curious position in light of the incoherence of
|
|
the arguments. (The most vocal of these tend to be Americans, who
|
|
frequently cite "First Amendment Rights". This refers to the first
|
|
amendment to the U.S. Constitution, which Americans tend to see as
|
|
some universal law, rather than an arbitrary political document,
|
|
however desirable.)
|
|
|
|
Rights, though, carry with them a weight of responsibility. As is
|
|
often quoted, your "right" to swing your fist ceases at the end of my
|
|
nose. You have a "right" to free speech--so long as you are
|
|
responsible and do not perpetrate fraud. You have a "right" to study
|
|
whatever you like--so long as you are responsible enough not to carry
|
|
out experiments in poison with human subjects. No PC is an island--at
|
|
least, not where viral programs are concerned. Therefore, your
|
|
"right" to study, write and distribute viral programs carries the
|
|
responsibility to ensure that your creations do not--ever--run on
|
|
machines where they are not authorized.
|
|
|
|
One of the most confusing aspects of the "exchange/no exchange" debate
|
|
is the concept of the "good" virus. There is nothing inherently evil
|
|
in the concept of reproduction. (Dangerous, yes.) In fact, the very
|
|
earliest experiment with self-reproducing programs was the Xerox Worm
|
|
of Shoch and Hupp. This was designed to spawn "segments" of the
|
|
central program on other machines in the network, thus bringing the
|
|
power of many processors to bear on a single problem. Thus, in
|
|
theory, viral programming could represent the same level of advanced
|
|
technology in software that parallel processing represents in
|
|
hardware.
|
|
|
|
That's the theory. And it is promoted by no less eminent a researcher
|
|
than Dr. Fred Cohen, who did seminal work on the security-breaking
|
|
class of viral programs in a thesis, in 1984, and dissertation, in
|
|
1986. Unfortunately, the theory founders on some rather hard facts.
|
|
|
|
There are three questions to ask of a new, inherently dangerous,
|
|
technology. Has it a useful application? Can it fulfil that
|
|
application better than current technologies? And, can the danger,
|
|
either inherently, or effectively, be controlled?
|
|
|
|
To date, no one has answered those three questions. While a variety
|
|
of uses have been proposed for viral programs, there are none which
|
|
are not effectively being done by other means. No viral programs
|
|
have, indeed, been seen to be as effective as normal systems.
|
|
Operating system upgrades could not guarantee universal coverage.
|
|
Network management tasks could not promise reliable feedback.
|
|
Automated utilities would confuse novice level users, who never run
|
|
utilities anyway. The most useful function is still that proposed by
|
|
Shoch and Hupp--and their programs were not, strictly speaking, viral.
|
|
|
|
(Vesselin Bontchev's examination of this question is the most detailed
|
|
to date, and is required reading for all who want to join the debate.
|
|
His proposals, while demonstrating good ideas for safety and control,
|
|
are still primarily an advanced automated distribution system. The
|
|
necessity for viral functions in this regard is still unproven.)
|
|
|
|
Those in the vx camp will point to two current viral programs which,
|
|
they say, do have useful functions. One of these programs produces
|
|
compressed executable files, thus saving disk space, while the other
|
|
performs encryption on files. However, both of these functions are
|
|
provided by other programs--from which, indeed, code was stolen for
|
|
those two "good" virals. Neither of the viral programs are as easy to
|
|
use or control as the original programs, and both have bugs which must
|
|
place them firmly in the malware grouping, for nuisance value, if
|
|
nothing else.
|
|
|
|
Currently, therefore, the utility of viral programs is very much
|
|
unproven. This would, though, mean only that they are neutral, were
|
|
it not for the lack of any demonstrable control. Methods of control
|
|
have been discussed primarily by Fred Cohen, but even he remains
|
|
unconvincing. The mechanisms generally are limited to environmental
|
|
checks which can either fail, or be easily cut out of the program.
|
|
Some have proposed "hunter" virals, to go after programs which "turn
|
|
rogue", but a program which is corrupted will behave in unpredictable
|
|
ways and a hunter program would likely consume a lot of resources,
|
|
fail, or (most likely) both.
|
|
|
|
(Cohen frequently cites viral "programs which have been running since
|
|
1986 with no ill effects" and speaks of a VCE (viral computing
|
|
environment). There are two points to be noted here. One is that
|
|
Cohen has not yet described his viral programs in anything like the
|
|
detail he put into his earlier work, so there can be no independent
|
|
assessment of his claims. The second point is that the very term,
|
|
VCE, implies that a viral computing environment is substantially
|
|
different, and should be kept separate, from the "normal" computing
|
|
environment as it is currently known. A VCE may very well be a
|
|
powerful entity, but it is still an unknown and unproven concept.)
|
|
|
|
Computer viral programs have an inherent danger: that of reproduction
|
|
and spread. If you study explosives, and pass along that knowledge,
|
|
you also have to pass along the materials before there is any risk of
|
|
a blast. Even then, the materials do not multiply themselves: when
|
|
exhausted, another supply must be found. The same is *not* true of
|
|
viral programs. These entities are *designed* to reproduce. And,
|
|
unlike the study of dangerous animals, or even germ warfare, viral
|
|
programs are built to reproduce, multiply and spread without the aid
|
|
of a skilled, or even aware, operator. If you are careless with a
|
|
deadly animal or weapon, it is still only a single danger in a
|
|
localized area. If you are careless with a computer virus, it can
|
|
spread world-wide.
|
|
|
|
We do not use computers because they are smart. Computers *aren't*
|
|
smart. Sometimes we use them because they can do calculations very
|
|
quickly, but even this is only a special case of the real value of
|
|
computers. Computers always do the same thing in the same way. They
|
|
are repeatable. They are, in this manner, reliable. Even a computer
|
|
error can be useful to us--so long as it always happens the same way.
|
|
|
|
Consider, then, the computer virus. In order to reproduce without the
|
|
informed assistance of the user, the virus must be, in the computer
|
|
sense, transparent. It must operate without alerting the operator, or
|
|
interfering with the operator's interaction with the computer. If the
|
|
virus even posts a notice ("Hi! I am infecting object X!"), it has a
|
|
nuisance value and is, therefore, not good. (Vesselin Bontchev notes
|
|
that even such a notice, by possibly delaying a process, may have
|
|
grave consequences far beyond annoyance.)
|
|
|
|
If, however, the virus does *not* notify the operator, then the
|
|
operator is not aware of some additional code in the machine. This
|
|
extra code will have an unknown, and inherently unknowable, effect on
|
|
the computer. The operations of the computer are, therefore, no
|
|
longer repeatable. This is a Bad Thing (TM).
|
|
|
|
Some will protest that I have overblown the danger of both the
|
|
notification messages and the possibility of conflicts. The point
|
|
that I am trying to make is that you cannot predict the harm which may
|
|
arise from interference either with the operator or the programs.
|
|
Software is digital, and is subject to catastrophic collapse without
|
|
prior warning. For those without a background in computer risk
|
|
assessment, an excellent overview for the non-professional is found in
|
|
Lauren Wiener's "Digital Woes" (cf. BKDGTLWO.RVW). An intriguing
|
|
compilation of the types of things that can go wrong is to be found in
|
|
Peter Neumann's "Computer Related Risks" (cf. BKCMRLRS.RVW). At the
|
|
very least, as Sarah Gordon points out, the virus is an autonomous
|
|
agent, making decisions and carrying out activities according to it's
|
|
own internal constructs and the intention of its programmer. This is
|
|
very likely not in correspondence with your own intention, and is
|
|
therefore an invasion of privacy.
|
|
|
|
A number of virus writers will object that their creations simply are
|
|
not harmful. Not only is it impossible to guarantee that your virus
|
|
will not conflict with existing systems, you also cannot guarantee
|
|
that a given system will not conflict with your virus. Almost all
|
|
file infecting viral programs will interfere with applications which
|
|
have an internal integrity checksum or a non-standard loader, and will
|
|
cause those applications to fail. (An example of this is that Windows
|
|
programs infected with DOS viral programs always fail to load.) The
|
|
"Ohio" virus (a prior version of Den Zuk) was not intended to carry
|
|
any destructive payload, but an unusual interaction with a certain
|
|
network operating system caused fatal disk corruption. Since both
|
|
Ohio and Den Zuk are examples of the often proposed "virus hunter
|
|
virus", it should be clear that the concept of using a viral program
|
|
to hunt down and disinfect other viral programs is not a good one.
|
|
|
|
Historically, and statistically, virus exchange people have been
|
|
careless and incompetent programmers. Remember that we are talking
|
|
vx, here, and those viral programs which have been released into the
|
|
wild. There may be, carefully hidden in the desk of a virus writer,
|
|
the "perfect" and harmless virus. If so, we haven't seen it yet. The
|
|
majority have obvious bugs, sloppy coding and derivative programming.
|
|
Less than one percent are interesting for *any* reason; only a handful
|
|
have unique styles of algorithms. And even these last have
|
|
programming pathologies.
|
|
|
|
There are two other reasons often given to justify virus exchange.
|
|
The first is generally described as experimentation and education.
|
|
The second is described as antiviral research, or, more commonly,
|
|
assessment of antiviral programs. These arguments *do* have some
|
|
validity, and should be examined. Ultimately, though, the reality
|
|
fails to support the claim.
|
|
|
|
The call for experimentation is somewhat tied to the argument for a
|
|
"good" virus. Current viral technology may be crude and ridiculous,
|
|
but how can it be improved if there isn't any work or sharing of
|
|
results? Quite true. The vx community, however, have obviously not
|
|
read or noted any programming journals or texts. Discussions of
|
|
programming and algorithms are supported by well-annotated code
|
|
fragments. You don't present a whole program to discuss a specific
|
|
function any more than you send an entire car with a manual on auto
|
|
repair. You certainly don't use encoded or "DEBUG script" object
|
|
code: that has no explanatory value at all.
|
|
|
|
And I have yet to see, in the vx materials, any discussion of
|
|
legitimate and positive uses for viral technology, any discussion of
|
|
control technology, or any discussion directed at ensuring that viral
|
|
programs do not create conflicts.
|
|
|
|
In regard to education, it is true that a study of viral programs is
|
|
related to a knowledge of operating system internals, as well as
|
|
assembly language programming. However, viral study *requires* such
|
|
knowledge, rather than providing it. Giving someone a virus and
|
|
expecting them to learn from it is akin to "teaching" a surgeon by
|
|
handing him a scalpel and pointing at a patient. Even the vx "old
|
|
guard" are beginning to realize this. Viral programs use normal
|
|
computer functions. If you understand computers, a virus is trivial.
|
|
If you don't, well ...
|
|
|
|
As far as virus exchange tutorials go, well, let me put it this way.
|
|
I am a teacher. Many of you will also know that I review technical
|
|
books on a daily basis. Some are great, enough are good, many are bad
|
|
and some are just plain awful. Only a few are worse, in terms of
|
|
tutorial effectiveness, than vx "zines" (electronic periodicals).
|
|
|
|
Recently, someone who makes his living pushing virus source code
|
|
promoted a collection of viral programs by suggesting you could test
|
|
antiviral programs with it. This, superficially, sounds like a good
|
|
idea--if you don't know what *real* software testing is like. What do
|
|
we know about the quality of this "zoo" (set of virus samples)? What
|
|
do we know about the structure, organization, documentation and so
|
|
forth? How many duplicates are there? Of course, we *do* want
|
|
duplicates in some cases; we want every possible variation on
|
|
polymorphs. (For Tremor, that works out to almost six billion files.)
|
|
But then, this collection was on a CD-ROM. What a pity. The most
|
|
successful viral programs are boot sector infectors, and you need to
|
|
have real, infected disks to truly test for them. At a minimum, you'd
|
|
want all seven "common" disk formats, in both system and non-system
|
|
versions. That's fourteen disks--for *each* BSI.
|
|
|
|
For all the length of this piece, it is still only an overview. And,
|
|
for all it's length, it probably hasn't convinced anyone. Ethics
|
|
education (it used to be called "values education"), in whatever form
|
|
and however presented, has very little to show that it works. There
|
|
are various theories and models of moral training, the most
|
|
sophisticated probably being Lawrence Kohlberg's "Moral Development"
|
|
schema. All, though, basically boil down to sitting around talking
|
|
about ethical dilemmas. They may develop debating skills and
|
|
rhetorical sophistry, but there is no evidence to suggest that any of
|
|
these programs leads to any significant change in behaviour.
|
|
|
|
While Kohlberg's model of moral development has the most detailed
|
|
construction, its utility is questionable. His system is not so much
|
|
one of values education as of values measurement. It is, therefore, a
|
|
guideline for evaluating other ethical training methods rather than a
|
|
means of instruction and change. Moral development is a six stage
|
|
structure, assessing the type of reasoning which goes into ethical
|
|
choices. The stages range from "fear of punishment" to "internal
|
|
ethical principles". There is great difficulty, however, in
|
|
determining the "stage" of a given individual. Most ethical
|
|
discussions will be judged as having reasoning at all of stages three,
|
|
four and five. This entire document, for example, could be dismissed
|
|
as being level one reasoning since it mentions the possibility of the
|
|
danger of virus distribution and could therefore be seen as a "fear of
|
|
punishment" (negative consequences) on my part. On the other hand,
|
|
most of Kohlberg's proponents dismiss level six, since even a
|
|
psychopath could be said to be acting from internal principles.
|
|
Kohlberg, himself, has stated that he does not know if anyone
|
|
consistently acts from stage six reasoning.
|
|
|
|
Probably the major reason for this is that modern society has no
|
|
fundamental moral foundation. The most widely cited (and Johnson
|
|
gives an excellent critique of it) is utilitarianism--"the greatest
|
|
good for the greatest number". Leaving aside the difficulties of
|
|
assessing such a measure, utilitarianism, along with all the other
|
|
modern "humanistic" philosophies, has nothing to support itself. Why
|
|
is "the greatest good for the greatest number" to be chosen over "what
|
|
*I* want"? An alternative is deontology; ethical principles derived
|
|
from the concept of duty. (Ironically, this philosophy, while
|
|
arguably superior to utilitarianism, is limited to Kohlberg's stage
|
|
four almost by definition.) Again, however, there is no underpinning
|
|
to the concept of duty, itself.
|
|
|
|
Ironically, the much maligned "Judeo-Christian Ethic" did have such a
|
|
foundation for moral standards--God. The theistic universe may yet
|
|
have the last laugh over the mechanical universe of B. F. Skinner's
|
|
"Beyond Freedom and Dignity". Maybe Jesus *is* the answer--or there
|
|
may be no answer.
|
|
|
|
Bibliography
|
|
|
|
Bontchev, "Are `Good' Viruses Still a Bad Idea?", Proceedings of the EICAR '94
|
|
Conference, pp.25-47, also
|
|
ftp://ftp.informatik.uni-hamburg.de/pub/virus/texts/viruses/goodvir.zip
|
|
|
|
Clarkson, "Windows Hothouse", 1994, 0-201-62669-1, U$34.95/C$44.95 - lots of
|
|
artificial life fun with Visual C++
|
|
|
|
Cohen, "It's Alive!", 1994, 0-471-00860-5, U$39.95 - an intriguing, provoking
|
|
and practical exploration of computer programs as "artificial life", but
|
|
somewhat narrow
|
|
|
|
Denning, ed., "Computers Under Attack", 1990, 0-201-53067-8 - collection of
|
|
essays roughly related to security, also "the net"
|
|
|
|
Ermann/Williams/Gutierrez, "Computers, ethics and society" - textbook for
|
|
computer ethics course: not great
|
|
|
|
Gordon, "Technologically Enabled Crime", 1994
|
|
|
|
Forester/Morrison, "Computer Ethics", 1994, 0-262-56073-9 - lots of great
|
|
stories, but short on analytical depth
|
|
|
|
Johnson, "Computer Ethics", 1994, 0-13-290339-3 - the basic work in the field,
|
|
thorough coverage and good discussion starter
|
|
|
|
Levy, "Artificial Life", 1992, 0-679-73489-8, U$13.00/C$17.00 - an interesting
|
|
wander through fields studying artificial life but no strong points
|
|
|
|
Neumann, "Computer-Related Risks", 1994, 0-201-55805-X, U$24.75 - exhaustive
|
|
examples from the RISKS-FORUM Digest of potential technological perils
|
|
|
|
Slade, "Robert Slade's Guide to Computer Viruses", 1994,
|
|
0-387-94311-0/3-540-94311-0, U$29.95 - chapter seven looks at the computer
|
|
virus and society
|
|
|
|
Thro, "Artificial Life Explorer's Kit", 1993, 0-672-30301-9, U$24.95/C$31.95 -
|
|
good fun, but little analysis
|
|
|
|
Wiener, "Digital Woes", 1993, 0-201-62609-8, U$22.95/C$29.95 - excellent
|
|
introduction to the risks of software
|
|
|
|
(A fuller bibliography on values education readings is available for those
|
|
demonstrating a willingness to put some effort into it, since, frankly, it's a
|
|
really disappointing field. Sarah Gordon's "Generic Virus Writer" paper has
|
|
significant resources here.)
|
|
|
|
copyright Robert M. Slade, 1995
|
|
Permission is granted to post this file, in full, on any system.
|
|
|
|
======================
|
|
DECUS Canada Communications, Desktop, Education and Security group newsletters
|
|
Editor and/or reviewer ROBERTS@decus.ca, RSlade@sfu.ca, Rob Slade at 1:153/733
|
|
Author "Robert Slade's Guide to Computer Viruses" (US contact 1-800-SPRINGER)
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 9 Mar 95 12:52:26 MST
|
|
From: Chris McDonald <cmcdonal@WSMR-EMH34.ARMY.MIL>
|
|
Subject: File 5-- Dutch Hacker Arrested
|
|
|
|
--------------Original message----------------
|
|
|
|
UTRECHT, THE NETHERLANDS, 1995 MAR 6 (NB) -- A Dutch student has
|
|
become the first person to be convicted of computer hacking in the
|
|
Netherlands. Ronald Oosteveen, a 22 year old Utrecht computer science
|
|
student, was handed down a six month suspended sentence by
|
|
magistrates last week, and was fined around $3,200
|
|
|
|
Oosteveen was accused of breaking into university, corporate and
|
|
government computers, following his arrested in March, 1993, just
|
|
three weeks after new Dutch anti-hacking legislation came into force.
|
|
|
|
Oosteveen was caught in the act of trying to hack into the computer
|
|
lines of a technical university in Delft near The Hague. He is also
|
|
thought to have been responsible for previous hacking attacks which
|
|
occurred before the new legislation came into force.
|
|
|
|
In court, prosecutors said that he was challenged by university staff
|
|
monitoring the computers, and police traced Oosteveen back to his
|
|
home. There, police found computer disks with evidence that he had
|
|
gained unauthorized access into the computer systems of several
|
|
companies and government offices in the Netherlands, Norway, and
|
|
Iceland.
|
|
|
|
Handing down its verdict, the court said computers were vital to a
|
|
modern society and it was "essential that information networks
|
|
not be violated."
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 25 Feb 1995 21:10:26 -0600 (CST)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 6--(fwd) Eyewitness account of 2/21 San Jose hearing, by C. Kaun
|
|
|
|
---------- Forwarded message ----------
|
|
[Reposted from misc.legal.computing]
|
|
|
|
From--ckaun@deimos.ads.com (Carl Kaun)
|
|
Subject--Religious Technology vs. Netcom-On-Line
|
|
Date--22 Feb 1995 23:38:17 GMT
|
|
|
|
Apologies if this turns out to be a duplicate post. It was supposed
|
|
to go out yesterday, but I think there were problems.
|
|
|
|
I attended the hearing described below. I did not take notes at the
|
|
hearing, and not being a lawyer, do not fully understand the nature of
|
|
the legal comments. Still, my recollections may have some benefit,
|
|
and are provided in that event. Question marks indicate where I did
|
|
not hear or cannot recall clearly what was said, or where I have a
|
|
question. Perhaps someone with legal background can answer some of
|
|
these. Where I am adding commentary should be clear from the use of
|
|
the first person, or by other qualifications. Full rights to
|
|
reproduce or reuse in any form are granted.
|
|
|
|
============
|
|
|
|
C-95-20091: Religious Technology vs. Netcom-on-Line, Judge Ronald Whyte
|
|
presiding -- 2/21/95 hearing at Federal Court in San Jose (10:00-11:00)
|
|
|
|
Plaintiffs: Attys McShane, Small, Korbin, others whose names I didn't
|
|
catch (5 total).
|
|
Defendants: Atty for Netcom and associate, Atty for Klemesrud
|
|
(operator of BBoard), Dennis Erlich
|
|
|
|
The purpose of the hearing was to show cause re. a preliminary
|
|
injunction (same as temporary restraining order or 'TRO'?).
|
|
|
|
Judge Whyte had initial concerns about whether the scope of the
|
|
seizure order was exceeded. He asked what material (on a list
|
|
provided by plaintiff, allegedly an inventory of materials taken in
|
|
the seizure) was trade secret, and what was copyrighted. Plaintiffs
|
|
could not identify which was what, and were given until Feb 24th to
|
|
provide that identification. There was some discussion about sealing
|
|
exhibits (presumably documents containing trade secrets), but no
|
|
materials to be sealed were identified.
|
|
|
|
Small made initial remarks, talking about the execution of the seizure
|
|
order and items taken. He said that Netcom could "write a program to
|
|
identify publications from sites (purportedly) publishing copyrighted
|
|
materials, to enable a more in-depth review of these". Plaintiff did
|
|
not seem to make many points with Judge Whyte.
|
|
|
|
Erlich provided a statement to the court, and made additional comments
|
|
to the effect that:
|
|
(1) materials in his possession were obtained legally, being
|
|
provided by various mechanisms including given or loaned by others
|
|
(presumably obtained legally by them?), being purchased, or obtained
|
|
as part of being a minister in the Church of Scientology. He
|
|
called the judge's attention particularly to documents identified
|
|
as being hardcopies in this regard.
|
|
(2) no materials were identified to him as trade secrets.
|
|
(3) postings to internet were made in form of commentary or satire (the
|
|
word 'satire' was a significant element in comments during the
|
|
early parts of the hearing), and were paragraphs or at most a
|
|
couple of pages, and constituted fair use of the materials.
|
|
(4) his use of the materials was not for monetary profit or gain
|
|
(inferring that it was therefore beyond the scope of copyright law?).
|
|
(5) (execution of?) the seizure order violated his 1st and 4th Amendment
|
|
rights, making him the aggrieved party, on which basis he was
|
|
entering suit (against the Church of Scientology and individuals
|
|
involved in the seizure).
|
|
(6) he was not permitted to monitor removal of materials, nor was
|
|
he provided an inventory of items taken, except as a single
|
|
unsigned page, and that because the materials were deleted, he
|
|
has no way to verify what was claimed to have been seized (had in
|
|
fact been in his possession?)
|
|
(7) he had indicated his willingness to cease publication of and
|
|
delete from his files any copyrighted or trade secret materials,
|
|
and had requested plaintiff provide a means to identify/verify
|
|
these, which plaintiff had not done.
|
|
|
|
The Attorney for Klemesrud submitted a brief to the court, and in
|
|
commment cited various precedent why Klemesrud should not be included
|
|
in the suit; and indicated the impact of requiring Klemesrud to comply
|
|
with what plaintiff wanted would be to shut down the B-board, thereby
|
|
removing access to Internet for some 500 users.
|
|
|
|
The Attorney for Netcom submitted a brief to the court, and in comment
|
|
merely indicated Netcom's role as essentially a common carrier, with
|
|
no control over content, and having no more liability than a
|
|
bookseller would have.
|
|
|
|
Somewhere along the line, attorneys for both Netcom and Klemesrud
|
|
indicated they were filing motions for dismissal. Small tried to
|
|
argue why they should not be dismissed with some sort of analogy about
|
|
how a private toll booth operator should deny highway access to a
|
|
particular car that had been described to the operator. I hope the
|
|
judge thought it as ridiculous as I did.
|
|
|
|
In subsequent comment, the attorney for Netcom made what I thought the
|
|
neatest point of the day. He pointed out that plaintiff could not
|
|
there in the court identify what was or was not copyrighted from a list
|
|
of materials in his possession, yet plaintiff was asking Netcom to
|
|
make that same determination nearly instantaneously on a very great
|
|
volume of material. The only alternative to this would be to block
|
|
access to individuals, for which there is absolutely no precedent.
|
|
|
|
Late in the hearing, Small tried to make some point about how Erlich
|
|
had initially cooperated with the seizure, but later on tried to block
|
|
it "when he had called the press and guzzled some beer". You had to
|
|
be there! Such inappropos slander attempts come across almost as CoS
|
|
signature. He also tried to express outrage that Erlich had a scanner and
|
|
was copying whole documents into his computer (even if it could be
|
|
established what was being scanned, aren't backup copies of
|
|
copyrighted materials allowed under various conditions?).
|
|
|
|
Judge Whyte released Netcom and Klemesrud from the injunction/TRO
|
|
"without prejudice" (??), and indicated he would replace the TRO
|
|
against Erlich with a more carefully worded one. A further hearing
|
|
with Erlich, etc. will occur on March 3rd. This might "take place
|
|
by telephone, to alleviate travel costs" (aren't hearings like this
|
|
supposed to be public, and doesn't a telephone conference preclude that?)
|
|
|
|
====
|
|
|
|
I was not impressed by any crispness in the arguments, e.g. to
|
|
establish any standards or boundaries (perhaps it is too
|
|
early for this). Indeed, I have seen clearer commmenting on the net.
|
|
|
|
One thing kind of surprised me -- I would have thought the court would
|
|
take possession of the purportedly copyrighted materials to insure
|
|
there was no tampering with "the evidence", especially given CoS'
|
|
reputation. This was not done, nor was there any suggestion made to do
|
|
so.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 26 Feb 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 7--Cu Digest Header Info (unchanged since 26 Feb, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB <your name>
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.21
|
|
************************************
|
|
|