907 lines
41 KiB
Plaintext
907 lines
41 KiB
Plaintext
|
|
Computer underground Digest Sun Feb 16, 1997 Volume 9 : Issue 09
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.09 (Sun, Feb 16, 1997)
|
|
|
|
File 1--Cyber Angels FACES Project
|
|
File 2--FYI: "Contributory copyright infringement"
|
|
File 3--Re: "Hacking Chinatown"
|
|
File 4--Coalition Letter on Privacy and Airline Security
|
|
File 5--BELLSOUTH CHALLENGES AT&T ACCESS CHARGE PROPOSAL (fwd)
|
|
File 6--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Sun, 9 Feb 1997 18:40:06 +0000
|
|
From: David Smith <bladex@bga.com>
|
|
Subject: Fle 1--Cyber Angels FACES Project
|
|
|
|
Attached is an excerpt from the December Cyber Angels bulletin
|
|
containing the details of their FACES project.
|
|
|
|
|
|
------- Excerpt Begins -------
|
|
|
|
****************************************************************
|
|
|
|
USENET TEAM NEWS
|
|
|
|
USENET "FACE" PROJECT
|
|
|
|
"FACE" = FREEING ABUSED CHILDREN from EXPLOITATION
|
|
|
|
WE ARE IN THE PROCESS OF CONSTRUCTING AN ONLINE DATABASE OF THE
|
|
FACES OF THE CHILDREN WHO HAVE BEEN ABUSED AND PHOTOGRAPHED TO MAKE
|
|
CHILD PORNOGRAPHY
|
|
|
|
|
|
Child pornography as some of you no doubt know is regularly posted to the
|
|
Usenet. Child pornography is also illegal - that is why we are regularly
|
|
passing evidence to Federal Authorities that we gather from the Usenet.
|
|
|
|
Who are the children who are used in the child pornography that is posted
|
|
to the Usenet? Do you know any? How could you find out? That is exactly
|
|
what our FACE UNIT is all about. Our volunteers spend time each week
|
|
finding child pornography posts on the Usenet, and cropping the picture so
|
|
that just the child's face is left. These faces - the faces of innocent
|
|
children who are the victims of abuse crimes by adults - are then passed
|
|
with the full header reference to our FACE UNIT Leader. The images are
|
|
then posted up to our website, in the hope that as thousands of people pass
|
|
through our website someone somewhere may recognize the face of someone in
|
|
our online database and then we can contact law enforcement and perhaps
|
|
bring someone to justice and rescue an abused child.
|
|
|
|
To help on this unit you need to have cropping ability - in other words the
|
|
ability to take a jpg image and cut out the child's face and make a new jpg
|
|
out of it.
|
|
|
|
NB For legal reasons the FACE UNIT accepts only volunteers 18 years old and
|
|
above. You may like to know that this work follows guidelines given to us
|
|
by Federal Authorities.
|
|
|
|
This is pioneering work! YOU can help us! Contact me if you are inspired
|
|
to assist us.
|
|
|
|
The FACE database will open at our main site at the beginning of January.
|
|
|
|
****************************************************************
|
|
|
|
---- Excerpt Ends ----
|
|
|
|
I feel such a database would be a case of "double victimization" --
|
|
that someone who was the victim of child pornography would not want
|
|
pictures of their faces openly distributed. No one I've spoken to
|
|
thinks this is a good idea.
|
|
|
|
In an exchange of e-mail, Gabriel Hatcher (gabriel@cyberangels.org) politely
|
|
disagreed, suggesting that their project would identify children
|
|
who are currently being abused and thus rescue/save them from
|
|
suffering. He's heard nothing but positive feedback, and is working
|
|
with various law enforcement officials to make sure the project is
|
|
done properly.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 17 Feb 1997 17:48:03 -0600 (CST)
|
|
From: Jim Davis <jdav@mcs.com>
|
|
Subject: Fle 2--FYI: "Contributory copyright infringement"
|
|
|
|
-----
|
|
Date--Sun, 16 Feb 1997 00:15:27 -0600 (CST)
|
|
From--Netiva Caftori <uncaftor@uxa.ecn.bgu.edu>
|
|
|
|
This is a report David Loundy from CPSR Chicago prepares for a committee
|
|
which he chairs. fyi
|
|
|
|
Netiva Caftori, DA (CS dept) e-mail--n-caftori@neiu.edu /\/\/\/\/\
|
|
Northeastern Illinois Univ. http://www.neiu.edu/users/uncaftor/home.html
|
|
|
|
Date--Sat, 15 Feb 1997 14:42:14 -0500
|
|
From--"David J. Loundy" <David@loundy.com>
|
|
|
|
The Law Office of
|
|
David J. Loundy
|
|
465 Pleasant Avenue Phone: (847) 926-9744
|
|
Highland Park, Illinois Electronic Mail: David@Loundy.com
|
|
60035-4909 World Wide Web: http://www.Loundy.com/
|
|
|
|
|
|
ISBA INTELLECTUAL PROPERTY SECTION COUNCIL
|
|
INTERNET LAW SUBCOMMITTEE REPORT
|
|
February 13, 1997
|
|
Compiled by David Loundy
|
|
|
|
A final decision has been reached in the Sega v. MAPHIA case. The court
|
|
held that a BBS operator who ran a pirate bulletin board for the
|
|
distribution of video games was guilty of contributory copyright
|
|
infringement (though direct infringement was not proven), federal trademark
|
|
infringement, California trade name infringement, and state unfair
|
|
competition.
|
|
|
|
In Sega Enterprises Ltd v. Sabella, in the Northern District of California,
|
|
Sega was granted summary judgment on its claim of contributory copyright
|
|
infringement by a BBS operator. The defendant's BBS was used for the
|
|
uploading and downloading of pirated games on the BBS. Unlike in the Sega
|
|
v. MAPHIA case, the Court denied summary judgment on a trademark
|
|
infringement claim based on the system operator's claim that she was not
|
|
aware of, and did not authorize, the use of Sega's trademark on the pirated
|
|
games.
|
|
|
|
Hallmark cards received a "cease and desist" letter as a result of its use
|
|
of "E-Greetings," as a term for electronic cards marketed off its web site.
|
|
Hallmark has filed a challenge with the U.S. Trademark Office over Greet
|
|
Street's rights to use E-Greetings claiming the term "E-Greetings" or
|
|
anything else prefaced with "e-" is not suitable for trademark protection.
|
|
|
|
An Oklahoma court has denied journalism professor Bill Loving's request for
|
|
an injunction against the University of Oklahoma. The University removed
|
|
access on its public news server to all of the "alt.sex" hierarchy of
|
|
usenet newsgroups after the group "Oklahomans for Children and Families"
|
|
complained that the newsgroups contained illegal content.
|
|
|
|
Legislation has been introduced in Maryland that would make it illegal to
|
|
send "annoying" or "embarrassing" e-mail. It is similar to a bill
|
|
currently working its way through the New York legislature.
|
|
|
|
Another suit was filed against the Communications Decency Act. The
|
|
webmaster of the "annoy.com" web site filed for a preliminary injunction
|
|
against Janet Reno on Jan. 30. The suit specifically targets the "with
|
|
intent to annoy" provision of the act, since that is what the web site is
|
|
intended to do. The creator's intent is to create an online service that
|
|
delivers scathing, anonymous postcards to public figures, as well as
|
|
provide controversial commentary on "hot button" issues. One of the
|
|
reasons behind the sites creation and accompanying lawsuit was the
|
|
creator's frustration that all of the press surrounding the CDA focused on
|
|
its attempts to protect minors, without addressing the impact on adult
|
|
speech.
|
|
|
|
Sen. Patrick Leahy introduced a bill that would repeal amendments to the
|
|
Communications Act made by the CDA. In the mean time, 22 members of
|
|
Congress filed an Amici Curiae brief with the Supreme Court in Reno v. ACLU
|
|
in support of the Communications Decency Act (the brief is available at
|
|
http://www.cdt.org/ciec/SC_appeal/970121_Cong_brief.html).
|
|
|
|
In New York, U.S. District Judge Kimba Wood has issued a temporary
|
|
restraining order against Richard Bucci, an anti-abortion activist who
|
|
registered the domain name "plannedparenthood.com." Mr. Bucci registered
|
|
the domain and set up a web site labeled as "Planned Parenthood's Home
|
|
Page" from which he sold an anti-abortion book. Planned Parenthood
|
|
Federation of America has sued Bucci alleging his use of the group's name
|
|
constitutes trademark infringement. A Feb. 20 hearing on a motion for a
|
|
preliminary injunction is scheduled.
|
|
|
|
A U.S. District Judge in North Carolina has denied Gateway2000's motion for
|
|
a preliminary injunction against gateway.com, Inc. for use of its domain
|
|
name. Gateway2000 claims that use of the domain name gateway.com
|
|
constitutes trademark infringement, trademark dilution, and predatory
|
|
business practices.
|
|
|
|
In Cardservice International, Inc. v. McGee, 1997 WL 16795 (E.D. Va. Jan.
|
|
17, 1996), Judge Clarke issued a permanent injunction against using
|
|
cardservice.com or csimall.com as a domain name-- stating that the use of
|
|
at least the cardservice.com name constitutes trademark infringement. It
|
|
is worth noting that csimall.com in no way resembles the plaintiff's
|
|
trademark, and was registered by the defendant to use to in "guerilla
|
|
warfare" against the plaintiff. For the first time in a domain name case
|
|
the judge also awarded attorneys' fees.
|
|
|
|
The Internet Ad-Hoc Committee has released its final report on how the
|
|
domain name system should be changed (available at http://www.iahc.org/).
|
|
The report recommends the creation of seven new top-level domains, plus the
|
|
creation of an international trademarks domain. It also advocates the
|
|
creation of a trademark domain under each individual country's top level
|
|
domain. The report also sets forth a plan that top level domain
|
|
administration will be shared by multiple registrars, including the .com
|
|
top level domain as soon as NSI's contract expires. The report calls for a
|
|
non-mandatory 60 day publication period on all registered domain names. It
|
|
also provides for a dispute resolution policy to be used for trademark
|
|
conflicts (which will probably be somewhat ineffectual).
|
|
|
|
In Heroes, Inc. v. Heroes Foundation, No. 96-1260, Judge Flannery found
|
|
that the defendants web page, along with a Washington Post ad, which
|
|
solicited charitable contributions from its location in New York
|
|
constituted sufficient minimum contacts to allow the court to exercise
|
|
jurisdiction in the trademark infringement action. The judge refused to
|
|
hold that the web page alone was enough to confer jurisdiction-- pointing
|
|
out some of the conflicting Internet jurisdiction cases.
|
|
|
|
Suit has been filed in the United States District Court for the Western
|
|
District of Pennsylvania by an Internet Service Provider against another
|
|
ISP and some of its staff. The claim is that the service provider spammed
|
|
the plaintiff and its users thereby violating Section 227(b)(1)(C) of the
|
|
Telephone Consumer Protection Act-- the "junk fax" law.
|
|
|
|
In Nevada, legislation has been introduced which would prohibit a sending
|
|
unsolicited e-mail to solicit a person to purchase real property, goods or
|
|
services unless the recipient has a pre-existing business relationship with
|
|
the message sender.
|
|
|
|
On February 3, 1997, Judge James L. Graham of the United States District
|
|
Court for the Southern District of Ohio preliminarily enjoined Cyber
|
|
Promotions, Inc. and its president, Sanford Wallace from e-mailing ads to
|
|
CompuServe subscribers. The Court argued that while making available an
|
|
e-mail account provides tacit approval to send e-mail to that account,
|
|
Cyber Promo's use of the CompuServe system exceeded any tacit approval and
|
|
therefore Cyber Promo's actions constitute a trespass to chattels.
|
|
|
|
Cyber Promotions, Inc. has settled with America Online, in part because of
|
|
having lost its fight against CompuServe. (In which the judge made some
|
|
comments about the applicability of his decision to the AOL case.)
|
|
According to a litigation attorney for AOL, Stanford Wallace (president of
|
|
Cyber Promo) "agreed to the entry of an injunction restricting him to use
|
|
only domains that could be blocked by AOL's Preferred Mail tool and which
|
|
requires him to provide a viable remove option for AOL members, he
|
|
dismissed all of his claims against AOL with prejudice and dismissed his
|
|
appeal of the state action/First Amendment decision which was pending in
|
|
the Third Circuit."
|
|
|
|
America Online has had another 5 class action suits filed against it
|
|
(bringing the total to 6) by customers who are unable to log on to the
|
|
service due to busy phone lines caused by increased usage after AOL
|
|
instituted a flat-rate pricing scheme. AOL settled with 36 state attorneys
|
|
general who became interested in AOL's problems by promising to offer
|
|
refunds, reduce advertising, hire more phone staff to handle cancellations,
|
|
put a notice on any advertising already in the works that there may be some
|
|
delays in logging on, and cap the subscriber base until its network
|
|
infrastructure has been improved.
|
|
|
|
A Florida mother is suing America Online, claiming it allowed a subscriber
|
|
to distribute pornographic pictures of her son and two other boys to
|
|
pedophiles. The suit alleges that AOL is breeding "a home shopping network
|
|
for pedophiles and child pornographers." Others claim that the suit is
|
|
analogous to suing New York for having pedophiles living in the city.
|
|
|
|
The Executive Committee of the New York State Bar Association has adopted
|
|
the bar association's opinion on the use of e-mail in attorney-client
|
|
communications. The opinion states that "merely because a communication
|
|
took place over e-mail, or by similar electronic means, it would not lose
|
|
its privileged nature." The opinion (at
|
|
http://www.nysba.org/committees/cplr/library/4547.html) does, however,
|
|
state that there are some communications that would be too sensitive to
|
|
trust to e-mail (such as communicating trade secrets or confessions).
|
|
|
|
The Consumer Internet Privacy Protection Act of 1997 (H.R. 97) has been
|
|
introduced in the House. The Act, among other things, provides that "an
|
|
interactive computer service shall not disclose to a third party any
|
|
personally identifiable information provided by a subscriber to such
|
|
service without the subscriber's prior informed written consent."
|
|
|
|
The 6th Circuit affirmed the dismissal of the indictment against Jake Baker
|
|
(by a 2-1 vote). Jake Baker is the former University of Michigan student
|
|
who posted a piece of "erotic fiction" on the Internet which described the
|
|
sexual torture and murder of a classmate, who was mentioned by name.
|
|
|
|
Jayne Hitchcock is suing the Woodside Literary Agency in New York federal
|
|
court alleging that people at or affiliated with the agency electronically
|
|
impersonated, harassed, and defamed her with what she describes as a
|
|
scorched-earth slander campaign in retaliation for her attempts to warn
|
|
others away from the agency. She received over 200 e-mail messages from a
|
|
forged address. Her literary agent received forged e-mail, reporting to be
|
|
from her, threatening to cancel her contract. Even a personal add was
|
|
forged stating "Female International Author, no limits to imagination and
|
|
fantasies, prefers group ma\cho/sadistic interaction including lovebites
|
|
and indiscriminate scratches. . . . Will take your calls day or night." was
|
|
posted to various places on the Internet-- listing Ms. Hitchcock's name,
|
|
address, and phone number. The suit seeks $10 million in damages.
|
|
|
|
An Internet scam has cost some Canadian victims up to $1,200 in phone
|
|
bills. Web surfers are offered the opportunity to download free nude
|
|
pictures from a web site, however, the people are told that they must
|
|
download a "special image viewer" first. The "viewing" software,
|
|
unbeknownst to most users, hangs up the modem from the user's local service
|
|
provider and quietly reconnects the call to a number in Moldavia. Canadian
|
|
police have ordered that all outgoing calls to the number in Moldavia be
|
|
blocked.
|
|
|
|
|
|
INTERNATIONAL
|
|
|
|
The United Arab Emirates state-owned Emirates Telecommunications
|
|
Corporation (Etisalat) has put into place national proxy servers which will
|
|
route all Internet traffic and censor selected Internet sites which
|
|
conflict with local moral values and traditions.
|
|
|
|
Berlin prosecutors have filed charges against Angela Marquardt, a leader of
|
|
Germany's reform communist Party of Democratic Socialism (PDS), for placing
|
|
a link on her home page to the outlawed Radikal magazine. A Berlin
|
|
prosecutor's office spokesman is quoted by Reuters as saying that "It is
|
|
illegal in Germany to teach others how to commit a felony or to sanction a
|
|
felony."
|
|
|
|
Attorneys for the Australasian Mechanical Copyright Owners Society (AMCOS)
|
|
and the Australian Music Publishers Association Limited (AMPAL) forced have
|
|
shut down Internet archives of song lyrics and MIDI (Musical Instrument
|
|
Digital Interface) files located at two Australian Universities (Monash
|
|
University and the University of Western Sydney) to remove the material
|
|
from sites at those schools.
|
|
|
|
|
|
|
|
MISCELLANEOUS
|
|
|
|
WebTV and OnCommand, Inc. have teamed up to provide Internet access in
|
|
hotel rooms to business travellers. The companies claim that half of all
|
|
business travellers already subscribe to an on-line service.
|
|
|
|
UPS is making its database of digitized signatures available to anyone with
|
|
a computer, modem, and package tracking number. You can download the
|
|
software from the Internet and have your modem reconnect to an 800 number
|
|
for access to the database.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 10 Feb 1997 19:51:22 -0800 (PST)
|
|
From: Daniel Brown <bidorn19@idt.net>
|
|
Subject: Fle 3--Re: "Hacking Chinatown"
|
|
|
|
> Re CuD - -"Hacking Chinatown"
|
|
>
|
|
> "Hacking Chinatown"
|
|
> by
|
|
> Richard Thieme
|
|
|
|
This article agitates the long-abused word 'hack'. As I call myself a
|
|
hacker, I wish to clean up this mess thoughoughly. I invite you to RTFM
|
|
-- try reading the Jargon File (http://www.ccil.org/jargon).
|
|
|
|
First of all, nothing I do which I call hacking is illegal, or frowned
|
|
upon by security people. Some who read, say, alt.2600, are in another
|
|
boat than I am. What do I call hacking? Here's an excerpt from the
|
|
Unofficial alt.hackers FAQ:
|
|
|
|
In short, hacking is about using available technology in a creative
|
|
way to solve a problem. It can be a stupid problem and an ugly
|
|
solution, as long as it is a new and creative solution. Hacking
|
|
extends to all forms of technology, not just computers--using the
|
|
thighbone of an antelope to bash in the head of another antelope was
|
|
an excellent hack.
|
|
|
|
As well, a 'hack' is often an object. A section of code could be an
|
|
example, if you 'hacked it up'. I have a home-made
|
|
headphone-to-"line in" converter (it's a headphone plug I put into my CD
|
|
player, and soldered to it are "line in" wires for left and right sound that
|
|
goes into my cassette/radio player), and I call that a mini hack.
|
|
|
|
Do you get the idea?
|
|
|
|
On a historical note, many crackers think the history of hacking begins
|
|
the same as all hackers know it ... that TMRC at MIT (late 1950s) was the
|
|
birthplace of curious techies who called themselves 'hackers', who found
|
|
the TX-0, and worked on this first of the minicomputers, and their
|
|
influence spread to places like the SAIL. Where the ideas diverge is
|
|
that crackers, quite possibly from Levy's book named "Hackers" (1984),
|
|
think that that culture died (quite possibly when MIT's ITS machine was
|
|
shut down) and now the current "breed" of hackers are those who crack
|
|
security.
|
|
|
|
Wrong. How that definition arrived was by journalistic misuse of the
|
|
work 'hackers', after some hackers who were curious about security got
|
|
into the habit of cracking BBSs. (The first word used to defend against
|
|
this misuse was to call people who did this 'worms'; this failed, and a
|
|
couple years later, the term 'cracker' got started.) The original
|
|
culture did not die per se; hackers still continued to thrive (there
|
|
were other ITS machines, most notably at SAIL; micros were another
|
|
interest). But this small minority of crackers within hackerdom got
|
|
media attention, and soon the public's definition of hackers turned and
|
|
took on approximately the same definition today. What do you get?
|
|
People who call them hackers but never saw a minicomputer in their life,
|
|
beleive IBM invented the PC, and think hacking is all about cracking.
|
|
|
|
The culture that was spawned in MIT has a direct link to the real hacker
|
|
culture of today. The interests have not really changed.. hackers still
|
|
create their own Operating System (Linux comes to mind), still optimize
|
|
code for speed, still find solutions to unique problems, .. you get the
|
|
idea. I mean to say that cracking isn't "the current generation of
|
|
hacking". The two are different, and I'm tired of one marring the
|
|
validity of the other (cracking on hacking).
|
|
|
|
Specific responses follow...
|
|
|
|
> Hacking means tracking -- and counter-tracking -- and
|
|
> covering your tracks -- in the virtual world. Hacking means
|
|
> knowing how to follow the flow of electrons to its source and
|
|
> understand on every level of abstraction -- from source code to
|
|
> switches and routers to high level words and images -- what is
|
|
> really happening.
|
|
|
|
You make understanding the idea of abstraction a wizardly concept, which
|
|
is bogus.
|
|
|
|
> Hackers are unwilling to do as little as possible. Hackers
|
|
> are need-to-know machines driven by a passion to connect
|
|
> disparate data into meaningful patterns. Hackers are the online
|
|
> detectives of the virtual world.
|
|
> You don't get to be a hacker overnight.
|
|
|
|
Actually, it's a lifestyle. You could develop hackish habits/
|
|
preoccupations (creating jargon, consuming curiosity, enjoying the
|
|
accomplishment of something unheard of, ...), but never know these same
|
|
qualities were common in a culture wich mades computers what they are
|
|
now. (I mean that. The person to invent the PC was a hacker who decided
|
|
to make a computer out of the Intel 4004, even though noone thought it
|
|
would be possible. Some Linux hackers look to the Nintendo 64 with a
|
|
similar inspiration -- a possible host for a Linux microkernel :)
|
|
|
|
You *could* "make" yourself into a hacker, though. If you drive yourself
|
|
crazy enough :-).
|
|
|
|
> The devil is in the details. Real hackers get good by
|
|
> endless trial and error, failing into success again and again.
|
|
|
|
Wrong. This is characteristic of crackers, and is primarily useful for
|
|
their art. (Should I dare call it so? Breaking into computers is *NOT*
|
|
beautiful). Real hackers avoid tedium, and read the manual(s) and devise
|
|
their hacks before making them. "Trial and error" is a facet of lacking
|
|
brilliance.
|
|
|
|
> Isn't it ironic that curiosity, the defining characteristic
|
|
> of an intelligent organism exploring its environment, has been
|
|
> prohibited by folk wisdom everywhere?
|
|
|
|
Cracking does not involve intelligence. At most, it involves 5%
|
|
cleverness spent on finding new exploits (that is, if the perpetrator has
|
|
nothing to exploit first), and 95% dogged determination (spent on
|
|
activities as garbaging). The mental capacity used for such skill aught
|
|
to be garbage collected for helpful activities. Graduate high school,
|
|
and go to a university where real hackers will teach you.
|
|
|
|
> The endless curiosity of hackers is regulated by a higher
|
|
> code that may not even have a name but which defines the human
|
|
> spirit at its best. The Hacker's Code is an affirmation of life
|
|
> itself, life that wants to know, and grow, and extend itself
|
|
> throughout the "space" of the universe. The hackers' refusal to
|
|
> accept conventional wisdom and boundaries is a way to align his
|
|
> energies with the life-giving passion of heretics everywhere. And
|
|
> these days, that's what needed to survive.
|
|
|
|
You mean the Hacker Ethic? I always freely distribute my software (by
|
|
either putting it in the Public Domain or giving it the GNU Copyleft). What
|
|
about you?
|
|
|
|
> We know we build on quicksand, but building is too much fun
|
|
> to give up. We know we leave tracks, but going is so much more
|
|
|
|
The Free Software Foundation is a collection of hackers that makes
|
|
excellect freeware in alternative to proprietary tools. Much of their
|
|
software is ancient in that it was created a long time ago (in computer
|
|
historical terms, at least), but is still around today because it is
|
|
always maintained. If you say "we build on quicksand", I don't doubt you
|
|
talk about cracking, and it proves cracking is backwards, hacking is
|
|
forwards.
|
|
|
|
> To say that when we engage with one another in cyberspace we
|
|
> are "Hacking Chinatown" is a way to say that asking questions is
|
|
> more important than finding answers. We do not expect to find
|
|
> final answers. But the questions must be asked. We refuse to do
|
|
> as little as possible because we want to KNOW.
|
|
|
|
You say that asking questions is more important than the answers. True,
|
|
you can't seek something if you don't wonder about it (this true to
|
|
hacking too), but real hacking delights in finding the answers (or the
|
|
answers, depending on the purpose of the hack).
|
|
|
|
I really tell you, cracker ideals are teenagerisms about technology.
|
|
Hackers don't say thing in w!3rd w4yz, because there is no joy in that.
|
|
It also goes against the logical use of the English language (you can't
|
|
really hack if you can't think logically). Also, doing something in
|
|
retaliation is illogical (ie, breaking into the IRS to find the auditing
|
|
selection code, because the IRS refuses to release it) -- it isn't the
|
|
Right Thing, which would be a) work out the problem, or b) forget it.
|
|
|
|
There's a gulf of difference between hacking and the ecstatic feeling
|
|
that hackers get when they circumvent a limitation or apply something
|
|
brand new, and cracking which searches to satisfy a adolescent's
|
|
problem (I say this in psychological terms; all stages of life have their
|
|
problems to solve).
|
|
|
|
If you want to be a hacker, read my .sig. But if you don't, please
|
|
distinguish between the words 'hack' and 'crack'.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 12 Feb 1997 20:41:26 -0500
|
|
From: Dave Banisar <banisar@EPIC.ORG>
|
|
Subject: Fle 4--Coalition Letter on Privacy and Airline Security
|
|
|
|
A HTML version of this is available at
|
|
http://www.epic.org/privacy/faa/airline_security_letter.html
|
|
|
|
|
|
February 11, 1997
|
|
|
|
Vice President Albert Gore, Jr.
|
|
The White House
|
|
1600 Pennsylvanpia Ave, NW
|
|
Washington, DC 20500
|
|
|
|
Dear Mr. Vice President,
|
|
|
|
We are writing to you to express our views on the serious civil
|
|
liberties issues raised by recent government activities in the name of
|
|
airline security. These include recent orders issued by the Federal
|
|
Aviation Administration, and also proposals recommended by the White House
|
|
Commission on Aviation Safety and Security and the FAA Advisory Aviation
|
|
Security Advisory Committee.
|
|
|
|
Many of these proposals were developed in the highly-charged
|
|
atmosphere following the still-unsolved crash of TWA Flight 800 and reflect
|
|
a misguided rationale that something had to be done, no matter how marginal
|
|
in value or violative of individual rights.
|
|
|
|
We all feel strongly that air travel must be safe - nobody wants to
|
|
feel that to set foot on an airplane or an airport is to take a substantial
|
|
safety risk. However, basic civil liberties protected by the Constitution
|
|
should not be sacrificed in the name of improving air safety, especially
|
|
where the potential benefits are questionable. At the airport ticket
|
|
counter, passengers check their luggage, not their constitutional rights.
|
|
|
|
|
|
Identification
|
|
|
|
One area of concern is a secret FAA order issued in August 1995 and
|
|
apparently revised in October 1995. The FAA order purportedly requires
|
|
airlines to demand government-issued photo identification from all
|
|
passengers before they can board an airplane. It remains unclear whether a
|
|
passenger must provide that identification and what discretion an airline
|
|
has to allow, or refuse, any passenger to board if they refuse to provide
|
|
identification or simply do not have any available.
|
|
|
|
Americans are not required to carry government-issued
|
|
identification documents. Any requirement that passengers show
|
|
identification raises substantial constitutional questions about
|
|
violations of the rights to privacy, travel, and due process of law. The
|
|
Supreme Court has consistently struck down laws that interfere with the
|
|
constitutional right to travel. The Court has also overturned laws in a
|
|
variety of circumstances that require an individual to provide
|
|
identification in the absence of any specific suspicion that a crime has
|
|
been committed. In addition, it is unclear that requiring passenger
|
|
boarding an aircraft to identify him or herself actually makes the people
|
|
with whom they travel any safer. A bomber with a fake ID is just as
|
|
effective as a bomber with no ID.
|
|
|
|
We urge the FAA to withdraw its directive and to notify airlines
|
|
that identification should not be requested for security reasons. At a
|
|
minimum, the FAA should require airlines to post notices telling passengers
|
|
that they cannot be denied boarding just because they fail or refuse to
|
|
identify themselves.
|
|
|
|
|
|
Computer Databases and Profiling
|
|
|
|
Another major concern involves the proposed increased utilization
|
|
of the practice of "profiling" passengers to determine whether they pose a
|
|
security risk and should thus be searched. This would require the
|
|
collection of personal information on passengers prior to their boarding a
|
|
plane. Information that may be collected includes a picture or other
|
|
biometric identifier, address, flying patterns with a particular airline,
|
|
bill paying at a particular address, criminal records, and other
|
|
information. This, and information gleaned from observing the persons with
|
|
whom the passenger was traveling, would be fed into a computer data base
|
|
that would be used to decide whether the passenger "fits the profile" and
|
|
should be subjected to heightened security measures. Under this proposal,
|
|
the checked luggage of people selected by the computer would be scanned by
|
|
new sophisticated scanning devices.
|
|
|
|
The risks to privacy are enormous and run not only to those who
|
|
"fit the profile." For this system to be useful, it must apply to every
|
|
person who might take a flight, i.e., to everybody. A new government
|
|
dossier on everyone would have to be created, computerized, and made
|
|
accessible to airline personnel.
|
|
|
|
In addition, for the system to be useful, it would have to be
|
|
linked to other data bases and constantly updated. Each time a person
|
|
changes their address or takes another flight, or does anything related to
|
|
the characteristics about them deemed significant by the profiling system,
|
|
the government would track it. All of our experience with the creation and
|
|
updating of such ever-changing data bases teaches us that the likelihood of
|
|
inaccuracy at any given moment is high. The FBI, for instance, recognizes
|
|
that data in its computer system of criminal records has an inaccuracy
|
|
rate of 33 percent. Such inaccuracy would lead to both a breach of safety
|
|
and to violations of the rights of innocent people. This proposal is a
|
|
quick fix that won't fix anything.
|
|
|
|
The proposal also violates a central principle of the Code of Fair
|
|
Information Practices and the Privacy Act (5 U.S.C =A7 552a): information
|
|
given to the government for one purpose ought not be used for other
|
|
purposes without the consent of the person to whom it pertains. The use of
|
|
criminal records in such a data base, particularly where those records
|
|
include arrests that do not result in convictions, is particularly
|
|
troubling.
|
|
|
|
Profiling also frequently leads to discriminatory practices.
|
|
Already, we have received numerous reports of discrimination against
|
|
individuals and families with children who have been refused entry onto
|
|
aircraft because their names appeared to be of Middle-Eastern origin. In
|
|
the well publicized example of security guard Richard Jewel, reports
|
|
indicated that the FBI profile led the police to unfairly target Mr. Jewel
|
|
for the incident, even in the absence of other evidence. This incident
|
|
vividly shows the limitations of basing a law enforcement decision on a
|
|
profile.
|
|
|
|
We urge the FAA and airlines to discontinue the use of passenger
|
|
profiling.
|
|
|
|
X-Ray Cameras
|
|
|
|
We also view with concern proposals to install in airports new
|
|
cameras which can depict highly detailed images of individuals' bodies
|
|
under their clothes. Existing scanners, the development of which was
|
|
partially funded by the FAA, already show a revealing and invasive picture
|
|
of a naked body in high detail and the technology is likely to improve.
|
|
This is clearly a search under the Fourth Amendment and is far more
|
|
intrusive than a standard metal screening device. Passengers should not be
|
|
subject to an "electronic strip search" in order to board an aircraft. To
|
|
expose travelers' anatomies to the general public or even to selected (not
|
|
by the victim of the unreasonably intrusive search) strangers is extremely
|
|
embarrassing and shocking to the conscience.
|
|
|
|
We urge the FAA to reject proposals to use body scanners capable of
|
|
projecting an image of a person's naked body.
|
|
|
|
Secrecy
|
|
|
|
Much of the key decision-making surrounding these proposals has
|
|
been shrouded by secrecy. The FAA has claimed that it is exempt from open
|
|
government laws and has refused to release its directives on profiling and
|
|
identification. Relevant meetings have been closed to the public or limited
|
|
to participants who can afford to pay expensive fees.
|
|
|
|
We urge the FAA to publish its directives and open all further
|
|
decision making open to public scrutiny.
|
|
|
|
Conclusion
|
|
|
|
In conclusion, we believe that these proposals raise grave
|
|
constitutional issues and are likely to produce only minimally beneficial
|
|
results to improve airline safety. We urge the FAA and the advisory
|
|
commissions to focus their efforts on improving security in a balanced and
|
|
rational manner that is open to public scrutiny and consistent with
|
|
constitutional rights.
|
|
|
|
|
|
Sincerely,
|
|
|
|
|
|
Houeida Saad
|
|
American-Arab Anti-Discrimination Committee
|
|
|
|
Greg Nojeim
|
|
American Civil Liberties Union
|
|
|
|
Maher Hanania
|
|
American Federation of Palestine
|
|
|
|
James Lucier, Jr., Director of Economic Research
|
|
Americans for Tax Reform
|
|
|
|
Aki Namioka, President
|
|
Computer Professionals for Social Responsibility
|
|
|
|
Lori Fena, Executive Director
|
|
Electronic Frontier Foundation
|
|
|
|
David Banisar, Staff Counsel
|
|
Electronic Privacy Information Center
|
|
|
|
Ned Stone
|
|
Friends Committee on National Legislation
|
|
|
|
Judy Clarke, President
|
|
National Association of Criminal Defense Lawyers
|
|
|
|
Kit Gage, Washington Representative
|
|
National Committee Against Repressive Legislation
|
|
|
|
Audrie Krause, Executive Director
|
|
NetAction
|
|
|
|
Sharisa Alkhateeb
|
|
North American Council of Muslim Womem
|
|
|
|
Simon Davies, Director General
|
|
Privacy International
|
|
|
|
Robert Ellis Smith, Publisher
|
|
Privacy Journal
|
|
|
|
Evan Hendricks, Chairman
|
|
US Privacy Council and Publisher, The Privacy Times
|
|
|
|
Enver Masud
|
|
Executive Director
|
|
The Wisdom Fund
|
|
|
|
John Gilmore
|
|
Civil Libertarian and co-founder, The Electronic Frontier Foundation
|
|
|
|
|
|
-------
|
|
David Banisar (Banisar@epic.org) * 202-544-9240 (tel)
|
|
Electronic Privacy Information Center * 202-547-5482 (fax)
|
|
666 Pennsylvania Ave, SE, Suite 301 * HTTP://www.epic.org
|
|
Washington, DC 20003 * PGP Key
|
|
http://www.epic.org/staff/banisar/key.html =20
|
|
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 3 Feb 1997 16:50:24 -0500 (EST)
|
|
From: "noah@enabled.com" <noah@enabled.com>
|
|
Subject: Fle 5--BELLSOUTH CHALLENGES AT&T ACCESS CHARGE PROPOSAL (fwd)
|
|
|
|
From -Noah
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Mon, 27 Jan 1997 14:35:29 -0500 (EST)
|
|
From--BellSouth <press@www.bellsouth.com>
|
|
|
|
BellSouth ............................................January 24, 1997
|
|
|
|
BELLSOUTH CHALLENGES AT&T ACCESS CHARGE PROPOSAL
|
|
|
|
Background: AT&T told reporters Thursday that they will ask the Federal
|
|
Communications Commission to slash the price they pay to local telephone
|
|
companies for use of the local lines to deliver calls to businesses and
|
|
home customers.
|
|
|
|
The following response may be attributed to David J. Markey, BellSouth
|
|
vice president governmental affairs.
|
|
|
|
"As usual, AT&T is looking for a federally enforced free ride.
|
|
|
|
"The Commission should ignore their rhetoric and the Congress should
|
|
monitor this process closely.
|
|
|
|
"At risk is the ability of the local telephone industry to maintain and
|
|
improve the public telephone network.
|
|
|
|
"AT&T wants the FCC to ignore our real costs. The AT&T analysis of what
|
|
they think our costs ought to be is based on the so-called Hatfield model
|
|
which has not been accepted by most state commissions. TELRIC prices an
|
|
imaginary network and has been discredited by the noted economist, Alfred
|
|
Kahn who points out that the TELRIC approach doesn't take into
|
|
consideration the costs of maintaining the network or the costs of
|
|
universal service.
|
|
|
|
"Congress was told by the FCC that the so-called trilogy of proceedings
|
|
interconnection, universal service and access charges) would result in a
|
|
balanced implementation of the Telecommunications Act of 1996. We're
|
|
still looking for that balance.
|
|
|
|
"First the Commission ordered us to allow companies like AT&T to buy our
|
|
service at half price through the "unbundled elements" scheme. Then they
|
|
proposed a universal service regime that requires us to provide more
|
|
services, like wiring inside school buildings for which we are not fully
|
|
paid and now AT&T thinks we should give them another half-price ride on
|
|
our network.
|
|
|
|
"It's pretty clear that long distance oligopolists, offered the choice of
|
|
leasing our service below cost or spending money to build their own local
|
|
facilities, are choosing the cheap approach. At that rate, no one will
|
|
build their own networks. So, the improvements Congress envisioned and
|
|
the people were promised won't come. AT&T won't build it and we won't
|
|
have the money to and we may not even have the money to maintain the
|
|
network to the same high level customers have come to expect.
|
|
|
|
Some potential facilities based competitors, like cable companies, have
|
|
looked at the new and proposed rules and decided there's no way to pay for
|
|
network improvements if AT&T can cream-skim all the business by just
|
|
re-selling our service.
|
|
|
|
"The commission needs to ignore AT&T's posturing and provide the balance
|
|
they promised Congress."
|
|
|
|
|
|
(A copy of Dr. Kahn's letter can be found at
|
|
http://www.bellsouthcorp.com/headlines/bell_releases/97/jan/kahnltr.html)
|
|
|
|
####
|
|
|
|
BellSouth is a $19 billion communications services company. It provides
|
|
telecommunications, wireless communications, directory advertising and
|
|
publishing, video and information services to more than 25 million
|
|
customers in 17 countries worldwide.
|
|
|
|
|
|
##
|
|
|
|
Internet users: For more information about BellSouth Corporation visit the
|
|
BellSouth Webpage http://www.bellsouth.com
|
|
|
|
BellSouth Corporation news releases dating back one year are available by
|
|
fax at no charge by calling 1-800-758-5804, Ext. 095650.
|
|
|
|
|
|
For information: Bill McCloskey 202-463-4129
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 15 Dec 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: Fle 6--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.09
|
|
************************************
|
|
|