912 lines
40 KiB
Plaintext
912 lines
40 KiB
Plaintext
|
|
Computer underground Digest Sun May 11, 1997 Volume 9 : Issue 36
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.36 (Sun, May 11, 1997)
|
|
|
|
File 1--Credit Card Numbers put Online?? (fwd)
|
|
File 2--Jim Tyre responds to CyberSitter's Brian Milburn
|
|
File 3--TV interview w/2 hackers banned from computers
|
|
File 4--Fwd: intellectual property and graduate students
|
|
File 5--Georgia expands the "Instruments of Crime"
|
|
File 6--More on Gov't Goofs on Virus Hoaxes (Crypt Reprint)
|
|
File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Sat, 10 May 97 23:07:12 -0700
|
|
From: Joab Jackson@sun.soci.niu.edu, joabj@charm.net
|
|
Subject: File 1--Credit Card Numbers put Online?? (fwd)
|
|
|
|
Spider Came a Crawlin'
|
|
From: April 30, 1997, The Baltimore City Paper
|
|
|
|
"You mean my credit-card number is on the Internet?" Mike Donahue
|
|
of the town of Lafayette State, Indiana, asks, rather surprised.
|
|
|
|
I thought he knew. After all, that's where I got his name, his
|
|
phone number, and his Visa number.
|
|
|
|
Up until two weeks ago all anyone had to do to get info on
|
|
Donahue's credit card-and the cards of at least 11 other
|
|
people-was go to the Internet search engine Excite and type in
|
|
"Holabird Sports," the name of a Baltimore sporting-goods store.
|
|
Up popped what looked to be on-line order forms-credit-card
|
|
numbers included.
|
|
|
|
Whoops! Somebody messed up. Big time.
|
|
|
|
When I called to get Donahue's reaction and that of others whose
|
|
account numbers were on the Net, I was usually greeted with
|
|
befuddlement. They wanted to know how the numbers they provided to
|
|
a Web page in Maryland landed on a computer in California. The
|
|
owner of Holabird Sports, David Hirshfeld, is at a loss too; in
|
|
many ways he's also a victim, having angered his customers through
|
|
no fault of his own.
|
|
|
|
A lesson everyone learned is how rapidly the Internet can turn
|
|
local mistakes into global ones.
|
|
|
|
Nine months ago, Holabird Sports contracted Worldscape, a small
|
|
local Web-presence provider headed by a former stockbroker named
|
|
Morris Murray, to build and maintain a Web site. Holabird had been
|
|
doing mail-order business for more than two decades, so it seemed
|
|
natural to expand onto the Web. Hirshfeld didn't know much about
|
|
the Internet, but with Worldscape handling the site, he wouldn't
|
|
even need an Internet account. The on-line order forms filled out
|
|
by customers would be automatically converted into faxes and sent
|
|
to the sporting-goods store.
|
|
|
|
On April 3 one of Holabird's Web customers, Florida resident
|
|
Barbara Gehring, received an E-mail from an Internet user in St.
|
|
Louis informing her that her credit-card information was on-line.
|
|
Those fax files had become accessible.
|
|
|
|
"I was horrified," Gehring tells me by phone. She called Holabird;
|
|
on April 4, Murray removed the fax files as well as the entire
|
|
Holabird Web site, then called the people whose account numbers
|
|
and expiration dates were exposed. (Murray says he didn't phone
|
|
those whose expiration dates were not exposed, such as Donahue and
|
|
at least one other person I spoke with, because the lack of an
|
|
expiration date would have kept scofflaws from illegally using the
|
|
card numbers to make phone purchases.)
|
|
|
|
What had gone wrong? Worldscape set up its Web servers
|
|
incorrectly. The contents of any computer hooked to the Internet
|
|
can be partitioned into sections-some restricted for private use,
|
|
some accessible to others on the Net. Worldscape's restricted
|
|
areas-at least the one holding those Holabird fax files-were
|
|
misconfigured, making them accessible to the public. Murray
|
|
maintains the mistake occurred in mid-March when his system
|
|
administrator incorrectly linked two of Worldscape's file servers
|
|
together.
|
|
|
|
For a Web-presence provider, this is not a minor error. It's akin
|
|
to a bank accidentally leaving its customers' money in the alley
|
|
out back. But it was a little-traveled alley-the chance of someone
|
|
stumbling across that information was pretty slim. Murray's real
|
|
headache didn't begin until the records went onto Excite, a far
|
|
more trafficked site.
|
|
|
|
How did this happen? Excite's chief selling point is that it
|
|
updates its summaries of 50 million Web sites every three weeks,
|
|
the better to catch changes at frequently updated sites such as
|
|
on-line magazines. It would be impossible for even a horde of
|
|
librarians to catalog all the changes, so Excite uses a program
|
|
called a spider to automatically travel through the pages, copying
|
|
the text on each one and shipping it to Excite for indexing. The
|
|
spider found the Holabird customers' numbers and put them up on
|
|
the Web. Murray repeatedly asked Excite to erase the numbers from
|
|
its database, and the company repeatedly said it could not-thus
|
|
they stayed in view for nearly three weeks.
|
|
|
|
According to Kris Carpenter, product manager at Mountain View,
|
|
California-based Excite, all the information the search engine
|
|
holds is linked. "The way the underlying algorithms [used to
|
|
complete the Internet searches] are calculated is based on the
|
|
entire collection of documents," she tells me by phone. "To pull
|
|
even one throws off the calculation for the entire underlying
|
|
collection."
|
|
|
|
Excite's is an unusual design, and I wonder if it's a wise one. As
|
|
Murray says, "This thing is like a piece of stone that you can't
|
|
take any one part from. . . . What if there is a big
|
|
problem?They'll have to shut down the entire service."
|
|
|
|
In any event, the numbers disappeared from Excite by April 19, and
|
|
Murray reports that none of the Holabird customers have informed
|
|
him of any improper charges on their cards. So should we believe,
|
|
as Murray tells me, that the mistake shouldn't be blown out of
|
|
proportion? "The risk was very minimal," he says, likening the
|
|
danger to that of a shopkeeper surreptitiously using a customer's
|
|
credit-card number. But Murray is wrong. There is a major
|
|
difference-the difference between a few people being privy to your
|
|
credit-card information versus the entire world.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 6 May 1997 14:49:59 -0400
|
|
From: Declan McCullagh <declan@well.com>
|
|
Subject: File 2--Jim Tyre responds to CyberSitter's Brian Milburn
|
|
|
|
Source - Fight-Censorship
|
|
|
|
((MODERATORS' NOTE: Brian Milburn's block software has been
|
|
criticized for indiscriminate blocking of sites with minimal--if
|
|
any--sexual content, and of sites with politics to which Milburn
|
|
might object, including sites that criticize his software.
|
|
Bennett Haselton has been especially vocal (see CuD 9.33), and
|
|
Milburn has threatened him with litigation. The following is the
|
|
response of Haselton's attorney to Milburn's threat)).
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
Jim Tyre's response to Brian Milburn's letter is attached below.
|
|
|
|
Milburn's "demand letter" sent on April 24 is at:
|
|
http://www.peacefire.org/archives/SOS.letters/bm.2.bh.4.24.97.txt
|
|
|
|
One of my articles about Milburn's earlier threats is at:
|
|
http://cgi.pathfinder.com/netly/editorial/0,1012,453,00.html
|
|
|
|
Netly's Censorware Search Engine is at:
|
|
http://cgi.pathfinder.com/netly/spoofcentral/censored/
|
|
|
|
-Declan
|
|
|
|
**************
|
|
|
|
May 5, 1997
|
|
|
|
|
|
Mr. Brian Milburn
|
|
President, BY FAX TO
|
|
Solid Oak Software, Inc. (805) 967-1614
|
|
P.O. Box 6826 AND BY CERTIFIED MAIL
|
|
Santa Barbara, CA 93160 RETURN RECEIPT REQUESTED
|
|
|
|
|
|
Re: April 24, 1997 Demand Letter to Bennett Haselton
|
|
|
|
|
|
Dear Mr. Milburn:
|
|
|
|
This law firm represents Bennett Haselton with respect to your April 24,
|
|
1997 demand letter to him, received on April 29, 1997. Any further
|
|
communications concerning this matter should be directed to me, not to
|
|
Mr. Haselton.
|
|
|
|
It is not my custom to engage in lengthy discussions of the law with
|
|
non-lawyers, and I shall not vary from that custom here. I would
|
|
suggest that you have Solid Oak's attorneys contact me if there is
|
|
reason to discuss this matter further. However, I will make the
|
|
following remarks.
|
|
|
|
|
|
ALLEGED COPYRIGHT INFRINGEMENT
|
|
|
|
You write that:
|
|
|
|
"You have posted a program on your web site called 'CYBERsitter filter
|
|
file codebreaker'. This program illegally modifies and decodes data and
|
|
source code protected by U.S. and International intellectual property
|
|
laws.
|
|
|
|
"This program performs this action without permission of the copyright
|
|
owner. We demand that this program be removed immediately."
|
|
|
|
You should be perfectly well aware that your assertion that Mr.
|
|
Haselton's program modifies or decodes CYBERsitter source code is
|
|
factually incorrect. Further, as you know, Mr. Haselton's program is
|
|
not in any way a work-around of CYBERsitter, nor did Mr. Haselton hack
|
|
into Solid Oak's computers in order to create the program.
|
|
|
|
Mr. Haselton's program does indeed decode data from the CYBERsitter
|
|
filter file. However, there is no basis in the law for your assertion
|
|
that Mr. Haselton's program does so unlawfully. If Solid Oak's
|
|
attorneys believe otherwise, I would be interested in their thoughts.
|
|
In that regard, my personal observation is one of surprise at how basic
|
|
was the encryption algorithm used for the CYBERsitter filter file.
|
|
XORing each byte with a constant byte, such as Ox94, is a methodology
|
|
which has been well known for many years, and which is detectable with
|
|
great ease.
|
|
|
|
Applied Cryptography (2nd edition) by Bruce Schneier is a standard
|
|
reference. Mr. Schneier writes:
|
|
|
|
"The simple-XOR algorithm is really an embarrassment; its nothing more
|
|
than a Vigenere polyalphabetic cipher. Its here only because of its
|
|
prevalence in commercial software packages, at least those in the MS-DOS
|
|
and Macintosh worlds."
|
|
|
|
He continues, commenting on a slightly more sophisticated variant than
|
|
simple Ox94:
|
|
|
|
"There's no real security here. This kind of encryption is trivial to
|
|
break, even without computers. It will only take a few seconds with a
|
|
computer."
|
|
|
|
He concludes the discussion as follows:
|
|
|
|
"An XOR might keep your kid sister from reading your files, but it won't
|
|
stop a cryptanalyst for more than a few minutes."
|
|
|
|
With XOR (Ox94) being the extent of the filter file encryption, it
|
|
certainly should have been foreseeable to Solid Oak that the filter file
|
|
would be decrypted into plaintext, and I am surprised that the algorithm
|
|
was not publicized by people examining the program far earlier than was
|
|
the case.
|
|
|
|
Far more important, however, is that Mr. Haselton's program simply is
|
|
not a violation of any copyright law or of any copyright which Solid Oak
|
|
allegedly may have in the filter file. I suggest that Solid Oak's
|
|
attorneys review and explain to you the following cases, among others:
|
|
Vault Corp. v. Quaid Software Ltd., 847 F.2d 255 (5th Cir. 1988); Lewis
|
|
Galoob Toys, Inc. v. Nintendo of America, Inc., 964 F.2d 965 (9th Cir.
|
|
1992); and Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510 (9th
|
|
Cir. 1992).
|
|
|
|
I would also commend that your attorneys explain to you the copyright
|
|
doctrine of fair use, as set forth in 17 United States Code ("U.S.C.") =A7
|
|
107. One of the (nonexclusive) factors in determining whether the use
|
|
of copyrighted material is fair concerns "the purpose and character of
|
|
the use, including whether such use is of a commercial nature or is for
|
|
nonprofit educational purposes."
|
|
|
|
Solid Oak cannot seriously assert that Mr. Haselton's program is of a
|
|
commercial nature. On the other hand, Mr. Haselton can and will assert
|
|
that his program is for a nonprofit educational purpose. Specifically,
|
|
Solid Oak's stated blocking policy, at
|
|
http://www.solidoak.com/cybpol.htm is as follows:
|
|
|
|
CYBERsitter Site Filtering Policies
|
|
|
|
CYBERsitter may filter web sites and/or news groups that contain
|
|
information that meets any of the following criteria not deemed suitable
|
|
for pre-teen aged children by a general consensus of reports and
|
|
comments received from our registered users:
|
|
|
|
|
|
- Adult and Mature subject matter of a sexual nature.
|
|
- Homosexuality / Transgender sites.
|
|
- Pornography or adult oriented graphics.
|
|
- Drugs, Tobacco or alcohol.
|
|
- Illegal activities.
|
|
- Gross depictions or mayhem.
|
|
- Violence or anarchy.
|
|
- Hate groups.
|
|
- Racist groups.
|
|
- Anti-Semitic groups.
|
|
- Sites advocating intolerance.
|
|
- Computer hacking.
|
|
- Advocating violation of copyright laws.
|
|
- Displaying information in violation of intellectual property
|
|
laws.
|
|
- Information that may interfere with the legal rights and
|
|
obligations of a parent or our customers.
|
|
- Any site maintaining links to other sites containing any of the
|
|
above content.
|
|
- Any domain hosting more than one site containing any of the above
|
|
content.
|
|
- Any domain whose general policies allow any of the above content.
|
|
|
|
The above criteria is subject to change without notice.
|
|
|
|
|
|
Mr. Haselton has the right to test whether what CYBERsitter actually
|
|
blocks comports with Solid Oak's stated criteria, particularly given
|
|
some of the seemingly arbitrary decisions incorporated into
|
|
CYBERsitter. Mr. Haselton has the First Amendment right to be critical
|
|
of what CYBERsitter does and how it does it. Since the only way to
|
|
fully test what CYBERsitter blocks and to comment critically on the
|
|
functionality of CYBERsitter is to decrypt the filter file, Mr.
|
|
Haselton's program falls squarely within the fair use doctrine of 17
|
|
U.S.C. =A7 107.
|
|
|
|
Additional copyright arguments can be made, and, if necessary, will be
|
|
made. However, I hope that this is enough to convince Solid Oak's
|
|
attorneys that Solid Oak cannot prevail in an infringement action
|
|
against Mr. Haselton.
|
|
|
|
|
|
ALLEGED IMPERMISSIBLE LINKING
|
|
|
|
You state that Mr. Haselton has placed links to various Solid Oak sites
|
|
on the www.peacefire.org site. Of course you are correct, but your
|
|
assertion that Mr. Haselton needed permission to do this is nonsense. A
|
|
URL (the "U", of course, standing for "universal") is merely a machine
|
|
readable encoding of a label identifying the work in the form
|
|
how://where/what: It is no different than providing the card catalog
|
|
number for a book already in the library. Solid Oak already is on the
|
|
internet, where, by definition, its presence is public, regardless of
|
|
whether Solid Oak is a public corporation or a private corporation. Mr.
|
|
Haselton simply has told people where to find Solid Oak and given them
|
|
the means to get there without having to type in a URL. Would you
|
|
contend that Mr. Haselton needs your permission to write on the
|
|
Peacefire site that "The URL for Solid Oak Software, Inc. is
|
|
http://www.solidoak.com"? Would you contend that Mr. Haselton needs
|
|
your permission to state that Solid Oak's address is P.O. Box 6826,
|
|
Santa Barbara, CA 93160? That Solid Oak's telephone number is (805)
|
|
962-9853, or that its fax number is (805) 967-1614?
|
|
|
|
Since you are in the business of making internet software products, no
|
|
doubt you should appreciate that linking one web site to another, or to
|
|
hundreds of others, which in turn could be linked to thousands of
|
|
others, is the raison d'etre of the World Wide Web. If linking required
|
|
permission (which it does not) or was unlawful (which it is not) then,
|
|
as a practical matter, the web would die. Since Solid Oak's business
|
|
depends on the web flourishing, I doubt that you would want to see that
|
|
happen.
|
|
|
|
However, regardless of what you might want, there is no law and there is
|
|
no policy which prevents Mr. Haselton from including links to Solid Oak
|
|
on the Peacefire site. The same is true for Solid Oak's email
|
|
addresses, many of which are listed on Solid Oak's own web pages. Solid
|
|
Oak's URLs are pure information, not protected under any intellectual
|
|
property law of which I am aware. Disclosing and/or linking to them is
|
|
neither trespass nor any other offense.
|
|
|
|
Finally, although I consider the matter legally irrelevant, I note that
|
|
Solid Oak's site includes links to each of:
|
|
|
|
Parent Time http://pathfinder.com/ParentTime/Welcome/;
|
|
Microsoft http://www.microsoft.com/;
|
|
Quarterdeck http://www.quarterdeck.com/;
|
|
Windows95.com http://www.windows95.com/;
|
|
Berit's Best Sites for Children
|
|
http://db.cochran.com/db_HTML:theopage.db;
|
|
Discovery Channel http://www.discovery.com/; and
|
|
Family.Com http://www.family.com/.
|
|
|
|
If, prior to the date of your demand letter, you obtained written
|
|
permission from each of these sites to link to them, I would be
|
|
interested in seeing those writings. If, however, Solid Oak has not
|
|
obtained written permission for those links, one might wonder as to your
|
|
motivation in making your assertion that the links provided by Mr.
|
|
Haselton are in any way improper.
|
|
|
|
|
|
Perhaps I can understand your being upset with how easy it was for Mr.
|
|
Haselton to lawfully decrypt the weakly encrypted CYBERsitter filter
|
|
file. But being upset is one thing: accusing Mr. Haselton of criminal
|
|
conduct and threatening him with legal action (as you have done publicly
|
|
both recently and last December) is quite another. Mr. Haselton has no
|
|
desire to institute legal proceedings against you or Solid Oak if this
|
|
goes no further. Therefore, if you were just venting your frustration,
|
|
say so now and we will be done with this. Otherwise, I am confident
|
|
that Solid Oak's attorneys know where the proper court is, as do I.
|
|
|
|
|
|
|
|
BIGELOW, MOORE & TYRE, LLP
|
|
|
|
|
|
|
|
|
|
By:
|
|
JAMES S. TYRE
|
|
|
|
JST:hs
|
|
|
|
cc: Mr. Bennett Haselton
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 06 May 1997 20:55:42 -0400
|
|
From: Minor Threat <mthreat@paranoia.com>
|
|
Subject: File 3--TV interview w/2 hackers banned from computers
|
|
|
|
TV.COM is a weekly, 30-minute television show devoted to topics of
|
|
the Internet, online services, web pages and new computer
|
|
technology. The May 17th show will feature interviews with two
|
|
hackers who have been ordered by federal judges to stay away from
|
|
computers after they were found guilty of committing computer and
|
|
other crimes.
|
|
|
|
Minor Threat will discuss the details of his ban from the Internet
|
|
and how it will affect him when he is released and why he feels it
|
|
is unfair. His crime was not computer-releated, but the judge
|
|
believed he had the capability to electronically retaliate against
|
|
the arresting officer by altering his credit rating and so,
|
|
ordered an Internet ban placed on him. Minor Threat was
|
|
interviewed early April at FCI Bastrop where he is currently
|
|
serving a 70-month sentence. His web page is at
|
|
www.paranoia.com/~mthreat/.
|
|
|
|
Notorious computer hacker Kevin Poulsen was released from federal
|
|
prison last summer after serving 51 months and is now struggling
|
|
to cope with a life without computers. Having been surrounded by
|
|
computers up until his capture in 1991, his life has drastically
|
|
changed since he is currently prohibited from touching or being in
|
|
the same room as one. He will discuss the difficulties he faces as
|
|
a non-computer user in a high-tech environment. His web page is
|
|
at www.catalog.com/kevin/.
|
|
|
|
Please check the TV.COM web site (www.tv.com) for local time and
|
|
channel listings in your area.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 8 May 97 12:12:34 -0700
|
|
From: "Gordon R. Meyer" <grmeyer@apple.com>
|
|
Subject: File 4--Fwd: intellectual property and graduate students
|
|
|
|
Date--Thu, 1 May 1997 08:49:19 -0700
|
|
From--Tony Rosati <rosati@gusun.acc.georgetown.edu>
|
|
|
|
Source - nagps-official@nagps.org
|
|
|
|
Intellectual Property May Prove to Be the Pressing Graduate &
|
|
Professional Student Concern at the Turn of the Century!
|
|
|
|
Find Out How YOU Can Help NAGPS Prepare to Help Save YOUR Intellectual
|
|
Property Rights!
|
|
|
|
by Anthony Rosati
|
|
NAGPS Information Exchange Coordinator
|
|
|
|
Recently, at the Annual NAGPS Southeastern Regional Meeting, in Atlanta
|
|
this past April 11-13, Anne Holt, former SE Regiona Coordinator for
|
|
NAGPS & Speaker of the Congress of Graduate Students of Florida State
|
|
University gave a presentation & presided over a Roundtable on
|
|
Intellectual Property. Her findings shocked the entire room of attendees.
|
|
|
|
She started off using her school, FSU, as a starting point. She pointed
|
|
out that at FSU, graduate & professional students, and even undergraduate
|
|
students, fall under the faculty guidelines for intellectual property,
|
|
regardless of whether they are working for the university or simply
|
|
matriculated. In addition, the FSU faculty handbook, in the section where
|
|
IP issues are discussed, clearly points out that even in areas that are
|
|
unrelated to the work done at the university and abny work done at home or
|
|
after-business-hours is encompassed. It even explicitedly stated that
|
|
AFTER one left the FSU, one's work, whether reklated to the support
|
|
received from FSU or not, could be claimed by FSU and was, for all intents
|
|
and purposes, theirs to lay claim to. We were all shocked. It basically
|
|
stated that regardless of whether you were working on campus or not,
|
|
working during business hours or not, working on something you were
|
|
matriculated or hired for, if you came up with it, it belonged to the FSU.
|
|
|
|
Anne mentioned several cases, including one of a Univ. of South Florida
|
|
graduate student, who documented that he worked on a computer software
|
|
package off-hours and at home, without any resources from the university,
|
|
and yet is still sitting in a jail cell awaiting trial.
|
|
|
|
Then Anne Holt began asking attendees what their schools' IP policies
|
|
were. Only a handful of individuals could cite them, and even fewer
|
|
realized that they may be covered by such policies.
|
|
|
|
Anne Holt is now spearheading an investigation for NAGPS into what
|
|
policies
|
|
exist at different schools. She would like to collect as many policies as
|
|
possible from different institutions. If you can, please send the relavent
|
|
excerpts by e-mail to NAGPS-IP-CRISIS@NAGPS.ORG, or if transcribing that
|
|
information into an e-mail message is too daunting or too large, please
|
|
send a hardcopy or photocopy of the policy to
|
|
|
|
Anthony V. Rosati
|
|
NAGPS Information Exchange Coordinator
|
|
6630 Moly Drive
|
|
Falls Church, VA 22046
|
|
ATTN: IP Crisis
|
|
|
|
Anne & I will pour through the resulting collection and distill the
|
|
results into a document for us by all NAGPS Members. Additionally,
|
|
a recommended policy for Intellectual Property concerns between students
|
|
and institutions of higher learning, as well as a draft position statement
|
|
for the Association will be created and presented to the Membership at the
|
|
New Orleans Meeting this coming October for amendment & ratification.
|
|
|
|
Before parting, Anne & I wanted to remind all that with the future of
|
|
Intellectual Property becoming unstable and confusing, only YOU can
|
|
best protect your Intellectual Property by:
|
|
|
|
(1) Knowing your rights under the contract(s) you signed when
|
|
matriculating and/or accepting work with the university.
|
|
(2) Knowing the current state & federal laws regarding the
|
|
protection and claiming of Intellectual Property.
|
|
(3) carefullly documenting the conditions, resources and
|
|
chronology of your research and intellectual effort,
|
|
regardless of its status.
|
|
(4) Working with a strong advocacy group, like the AAUP, or
|
|
the NAGPS, to ensure your rights are understood and
|
|
addressed by local, regional & national legislatures.
|
|
|
|
You can learn some more about Intellectual Property Rights by going to the
|
|
NAGPS Web site at http://www.nagps.org/NAGPS/ and clicking on the Focus
|
|
Issues link - from there, click on the Legislative Issues link and go to
|
|
the bottom of the page.
|
|
|
|
Regards,
|
|
|
|
Anthony Rosati
|
|
NAGPS Infromation Exchange Coordinator
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 02 May 1997 09:59:58 -0400
|
|
From: "Robert A. Costner" <pooh@efga.org>
|
|
Subject: File 5--Georgia expands the "Instruments of Crime"
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
+++++++++++++
|
|
|
|
In Georgia it is a crime, punishable by $30K and four years to use in
|
|
furtherance of a crime:
|
|
|
|
* a telephone
|
|
* a fax machine
|
|
* a beeper
|
|
* email
|
|
|
|
The actual use of the law, I think, is that when a person is selling drugs
|
|
and either is in possession of a beeper, or admits to using the phone to
|
|
facilitate a meeting, he is charged with the additional felony of using a
|
|
phone. This allows for selective enforcement of additional penalties for
|
|
some people.
|
|
|
|
O.C.G.A. 16-13-32.3.
|
|
|
|
(a) It shall be unlawful for any person knowingly or intentionally to
|
|
use any communication facility in committing or in causing or
|
|
facilitating the commission of any act or acts constituting a felony
|
|
under this chapter. Each separate use of a communication facility
|
|
shall be a separate offense under this Code section. For purposes of
|
|
this Code section, the term "communication facility" means any and all
|
|
public and private instrumentalities used or useful in the
|
|
transmission of writing, signs, signals, pictures, or sounds of all
|
|
kinds and includes mail, telephone, wire, radio, computer or computer
|
|
network, and all other means of communication.
|
|
|
|
(b) Any person who violates subsection (a) of this Code section shall
|
|
be punished by a fine of not more than $30,000.00 or by imprisonment
|
|
for not less than one nor more than four years, or both.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 2 May 1997 15:08:43 -0500 (CDT)
|
|
From: Crypt Newsletter <crypt@sun.soci.niu.edu>
|
|
Subject: File 6--More on Gov't Goofs on Virus Hoaxes (Crypt Reprint)
|
|
|
|
((MODERATORS NOTE: For those unfamiliar with Crypt Magazine,
|
|
you should check it out. The homepage is at:
|
|
http://www.soci.niu.edu/~crypt - and the editor, George Smith,
|
|
is to covering computer viruses what Brock Meeks and
|
|
Declan McCullagh are to Net politics)).
|
|
|
|
|
|
CRYPT NEWSLETTER 42
|
|
April -- May 1997
|
|
|
|
|
|
HOISTED ON THE PETARD OF PENPAL
|
|
|
|
In an astonishing gaffe, government intelligence experts writing
|
|
for the Moynihan Commission's recent "Report . . . on Protecting
|
|
and Reducing Government Secrecy" reveal they've been hooked on one
|
|
of the Internet's ubiquitous e-mail computer virus hoaxes
|
|
known as "Penpal Greetings"!
|
|
|
|
In a boldly displayed boxed-out quote (page 109) in a part of the
|
|
report entitled "Information Age Insecurity" authors of the report
|
|
proclaim:
|
|
|
|
"Friendly Greetings?
|
|
|
|
"One company whose officials met with the Commission warned its
|
|
employees against reading an e-mail entitled Penpal Greetings.
|
|
Although the message appeared to be a friendly letter, it
|
|
contained a virus that could infect the hard drive and destroy all
|
|
data present. The virus was self-replicating, which meant that
|
|
once the message was read, it would automatically forward itself
|
|
to any e-mail address stored in the recipients in-box."
|
|
|
|
The Penpal joke is one in half-a-dozen or so permutations spun
|
|
off the well-known GoodTimes e-mail virus hoax. Variations on
|
|
GoodTimes have appeared at a steady rate over the past couple
|
|
years. Real computer security experts -- as opposed to the
|
|
Moynihan commission's -- now occasionally worry in the press that
|
|
they spend more time clearing up confusion created by such
|
|
tricks than destroying actual computer viruses.
|
|
|
|
The report's authors come from what is known as "the Moynihan
|
|
commission," a group of heavy Congressional and intelligence
|
|
agency hitters tasked with critiquing and assessing the Byzantine
|
|
maze of classification and secrecy regulation currently embraced by
|
|
the U.S. government. The commission also devoted significant print
|
|
space to the topic of information security and network intrusion.
|
|
|
|
Among the commission's members are its chairman, Daniel Moynihan;
|
|
vice-chairman Larry Combest, Jesse Helms, ex-CIA director John
|
|
Deutch and Martin Faga, now at a MITRE Corporation facility in McLean,
|
|
Virginia, but formerly a head of the super-secret, spy satellite-flying
|
|
National Reconnaissance Office.
|
|
|
|
The part of the commission's report dealing with "Information Age
|
|
Insecurity" merits much more comment. But in light of the report's
|
|
contamination by the Penpal virus hoax, two paragraphs from the March 4
|
|
treatise become unintentionally hilarious:
|
|
|
|
"Traditionally, computer security focuses on containing the effects of
|
|
malicious users or malicious programs. As programs become more complex,
|
|
an additional threat arises: _malicious data_ [Crypt Newsletter emphasis
|
|
added] . . . In general, the outlook is depressing: as the economic
|
|
incentives increase, these vulnerabilities are likely to be
|
|
exploited more frequently.
|
|
|
|
---W. Olin Sibert, 19th National Information Systems Security
|
|
Conference (October 1996)"
|
|
|
|
And,
|
|
|
|
"Inspector General offices, with few exceptions, lack the personnel,
|
|
skills, and resources to address and oversee information systems
|
|
security within their respective agencies. The President cannot turn to
|
|
an Information General and ask how U.S. investments in information
|
|
technology are being protected from the latest viruses, terrorists, or
|
|
hackers."
|
|
|
|
Got that right, sirs.
|
|
----------------------
|
|
|
|
Notes: Other authors of the commission report include Maurice
|
|
Sonnenberg, a member of the President's Foreign Intelligence Advisory
|
|
Board; John Podesta, a White House Deputy Chief of Staff and
|
|
formerly a visiting professor at Georgetown University's Cyberlaw
|
|
Center; Ellen Hume, a media critic for CNN's "Reliable Sources"
|
|
and former reporter for the Wall Street Journal and Los Angeles Times;
|
|
and Alison Fortier, a former National Security Council staffer and
|
|
current director of Missile Defense Programs in a Washington,
|
|
D.C.-based arm of Lockheed Martin.
|
|
|
|
The Penpal Greetings hoax appeared in November of 1996 which would
|
|
seem to indicate the section of the report containing it was not written
|
|
until a month or so before the report's publication on March 4 of
|
|
this year.
|
|
|
|
Unsurprisingly, much of the report appears to be written by staff
|
|
members for the commission chairmen. An initial phone call to
|
|
the commission was answered by a staffer who declined to name the
|
|
author of the part of the report carrying the Penpal hoax. The
|
|
staffer did, however, mention he would forward the information to
|
|
the author. And he was as good as his word. The following week,
|
|
Crypt Newsletter was told to get in touch with Alison Fortier
|
|
by way of Jacques Rondeau, a U.S. Air Force colonel who served as
|
|
a commission staff director and was instrumental in writing the
|
|
chapter on "computer insecurity."
|
|
|
|
Fortier was surprised by the information that Penpal Greetings
|
|
was a hoax and could shed no light on the peer-review process that
|
|
went into verifying items included as examples in the report. She
|
|
said the process involved readings of the material by staffers to
|
|
the commissioners. Examples were presented and this was one of
|
|
the ones that was picked, apparently because it sounded good.
|
|
|
|
At first, Fortier argued that Penpal Greetings, as an example,
|
|
was difficult to distinguish from the truth. Indeed, Fortier wasn't
|
|
even convinced it wasn't a real virus. And this demonstrates the thorny
|
|
problem that arises when hoaxes work their way into the public
|
|
record at a very high level of authority: Simply, there is a great
|
|
reluctance to accept that they ARE rubbish, after the fact, because the
|
|
hearsay has come from multiple, supposedly authoritative, sources.
|
|
|
|
Crypt Newsletter then told Fortier that verification of whether or
|
|
not Penpal was bogus could have been accomplished by spending five
|
|
minutes of time on any of the Internet search engines and using it
|
|
as a keyword ("Penpal Greetings" returns numerous cites indicating
|
|
it is a hoax) and the Moynihan commissioner backed off on insistence
|
|
that it might still be real.
|
|
|
|
"It's unfortunate that this error occurred because it can interfere
|
|
with the recommendations of the commission, which are still valid,"
|
|
Fortier said. "When policy meets science -- it's always an imperfect
|
|
match."
|
|
|
|
Crypt Newsletter also queried commissioner and ex-NRO director Martin
|
|
Faga. "I've been aware of the error since shortly after
|
|
publication of the report, but I'm not familiar with the background," Faga
|
|
told Crypt.
|
|
|
|
Commissioner Ellen Hume was also at a loss as to how Penpal Greetings
|
|
had arrived in the report.
|
|
|
|
Commission staff director Eric Biel had more to say on the subject in a
|
|
letter to Crypt Newsletter dated April 24. In it, Biel wrote: "I am
|
|
very frustrated that we failed to get our information correct in
|
|
this regard; as you note, the error only adds to the confusion
|
|
concerning a very complicated set of security issues. You are quite
|
|
right when you indicate this portion of the report was added late
|
|
in the day. We had been urged to provide some anecdotes to complement
|
|
the narrative text; this example thus was added to give greater
|
|
emphasis to the points already being described . . . Obviously, there
|
|
was not an adequate fact-checking and verification process with
|
|
respect to the Penpal information."
|
|
|
|
Biel added that he was still confident of "the soundness of [the
|
|
report's] findings and recommendations, including [those in the chapter
|
|
'Information Age Insecurity.']"
|
|
|
|
Go ahead, contact the Moynihan Secrecy Commission at 202-776-8727
|
|
and verify for them that Penpal Greetings is a hoax. After all, it's your
|
|
money, too. But hurry, they're moving out of the office by the middle
|
|
of the month.
|
|
|
|
Acknowledgment: A copy of the Moynihan Commission report is mirrored
|
|
on the Federation of American Scientists' Website. Without FAS' timely
|
|
and much appreciated efforts to make government reports and documents
|
|
of strategic interest freely available to an Internet readership, Crypt
|
|
Newsletter's rapid tracing of the travel of the Penpal hoax into the
|
|
commission's record might not have been possible.
|
|
|
|
|
|
WE ARE THE ENEMY: BUNKER MENTALITY IN USAF INFO-WAR KOOKS
|
|
|
|
Just in case you've harbored the suspicion that Crypt Newsletter
|
|
exaggerates the outright paranoia now gripping portions of the
|
|
United States military with regards to the Internet, in this
|
|
issue I've excerpted substantial portions of an article which
|
|
appeared in a July 1996 issue of Intercom, an electronic
|
|
publication published on a Web server out of Scott Air Force Base in
|
|
Illinois. Intercom is a good source of US Air Force orthodoxy on the
|
|
topic of information technology as it pertains to members of the
|
|
service.
|
|
|
|
In this article, the information airmen of Goodfellow AFB,
|
|
Texas, tell us they're already under attack. Computer viruses,
|
|
say soldiers, are continuously assaulting the base, leaving it
|
|
in essentially a continual state of information war. While the
|
|
article may appear reasonable to the principals who commissioned it,
|
|
publishing it on the Internet has only served to reinforce the
|
|
notion that some "info-warriors" in the U.S. military are starkly
|
|
paranoid nutcases.
|
|
|
|
It's a whole new realm of warfare and you're no longer safe at work
|
|
or at home," said Lieutenant Randy Tullis, for Intercom.
|
|
|
|
"As evidence of the increase in information warfare activity,
|
|
communications officials at Goodfellow have logged 12 incidents of
|
|
computer viruses in less than four months this year," said
|
|
Sgt. Michael Minick.
|
|
|
|
The Intercom feature continues, "In all of 1995,
|
|
[Goodfellow] handled 14 cases [of computer virus infection.]"
|
|
|
|
"While viruses are not an all-out war waged against the base with
|
|
weapons of mass destruction, the results can be devastating," states
|
|
the article, rather balefully.
|
|
|
|
"Information warriors will try to deal heavy blows in future wars,
|
|
and Goodfellow and its 315th Training Squadron is at the forefront in
|
|
training defenders against these warriors," the article says.
|
|
|
|
"The most popular aspect of [information war] is the process of
|
|
attacking and protecting computer-based and communication information
|
|
networks," said Goodfellow AFB's Captain Tim Hall.
|
|
|
|
Hall had also advertised on the Internet in mid-November 1996 for
|
|
an info-war instructor at Goodfellow. The job description called
|
|
for a captain's rank to "[Create and develop] infowar curricula for all
|
|
new USAF Intelligence personnel; Supervise IW Lab development, student
|
|
training, infowar instructional methods and infowar exercises."
|
|
|
|
"Some attacks are by people who unintentionally access networks and
|
|
others are by those bent on destroying government computer data
|
|
through use of devastating viruses and other means," said Hall.
|
|
|
|
"Students also learn how other countries such as Russia, China and
|
|
France plan to conduct [information warfare] operations," said Hall.
|
|
|
|
"Indeed," said Crypt Newsletter.
|
|
|
|
It's war -- war against hackers, say the information soldiers of
|
|
Goodfellow.
|
|
|
|
Instruction courses at the base are designed to inculcate "basic
|
|
awareness in the defensive skills needed to recognize and defeat
|
|
information warriors, <I>commonly called computer hackers</I>," Hall
|
|
said for Intercom.
|
|
|
|
Goodfellow is stepping up efforts to train its information warriors.
|
|
"We are going to propose Team Goodfellow build an advanced [information
|
|
warfare] course," said another soldier. "It will teach offensive and
|
|
defensive concepts in a classroom and hands-on training in a lab
|
|
environment," which is a tricky way of saying that soldiers
|
|
think hacking the hackers, or whoever they think might be launching
|
|
info-war attacks, is a savvy idea.
|
|
|
|
Long-time Crypt Newsletter readers probably can't help but
|
|
recognize trenchant similarities between the quote of Goodfellow
|
|
info-warriors and examples of the paranoid rantings found sprinkled
|
|
through the writings of teenager-composed 'zines from the computer
|
|
underground ca. 1992.
|
|
|
|
We'll kick them off Internet Relay Chat. They'll never get
|
|
channel ops on our watch. Yeah, that's the ticket.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 7--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.36
|
|
************************************
|
|
|