1583 lines
40 KiB
Plaintext
1583 lines
40 KiB
Plaintext
|
|
|
|
THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING / Published Quarterly
|
|
|
|
===================================================================
|
|
|
|
ISSN 1074-3111 Volume One, Issue One March 19, 1994
|
|
|
|
===================================================================
|
|
|
|
|
|
|
|
Editor-in-Chief: Scott Davis
|
|
|
|
NetSurfer: John Logan
|
|
|
|
It's A Conspiracy!: Gordon Fagan
|
|
|
|
|
|
|
|
E-Mail - editors@fennec.com
|
|
|
|
** ftp site: etext.archive.umich.edu /pub/Zines/JAUC
|
|
|
|
|
|
|
|
U.S. Mail:
|
|
|
|
The Journal Of American Underground Computing
|
|
|
|
10111 N. Lamar #25
|
|
|
|
Austin, Texas 78753
|
|
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
|
|
To Subscribe to "TJOAUC", send mail to: sub@fennec.com
|
|
|
|
All questions/comments about this publication to: comments@fennec.com
|
|
|
|
Send all articles/info that you want published to: submit@fennec.com
|
|
|
|
Commercial Registration for Profitable Media: form1@fennec.com
|
|
|
|
|
|
|
|
"The underground press serves as the only effective counter to a growing
|
|
|
|
power, and more sophisticated techniques used by establishment mass media
|
|
|
|
to falsify, misrepresent, misquote, rule out of consideration as a priori
|
|
|
|
ridiculous, or simply ignore and blot out of existence: data, books,
|
|
|
|
discoveries that they consider prejudicial to establishment interest..."
|
|
|
|
|
|
|
|
(William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)
|
|
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
|
|
Contents Copyright (C) 1994 The Journal Of American Underground Computing
|
|
|
|
and/or the author of the articles presented herein. All rights reserved.
|
|
|
|
Nothing may be reproduced in whole or in part without written permission
|
|
|
|
of the Editor-In-Chief and/or the author of the article. This publication
|
|
|
|
is made available quarterly to the amateur computer hobbyist free of charge.
|
|
|
|
Any commercial usage (electronic or otherwise) is strictly prohibited
|
|
|
|
without prior consent of the Editor, and is in violation of applicable
|
|
|
|
US Copyright laws. To subscribe, send email to sub@fennec.com
|
|
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
|
|
DISCLAIMER AND NOTICE TO DISTRIBUTORS -
|
|
|
|
|
|
|
|
NOTE: This electronic publication is to be distributed free of charge
|
|
|
|
without modifications to anyone who wishes to have a copy. Under NO
|
|
|
|
circumstances is any issue of this publication, in part or in whole,
|
|
|
|
to be sold for money or services, nor is it to be packaged with other
|
|
|
|
computer software, including, but not limited to CD Rom disks, without
|
|
|
|
the express written or verbal consent of the author and/or editor.
|
|
|
|
To obtain permission to distribute this publication under any of the
|
|
|
|
certain circumstances stated above, please contact the editor at one of
|
|
|
|
the addresses above. If you have intentions of publishing this journal
|
|
|
|
in any of the ways described above, or you are in doubt about whether or
|
|
|
|
not your intentions conflict with the restrictions, please contact the
|
|
|
|
editor. FOR A COPY OF THE REGISTRATION FORM, MAIL - form1@fennec.com
|
|
|
|
|
|
|
|
This publication is provided without charge to anyone who wants it.
|
|
|
|
This includes, but is not limited to lawyers, government officials,
|
|
|
|
cops, feds, hackers, social deviants, and computer hobbyists. If anyone
|
|
|
|
asks for a copy, please provide them with one, or mail the subscription
|
|
|
|
list so that you may be added.
|
|
|
|
|
|
|
|
The articles and information printed herein are the property of the author
|
|
|
|
and / or The Journal Of American Underground Computing. An electronic mail
|
|
|
|
address of the author will be provided when made available to us so that you
|
|
|
|
can contact the author with your comments. No article in this publication
|
|
|
|
can be reprinted without the permission of the author / editor. Any attempt
|
|
|
|
to do so will be in direct violation of United States Copyright laws.
|
|
|
|
Any attempt to sell this publication in part or in whole, on CD Rom or
|
|
|
|
while packaged with any other software bundle without the express consent
|
|
|
|
of the editor is also a direct violation of United States Copyright laws.
|
|
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
|
|
THE JOURNAL OF AMERICAN UNDERGROUND COMPUTING - Volume 1, Issue 1
|
|
|
|
|
|
|
|
TABLE OF CONTENTS
|
|
|
|
|
|
|
|
1) Introduction To TJOAUC Editors
|
|
|
|
2) Control Of Information In The Mass Media Gordon Fagan
|
|
|
|
3) Some Thoughts On Clipper, NSA, ... Jim Bidzos
|
|
|
|
4) CIA Corrupt, Stupid, Should Be Abolished Mark Lane
|
|
|
|
5) Legion Of Doom T-Shirts...get 'em!! Chris Goggans
|
|
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
|
|
Introduction To The Journal Of American Underground Computing
|
|
|
|
|
|
|
|
By The Editors (editors@fennec.com)
|
|
|
|
|
|
|
|
First of all, I want to personally thank you for taking the time
|
|
|
|
to read this electronic publication. The editors of this publication had a
|
|
|
|
large hand in The World View Magazine, a publication that became defunct as
|
|
|
|
of January 1, 1993. We had become stagnant with that publication, so we
|
|
|
|
jointly agreed to ditch it. Since then, we have received hundreds of
|
|
|
|
subscription requests for the magazine. After consulting with each other
|
|
|
|
for several months, we have decided to do a "new-and-improved" version of
|
|
|
|
that popular magazine...but under a different name. And in a more official
|
|
|
|
capacity I might add. So here it is...Issue one, Volume one. The format for
|
|
|
|
this magazine is totally undefined. The decision to do it this way is better
|
|
|
|
than focusing on a certain area in the sense that we can cover anything and
|
|
|
|
everything...and people will not be suprised when they see an article that
|
|
|
|
is "out of character". Also, I hope that it will inspire people to write
|
|
|
|
about whatever they feel intimate with...be it politics, computer networking,
|
|
|
|
hacking, etc...or any remote aspect of such topics. So please read on, and
|
|
|
|
keep in mind that we encourage you to comment on anything you agree with,
|
|
|
|
disagree with, like, dislike, etc...we will print comments like that.
|
|
|
|
Your input is necessary. Thanks for reading, and enjoy. A special thanks
|
|
|
|
goes to "The Spotlight", a weekly publication in our nation's capital for
|
|
|
|
permission to reprint, etc...Thanks to Don Markey!
|
|
|
|
|
|
|
|
Editors
|
|
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
|
|
CONTROL OF INFORMATION IN THE MASS MEDIA
|
|
|
|
|
|
|
|
By Gordon Fagan (fagang@ccmail.us.dell.com)
|
|
|
|
|
|
|
|
|
|
|
|
The Public's right to know is not always what the Public ends up
|
|
|
|
getting. The Public frequently gets one-sided, biased information
|
|
|
|
and not just from the mass media. It's easy to have a long arm that
|
|
|
|
protects the special interest groups: this kind of a "one world
|
|
|
|
family" of insiders that is capable of affecting federal judges,
|
|
|
|
U.S. attorneys, to slant or obstruct justice, to hide or cover up
|
|
|
|
crucial information, and to interfere with our liberties.
|
|
|
|
|
|
|
|
There has been a major campaign on the part of the Central
|
|
|
|
Intelligence Agency to place Central Intelligence Agency agents, in
|
|
|
|
various news media posts. Documents have been found on this. It was
|
|
|
|
called "Operation Mocking Bird". They placed operatives in places
|
|
|
|
like TIME Magazine and LIFE Magazine, the New York Times, inside CBS
|
|
|
|
and ABC News. The National Student Association and other student
|
|
|
|
groups were also targeted.
|
|
|
|
|
|
|
|
Originally, the intent of "Operation Mocking Bird" was to make
|
|
|
|
certain that these major media outlets and student organizations
|
|
|
|
reflected an adequately anti-communist perspective. And then, of
|
|
|
|
course, as they became entrenched and in-place, any time the Central
|
|
|
|
Intelligence Agency wanted a story killed or distorted they would
|
|
|
|
contact their agents inside. They have bragged openly in private
|
|
|
|
memos back and forth inside the Agency about how proud they are of
|
|
|
|
having very important "assets" inside virtually every major news
|
|
|
|
media in the United States.
|
|
|
|
|
|
|
|
For example, the Chief National Security Correspondent for TIME
|
|
|
|
Magazine, Bruce Van Voorst, is a regular Central Intelligence
|
|
|
|
Agency officer. It turns out that Ben Bradlee from the Washington
|
|
|
|
Post was a regular Central Intelligence Agency officer prior to
|
|
|
|
coming to his post at the Washington Post. Bob Woodward at the
|
|
|
|
Washington Post was the Point-Briefer for U.S. Naval Intelligence
|
|
|
|
of the Joint Chiefs-of-Staff before he went over to the Washington
|
|
|
|
Post. What we're told in the media (and what we're told officially
|
|
|
|
from Government sources) and what is the truth are frequently at
|
|
|
|
varying degrees against each other.
|
|
|
|
|
|
|
|
We find these people constantly in the news media. When the New
|
|
|
|
York Times was refusing to print any information about Oliver North,
|
|
|
|
Richard Secord, Albert Hakim and Rob Owen, and all of the other men
|
|
|
|
who, throughout 1985 and 1986, were engaged in a massive criminal
|
|
|
|
conspiracy to violate the Boland Amendment prohibiting any weapons
|
|
|
|
shipments to the Contras, and who were involved in smuggling TOW
|
|
|
|
missiles to Iran. Keith Schneider, who was one of the reporters
|
|
|
|
assigned to look into the issue, said that the Times was refusing to
|
|
|
|
print any of it because their high-level sources inside the Central
|
|
|
|
Intelligence Agency refused to confirm the stories.
|
|
|
|
|
|
|
|
This kind of relationship between self-conscious "assets" of the
|
|
|
|
Covert Operations Director of the Central Intelligence Agency is a
|
|
|
|
political police force on an international level to protect the
|
|
|
|
ostensible economic interests of United States industries by placing
|
|
|
|
these people inside a news media which, under the First Amendment,
|
|
|
|
ostensibly has the responsibility to critique and investigate
|
|
|
|
potential injustices on the part of the State, inside the Government
|
|
|
|
is an extraordinarily dangerous development here in the United States.
|
|
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
|
|
Article printed with permission of the author, Jim Bidzos
|
|
|
|
Jim Bidzos is the President and CEO of RSA Data Security, and is a
|
|
|
|
well respected authority in the area of security and encryption.
|
|
|
|
|
|
|
|
SOME THOUGHTS ON CLIPPER, NSA, AND ONE KEY ESCROW ALTERNATIVE
|
|
|
|
|
|
|
|
By Jim Bidzos (bidzos@rsa.com)
|
|
|
|
|
|
|
|
In a recent editorial, Dr. Dorothy Denning of Georgtown University
|
|
|
|
argued in support of the U.S. government's proposed Clipper Chip, a
|
|
|
|
security device that would allow law enforcement to decipher the
|
|
|
|
communications of users of such devices.
|
|
|
|
|
|
|
|
Dr. Denning attempts to argue that Clipper is necessary for law
|
|
|
|
enforcement agencies to be able to do their job. I'm not going to
|
|
|
|
argue that one; there are plenty of people who can argue that
|
|
|
|
compromising privacy for all citizens in order to aid law enforcement
|
|
|
|
is a bad idea more effectively than I, particularly in the Clipper
|
|
|
|
case, where the arguments from law enforcement are dubious at best.
|
|
|
|
(The current justification is inadequate; there may be better reasons,
|
|
|
|
from a law enforcement perspective, but we haven't heard them yet.)
|
|
|
|
|
|
|
|
Without doubt, law enforcement and intelligence are huge stakeholders
|
|
|
|
in the debate over encryption. But every individual and corporation in
|
|
|
|
the U.S. must be included as well. Are NSA's actions really in the
|
|
|
|
best interests of all the stakeholders? Are there alternatives to the
|
|
|
|
current key escrow program?
|
|
|
|
|
|
|
|
If one steps back and looks at what has happened over the last few
|
|
|
|
years, one might well question the government's approach with Clipper,
|
|
|
|
if not its motivation, for dealing with this problem. (I believe it
|
|
|
|
may even be possible to conclude that Clipper is the visible portion
|
|
|
|
of a large-scale covert operation on U.S. soil by NSA, the National
|
|
|
|
Security Agency.) Over a number of years, through their subversion of
|
|
|
|
the Commerce Department (who should be championing the causes of U.S.
|
|
|
|
industry, not the intelligence agencies), NSA has managed to put many
|
|
|
|
U.S. government resources normally beyond their control, both legally
|
|
|
|
and practically, to work on their program of making U.S. and
|
|
|
|
international communications accessible.
|
|
|
|
|
|
|
|
The first step was the MOU (Memorandum of Understanding) between the
|
|
|
|
Commerce Department's National Institute of Standards and Technology
|
|
|
|
(NIST) and the Defense Department's NSA. This document appears to
|
|
|
|
contravene the provisions of the Computer Security Act of 1987, the
|
|
|
|
intent of which was to give NIST control over crypto standards-making
|
|
|
|
for the unclassified government and commercial sectors. The MOU
|
|
|
|
essentially gave NSA a veto over any proposals for crypto standards by
|
|
|
|
NIST.
|
|
|
|
|
|
|
|
By using the standards making authority of NIST, NSA is attempting to
|
|
|
|
force the entire U.S. government to purchase Clipper equipment since
|
|
|
|
only NIST-standard equipment may be purchased by government agencies.
|
|
|
|
This purchasing power can then be used to force U.S. manufacturers to
|
|
|
|
build Clipper products or risk losing government business. (GSA is
|
|
|
|
currently questioning NSA's authority to control government-wide
|
|
|
|
procurement, and should continue to do so.) This of course not only
|
|
|
|
subsidizes Clipper products, but could make Clipper a de facto
|
|
|
|
standard if the costs associated with alternatives are too high.
|
|
|
|
These costs to industry, of ignoring Clipper, come in the form of lost
|
|
|
|
government market share, costly support for multiple versions of
|
|
|
|
incompatible products, and non-exportability of non-Clipper products.
|
|
|
|
|
|
|
|
It also appears that NSA is desperately seeking a digital signature
|
|
|
|
standard that would force users to take that signature capability
|
|
|
|
wrapped up with a Clipper chip. If this is the case, as it appears to
|
|
|
|
be, then NSA has is trying to use what is probably the most powerful
|
|
|
|
business tool of the information age as a means to deny us its
|
|
|
|
benefits unless we subsidize and accept Clipper in the process. This
|
|
|
|
would, if true, be an unprecedented abuse of government power to
|
|
|
|
influence U.S. industry and control individual privacy. (Clipper is
|
|
|
|
part of a chip called Capstone, which is where their proposed digital
|
|
|
|
signature standard would be used.)
|
|
|
|
|
|
|
|
The overall cost of these policies is unknown. We only know that NSA
|
|
|
|
has spent a considerable amount of money on the program directly.
|
|
|
|
Other costs are not so obvious. They are:
|
|
|
|
|
|
|
|
- A burdened U.S. industry, which will have to build multiple products
|
|
|
|
or more expensive products that support multiple techniques;
|
|
|
|
|
|
|
|
- A low-intensity "trade war" with the rest of the world over
|
|
|
|
encryption;
|
|
|
|
|
|
|
|
- Lost sales to U.S. companies, since international buyers will surely
|
|
|
|
go to non-U.S. suppliers for non- Clipper encryption, as may buyers in
|
|
|
|
the U.S.;
|
|
|
|
|
|
|
|
- Potential abuses by government and loss of privacy for all citizens.
|
|
|
|
|
|
|
|
Does NSA truly believe they can displace other methods with Clipper?
|
|
|
|
With over three million licensed, documented RSA products, the
|
|
|
|
technology they feel threatened by, in use in the U.S. today? Not
|
|
|
|
likely; therefore, they have already decided that these costs are
|
|
|
|
acceptable even if they only delay the inevitable, and that U.S.
|
|
|
|
industry and U.S. taxpayers should bear these costs, whatever they
|
|
|
|
are. This policy was apparently developed by unelected people who
|
|
|
|
operate without oversight or accountability. Does the White House
|
|
|
|
really support this policy?
|
|
|
|
|
|
|
|
It has been reported that NSA is attempting to gain support from
|
|
|
|
foreign governments for escrow technology, especially if "local
|
|
|
|
control" is provided. Even if NSA can convince their sister
|
|
|
|
organizations around the world to support key escrow (by offering
|
|
|
|
Clipper technology with a do-your-own-escrow option), will these other
|
|
|
|
organizations succeed in selling it to their government, industry and
|
|
|
|
citizens? Most countries around the world have much stronger privacy
|
|
|
|
laws and a longer history of individual privacy than the U.S.
|
|
|
|
|
|
|
|
WHY AGAIN WHEN IT DIDN'T WORK THE FIRST TIME?
|
|
|
|
|
|
|
|
Many seem to have forgotten or are not aware that the Clipper program
|
|
|
|
is not new, and it's also not the first time NSA has attempted to
|
|
|
|
force communications security on U.S. industry that it could
|
|
|
|
compromise. In the mid-80's, NSA introduced a program called the
|
|
|
|
Commercial COMSEC Endorsement Program, or CCEP. CCEP was essentially
|
|
|
|
Clipper in a black box, since the technology was not sufficiently
|
|
|
|
advanced to build lower-cost chips. Vendors would join CCEP (with the
|
|
|
|
proper security clearances) and be authorized to incorporate
|
|
|
|
classified algorithms into communications systems. NSA had proposed
|
|
|
|
that they themselves would actually provide the keys to end-users of
|
|
|
|
such systems. The new twist is access by key escrow.
|
|
|
|
|
|
|
|
To see how little things have changed, consider this quote: "...RSA
|
|
|
|
Data Security, Inc. asserts that since CCEP-2 is not published and
|
|
|
|
therefore cannot be inspected by third parties, the NSA could put a
|
|
|
|
'trap door' in the algorithm that would enable the agency to inspect
|
|
|
|
information transmitted by the private sector. When contacted, NSA
|
|
|
|
representative Cynthia Beck said that it was the agency's policy not
|
|
|
|
to comment on such matters." That was in 1987. ("The Federal Snags in
|
|
|
|
Encryption Technology," Computer and Communications Decisions, July
|
|
|
|
1987, pp. 58-60.)
|
|
|
|
|
|
|
|
To understand NSA's thinking, and the danger of their policies,
|
|
|
|
consider the reply of a senior NSA official when he was asked by a
|
|
|
|
reporter for the Wall Street Journal if NSA, through the CCEP program,
|
|
|
|
could read anyone's communications: "Technically, if someone bought
|
|
|
|
our device and we made the keys and made a copy, sure we could listen
|
|
|
|
in. But we have better things to do with our time." (The Wall Street
|
|
|
|
Journal, March 28, 1988, page 1, column 1, "A Supersecret Agency Finds
|
|
|
|
Selling Secrecy to Others Isn't Easy," by Bob Davis.) Another NSA
|
|
|
|
official, in the same Journal story, said "The American Public has no
|
|
|
|
problem with relying on us to provide the technology that prevents the
|
|
|
|
unauthorized launch of nuclear weapons. If you trust us to protect
|
|
|
|
against that, you can trust us to protect private records." Remember
|
|
|
|
that the Cold War was still on at that time.
|
|
|
|
|
|
|
|
Law enforcement and intelligence gathering are certainly impeded by
|
|
|
|
the use of cryptography. There are certainly legitimate concerns that
|
|
|
|
these interests have. But is the current approach really the way to
|
|
|
|
gain support from industry and the public? People with a strong
|
|
|
|
military and intelligence bias are making all the decisions. There
|
|
|
|
seem to be better ways to strike a balance.
|
|
|
|
|
|
|
|
AN ALTERNATIVE PROPOSAL
|
|
|
|
|
|
|
|
One approach would be to have NIST develop a standard with three
|
|
|
|
levels. The first level could specify the use of public-key for key
|
|
|
|
management and signatures without any key escrow. There could be a
|
|
|
|
"Level II" compliance that adds government key escrow to message
|
|
|
|
preparation. "Level III" could be key escrow controlled by the user,
|
|
|
|
typically a corporation. Would this work? The first level, meeting
|
|
|
|
the standard by itself, would back up the government's claim that key
|
|
|
|
escrow is voluntary; if I want privacy and authentication without key
|
|
|
|
escrow, then I can have it, as the government has claimed I can.
|
|
|
|
Actions speak louder than words.
|
|
|
|
|
|
|
|
Why would any vendors support Level II? There would be several
|
|
|
|
reasons. They would find a market in the government, since the
|
|
|
|
government should purchase only Level II products. (I would certainly
|
|
|
|
like our public servants to use key escrow, just as I want work
|
|
|
|
product paid for by my corporation to be accessible. Of course, anyone
|
|
|
|
can buy Level I products for home and personal use.) So the
|
|
|
|
government can still influence the private sector by buying only
|
|
|
|
products that include Level II compliance. Also, Level II products
|
|
|
|
would be decontrolled for export. This way the market can decide;
|
|
|
|
vendors will do what their customers tell them to. This satisifies
|
|
|
|
the obvious desire on the part of the government to influence what
|
|
|
|
happens with their purchasing power.
|
|
|
|
|
|
|
|
Level III would allow any user to insert escrow keys they control into
|
|
|
|
the process. (Level II would not be a prerequisite to Level III.) My
|
|
|
|
company may want key escrow; I, as an individual, may want to escrow
|
|
|
|
my keys with my attorney or family members; a standard supporting
|
|
|
|
these funtions would be useful. I don't necessarily want or need the
|
|
|
|
government involved.
|
|
|
|
|
|
|
|
NIST already knows how to write a FIPS that describes software and
|
|
|
|
hardware implementations, and to certify that implementations are
|
|
|
|
correct.
|
|
|
|
|
|
|
|
This approach cetainly isn't perfect, but if the administration really
|
|
|
|
believes what it says and means it, then I submit that this is an
|
|
|
|
improvement over a single key escrow FIPS foisted on everyone by NSA,
|
|
|
|
and would stand a much better chance of striking a workable balance
|
|
|
|
between the needs of the government and the right of individuals to
|
|
|
|
privacy. Therefore, it RISKS much less than the current plan.
|
|
|
|
|
|
|
|
The real problem with the way NSA works is that we don't find out what
|
|
|
|
they're really doing and planning for decades, even when they're
|
|
|
|
wrong. What if they are?
|
|
|
|
|
|
|
|
In the 60's and 70's, the CIA was out of control, and the Congress,
|
|
|
|
after extensive hearings that detailed some of the abuses of power by
|
|
|
|
the CIA, finally moved to force more accountability and oversight. In
|
|
|
|
the 80's and 90's, NSA's activities should be equally scrutinized by a
|
|
|
|
concerned Congress.
|
|
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
|
|
SYSOPS: CAN YOU GO TO JAIL ?
|
|
|
|
|
|
|
|
By Jeff A. Heyens
|
|
|
|
Additional Comments By chris@eastern.eastern.com
|
|
|
|
|
|
|
|
We have a new problem. Everyone knows that lately there has
|
|
|
|
been a crackdown on Bulletin Boards which carry pornography,
|
|
|
|
pirated software, etc. There is, however, a new and much more
|
|
|
|
powerful threat which is threatening to stop all privately run
|
|
|
|
BBS's.
|
|
|
|
|
|
|
|
The Canadian Radio and Telecommunications Commission (CRTC)
|
|
|
|
is currently in the process of setting itself up to regulate
|
|
|
|
Public bulletin boards. They want to make it an offense to run a
|
|
|
|
BBS without a CRTC license. If licensing comes into effect, the
|
|
|
|
BBS scene will quite literally shrivel up and die.
|
|
|
|
|
|
|
|
Consider the example of radio in the 40's and 50's. Before
|
|
|
|
the CRTC was formed, anyone could broadcast radio signals legally
|
|
|
|
from their home on any bandwidth. Fearing obscenity and extreme
|
|
|
|
access to information, the CRTC was formed to sell licenses to
|
|
|
|
broadcasters. Without such a license, you could be prosecuted
|
|
|
|
for broadcasting. The result of this action can be seen today:
|
|
|
|
the only radio stations we see are totally mainstream and are
|
|
|
|
hell-bent on making profit, not pleasing listeners or informing
|
|
|
|
the public.
|
|
|
|
|
|
|
|
We all know that the bulletin board systems are a great way
|
|
|
|
to get alternative information. We can get information on the
|
|
|
|
Paul Teele / Karla Homolka trials. We can get new insights as to
|
|
|
|
what is really happening in the former Yugoslavia through the
|
|
|
|
giant Internet. We currently have access to multitudes of
|
|
|
|
information that isn't available through the mainstream media.
|
|
|
|
|
|
|
|
If licensing comes into affect, we will LOSE this access.
|
|
|
|
Not only will the pirate boards be hunted down and exterminated,
|
|
|
|
but all currently LEGAL PUBLIC DOMAIN BBS's will also be made
|
|
|
|
illegal unless they can afford a license. And who do you think
|
|
|
|
will get licenses? Only those willing to follow the CRTC
|
|
|
|
guidelines for radio and television. Corporations and rich
|
|
|
|
executives. The BBS world, our underground paradise (if you
|
|
|
|
will) is in great danger of becoming a commercial hell like the
|
|
|
|
rest of today's media.
|
|
|
|
|
|
|
|
We don't yet know what the proposed licensing fee will be,
|
|
|
|
but it could anywhere in the area of $300-$5,000. This could
|
|
|
|
also depend on the size of the BBS. However, most BBS's will
|
|
|
|
simply close up shop if the government wants a license. The
|
|
|
|
government will simply weed out all the little guys and support
|
|
|
|
the big guys.
|
|
|
|
|
|
|
|
This WILL HAPPEN, and sooner than you think! The U.S.
|
|
|
|
Government has already started doing this, with the new
|
|
|
|
Information SuperHighway being the flag-ship of government
|
|
|
|
regulated systems. The Canadian government is going farther, and
|
|
|
|
must be stopped now.
|
|
|
|
|
|
|
|
Before I go into my plan of action, I want to tell you that
|
|
|
|
if licensing comes into effect, if will be basically impossible
|
|
|
|
to beat the system. All pirate radio stations in North America
|
|
|
|
have been crushed by the government in a matter of months.
|
|
|
|
Imagine how easy it will be to crush pirate bulletin board
|
|
|
|
systems (and by that I simply mean BBS's without a license) with
|
|
|
|
traceable phone numbers. Bell Canada would be sure to help the
|
|
|
|
CRTC bust those boards. And the RCMP would have a real easy time
|
|
|
|
busting any boards with illegal software, because those boards
|
|
|
|
would not have licenses. The CRTC finds the board through Bell,
|
|
|
|
arrests the sysop for running a board without a license, then
|
|
|
|
informs the RCMP that this sysop was allowing copyrighted
|
|
|
|
material to be transferred through his/her bbs. That sysop, for
|
|
|
|
the first time in his/her life, is suddenly looking at a possible
|
|
|
|
jail term.
|
|
|
|
|
|
|
|
|
|
|
|
COULD YOU IMAGINE GOING TO JAIL FOR RUNNING A BBS????????
|
|
|
|
|
|
|
|
That, I admit, is the extreme case, but it is looking more and
|
|
|
|
more likely as time goes on. If you're as pissed off about this
|
|
|
|
as I am, then keep reading, because I have a plan of
|
|
|
|
action/protest to stop this from happening.
|
|
|
|
|
|
|
|
WE are the only people out there who can stop this from
|
|
|
|
transpiring. Only the extremely computer literate, those of us
|
|
|
|
who know the ins and outs of the BBS scene and computers
|
|
|
|
generally, will be able to generate an argument strong enough to
|
|
|
|
counter the argument of the government and the CRTC.
|
|
|
|
|
|
|
|
I've been a user in different parts of Ontario for about six
|
|
|
|
years. I currently go to York University for Computer Science
|
|
|
|
and my plan is to organize a campaign of users who will be
|
|
|
|
willing to petition the government to stop this craziness. My
|
|
|
|
sister is a lawyer and also an occasional user of the boards.
|
|
|
|
She would be willing to confront the CRTC on legal grounds if we
|
|
|
|
have enough support from YOU. I have to hear from you. In order
|
|
|
|
to force the CRTC to at least seriously listen to our argument,
|
|
|
|
we need a lot of names, and a lot of letters to your local MP and
|
|
|
|
to the CRTC.
|
|
|
|
|
|
|
|
If I have enough support, I will set up a BBS which is
|
|
|
|
dedicated to keeping you informed. I will keep up to date as to
|
|
|
|
what the CRTC is doing and open up discussion concerning what we
|
|
|
|
should do about it. I would also print out all the messages on
|
|
|
|
the board and send them off to the prime minister, the CRTC and
|
|
|
|
our local MP's. At the same time, my sister and I will prepare a
|
|
|
|
legal argument to present to the government and the CRTC. IF we
|
|
|
|
have the support of your names and your letters behind us, the
|
|
|
|
CRTC will be forced to stop.
|
|
|
|
|
|
|
|
OUR GOAL: To stop the CRTC from requiring the licensing of
|
|
|
|
bulletin board systems and get it written into the law books that
|
|
|
|
private, home run bbs's are totally legal and should never be
|
|
|
|
regulated, in the interests of free information.
|
|
|
|
|
|
|
|
|
|
|
|
PLEASE send me E-mail or letter mail with your thoughts. I
|
|
|
|
WILL set up the bbs and get this ball rolling if we have enough
|
|
|
|
support! Please send this file to other BBS's and get this
|
|
|
|
information out. Contact me if you want to be involved. We need
|
|
|
|
all your support!
|
|
|
|
|
|
|
|
Support USERS AGAINST THE LICENSING OF BBS's (UALBBS).
|
|
|
|
|
|
|
|
KEEP PRIVATE BBS's LEGAL!
|
|
|
|
|
|
|
|
*** Begin Additional Comments: ***
|
|
|
|
|
|
|
|
Reading the preceding document has brought a few thoughts to
|
|
|
|
my mind. First of all, there has been much apprehension about
|
|
|
|
what the computerization of society holds for the freedom of the
|
|
|
|
common citizen. It seems that the more powerful a thing is, the
|
|
|
|
more potential it has for both good and bad; and there is no doubt
|
|
|
|
that the computerization of information is powerful indeed.
|
|
|
|
|
|
|
|
On one side, the computerization of society holds the potential
|
|
|
|
for a centralized authoritarian regime that could not have been
|
|
|
|
dreamed of previously. In the near future, there will be no further
|
|
|
|
need for cash money and there will be no economic activity beyond
|
|
|
|
the reach central intelligence and control. And there will be no
|
|
|
|
personal information that will be kept secret from the authorities.
|
|
|
|
Even the USSR, with the model of central authority we feared most,
|
|
|
|
could could not have been capable of realizing the degree of control,
|
|
|
|
the dawn of which, we now witness.
|
|
|
|
|
|
|
|
But the evil that we feared in Communism infects our own society.
|
|
|
|
Abstract concepts such as truth and justice are minimum requirements
|
|
|
|
for spiritual beings, yet we deny the spiritual and cling to the
|
|
|
|
material. If we assert that we are but material beings, how real
|
|
|
|
can the spiritual necessities really be? And yet, in order for
|
|
|
|
us to have any hope of happiness, these must be acknowledged in
|
|
|
|
any formula for a culture and society we might propose. Even So,
|
|
|
|
we increasingly embrace a purely materialist interpretation of
|
|
|
|
existence in which such things as truth and justice, if not
|
|
|
|
outright delusional, are relative.
|
|
|
|
|
|
|
|
If we continue to embrace the same cosmology as drove the Soviet
|
|
|
|
repression, and the tools of a police state become available,
|
|
|
|
what of government's temptation to become the definer of truth and
|
|
|
|
justice and all the things which are the very breath of life
|
|
|
|
for the human soul? Even one who is completely seduced by
|
|
|
|
materialism would have to be blind indeed not to perceive what
|
|
|
|
an enormous poison this is.
|
|
|
|
|
|
|
|
On the other side, the proliferation of information technology has the
|
|
|
|
same sort of potential as the cheap portable video camera. The
|
|
|
|
particular aspect of this potential I'm addressing has been made most
|
|
|
|
obvious by the effect the video camera has had in totalitarian
|
|
|
|
countries, namely, that it is increasingly difficult for these
|
|
|
|
governments to suppress the truth of events by simple denial and
|
|
|
|
propaganda. The proliferation of information technology can
|
|
|
|
have a parallel with the advent of the Guttenberg press, which made
|
|
|
|
it more difficult for the Inquisition to suppress the works of
|
|
|
|
heretics-- but only if it is allowed. If the Church had tried
|
|
|
|
to regulate the press, it would have been possible to operate them
|
|
|
|
underground. This is not the case with BBSs because the telephone
|
|
|
|
network can be programmed to log all modem communications.
|
|
|
|
|
|
|
|
From the positive aspect of information technology, there comes the
|
|
|
|
potential for a democratic process that has not been practical
|
|
|
|
until now. As information technology becomes more accessible,
|
|
|
|
there could come a world in which an average Joe might write an
|
|
|
|
article about picking his nose, and it would have no less
|
|
|
|
distribution than if it had been published in MacLean's or Newsweek.
|
|
|
|
|
|
|
|
Although the suppression of pornography and other abuses has its
|
|
|
|
attractiveness, the complete and unregulated liberation of
|
|
|
|
information is our only defense against its dark side. The
|
|
|
|
scope of the suffering that information enslavement can inflict
|
|
|
|
upon us is so great that "preventing misuse" can only be an
|
|
|
|
excuse of those who would enslave us.
|
|
|
|
|
|
|
|
Any move that leaves the dark potential of the new technology
|
|
|
|
in place, while invalidating its positive aspects, leaves the
|
|
|
|
potential for authoritarian abuse in place, while invalidating
|
|
|
|
our only true defense. Any such move is quite obviously
|
|
|
|
a move toward enslaving us. If any cause is worthy of struggle,
|
|
|
|
the preservation of information liberty is indeed such a cause.
|
|
|
|
|
|
|
|
Three other thoughts:
|
|
|
|
|
|
|
|
1) If the traditional media loses its preeminence to the "new"
|
|
|
|
media, it shows a flaw in the traditional media. Then, the
|
|
|
|
success of the alternative media will be the excuse for imposing
|
|
|
|
the same regulation on the alternative media as on the traditional.
|
|
|
|
But this will have the effect of imposing the same mediocrity into
|
|
|
|
the alternative media as made the traditional media less
|
|
|
|
attractive. Such are the politics of information enslavement.
|
|
|
|
|
|
|
|
2) Radio and television are vulnerable to interference from
|
|
|
|
the incompetent and abusive. But private BBSs must be explicitly
|
|
|
|
dialled into. Can the regulators seriously contend that they
|
|
|
|
might protect us from information that we must access in
|
|
|
|
such a deliberate and specific manner?
|
|
|
|
|
|
|
|
3) If private BBSs are regulated, uucp and FidoNet, which amount
|
|
|
|
to networks of BBSs for machines, will also be.
|
|
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
The following article reprinted from "The Spotlight" in Washington D.C
|
|
|
|
with permission from Asst. Editor Don Markey.
|
|
|
|
|
|
|
|
CIA CORRUPT, STUPID, SHOULD BE ABOLISHED
|
|
|
|
|
|
|
|
We're spending untold billions on any international spying
|
|
|
|
operation that can't figure out what it's own people are
|
|
|
|
doing. It's time for a change.
|
|
|
|
|
|
|
|
By Mark Lane
|
|
|
|
|
|
|
|
The arrest of Aldrich Hazen Ames, former head of the CIA's Soviet
|
|
|
|
counterintelligence branch, as a Soviet spy, raises some seminal questions
|
|
|
|
about the value of the CIA. With the fox and his wife, Maria del Rosario
|
|
|
|
Casas Ames, also charged as a Soviet spy, in charge of the henhouse, it is
|
|
|
|
time to wonder about the fate of the chickens.
|
|
|
|
|
|
|
|
During September, 1985, Vitaly Yurchenko, a senior KGB official, defected.
|
|
|
|
Ames was assigned to debrief him. Yurchenko, after that debriefing,
|
|
|
|
escaped from his CIA controllers while having dinner with them in a
|
|
|
|
restaurant in Georgetown and then returned to the Soviet Union.
|
|
|
|
|
|
|
|
Edward Lee Howard, a CIA officer, was under secret FBI surveillance during
|
|
|
|
the same period. He too fled to the Soviet Union after he learned that he
|
|
|
|
was about to be arrested. Until now the CIA and FBI have been unable to
|
|
|
|
figure out how Howard learned of his imminent incarceration.
|
|
|
|
|
|
|
|
There is a simple rule employed by police departments throughout the
|
|
|
|
United States to spot a possibly corrupt cop. Is he living beyond his
|
|
|
|
means? Even unsophisticated local police organizations which do not
|
|
|
|
regularly spy on their own colleagues or subject them to lie detector
|
|
|
|
tests, as does the CIA, have established a relatively sound and simple
|
|
|
|
method to locate potentially corrupt officers. Did he buy a Cadillac
|
|
|
|
instead of a Ford? How can he afford to build a garage or construct an
|
|
|
|
addition to his house?
|
|
|
|
|
|
|
|
During his highest paid year with the CIA, Ames earned under $70,000. His
|
|
|
|
wife was a student. Last year he bought a new Jaguar -- which cost about
|
|
|
|
his annual income after taxes, unless it was loaded with extras. He also
|
|
|
|
bought a house in Arlington, Virginia (a Washington suburb) worth well
|
|
|
|
over half-a-million dollars, a large farm and a number of condominiums in
|
|
|
|
Columbia, his wife's country of birth. He paid for the Virginia house --
|
|
|
|
$540,000 -- in cash.
|
|
|
|
|
|
|
|
Apparently he was paid approximately $1.5 million by the Soviet Union
|
|
|
|
during the last several years and spent it all on a luxurious life style.
|
|
|
|
And now, we are informed by the CIA that no one at the agency noticed the
|
|
|
|
improved Ames lifestyle during the past decade.
|
|
|
|
|
|
|
|
The Ames case is reminiscent of the case of CIA officer Edwin P. Wilson
|
|
|
|
who engaged in a similar grand life, while earning a relatively meager
|
|
|
|
salary at the CIA. He was subsequently charged and convicted of illegally
|
|
|
|
shipping explosives to Libya. For years Wilson lived on a huge baronial
|
|
|
|
estate in Virginia, kept horses and permitted other CIA officers,
|
|
|
|
including his superiors, to send their children over to his mansion and
|
|
|
|
stables to ride the horses.
|
|
|
|
|
|
|
|
The CIA later claimed to be astonished that Wilson had some other income.
|
|
|
|
He claimed the agency knew it all along and that he was the victim of a
|
|
|
|
change in policy toward Libya in the smoke-filled rooms in Langley,
|
|
|
|
Virginia (headquarters of the CIA) where the resident scholars engage in
|
|
|
|
thinking too convoluted and too secret thoughts for ordinary Americans to
|
|
|
|
comprehend. Wilson is now in prison and the CIA is newly astonished by
|
|
|
|
Ames.
|
|
|
|
|
|
|
|
Most Americans have not yet decided to forgive the CIA for murdering
|
|
|
|
President John F. Kennedy and the leaders of other states. The only
|
|
|
|
justification for its existence, immoral though it may be, is that at
|
|
|
|
least it is effective. That excuse has now expired. So should the CIA.
|
|
|
|
|
|
|
|
The American people deserve an intelligence agency created in the
|
|
|
|
post-Communist world, one designed not to plot, overthrow and kill, but to
|
|
|
|
inquire and determine. An organization which can predict, based on work
|
|
|
|
on the ground and contacts, trouble spots such as in Bosnia before they
|
|
|
|
erupt, a financial crisis in Japan secured through evaluation and study of
|
|
|
|
trends by competent scientists, the uprising of Mexican indigenous people
|
|
|
|
before we enter into a NAFTA which makes us partners of their oppressors
|
|
|
|
-- all of these would be of great value to America.
|
|
|
|
|
|
|
|
Above all, a democratic society deserves an intelligence agency designed
|
|
|
|
to meet the needs of such a country, not designed for a totalitarian
|
|
|
|
state.
|
|
|
|
|
|
|
|
This portion of the story ends on a light note. The "Washington Times"
|
|
|
|
reported in front page headlines that the Russians may lose billions of
|
|
|
|
dollars in U.S. aid due to their perfidy of spying on us. Just recently
|
|
|
|
Philip Heyman, a Justice Department high official, over the objection of
|
|
|
|
Janet Reno, the attorney general and his superior, demanded that Jonathan
|
|
|
|
Pollard, the American who spied for Israel, be freed. Pollard was paid in
|
|
|
|
dollars which the United States had sent to Israel as part of its enormous
|
|
|
|
contribution to that state.
|
|
|
|
|
|
|
|
I am still looking for the headline that suggests that Israel may lose
|
|
|
|
billions of dollars in U.S. aid.
|
|
|
|
|
|
|
|
*** An internationally known attorney and recognized authority on the
|
|
|
|
*** assassination of John F. Kennedy, Mark Lane is the author of "Rush to
|
|
|
|
*** Judgment", the definitive critique of the Warren Commission, and
|
|
|
|
*** "Plausible Denial", which links the CIA to the JFK assassination. Both
|
|
|
|
*** books are available from Liberty Lobby, 300 Independence Avenue SE,
|
|
|
|
*** Washington, D.C.
|
|
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
|
|
LEGION OF DOOM T-SHIRTS!! Get 'em
|
|
|
|
|
|
|
|
By Chris Goggans <phrack@well.sf.ca.us>
|
|
|
|
|
|
|
|
After a complete sellout at HoHo Con 1993 in Austin, TX this past
|
|
|
|
December, the official Legion of Doom t-shirts are available
|
|
|
|
once again. Join the net luminaries world-wide in owning one of
|
|
|
|
these amazing shirts. Impress members of the opposite sex, increase
|
|
|
|
your IQ, annoy system administrators, get raided by the government and
|
|
|
|
lose your wardrobe!
|
|
|
|
|
|
|
|
Can a t-shirt really do all this? Of course it can!
|
|
|
|
|
|
|
|
--------------------------------------------------------------------------
|
|
|
|
|
|
|
|
"THE HACKER WAR -- LOD vs MOD"
|
|
|
|
|
|
|
|
This t-shirt chronicles the infamous "Hacker War" between rival
|
|
|
|
groups The Legion of Doom and The Masters of Destruction. The front
|
|
|
|
of the shirt displays a flight map of the various battle-sites
|
|
|
|
hit by MOD and tracked by LOD. The back of the shirt
|
|
|
|
has a detailed timeline of the key dates in the conflict, and
|
|
|
|
a rather ironic quote from an MOD member.
|
|
|
|
|
|
|
|
(For a limited time, the original is back!)
|
|
|
|
|
|
|
|
"LEGION OF DOOM -- INTERNET WORLD TOUR"
|
|
|
|
|
|
|
|
The front of this classic shirt displays "Legion of Doom Internet World
|
|
|
|
Tour" as well as a sword and telephone intersecting the planet
|
|
|
|
earth, skull-and-crossbones style. The back displays the
|
|
|
|
words "Hacking for Jesus" as well as a substantial list of "tour-stops"
|
|
|
|
(internet sites) and a quote from Aleister Crowley.
|
|
|
|
|
|
|
|
--------------------------------------------------------------------------
|
|
|
|
|
|
|
|
All t-shirts are sized XL, and are 100% cotton.
|
|
|
|
|
|
|
|
Cost is $15.00 (US) per shirt. International orders add $5.00 per shirt for
|
|
|
|
postage.
|
|
|
|
|
|
|
|
Send checks or money orders. Please, no credit cards, even if
|
|
|
|
it's really your card.
|
|
|
|
|
|
|
|
|
|
|
|
Name: __________________________________________________
|
|
|
|
|
|
|
|
Address: __________________________________________________
|
|
|
|
|
|
|
|
City, State, Zip: __________________________________________
|
|
|
|
|
|
|
|
|
|
|
|
I want ____ "Hacker War" shirt(s)
|
|
|
|
|
|
|
|
I want ____ "Internet World Tour" shirt(s)
|
|
|
|
|
|
|
|
Enclosed is $______ for the total cost.
|
|
|
|
|
|
|
|
|
|
|
|
Mail to: Chris Goggans
|
|
|
|
603 W. 13th #1A-278
|
|
|
|
Austin, TX 78701
|
|
|
|
|
|
|
|
|
|
|
|
These T-shirts are sold only as a novelty items, and are in no way
|
|
|
|
attempting to glorify computer crime.
|
|
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
|
|
In the super-state, it really does not matter at all what
|
|
|
|
actually happened. Truth is what the government chooses
|
|
|
|
to tell you. Justice is what it wants to happen.
|
|
|
|
--Jim Garrison, New Orleans District Attorney
|
|
|
|
|
|
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
|
|
|
|
.
|
|
|