959 lines
50 KiB
Plaintext
959 lines
50 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 2, Issue #2.12 (November 17 1990) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
||
ARCHIVISTS: Bob Krause / Alex Smith
|
||
USENET readers can currently receive CuD as alt.society.cu-digest.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source is
|
||
cited. It is assumed that non-personal mail to the moderators may be
|
||
reprinted, unless otherwise specified. Readers are encouraged to submit
|
||
reasoned articles relating to the Computer Underground.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
views of the moderators. Contributors assume all responsibility
|
||
for assuring that articles submitted do not violate copyright
|
||
protections.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
CONTENTS:
|
||
File 1: Moderators' Corner
|
||
File 2: PhD Candidate Seeks information on the CU
|
||
File 3: Riggs, Darden, and Grant Sentenced
|
||
File 4: Prodigy Saga Continues
|
||
File 5: Re: Response to Mars "Censoring"
|
||
File 6: Response to SJG Affidavit (part 1)
|
||
File 7: Warrants schmarrants! The SS is Crazy!
|
||
File 8: More guidelines on what to do if busted
|
||
File 9: CU in the News--England and Emma Nicholson; VOGON News
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
********************************************************************
|
||
*** CuD #2.12: File 1 of 9: Moderator's corner ***
|
||
********************************************************************
|
||
|
||
From: Moderators
|
||
Subject: Moderators' Corner
|
||
Date: November 17 1990
|
||
|
||
++++++++++
|
||
In this file:
|
||
1. PHRACK CLASSIC #32 AND CHRISTMAS-CON
|
||
2. FACE-TO-FACE BBS
|
||
++++++++++
|
||
|
||
+++++++++++++++++++++
|
||
Phrack Classic #32 and Christmas-Con
|
||
+++++++++++++++++++++
|
||
|
||
Five years ago today (November 17, 1985), the first issue of Phrack appeared.
|
||
Today, November 17, 1990, Phrack Classic #32 will be released. Information
|
||
about Christmas-Con will be provided. it will be held in HOuston, December
|
||
28-30, and law enforcement and security personnel are encouraged to attend.
|
||
Video cameras will not be provided.
|
||
|
||
As a bit of nostalgia for the old folks, here is the original
|
||
header from the first issue of Phrack:
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
_ _ _______
|
||
| %/ | / _____/
|
||
|_||_|etal/ /hop
|
||
_________/ /
|
||
/__________/
|
||
(314)432-0756
|
||
24 Hours A Day, 300/1200 Baud
|
||
|
||
Presents....
|
||
|
||
==Phrack Inc.==
|
||
Volume One, Issue One, Phile 1 of 8
|
||
|
||
Introduction...
|
||
|
||
Welcome to the Phrack Inc. Philes. Basically, we are a group of phile writers
|
||
who have combined our philes and are distributing them in a group. This
|
||
newsletter-type project is home-based at Metal Shop. If you or your group are
|
||
interested in writing philes for Phrack Inc. you, your group, your BBS, or any
|
||
other credits will be included. These philes may include articles on telcom
|
||
(phreaking/hacking), anarchy (guns and death & destruction) or kracking. Othe
|
||
topics will be allowed also to an certain extent. If you feel you have some
|
||
material that's original, please call and we'll include it in the next issue
|
||
possible. Also, you are welcomed to put up these philes on your BBS/AE/Catfur
|
||
Etc. The philes will be regularly available on Metal Shop. If you wish to sa
|
||
in the philes that your BBS will also be sponsoring Phrack Inc., please leave
|
||
feedback to me, Taran King stating you'd like your BBS in the credits. Later
|
||
on.
|
||
|
||
TARAN KING
|
||
2600 CLUB!
|
||
METAL SHOP SYSOP
|
||
|
||
|
||
This issue is Volume One, Issue One, released on November 17, 1985. Included
|
||
are:
|
||
1 This Introduction to Phrack Inc. by Taran King
|
||
2 SAM Security Article by Spitfire Hacker
|
||
3 Boot Tracing on Apple by Cheap Shades
|
||
4 The Fone Phreak's Revenge by Iron Soldier
|
||
5 MCI International Cards by Knight Lightning
|
||
6 How to Pick Master Locks by Gin Fizz and Ninja NYC
|
||
7 How to Make an Acetylene Bomb by The Clashmaster
|
||
8 School/College Computer Dial-Ups by Phantom Phreaker
|
||
|
||
Call Metal Shop and leave feedback saying the phile topic and where you got
|
||
these philes to get your article in Phrack Inc.
|
||
|
||
(end Phrack header)
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
++++++++++++
|
||
FACE-TO-FACE BBS
|
||
++++++++++++
|
||
|
||
A number of electronic digests exist, such as this one, that attempt to
|
||
raise the issues of computer security, ethics, law, or policy. Few BBSs
|
||
exist for the same purpose. However, a new BBS has been set up for the
|
||
discussion of hacking, and unlike conventional "hacker" BBSs, this one is
|
||
designed for discussions between law enforcement and security specialists
|
||
and hackers. The goal of the board is to provide serious, intelligent
|
||
dialogue between various groups. It's called FACE-TO-FACE, and the number is
|
||
713-242-6853.
|
||
|
||
Here is the introductory log-in message:
|
||
|
||
All Hackers, Federal Agents, and Journalists
|
||
|
||
Welcome to a new concept in underground bulletin boards!
|
||
|
||
IDEA: The idea first came to me when I was mourning over the fact that Phoenix
|
||
Project went down. I thought, now gee, that was a good board. Ever since then
|
||
I've been searching for a place to "Hang-out"; A place where users were not
|
||
only productive but mature. Well, out of all those BBS's out there, I could
|
||
not locate one that met my standards of "a good board". So, I came to the
|
||
conclusion: There are no decent BBS's in the underground still running. Then
|
||
it hit me-- Why not make one ? Sounds logical. Well, here it is.
|
||
|
||
FACE to FACE: This BBS is devoted to having an intelligent, mature,
|
||
communication link from the Computer Underground to the Press and back to the
|
||
Security Agencies around the nation.
|
||
|
||
WARNING: Although this BBS allows "hackers" access, The Management of this
|
||
BBS demands that all users refrain from posting illegal material in nature.
|
||
If any such material is posted, that user and the message(s) shall be deleted.
|
||
I can't stress this enough. You have called a BBS where security agents are
|
||
scanning the messages also-- It's for OUR and YOUR saftey. We do not advocate
|
||
"hacking" in any way.
|
||
|
||
We are the MODERATORS of this BBS, while you are the USERS. It's a pure
|
||
communications link between the two sides. One side seeing white, the other
|
||
black. We see grey.
|
||
|
||
Access is guaranteed to any user who wishes to call.
|
||
|
||
This is an open system for the "phree" world.
|
||
|
||
(End Face-2-Face header)
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Subject: PhD Candidate Seeks information on the CU
|
||
From: P.A. Taylor <EJPA09@uk.ac.edinburgh.emas-a>
|
||
Date: 02 Nov 90 15:25:32 gmt
|
||
|
||
********************************************************************
|
||
*** CuD #2.12: File 2 of 9: PhD Students Seeks Info on CU ***
|
||
********************************************************************
|
||
|
||
I'm in the second year of a PhD on the subject of hacking/viruses and the
|
||
politics behind them, and I was wondering whether any of you are prepared to
|
||
enter into a dialogue on the subject.
|
||
At the moment, I'm preparing the theory section and literature review. In
|
||
January or thereabouts I want to start field-work (or modem-work, if it
|
||
turns out that way) with both hackers and their computer security industry
|
||
counterparts, and anyone who would consider themselves neither one nor the
|
||
other, but nevertheless interested in the field and the issues raised by it.
|
||
Theoretically, so far I've concentrated on the notion put forward in various
|
||
quarters that hackers are surfers on a technological wave that is carrying
|
||
the rest of us away, or in a similar vein, cowboys staking out new territory
|
||
in the new frontier world of computer technology. Looking at hackers in
|
||
this way has made me concentrate on the whole issue of technological
|
||
determinism and the "information revolution" and also the idea of hackers
|
||
being perhaps an extension or most recent development of an alternative
|
||
culture, hippies with modems perhaps. It also raises the whole issue of the
|
||
exact nature of cyberspace and the implications it holds... are we entering
|
||
a new realm of informational colonialism? What is information? Who has rights
|
||
over it, and are hackers/the computer underground fighting a battle of
|
||
principle the importance of which has passed most people by?
|
||
On a more practical level I'm interested in the following points...
|
||
1. To what extent has the advent of hacking/viruses fed back into
|
||
and affected the development of computer science? (e.g. the conceptualisation
|
||
of genetic algorithms)
|
||
|
||
2. Information and reference material relating to the formation of the
|
||
computer security industry. Ideally I'd like to write a short history of it
|
||
and trace the ways in which it has developed and been shaped by its
|
||
adversarial relationship with the computer industry.
|
||
|
||
3. The subject of the changing nature of information illustrated by
|
||
such episodes as the "look and feel lawsuits" and an increasingly
|
||
proprietal attitude towards information that is now evident. To what
|
||
extent are hackers/computer underground concerned with the type of
|
||
opposition to information control that people such as Richard Stallman
|
||
and his Gnu project represent?
|
||
|
||
Thanks for taking the time to read all this,and hopefully some of you
|
||
can give me feedback/suggestions/reference material.
|
||
|
||
Cheers, P.A.T.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Moderators
|
||
Subject: Riggs, Darden, and Grant Sentenced
|
||
Date: 17 November, 1990
|
||
|
||
********************************************************************
|
||
*** CuD #2.12: File 3 of 9: Riggs, Darden and Grant Sentenced ***
|
||
********************************************************************
|
||
|
||
Robert J. Riggs (The Prophet), Franklin E. Darden, Jr. (The Leftist), and
|
||
Adam E. Grant (The Urville) were sentenced in Atlanta Friday, November 16.
|
||
All were given prison terms. Riggs was sentenced to 21 months. Grant and
|
||
Darden were given 14 months each, half of which may be served in a half-way
|
||
house. Additional provisions include supervision and prohibitions on
|
||
computer use. In addition, each was ordered to repay $230,000 restitution.
|
||
Darden and Grant report for sentencing on January 4, 1991, and Riggs on
|
||
February 15. According to previous news reports, under the plea
|
||
arrangement Riggs could have been sentences to 15 years and a fine of up to
|
||
$500,000. Grant and Darden could have received up to 5 years in prison and
|
||
fines of up to $250,000.
|
||
|
||
Because the three pled guilty, the evidence against them is not public.
|
||
Yet, the both the prison sentence and the restitution seem harsh. Riggs,
|
||
presumably, received a heavier sentence because of a prior offense and
|
||
because the charge to which he pled guilty carried a more severe sentence.
|
||
But, according to reports, his cooperation with law enforcement and his
|
||
testimony against Craig Neidorf would be taken into consideration during
|
||
the testimony.
|
||
|
||
Did the actions of the three cause $700,000 worth of damages, or is the
|
||
figure intended to be a "message" to others? If the former, one wonders
|
||
what they possible could have done to create such mischief, because the
|
||
original indictment mentions nothing about concrete damages, and we have
|
||
already seem how Bell is willing to inflate costs. If the amount of
|
||
restitution was intended as a message, it is successful. But, it sends an
|
||
inintended message: The judicial system is wacky! If each repays $4,000 a
|
||
year, they may be paying out of their social security well into their 70s.
|
||
If each repays it within 25 years ($9,300 a year), they are effectively
|
||
saddled with a "second mortgage" before even launching their lives. They
|
||
will emerge from prison faced with obstacles that even the most hardened
|
||
criminals do not endure.
|
||
|
||
Prison time also seems inappropriate. The so-called "tough on crime"
|
||
mentality of the past decade has created an explosion in the nation's
|
||
prison population. Since 1980, the nation's prison population has more than
|
||
doubled, increasing from about 329,821 in 1980 to almost 800,000 in
|
||
November of 1990. Tossing people in prison is not, for non-violent crimes,
|
||
particularly cost-effective, and there is no agreement on the deterrent
|
||
effect of prisons. For relatively minor white collar crimes, such as those
|
||
commited by the "Atlanta Three," prison seems both unnecessary and unjust,
|
||
and tax-payers foot the bill.
|
||
|
||
There is apparently little the three can do about the sentence. But the
|
||
rest of us can join in the tasks of lobbying for saner laws and sentences
|
||
that better fit the "crime" than does incarceration, while simultaneously
|
||
working to curtail computer abuse.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Adam Gaffin
|
||
Subject: Prodigy Saga Continues
|
||
Date: November 14, 1990
|
||
|
||
********************************************************************
|
||
*** CuD #2.12: File 4 of 9: The Prodigy Saga Continues ***
|
||
********************************************************************
|
||
|
||
(The Prodigy saga continues. Adam Gaffin, who has been following the story
|
||
for the Middlesex News in Framingham, Mass, reports that after a couple of
|
||
days, Prodigy restored the account of the "Prodigy Nine" and then, a few
|
||
days after that, pulled them again! The total number is actually now up to
|
||
about 15. Prodigy has been receiving lots of bad press in the media, and
|
||
Henry Niman, a prodigy victim, has been interviewed about his experiences
|
||
by several TV stations and newspapers. Adam recently wrote the following
|
||
stories--moderators).
|
||
+++++++++++++
|
||
|
||
From: "Conversations with Fred," Middlesex News, Framingham, 11/6/90.
|
||
|
||
The story is bizarre but true, swears Herb Rothman. Seems Prodigy, the
|
||
network run as a joint venture by Sears and IBM, wouldn't let somebody post
|
||
a message in a coin-collecting forum that he was looking for a particular
|
||
Roosevelt dime for his collection. Upset, the man called "member services."
|
||
The representative told him the message violated a Prodigy rule against
|
||
mentioning another user in a public message. "What user?" the man asked.
|
||
"Roosevelt Dime," the rep replied. "That's not a person!" the man said.
|
||
"Yes he is, he's a halfback for the Chicago Bears," the rep shot back.
|
||
|
||
Rothman is one of those alleged compu-terrorists Prodigy claims is
|
||
harassing other users and companies that advertise on the service by
|
||
sending out thousands upon thousands of increasingly hostile messages in
|
||
protest of a Prodigy plan to begin charging users who send more than 30
|
||
e-mail messages a month. Rothman and the others say they sent very polite
|
||
messages to people (Penny Hay of Los Angeles says her messages were even
|
||
approved by the Prodigy legal department) telling them about the new fees
|
||
and urging them to protest.
|
||
|
||
What's really happening is that Prodigy is proving its complete arrogance
|
||
and total lack of understanding of the dynamics of on-line communication.
|
||
They just don't get it. People are NOT going to spend nearly $130 a year
|
||
just to see the weather in Oregon or order trips to Hawaii.
|
||
|
||
Even the computerphobes Prodigy wants to attract quickly learn the real
|
||
value of the service is in finding new friends and holding intelligent
|
||
"discussions" with others across the country.
|
||
|
||
But Prodigy blithely goes on censoring everything meant for public
|
||
consumption, unlike other nationwide services (or even bulletin-board
|
||
systems run out of some teenager's bedroom). Rothman's story is not the
|
||
only one about capricious or just plain stupid censoring. Dog fanciers
|
||
can't use the word "bitch" when talking about their pets, yet the service
|
||
recently ran an advice column all about oral sex. One user who complained
|
||
Law" was not allowed on was told that "queen b***h" would be acceptable,
|
||
because adults would know what it meant but the kiddies would be saved.
|
||
|
||
So when the supposed technology illiterates Prodigy thinks make up its user
|
||
base managed to get around this through the creation of private mail
|
||
"lists" (and, in fact, many did so at the urging of Prodigy itself!),
|
||
Prodigy started complaining of "e-mail hogs," quietly announced plans to
|
||
levy charges for more than a minute number of e-mail messages each month
|
||
and finally, simply canceled the accounts of those who protested the
|
||
loudest!
|
||
|
||
And now we are watching history in the making, with the nation's first
|
||
nationwide protest movement organized almost entirely by electronic mail
|
||
(now don't tell Prodigy this, but all those people they kicked off quickly
|
||
got back onto the system -- Prodogy allows up to six users per household
|
||
account, and friends simply loaned their empty slots to the protest
|
||
leaders).
|
||
|
||
It's truly amazing how little faith Prodigy has in the ability of users to
|
||
behave themselves. Other systems have "sysops" to keep things in line, but
|
||
rarely do they have to pull messages. Plus, Prodigy is just being plain
|
||
dumb. Rothman now has a mailing list of about 1,500. That means every time
|
||
he sends out one of his newsletters on collectibles, he sends 1,500 e-mail
|
||
messages, which, yes, costs more for Prodigy to send over long-distance
|
||
lines and store in its central computers. But if they realized their users
|
||
are generally mature, rather than treating them as 4-year-olds, Rothman
|
||
could post just one message in a public area, that everybody could see.
|
||
|
||
Is this any way to run an on-line system? Does Prodigy really want to drive
|
||
away the people most inclined to use the service -- and see all those ads
|
||
that pop up at the bottom of the screen? Prodigy may soon have to do some
|
||
accounting to the folks at IBM and Sears, who by most accounts have already
|
||
poured at least $750 million into "this thing."
|
||
|
||
(With your computer and modem, you can reach Fred the Middlesex News
|
||
Computer anytime, day or night, at (508) 872-8461. Set your parameters to
|
||
8-1-N and up to 2400 baud.)
|
||
|
||
+++++++++++++
|
||
|
||
"Prodigy Pulls Plug on Electronic Mail Service for Some"
|
||
From: Middlesex News, Framingham, Mass., 11/2/90
|
||
|
||
By Adam Gaffin (News staff writer)
|
||
|
||
Users of a national computer network vow to continue a protest against
|
||
censorship and a new charge for electronic mail even though the company
|
||
kicked them off-line this week.
|
||
|
||
Brian Ek, spokesman for the network, Prodigy, said the "handful" of users
|
||
had begun harassing other users and advertisers on the service and that
|
||
some had even created programs "to flood members' %mailboxes' with
|
||
(thousands of) repeated and increasingly strident harangues," he said.
|
||
|
||
But leaders of the protest say they sent only polite letters - approved by
|
||
the company's legal department - using techniques taught by the company
|
||
itself. Up to nine of them had their accounts pulled this week.
|
||
|
||
Protests began in September when the company said it would cut unlimited
|
||
electronic mail from its monthly fee -- which includes such services as
|
||
on-line airline reservations, weather and games -- and would charge 25
|
||
cents for every message above a monthly quota of 30. Ek says the design of
|
||
the Prodigy network makes "e-mail" very expensive and that few users send
|
||
more than 30 messages a month.
|
||
|
||
But Penny Hay, the only organizer of the "Cooperative Defense Committee"
|
||
whose account was not shut this week, said she and others are upset with
|
||
Prodigy's "bait and switch" tactics: the company continues to promote
|
||
"free" electronic mail as a major feature. She said Prodigy itself had
|
||
spurred use of e-mail by encouraging subscribers to set up private e-mail
|
||
"lists" rather than use public forums and that the charges will especially
|
||
hurt families, because the quota is per household, not person.
|
||
|
||
Ek said relatively few members protested the rate change. Gary Arlen, who
|
||
publishes a newsletter about on-line services, called the controversy "a
|
||
tempest in a teapot."
|
||
|
||
Hay, however, said the group now has the backing of nearly 19,000 Prodigy
|
||
users - the ones advertisers would want to see on-line because they are the
|
||
most active ones on the system and so more likely to see their ads.
|
||
|
||
The group is also upset with the way the company screens messages meant for
|
||
public conferences. Other services allow users to see "postings"
|
||
immediately.
|
||
|
||
"They are infamous for this unpredictable and unfathomable censorship," Hay
|
||
said.
|
||
|
||
"We feel what we are doing is not censoring because what we are essentially
|
||
doing is electronic publishing," Ek said, comparing the public messages to
|
||
letters to the editor of a family newspaper.
|
||
|
||
Neil Harris, marketing director at the competing GEnie service, said many
|
||
people would feel intimidated knowing that what they write is being
|
||
screened. He said GEnie only rarely has to deleted messages. And he said
|
||
GEnie has picked up several thousand new customers from among disgruntled
|
||
Prodigy users.
|
||
del 85 86; ch eol to')' in 89; m 87
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: laird@SLUM.MV.COM(Laird Heal)
|
||
Subject: Re: Response to Mars "Censoring"
|
||
Date: 7 Nov 90 10:45:18 EST (Wed)
|
||
|
||
********************************************************************
|
||
*** CuD #2.12: File 5 of 9: Mars *was* Censored ***
|
||
********************************************************************
|
||
|
||
In article <CuD #2.09 #4>, dan-hankins@cup.portal.com (Dan Hankins) write:
|
||
|
||
>In article <CuD #2.08 #3>, Karl Lehenbauer <karl@sugar.hackercorp.com> writes,
|
||
|
||
>>I used Prodigy several times, and it is a heavily censored system,...
|
||
|
||
>This is inaccurate. Prodigy is not censored, it is _edited_. There is a
|
||
>significant difference. When newspaper articles are removed by government
|
||
>order, that's censorship. When the newspaper owners decide to not run an
|
||
>article because it is counter to their editorial policies (or personal
|
||
>prejudices), then that's editing.
|
||
|
||
>In article <CuD #2.08 #4), the moderators write,
|
||
|
||
>>In the MARS incident, the NSF flexed its fiscal muscles (according to those
|
||
>>on the receiving end).
|
||
|
||
>This is again not censorship. The NSF pays for the Internet, and has the
|
||
>right to say how those monies are spent. Since MARS resided on an Internet
|
||
>node, the NSF had the right to refuse to pay for those files to be transmitted
|
||
>across its network. In fact, the NSF has the right to refuse to pay for
|
||
>network connections for any site for any reason whatsoever, unless it has made
|
||
>a contract to the contrary. If this is "flexing its fiscal muscles", then so
|
||
>be it.
|
||
|
||
You have gotten caught up in an emotional response to the word
|
||
"censorship". If you are going to mince words, do not use a meat
|
||
tenderizer or your argument will be mush.
|
||
|
||
The first comment is correct. Censorship is when a governmental body edits
|
||
a writing based upon its perceived content.
|
||
|
||
The fundamental point that has not been brought up by those approving of
|
||
the action (removing access and storage of the pictures) is that a
|
||
governmental body must grant First Amendment protection to all speech. The
|
||
sole exception where censorship is generally allowable is when that speech
|
||
would shock the general public, and this is normally restricted to
|
||
materials in public view.
|
||
|
||
The GIF archives are not in public view - even when sent as net-news they
|
||
are encoded - but they were/are in a location where there is general public
|
||
access of whatever files have been submitted to the archiver or to the
|
||
network. Particularly with netnews, there is no specific editing done
|
||
whatsoever after the author posts the article, and moderators serve only at
|
||
the whim of a majority of voters. Wherever speech is allowed, even if the
|
||
governmental body is paying for it, the content of that speech may not be
|
||
regulated by the governmental body. These pictures might be accessed by
|
||
immature youths who should be protected from carnal knowledge
|
||
|
||
Moreover, once it is established, that arm of the government may not simply
|
||
discontinue the service if the reason is to suppress the speech that is
|
||
being communicated. The First Amendment is guarded zealously by the
|
||
Federal courts and such an action should not withstand the "strict
|
||
scrutiny" that it should be examined under. I wish the Second Amendment
|
||
received such guardianship; I have never owned a gun, but I think everyone
|
||
should have the right to own one while the government has lots of guns and
|
||
seems to think nobody else should ever have any.
|
||
|
||
Obscenity may be censored - when it might otherwise shock the unsuspecting
|
||
public. A brown paper bag can never attract the prurient interest; do not
|
||
tear the bag open unless you do want to see what is inside. I never have
|
||
looked at any of the alt.sex hierarchy. Once a public forum exists, it may
|
||
not be censored, although the participants may agree to self-regulation. I
|
||
remember once wondering what was really in alt.flame, and the first article
|
||
convinced me that I had read enough. Those guys are serious about their
|
||
roasting there, not their vocabulary (damned if they do not just grab for
|
||
the nearest word). The alt.flame group is there with a good reason -
|
||
otherwise people who do not want to read that material might have to read
|
||
the same articles, but in their news group.
|
||
|
||
I personally can see no great benefit to maintaining an archive of sexually
|
||
explicit GIF images, except that archives exist to keep network
|
||
transmission to the most suitable paths; otherwise the private messages
|
||
sent back and forth are unmanaged and unmanageable, and we wind up with the
|
||
situation as described where Australians ftp'd files from Finland because
|
||
they were not archived at a more convenient site. Archives reduce network
|
||
load. Netnews reduces network load.
|
||
|
||
I can also personally see no great benefit to every person having a gun or
|
||
two except that we would all either be much more polite or on the way to an
|
||
ambulance. I am not an absolutist, and everyone does not act the way I
|
||
think everyone should. I do not act the way I think I should sometimes
|
||
either. I am a pragmatist when it comes to dealing with other people's
|
||
business: you send my files along, I will send yours along too.
|
||
|
||
>Complete the following: Pro is to Con as Progress is to ________.
|
||
|
||
That is a nice .signature.
|
||
|
||
Laird Heal laird@slum.MV.COM The Usenet is dead! NA:USA:NH:Salem +1 603
|
||
898 1406 Long live the Usenet!
|
||
|
||
********************************************************************
|
||
|
||
*******************************************************************
|
||
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
Subject: Response to SJG Affidavit (part 1)
|
||
From: David G. Cantor <dgc@MATH.UCLA.EDU>
|
||
Date: Wed, 14 Nov 90 22:48:06 -0800
|
||
|
||
********************************************************************
|
||
*** CuD #2.12: File 6 of 9: Response to SJG Affidavit (part 1) ***
|
||
********************************************************************
|
||
|
||
I just received the special issue CUD on the search affidavit for Steve
|
||
Jackson.
|
||
|
||
Thank you for publishing it.
|
||
|
||
Perhaps you could discuss how transferring a document can be a crime, other
|
||
than possibly a (relatively minor) copyright violation? If it truly is a
|
||
crime, as stated in the affidavit, then anyone, by calling a document
|
||
proprietary and attaching a large value to it, can, in effect, create a
|
||
classified document and have this classification enforced by the US
|
||
Government.
|
||
|
||
As the Pentagon Papers case (dismissed against Daniel Ellsburg) showed,
|
||
it's extremely difficult to prosecute such cases, even when they are real!
|
||
Note that in Ellsburg's case there was no doubt that the documents in
|
||
question were government documents. classified SECRET (mostly). Yet the
|
||
case against Ellsburg was dismissed. Of course, Ellsburg had powerful
|
||
allies: The New York Times and the Washington Post, among others.
|
||
|
||
You pointed out, "It should also be remembered that the "$79,449.00"
|
||
document in question was shown to contain nothing of substance that is not
|
||
available to the general public for under $14. Further, to our knowledge,
|
||
there is no evidence, contrary to suggestions, that E911 software was
|
||
obtained".
|
||
|
||
I find it troubling that these considerations are even relevant. What was
|
||
transferred were a few electrons forming information, not classified, or
|
||
otherwise secret. Even if it were 911 software, so what? No criminal
|
||
charges were made concerning copyright or patent violations
|
||
|
||
I also wonder, considering the generally tight budgets in our government,
|
||
why the "Feds" are so interested in this case? Why are they investing so
|
||
much effort? In my limited experience, this occurs when some party has an
|
||
ax to grind or something special to gain. For example, in one of the first
|
||
such cases, against Ronald Mark Austin (who in 1983 was convicted of a
|
||
felony, primarily for accessing the (then) Arpanet), Los Angeles District
|
||
Attorney Phillibosian (appointed by the Governor) was running in his first
|
||
election. Presumably for publicity to help his re-election campaign, he
|
||
fried Austin in a MAJOR PRESS CONFERENCE (this DA also gave us the infamous
|
||
McMartin child molestation case).
|
||
|
||
Who stands to gain in the current prosecution? Is it Bell South, trying to
|
||
protect its turf in some way, or cover up something it has done? Is it
|
||
having problems with its 911 system it would like to blame on someone else?
|
||
Clearly it has the clout to cause such a prosecution. But WHY?
|
||
|
||
This whole case STINKS.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Anonymous
|
||
Subject: Warrants schmarrants! The SS is Crazy!
|
||
Date: Fri, 16 Nov 90 17:12 CST
|
||
|
||
********************************************************************
|
||
*** CuD #2.12: File 7 of 9: Warrants Schmarrants (SJG, part 2) ***
|
||
********************************************************************
|
||
|
||
I've read the Steve Jackson Games warrant in CuD 2.11 and it makes me want
|
||
to move to Russia. It is crazy, just plain crazy. It reminds me of essay
|
||
tests when I wasn't prepared for a question and tried a snow-job hoping the
|
||
prof wouldn't notice. I usually got an F, but Foley gets rewarded and Steve
|
||
Jackson gets raided. Foley and his crowd have taken a few logs and blown
|
||
them out of context. They claim that Erik Bloodaxe's post on Jan 23 is some
|
||
kind of conspiracy, and that it proves that there's an encryption service,
|
||
and it says no such thing. The following posts don't add anything to that
|
||
post, so it seems it's just a silly attempt to fake evidence. Bloodaxe's
|
||
post may have been ill considered and in bad taste, but that's not a crime.
|
||
Heck, if bad taste were a crime, federal agents would be doing 30 years for
|
||
their wingtips.
|
||
|
||
The Phoenix Project had Phrack 24 on the board with a few pages of a
|
||
document. So what? Foley keeps talking about "my investigation." Well, if
|
||
he'd really investigated, he'd have known that the document in Phrack #24
|
||
was more than slightly edited and that the information in it was public.
|
||
Everything I've read says that the information that was published costs
|
||
about 13 dollars, not the 79,000 Foley claimed. Was he having a nap when
|
||
he claims to be investigating? Phrack is on a lot of boards, not just the
|
||
Phoenix Project, so what's the big deal? They make it sound like it was a
|
||
great conspiracy. Doesn't the first amendment allow posting legal
|
||
magazines?? Foley claims to be a lawyer; some lawyer! His lack of concern
|
||
for constitutional rights makes me wonder if his law degree isn't mail
|
||
order.
|
||
|
||
Foley also claims that Mentor's post on Jan 26 links him to some encryption
|
||
service. All he did was explain what Kermit is. Is that a crime?
|
||
Explaining a protocol? Christ, would anybody else who explained Kermit have
|
||
been busted? Beware when somebody asks about the difference between Puma
|
||
and Lynx. They might be feds and your boss might be raided.
|
||
|
||
Since when are encryption and decryption devices illegal? I can get them
|
||
off any good PD board in the country. Did Foley rewrite the law on his own?
|
||
|
||
The list of stuff to be searched boggles the mind. Books, notes, tapes, and
|
||
everything but the computerized micro-wave oven could be snatched (oh-oh!
|
||
Better keep quiet on that one or they'll get that next).
|
||
|
||
From this they justify their raid on Steve Jackson's company and nearly
|
||
destroy it. I guess you have to be prosecuted before you can charge
|
||
malicious prosecution, but I hope there is some way that those involved in
|
||
this total travesty of justice can get their due. It is frightening to
|
||
think that this could happen in America, and if Foley and his lackey's can
|
||
be sued, hopefully somebody will nail him. This isn't legitimate law
|
||
enforcement, it's a witch hunt. And if Foley is sued, I hope he gets more
|
||
justice than he is willing to give others.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: The Conflict
|
||
Subject: More guidelines on what to do if busted
|
||
Date: Tue, 13 Nov 90 12:26 CST
|
||
|
||
********************************************************************
|
||
*** CuD #2.12: File 8 of 9: More tips on Reacting to a Raid ***
|
||
********************************************************************
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
%% %%
|
||
%% Simple Guidelines To Follow If You Encounter %%
|
||
%% Law Enforcement Agents In An Unfriendly Situation %%
|
||
%% %%
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
The current state of the Computer Underground is an extreme turmoil. The
|
||
recent threat of another series of witchhunt raids has put many people into
|
||
a state of paranoia, and rightfully so. Noone needs to deal with all the
|
||
bullshit associated with a bust. I am offering a few guidelines to follow
|
||
if you are placed in a precarious situation instigated by a law enforcement
|
||
agent; of course, it is up to you to decide what you want to do. Of the
|
||
people who I have spoken with, these will be some of the best steps to
|
||
follow if you receive an unexpected visit.
|
||
|
||
Probably the first thing you would want to do if you receive an unfriendly
|
||
visit from Joe Fed is to READ the fucking warrant. Find out why you have
|
||
been chosen, and what they are looking for. Also, remember that if they
|
||
have only a search and seizure warrant, they are warranted only to
|
||
confiscate items on your premises; however, if they are serving a subpoena,
|
||
they may take what they need, on or off your premises. So, in essence, the
|
||
clean-house preventive measure may or may not be useful to you.
|
||
|
||
An important thing to do when Agent Foley (or one of his lesser evil
|
||
counterparts) comes knocking on your door is to cooperate fully. Drop a
|
||
lot of "Yes sir"/"No sir" answers; respond politely. You're in no position
|
||
to be a smart ass, and being friendly surely can not hurt you.
|
||
|
||
Another important thing to remember, although it is almost opposite of the
|
||
aforementioned, has to do with what to say. In essence, do not say a
|
||
fucking thing if you are questioned! Remember, anything you say or do can
|
||
and WILL be used AGAINST you in a court of law. Simply reply, "I can not
|
||
answer any questions without counsel", or "I first must contact my
|
||
attorney." You need not answer a damn thing they ask of you without an
|
||
attorney present, and it would most probably be very detrimental to do so.
|
||
|
||
This hint parallels the previous one. No matter what you do, do not reply
|
||
to any question with "I don't know anything", or any simple derivation of
|
||
that phrase. If you do, and you are indicted, you will be reamed in court.
|
||
The presence of that statement could greatly damage your defense, unless
|
||
you are conditionally mental or something.
|
||
|
||
In essence, those are all you should need. What I have outlined is very
|
||
simple, but logical. You need to keep a level head at least while they are
|
||
on site with you; get pissed off/psycho later, after they leave. If you
|
||
are currently an active member of the Computer Underground, you may wish to
|
||
lose anything that is important to you, at least temporarily. Why? Well,
|
||
the analogy I was given follows that: if you were suspected of
|
||
racketeering, the feds could execute a search and seizure on your property.
|
||
If they can prove by 51% that ANY of the confiscated material COULD have
|
||
been used in your suspected racketeering, it is forfeited (i.e. you lost
|
||
it, for good). The forfeiture stands whether or not you are indicted or
|
||
convicted! So, you would be entirely screwed.
|
||
|
||
All of the aforementioned steps are important. Those are all I really have
|
||
to offer. I suggest that you get clean before the sweep occurs, and that
|
||
you stay clean until after the sweep clears. Exercise extreme caution.
|
||
Keep your head high, and keep your back to the wall (otherwise, it would be
|
||
quite possible to find a knife lodged in it). Stay safe, and good luck!
|
||
|
||
The Conflict (11-13-1990)
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: P.A. Taylor@EDINBURGH.AC.UK
|
||
Subject: CU in the News--England and Emma Nicholson; VOGON News
|
||
Date: 04 Nov 90 16:07:16 gmt
|
||
|
||
********************************************************************
|
||
*** CuD #2.12: File 9 of 9: The CU in the News ***
|
||
********************************************************************
|
||
|
||
|
||
"A Bug In The Machine" By Tom Dewe Matthews.
|
||
From: Sunday Correspondent, 17th Dec, 1989.
|
||
|
||
"Adrian Vole " looked on helplessly as the words on his computer terminal
|
||
began to drift down to the bottom of the screen. Soon, all that was left
|
||
were skeleton lines of meaningless text. "Oh God", cursed Vole, "I've
|
||
been hit by Cascade". There was nothing he could do to stop the computer
|
||
virus from running amok. In less than ten seconds, Adrian Vole's computer
|
||
had been turned into a useless piece of junk. Vole the hacker had been
|
||
hacked.
|
||
|
||
Adrian Vole is typical of his breed. By day he works at a computer console
|
||
for a financial research company and by night he hacks away in a computer-
|
||
filled den off his bedroom. Self-sufficient, with his terminal and telephone
|
||
modem which connects him to the rest of the computerised world, Vole is
|
||
typical in that he himself is open to attack.
|
||
|
||
Hackers see themselves as fighting for freedom of information, as trying to
|
||
break the control which big corporations such as IBM hold over computerised
|
||
information, in order to disseminate it freely. "Hackers", says George Stone,
|
||
the man who gave birth to Max Headroom, " want to be able to look into a
|
||
computer system and say %I understand you and therefore can question you.
|
||
|
||
You can no longer threaten me. I've beaten you". This curiosity and
|
||
sometimes paranoia, is provoked by the sheer power of computers. "On
|
||
one computer disc" says Stone,"you can put every address in the UK,
|
||
including postcodes, and on another you can put every name from every
|
||
electoral role in the country.You correlate those two discs, whack in a
|
||
few parameters and you can start up your own credit company, or your own
|
||
poll tax."
|
||
|
||
Hackers may say they want to demystify computers,not to rob them, but they
|
||
are nevertheless constantly destroying each other's systems by off-
|
||
loading sabotaged computer games on to the electronic notice-boards where
|
||
they swap software programs with each other. "Lounge Suit Larry" is only
|
||
one in a long line of these tainted computer games which in their pure
|
||
commercial state are harmless, but if you run an adulterated copy of
|
||
"Larry" through your computer, it will wipe out your hard disc, which in
|
||
human terms is the equivalent of removing your spine.
|
||
|
||
Computer companies have been known to put bugs into the programmes that
|
||
they're trying to sell to stop the customer from copying the programme-
|
||
which is illegal under copyright law. The computer companies also blur
|
||
the battle lines by adopting an attitude of: "If we can't beat them,
|
||
let's exploit them". It is now common practice among managers of computer
|
||
networks to put the telephone access number and password of a proposed
|
||
system on to an electronic notice-board and then sit back and watch
|
||
hackers wander around their system. In the mock battle that follows,
|
||
the systems designer will even put up barriers which the hackers will
|
||
try to knock down or evade. At the end of this phoney war, the system is
|
||
dismantled and the manager redesigns it according to what he has learnt.
|
||
|
||
The real system, with a secret telephone number and password, is then
|
||
put in place and if that is hacked into it is likely that the hacker will
|
||
be traced and confronted- only to be employed by the company on the theory
|
||
that it takes a thief to keep one out.
|
||
|
||
For the politicians who want to introduce legislation into the computer
|
||
industry, such double standards are largely ignored in their pursuit of the
|
||
hacker. The Conservative M.P. Emma Nicholson tried unsuccessfully to
|
||
introduce a bill last summer which called for a loosening of Home Office
|
||
restrictions on phone taps and up to 10 years imprisonment for those who
|
||
gain unauthorised access into a computer system. If the government fails to
|
||
introduce its own hacking law in the next parliamentary session,
|
||
Ms Nicholson promises to be back soon with a repeat of her Private Members
|
||
Bill.
|
||
|
||
Hackers according to Nicholson, "are malevolent, nasty evil doers' who
|
||
fill the screens of amateur users with pornography". She believes that
|
||
"hacking has now become a regular terrorist action... The European Green
|
||
Movement hacks into large companies", she says,"and picks out sensitive
|
||
information. It could be pharmaceutical industries; it could be the oil
|
||
industry, and they justify it on the grounds of environmental or racial
|
||
fairness".
|
||
|
||
According to Emma Nicholson, the hacked information is then used to carry
|
||
out bombing and fires". The Greens may storm American air bases, but do
|
||
they really invade computers? "Yes," replies Nicholson, "The Green movement
|
||
in Europe is the most aggressive on this. They are akin to the Animal
|
||
Liberation movement here." So the Greens are trying to destabilize society
|
||
through computers? "Yes, without any doubt at all," she replies, adding that
|
||
she has " a lot of validated information" to confirm this fact.
|
||
|
||
The validation turns out to be a back copy of an anarchist magazine called
|
||
*insurrection*, in which a communique from the Dutch anti-Apartheid
|
||
movement Ra Ra lists 40 acts of sabotage against Shell in the Netherlands.
|
||
|
||
A separate article asks its readers to start fires and also lists various
|
||
computer viruses but doesn't tell the reader how to create them. The link
|
||
between the hackers and the European Greens still seems unclear. "That",
|
||
Nicholson replies, "is buried deep in my files". But what's the source?
|
||
|
||
She then becomes as enigmatic as she was previously emphatic. "You
|
||
could call it unofficial secret-service trackers close to the Dutch
|
||
government. They're very close to the hackers and if they're named they
|
||
could be put in terrible jeopardy. These hackers are very nasty people".
|
||
|
||
(That's the first approx 1/4 of the article, the rest goes on to describe
|
||
a German hacker "Mike Blip" of the Chaos Club).
|
||
|
||
*******************************************************************
|
||
|
||
From: fitz@WANG.COM(Tom Fitzgerald)
|
||
Date: Thu, 15 Nov 90 18:42:06 EST
|
||
|
||
|
||
<><><><><><><> T h e V O G O N N e w s S e r v i c e <><><><><><><>
|
||
|
||
Edition : 2193 Monday 12-Nov-1990 Circulation : 8447
|
||
|
||
|
||
VNS COMPUTER NEWS: [Tracy Talcott, VNS Computer Desk]
|
||
================== [Nashua, NH, USA ]
|
||
|
||
Massachusetts - Considering computer-crime bill hailed as a model for others
|
||
%The Wall Street Journal, 9-Nov-90, p. B1%
|
||
The legislation "is the first to properly balance property and free speech
|
||
interests," says Mitchell Kapor, founder and chairman of Lotus Development.
|
||
The bill, which has the support of the governor and is expected to be approved
|
||
by the Legislature, declares that new forms of communication such as computer
|
||
bulletin boards and paperless electronic publications "are protected by
|
||
fundamental rights, including freedom of speech and association and freedom
|
||
from unreasonable government intrusion." The bill orders jail terms and stiff
|
||
fines for those who break into computers without authorization or let loose
|
||
software viruses that disrupt systems or destroy data. Hackers caught causing
|
||
damage of $10,000 or more are subject to as much as 2 1/2 years in prison, a
|
||
fine of up to $25,000, or both.
|
||
|
||
European Community - Protecting computer software against piracy
|
||
%The Wall Street Journal, 9-Nov-90, p. A6%
|
||
European Community internal-market ministers gave broad-based support to
|
||
proposals aimed at protecting computer software against piracy. Among the
|
||
topics touched on was "reverse engineering," which allows a manufacturer to
|
||
write compatible software or produce compatible equipment. The EC proposals
|
||
would allow reverse engineering if the purpose was to create compatible, or
|
||
"inoperable" products, although strict limits on the process would be set.
|
||
|
||
|
||
<><><><><><><> T h e V O G O N N e w s S e r v i c e <><><><><><><>
|
||
|
||
Edition : 2194 Tuesday 13-Nov-1990 Circulation : 8450
|
||
|
||
|
||
VNS COMPUTER NEWS: [Tracy Talcott, VNS Computer Desk]
|
||
================== [Nashua, NH, USA ]
|
||
|
||
Security - Two teens charged with sabotaging voice-mail system
|
||
%The Wall Street Journal, 12-Nov-90, p. B7C%
|
||
Daniel Rosenbaum, 17, and a 14-year-old juvenile, both from Staten Island,
|
||
allegedly gained unauthorized entry to a computerized voice-mail system owned
|
||
by International Data Group, Framingham, Mass., then changed recorded
|
||
greetings to lewd messages, made bomb threats and erased customers' messages,
|
||
said John Keary, a New York state police investigator. The tampering occurred
|
||
between May and September at the company's Peterborough, N.H. office, at which
|
||
eight computer magazines published by the concern are based, said IDG
|
||
telecommunications director Jane Creighton. She estimated the disruptions cost
|
||
the company $2.4 million in lost revenue from advertisers and other expenses.
|
||
Mr. Rosenbaum said the two broke into the company's system because they didn't
|
||
get a free poster they had expected to receive with "Gamepro," one of its
|
||
computer magazines, said Mr. Keary. Mr. Keary said the teen-agers were charged
|
||
with computer tampering, unauthorized use of a computer and aggravated
|
||
harassment. They gained entry to the voice-mail system by entering "certain
|
||
codes" into it through telephones, after calling the company's toll-free
|
||
number, he added. By experimentation or luck, outsiders can learn passwords
|
||
needed to break into voice-mail systems, enabling them to change outgoing
|
||
messages and otherwise disrupt operations. Voice-mail break-ins, however, are
|
||
declining as security aspects of the systems are beefed up, asserts David
|
||
Ladd, executive vice president of VMX Inc., a San Jose, Calif., seller of
|
||
voice-mail systems. IDG's Ms. Creighton said that gaining access to the
|
||
company's phone mail system required use of multiple passwords. The teen-agers
|
||
"are subscribers and readers of ours, therefore they are very
|
||
computer-knowledgeable," she added.
|
||
|
||
|
||
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
|
||
|
||
Permission to copy material from this VNS is granted (per DIGITAL PP&P)
|
||
provided that the message header for the issue and credit lines for the
|
||
VNS correspondent and original source are retained in the copy.
|
||
|
||
<><><><><><><> VNS Edition : 2194 Tuesday 13-Nov-1990 <><><><><><><>
|
||
|
||
********************************************************************
|
||
|
||
------------------------------
|
||
|
||
**END OF CuD #2.12**
|
||
********************************************************************
|
||
|
||
|