878 lines
41 KiB
Plaintext
878 lines
41 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 2, Issue #2.19 (December 31, 1990) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
||
ARCHIVISTS: Bob Krause / Alex Smith / Bob Kusumoto
|
||
RESIDENT RAPMASTER: Brendan Kehoe
|
||
|
||
USENET readers can currently receive CuD as alt.society.cu-digest.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source is
|
||
cited. Some authors, however, do copyright their material, and those
|
||
authors should be contacted for reprint permission.
|
||
It is assumed that non-personal mail to the moderators may be reprinted
|
||
unless otherwise specified. Readers are encouraged to submit reasoned
|
||
articles relating to the Computer Underground.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
views of the moderators. Contributors assume all responsibility
|
||
for assuring that articles submitted do not violate copyright
|
||
protections.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
CONTENTS:
|
||
File 1: Moderators' Corner
|
||
File 2: From the Mailbag
|
||
File 3: Telecoms Ripping off BBSs?
|
||
File 4: Michigan Bell vs BBSs
|
||
File 5: Clarification of Gail Thackeray's Comment on Modem Licensing
|
||
File 6: a.k.a. freedom of expression
|
||
File 7: Z-modem Virus Alert
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
********************************************************************
|
||
*** CuD #2.19: File 1 of 7: Moderator's corner ***
|
||
********************************************************************
|
||
|
||
From: Moderators
|
||
Subject: Moderators' Corner
|
||
Date: December 31, 1990
|
||
|
||
++++++++++
|
||
In this file:
|
||
1. NEW FTP SITE
|
||
2. RESOURCE CORRECTIONS
|
||
3. LEN ROSE UPDATE
|
||
++++++++++
|
||
|
||
+++++++++++
|
||
New FTP Site
|
||
+++++++++++
|
||
|
||
A second FTP archive has been set up at the University of Chicago, to help
|
||
distribute the load. It'll be an exact shadow of the
|
||
ftp.cs.widener.edu site. The info you'll need is:
|
||
|
||
ftp to chsun1.uchicago.edu [128.135.12.60]
|
||
login as anonymous
|
||
send your email address as the password
|
||
the stuff's in pub/cud
|
||
|
||
The Mail-server is also up and runing. People need to send mail to:
|
||
archive-server@chsun1.uchicago.edu with the word "help" on a line by itself
|
||
in the body of the letter. This will send them the help file for the email
|
||
server. Also, adding the word "index" on a line by itself will send the
|
||
general Index for all files on the email server (includes other things
|
||
besides the CuD archives). Basically, the sections are broken down to the
|
||
various directories contained in ^^/pub/cud on the ftp archives. So if
|
||
someone wanted to get specific index by a section, they would put the
|
||
phrase:
|
||
|
||
index cud
|
||
|
||
on a line by itself and get the cud index file. Since there are quite a
|
||
few large files contained in the archives, the arc-master will have to
|
||
personally make special requests to split the files up and make them
|
||
available to whoever asks (the email and ftp servers are linked together to
|
||
save space). This puts more delay for email requesters but it's probably
|
||
the best way to go for the time being.
|
||
|
||
+++++++++++++++++
|
||
Resource Corrections
|
||
+++++++++++++++++
|
||
|
||
The cost of TAP has increased a bit. They are now $2 for single issues or
|
||
$10 for ten.
|
||
|
||
NIA's correct address is: elisem@nuchat.sccsi.com
|
||
|
||
+++++++++++++
|
||
Len Rose Update
|
||
+++++++++++++
|
||
|
||
Len Rose's trial in Baltimore remains scheduled for January 28 in the
|
||
Federal District Court before judge J. Frederick Motz. Len's public
|
||
defender has been replaced with Jane Macht, described by those who know her
|
||
as highly competent and responsive. Len faces a five-count indictment
|
||
alleging "crimes" under 18 USC s1030(a)(6), 18 USC s2314, and 18 USC s2,
|
||
which, as written, charge him with interstate transportation of AT&T source
|
||
code and with transfering a "trojan horse login program." The indictment
|
||
also links Len to the Legion of Doom, which it describes in a highly
|
||
prejudicial narrative. Previous issues of CuD have provided in-depth
|
||
details of the case, including a copy of the indictment. A large (1650
|
||
line) file with complete background is available from the CuD ftp sites.
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
From: Various
|
||
Subject: From the Mailbag
|
||
Date: December 31, 1990
|
||
|
||
********************************************************************
|
||
*** CuD #2.19: File 2 of 7: From the Mailbag ***
|
||
********************************************************************
|
||
|
||
From: Wes Morgan <morgan@ENGR.UKY.EDU>
|
||
Subject: security checks from outside (In CuD 2.18)
|
||
Date: Fri, 28 Dec 90 10:12:09 EST
|
||
|
||
>From: gnu@TOAD.COM
|
||
>Subject: Re: "strangers probing for security flaws" -- another view
|
||
>
|
||
>Suppose there was a free program, available in source code and scrutinized
|
||
>by wizards all over the net, that you could run to test your security. If
|
||
>you had the time, you might run it and fix up the things it found. If you
|
||
>didn't have the time, those things would probably go unfixed.
|
||
|
||
There are several packages available for UNIX sites. Two that come to
|
||
mind are:
|
||
|
||
- The suite of programs included in "UNIX System Security", by
|
||
Kochan and Wood (published by Hayden Books). These programs
|
||
will audit your system for such things as world-writable home
|
||
directories, world-writable .profiles, and the like. They will
|
||
also track down any setuid/setgid files outside of regular sys-
|
||
tem directories. I've seen this package on several archive sites,
|
||
but I don't know if it's legal to distribute them. If someone
|
||
can contact Kochan, Wood, or Hayden Books, and check on this, I'll
|
||
gladly get them into the CuD archive.
|
||
|
||
- COPS, written by Dan Farmer of CERT. This package is EXCELLENT.
|
||
The best feature of COPS is an expert system that pseudo-exploits
|
||
any holes it finds. It uses /etc/passwd and /etc/group to learn
|
||
what the users are capable of. It then looks for a way to assume
|
||
the identity of a particular user. It then checks /etc/group to
|
||
see what it can access as the new uid. The chain continues until
|
||
it either becomes root or runs into a dead end. The output looks
|
||
something like this:
|
||
write /usr2/admin/morgan/.profile become morgan group staff
|
||
write /bin become bin write /etc become root DO ANYTHING
|
||
<This output was caused by my .profile being left world-writable>
|
||
This is a SUPERIOR package for UNIX sites. It's available from
|
||
cert.sei.cmu.edu.
|
||
|
||
|
||
Both of these can be run via cron. I've been running them for several
|
||
months now, with excellent results.
|
||
|
||
>Sites all over the Internet *are* being probed by people who want to do
|
||
>them harm. We know this as a fact. I would prefer if we had some
|
||
>volunteer "cop on the beat"s who would walk by periodically and rattle the
|
||
>door to make sure it's locked.
|
||
|
||
I have no problems with this at all, *as long as* I know about it in
|
||
advance. With the advent of sophisticated security tools such as those
|
||
probably used by the group in Italy, it is awfully easy to claim "cop
|
||
on the beat" status after being discovered. There was sufficient concern
|
||
about the Italians for CERT to issue a Security Advisory about their
|
||
activities. I'm not trying to make any allegations against the folks
|
||
in Italy; as far as I know, they are exactly what they claim to be. In
|
||
the future, however, I'm going to be EXTREMELY wary of people coming in
|
||
"out of nowhere" claiming to be "remote security checkers". An ounce of
|
||
paranoia, you know........
|
||
|
||
Wes Morgan
|
||
|
||
*******************************
|
||
|
||
From: Thomas Neudecker <tn07+@ANDREW.CMU.EDU>
|
||
Subject: Re: Cu Digest, #2.18
|
||
Date: Fri, 28 Dec 90 22:56:16 -0500 (EST)
|
||
|
||
In a recent CuDigest it was argued copyright protection of user interface
|
||
code should be eliminated. The author wrote in part:
|
||
|
||
>While source code should generally be protected, there are times when it
|
||
>may be more profitable to a company to release either the source code or
|
||
>important information pertaining to it. A prime example is IBM and Apple.
|
||
>Apple chose to keep their operating system under close wraps. IBM, in their
|
||
>usual wisdom, chose to let some of it fly. This caused the market to be
|
||
>flooded with "clone" PC's. Given a choice, most people bought PC's or
|
||
>PC-compatibles.
|
||
|
||
In fact IBM does not own DOS, ask Mr. Gates at Micro Soft he _sells_
|
||
licenses to the clones and sues those who try to steal his code (so does
|
||
AT&T/U*ix) Bye the way the first series IBM-PCs came with PC-DOS and CP/M.
|
||
IBM wanted Gates to write CP/M for the new machine but he said it was
|
||
*owned* by Gary Kildall of Digital Research but he try to write something
|
||
else just as good. IBM covered all of the bases and licensed both.
|
||
|
||
Regarding Apple; the ][+ I bought came with copyrighted O/S in ROM. And a
|
||
version of BASIC licensed from Micro Soft. (my 1979 version came with a
|
||
complete listing of the code for the ROM). For the LISA and the Macintosh
|
||
Apple licensed concepts from PARC for the GUI. They then licensed parts of
|
||
their developments to Micro Soft for use in Windows.
|
||
|
||
For more background on these I suggest a good book on the history of the
|
||
personal computer written by Paul Freiberger and Michael Swain. It is
|
||
"Fire in the Valley" ISBN# 0-88134-121-5.
|
||
|
||
*****************************************
|
||
|
||
From: netcom!onymouse@APPLE.COM(John Debert)
|
||
Subject: Encryption dangers in Seizures
|
||
Date: Sat, 29 Dec 90 11:20 PST
|
||
|
||
With all the concern about government seizure of someone's computer
|
||
equipment for the purported intention of looking for some kind of criminal
|
||
activity, encryption is being seriously considered in order to protect
|
||
confidential information from Big Brother's prying eyes.
|
||
|
||
There are various ways, of course, to encrypt files but one particularly
|
||
comes to mind as being at least as much hazard as protection.
|
||
|
||
The use of the "one-time" method of encryption has been considered the best
|
||
way to keep information from those not entitled to it but it seems to me a
|
||
two-edged sword, if you will, that can cause harm to whomever uses such a
|
||
method to keep the government out of their business.
|
||
|
||
The one time method uses a unique random key of equal length to the data to
|
||
be encrypted which is then XOR'ed with the data to produce the encrypted
|
||
result. Without the original key, the plaintext is not recoverable. Or is
|
||
it?
|
||
|
||
Now, suppose that someone has used this method to encrypt files on his/her
|
||
system and then suppose that Big Brother comes waltzing in with a seizure
|
||
warrant, taking the system along with all the files but does not take the
|
||
code keys with them. Knowing Big Brother, he will really be determined to
|
||
find evidence of a crime and is not necessarily beneath (or above) fudging
|
||
just a bit to get that evidence. What's to keep him from fabricating such
|
||
evidence by creating code keys that produce precisely the results that they
|
||
want-evidence of a crime? Would it not be a relatively simple procedure to
|
||
create false evidence by creating a new key using the encrypted files and a
|
||
plaintext file that says what they want it to? Using that new key, they
|
||
could, in court, decrypt the files and produce the desired result, however
|
||
false it may be. How can one defend oneself against such a thing? By
|
||
producing the original keys? Whom do you think a court would believe in
|
||
such a case?
|
||
|
||
One should have little trouble seeing the risks posed by encryption.
|
||
|
||
jd / onymouse@netcom.UUCP netcom!onymouse@apple.com
|
||
|
||
********************************
|
||
|
||
From: Andy Jacobson <IZZYAS1@UCLAMVS.BITNET>
|
||
Subject: Hackers as a software development tool
|
||
Date: Wed, 02 Jan 91 03:49 PST
|
||
|
||
I received one of those packs of postcards you get with comp. subscription
|
||
magazines (Communications Week) that had an unbelievable claim in one of
|
||
the ads. I quote from the advertisement, but I in no way promote,
|
||
recommend, or endorse this.
|
||
|
||
"GET DEFENSIVE!
|
||
YOU CAN'S SEE THEM BUT YOU KNOW THEY'RE THERE.
|
||
Hackers pose an invisible but serious threat to your information system.
|
||
Let LeeMah DataCom protect your data with the only data security system
|
||
proven impenetrable by over 10,000 hackers in LeeMah Hacker Challenges I
|
||
and II. For more information on how to secure your dial-up networks send
|
||
this card or call, today!" (Phone number and address deleted.)
|
||
|
||
So it seems they're claiming that 10,000 hackers (assuming there are that
|
||
many!) have hacked their system and failed. Somehow I doubt it. Maybe they
|
||
got 10,000 attempts by a team of dedicated hackers, (perhaps employees?)
|
||
but has anyone out there heard of the LeeMah Hacker Challenges I and II?
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: "Michael H. Riddle" <riddle@CRCHPUX.UNL.EDU>
|
||
Subject: Telecoms Ripping off BBSs?
|
||
Date: Thu, 27 Dec 90 05:59:11 cst
|
||
|
||
********************************************************************
|
||
*** CuD #2.19: File 3 of 7: Telecoms Ripping off BBSs? ***
|
||
********************************************************************
|
||
|
||
%Moderators' note: A number of states have already begun charging BBSs with
|
||
business rates. In some states, this may be a nuisance but not prohibitive.
|
||
In Illinois, for example, our own base rate in DeKalb of $24.02 would
|
||
increase to $34 were we to run a BBS. In other states (see following
|
||
file), the charges could be prohibitive if multi-line charges required
|
||
deposits and other fees. A representative from GTE in Indiana indicated
|
||
that they had no formal means of enforcing the charges other than to
|
||
investigate if they received reports of an unregistered BBS operating in
|
||
their jurisdiction. We have heard of no hobbyist in the U.S. paying for a
|
||
business line to run a non-commercial BBS, but the implications, if the
|
||
practice is allowed to spread unchecked, are serious. Enforced charges
|
||
could be the end of the local or regional Bulletin Board as they currently
|
||
exist.
|
||
|
||
The issue, according to the Indiana spokesperson, is alleged to be one of
|
||
fairness and equity in billing. Why, they, ask, should someone whose phone
|
||
is in constant use pay the same as somebody who uses their phone only a
|
||
fraction of the time? Our response is that there is little, if any, added
|
||
expense to telecom operations whether a phone is used for 20 minutes or 20
|
||
hours during a given day. Further, the user is already paying an added
|
||
charge simply for the receipt of calls. If one adds in toll charges for the
|
||
hundreds of thousands of those who call long distance, BBSs generate
|
||
considerable revenue for telecom companies. Classifying BBSs as business
|
||
lines and increasing the charges strikes us as unabashed greed. Why not
|
||
*REDUCE* the rates for BBS lines, which only receive calls and generate
|
||
considerable revenue in long distance charges?
|
||
|
||
This is not a trivial concern. Telephone rates, like all utilities, tend to
|
||
rise. The policies identified in the following two files should motivate
|
||
all of us to become involved by
|
||
1) Writing letters to local telecom companies
|
||
2) Writing to elected officials
|
||
3) Introducing these campaigns in local and regional elections
|
||
4) Writing to state utililty commissions
|
||
5) Attending and participating in hearings
|
||
|
||
************************************************
|
||
|
||
|
||
--- original post on alt.cosuard as reposted on comp.dcom.telecom---
|
||
|
||
The following cross-posted information is extracted from alt.cosuard.
|
||
Can anyone in Indiana or a closely neighboring state provide any
|
||
details on this?
|
||
|
||
>From: BILL BLOMGREN - Sysop: St. Pete Programmers Exchange RIME: PETEX
|
||
|
||
Well ... thought I would pass this tidbit of bad news along ... GTE
|
||
Indiana prevailed against the BBS systems there ... ALL BBS's in GTE's
|
||
area there are now at BUSINESS RATES. Which means $50 per month base
|
||
rates, plus MUCH higher long distance charges.
|
||
|
||
Indiana Bell ... has filed the same tariff with the PUC (Public
|
||
Utilities Commission) there, making it state wide.
|
||
|
||
Needless to say, GTE has a history of going after the little guy, so
|
||
you can expect it here in the REAL near future! I expect it nation-
|
||
wide in the near future. In Indiana, they decided that THE PHONE
|
||
COMPANY can decide that your residence is a business, and charge high
|
||
rates to all service incoming.
|
||
|
||
Unfortunately, the courts agreed with them.
|
||
|
||
Ain't Monopolies Nice???
|
||
|
||
-----
|
||
|
||
Not a nice situation huh? We didn't need a precedent to be set like
|
||
this ... now this paves the way for other companies to follow suit.
|
||
It'll be interesting to watch the nodelist to see if the nets in
|
||
Indiana (201 in Lafayette, 227 in South Bend, 230 in the Gary Area,
|
||
231 in Indy, 236 in Ft. Wayne/NE IN and 2230 in Terre Haute and 11/15
|
||
in Evansville) start shrinking.
|
||
|
||
|
||
Paul
|
||
|
||
UUCP: crash!pro-lep!shiva
|
||
ARPA: crash!pro-lep!shiva@nosc.mil
|
||
INET: shiva@pro-lep.cts.com
|
||
|
||
--- End of Cross Posting ---
|
||
|
||
<<<< insert standard disclaimer here >>>>
|
||
riddle@hoss.unl.edu | University of Nebraska
|
||
postmaster%inns@iugate.unomaha.edu | College of Law
|
||
mike.riddle@f27.n285.z1.fidonet.org | Lincoln, Nebraska, USA
|
||
|
||
|
||
---- my own responses to comments in the Omaha Sysops echo ----
|
||
|
||
|
||
In a message to M. RIDDLE, JACK WINSLADE writes as of 25-DEC-90 14:30:26
|
||
|
||
>Since you are the closest to being a real lawyer of any of us, and since
|
||
>you were the one who 'broke' the story to Tel_Dig, would you be willing to
|
||
>give an educated opinion on specifically what, when, and how much the
|
||
>Indiana decision will affect us here in Omaha.
|
||
|
||
See the previous response to Joan for what news there is.
|
||
|
||
>I'm sure that this will result in Yet Another round of 'The Sky Is
|
||
>Falling' <tm> messages in every sysops' conference just as soon as it hits
|
||
>Arfnews, etc. and enters the distortion-prone person-to-person-to-person
|
||
>chain of communication.
|
||
|
||
The only thing faster than the speed of light is the manner is which
|
||
disinformation about BBS law propagates across the net.
|
||
|
||
>Is this decision effective immediately, or will a higher court (or
|
||
>something else) intervene ?? How might this affect the situation in
|
||
>Nebraska (where Clink is about to buy the farm) and in the other states
|
||
>such as Texas ??
|
||
|
||
Since the limited information we have suggests this is a PUC decision, it is
|
||
still appealable to the courts. If appealed, it will probably not go into
|
||
effect until final judgment. It's direct effect would only be in Indiana.
|
||
|
||
The Nebraska PUC might not care a great deal what Indiana did, or it might
|
||
give them some value as "persuasive precedent." The arguments GTE used
|
||
might have some value. They might not. It all depends on how the
|
||
Indiana statutes are worded. My guess is the fight is over "what is a
|
||
business for the purpose of telephone rates?", which will in turn include
|
||
"why do businesses pay higher rates than residences?"
|
||
|
||
The answer to the second is generally "because they use the phone more."
|
||
The answer to the first has usually been "some kind of organization that
|
||
either makes a profit or has formal nonprofit status."
|
||
|
||
We all know that successful BBSes use telephone resources more than a
|
||
residence, perhaps more than many businesses. That supports GTEs position.
|
||
The fact that they are hobby operations is what complicates the picture,
|
||
and the PUC reaction is difficult to predict.
|
||
|
||
>Comments, suggestions ??
|
||
|
||
Keep calm and wait for a better report on what happened.
|
||
|
||
>Good (??) Day! JSW
|
||
|
||
G'Day back to you, mate! MHR
|
||
|
||
--- end of quoted messages ---
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Ed Hopper <ehopper@ehpcb.wlk.com>
|
||
Subject: Michigan Bell vs BBSs
|
||
Date: Mon, 31 Dec 90 23:49:03 CST
|
||
Organization: Ed Hopper's BBS - Houston, Texas 713-997-7575
|
||
|
||
********************************************************************
|
||
*** CuD #2.19: File 4 of 7: Michigan Bell vs. BBSs ***
|
||
********************************************************************
|
||
|
||
From: TELECOM Digest Tue, 1 Jan 91 03:46:40 CST Volume 11 : Issue 1
|
||
|
||
(Note: I am sending this on behalf of Bruce Wilson.)
|
||
|
||
From the FACTS BBS in Flint, Michigan, by way of the Vehicle City BBS in
|
||
Davison, Michigan:
|
||
|
||
On January 15, 1991, an administrative hearing will be held before the
|
||
Michigan Public Service Commission to discuss a complaint filed against
|
||
Michigan Bell Telephone Company.
|
||
|
||
Early this year, a private bulletin board in Grosse Point, called the
|
||
Variety and Spice BBS, was ordered to pay an increased charge for phone
|
||
service because it was discovered he was accepting donations for use of his
|
||
BBS.
|
||
|
||
This BBS ran on an IBM, and supports sixteen separate lines. Although a
|
||
portion of the BBS was open to the public, most of the BBS (including an
|
||
"adult file" area, were restricted to those who sent a donation to the BBS.
|
||
The money collected didn't even come close to the actual cost of running
|
||
such a BBS.
|
||
|
||
Michigan Bell claims that placing any condition on the use of a BBS
|
||
constitutes a business, and that the sysop must pay a business rate for his
|
||
phone line, plus pay a $100 deposit for EACH LINE in use. This means the
|
||
Variety and Spice sysop would have to pay a $1600 deposit, plus about $50
|
||
additional each month if he wanted to continue his BBS.
|
||
|
||
The sysop refused to pay this fee, so Michigan Bell disconnect his lines.
|
||
The sysop filed a complaint with the MPSC. Until this case was heard, he
|
||
decided to re-install the phone lines (at a considerable cost to himself).
|
||
|
||
If Michigan Bell wins this case, they will require every BBS sysop to pay
|
||
business rates for each of their lines, if it is determined that the BBS is
|
||
accepting fees or donations. The Variety and Spice sysop claims that MBT
|
||
considers requiring users to upload files or post messages (ie
|
||
upload/download ratios) the same as a donation, and will require the sysop
|
||
to upgrade his line to a business line whether money was exchanged or not.
|
||
However, in an interview I did in March, I talked to the chief spokesman of
|
||
MBT, who claimed that this was not the case. Only if money is accepted
|
||
will MBT demand the sysop pay business rate.
|
||
|
||
The important thing here is that AT THIS TIME, these are the rules that MBT
|
||
believes is in the tariff. If Variety and Spice loses this case, it is
|
||
conceivable that MBT can request further restrictions to be placed.
|
||
|
||
At this hearing, the public will be allowed to voice their opinions and
|
||
comments. This applies to both sysops and users. If MBT wins this case it
|
||
can cause serious restrictions to be place on BBS's, and will set a
|
||
precedence for other phone companies around the country to follow.
|
||
|
||
Your help is urgently needed!! Please try to attend this hearing. It will
|
||
be held at the Public Service Building, 6545 Merchant Way, Lansing,
|
||
Michigan. The date is January 15. I do not have the exact time but I
|
||
assume this hearing will last most of the day. You do not have to testify,
|
||
but it would really be helpful if you can attend as a show of support. The
|
||
MPSC does not think the Michigan public even cares about BBS's. But we can
|
||
certainly jar their thinking if we can pack the room with sysops and users!
|
||
|
||
For more information, please contact Jerry Cross at 313-736-4544 (voice) or
|
||
313-736-3920 (bbs). You can also contact the sysop of the Variety & Spice
|
||
BBS at 313-885-8377.
|
||
|
||
Please! We need your support.
|
||
|
||
Notes from Ed Hopper:
|
||
|
||
In our case against Southwestern Bell, the same cockeyed logic was applied.
|
||
For a brief period, Southwestern Bell also maintained that the requirement
|
||
of file uploads was, in and of itself, cause for them to declare a BBS to
|
||
be a business because it required something "of value" for access. We were
|
||
able to force Southwestern Bell to see things in a more moderate tone.
|
||
|
||
Recently, I had the opportunity to testify before the Texas PUC regarding
|
||
the Texas BBS case. In that testimony, I stated that the telcos draw all
|
||
sorts of extreme scenarios in which the provision of residential service to
|
||
BBS systems is against the public good. Their argument goes: "If we allow
|
||
them to have residential service, it will upset the equations and raise the
|
||
cost of telecommunications services to everyone." However, there is not a
|
||
BBS on every block, or even one in every subdivision, and no rational
|
||
observer would ever expect that to be the case. There is, however, cause
|
||
for most rational observers to believe that the increased cost of business
|
||
service, including it's increased burden in the area of deposits and
|
||
installation charges, could cause the closing of many BBS outlets. This,
|
||
truly, would not be in the public good.
|
||
|
||
Ed Hopper
|
||
|
||
President
|
||
The Coalition of Sysops and Users Against Rate Discrimination
|
||
|
||
BBS: 713-997-7575 ehopper@attmail.com ehopper@ehpcb.wlk.com
|
||
|
||
****************************
|
||
|
||
[%Telecom Digest% Moderator's Note: The problem of course is that the
|
||
telephone company only has two basic rates: a rate for residence/personal
|
||
communications and a rate for all else, which they term 'business phones'.
|
||
Where Ed's counter-argument fails is that while there are not BBS's on
|
||
every block, neither are there churches and charities on every block -- yet
|
||
they pay full business rates, as do social service hotline, information and
|
||
referral services. Are BBS information providers to be treated differently
|
||
than dial-a-prayer lines which run on business phones, or the proverbial
|
||
"Battered Women's Shelter outgoing phone line where the calls can't be
|
||
traced" which also pays business rates?
|
||
|
||
Here are some questions you may wish to give response to: Should there be a
|
||
third rate category made available, covering charitable and religious
|
||
organizations? Should this third rate category be available to all
|
||
not-for-profit phone services such as BBS lines and social service referral
|
||
numbers or hotlines? If BBS operators who charge money got such a rate,
|
||
should Compuserve or GEnie also be allowed to use the same rate? Should
|
||
telco be the one to audit the revenues and decide which computer sites
|
||
should be treated as 'business' and which should be 'charitable
|
||
organization'? Is it the fault of telco if the BBS operator does not
|
||
charge enough money to make a profit? Where is the line to be drawn?
|
||
Answers? PAT]
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: well!jwarren@APPLE.COM(Jim Warren)
|
||
Subject: Clarification of Gail Thackeray's Comment on Modem Licensing
|
||
Date: Sun, 30 Dec 90 12:59:54 pst
|
||
|
||
********************************************************************
|
||
*** CuD #2.19: File 5 of 7: Gail Thackeray Clarification ***
|
||
********************************************************************
|
||
|
||
GAIL THACKERAY RE LICENSING MODEMS & RESTRICTING MODEM USE
|
||
On 12/21, as a postscript on e-mail to Gail Thackeray, I asked:
|
||
+++++++++++++++++++++++++
|
||
Been meanin' to check this *rumor* for months (I rarely trust what I
|
||
haven't checked, personally): Have you said that modems should be licensed
|
||
and their use restricted? (It's been widely quoted/paraphrased and is a
|
||
common [mis?]perception of your views.) If you ever said it, do you now
|
||
hold that view?
|
||
I'm not challenging it; just tryin' to verify or refute a provocative
|
||
rumor.
|
||
+++++++++++++++++++++++++
|
||
To which, Gail responded:
|
||
+++++++++++++++++++++++++
|
||
Date: Sat, 22 Dec 90 10:04:05 pst
|
||
From: gailt (Gail Thackeray)
|
||
To: jwarren
|
||
No, I never said so -- when talking about the lack of parental
|
||
supervision of computer use for beginning youngsters, I have pointed
|
||
out that in other instances involving driving, guns, etc. we
|
||
recognize that kids don't have good judgment and we insist on training,
|
||
supervision, licensing, etc. to minimize the risk to the rest of
|
||
society. I have specifically said that I DON'T want to see licensing
|
||
of modems, or FCC regulation, etc. -- but that if we look at historic
|
||
parallels involving new technology (driving, airplanes, etc.) when
|
||
society grows annoyed/concerned enough with abuses, damage, risk to
|
||
others, "entry requirements" such as licensing have been imposed.
|
||
I have recommended that to avoid such a trend in electronic technology,
|
||
we should put a lot of effort into developing "rules of the road"
|
||
that we all agree on and abide by & teach youngsters -- or the back-
|
||
lash may cause formal regulation (just think about the regulations
|
||
controlling ham radio, etc. -- and the potential for similar rules
|
||
is quite real, computer-wise.)
|
||
Regulation usually comes about as a reaction to complaints of
|
||
enough people to attract the interest of legislators. We are
|
||
rapidly approaching that "critical mass" stage with computer
|
||
communications, and if we don't want to see licensing of BBS's, we
|
||
need to do whatever will curb the abuses (interference with other
|
||
people's rights). I have recommended that parents check into what
|
||
their kids are doing with their modems, set rules, ans if need be,
|
||
"ground" their kids just as they do for other kinds of rules-
|
||
violations, like being reckless with the family car....
|
||
--------------------------------------------
|
||
This prompted my 12/24 comments and request:
|
||
--------------------------------------------
|
||
& mail gailt
|
||
Subject: licensing etc.
|
||
Gail,
|
||
This is important:
|
||
If you have not yet posted exactly those comments, in detail, regarding
|
||
licensing and regulation of modem users, I *urge* you to post them
|
||
immediately and completely to the eff Conference, and explicitly add a note
|
||
encouraging their widespread duplication (without editing, of course)
|
||
across the nets.
|
||
You are more than welcome to preface it with a comment that I urged you to
|
||
post the comments (if that has any value :-).
|
||
I absolutely agree with your observations and think we have *much* to fear
|
||
from overzealous legislators/regulators responding to the miniscule
|
||
minority who are abusive of our tremendously productive cooperative anarchy.
|
||
...
|
||
------------------
|
||
I also urged her to send it to jthomas for the Computer Underground Digest
|
||
and emmanuel for 2600, and sent mail to both of them urging them to publish
|
||
it, if Gail sent it, saying, in part:
|
||
------------------
|
||
Her explanation of what she had and had not said related to such matters
|
||
was both reasonable and **illustrated a very real threat** (from legislators
|
||
and regulators; *not* from Gail T) against all of us. Her comments were
|
||
very realistic; her prognosis highly likely, if we cannot exercise adequate
|
||
discipline within our ranks.
|
||
I have urged her to post her comments on the WELL, and forward them to
|
||
Cud and 2600 for publication (and release them for general posting around
|
||
the nets).
|
||
---------------------------------------------------------------
|
||
I hope you will help do so, because we now have her permission:
|
||
---------------------------------------------------------------
|
||
From gailt Mon Dec 24 19:51:53 1990
|
||
Date: Mon, 24 Dec 90 19:51:51 pst
|
||
From: gailt (Gail Thackeray)
|
||
To: jwarren
|
||
Subject: Re: licensing etc.
|
||
Willing, but ignorant: so how do I DO that? I thought whatever
|
||
was sent in E-mail went into the cosmic winds.... is there a way I
|
||
can retrieve what I sent you, & post it? Can you retireve & upload
|
||
it? I'm (definitely) still stumblin' around here, and help would be
|
||
great/grate/fully accepted....
|
||
&
|
||
Date: Mon, 24 Dec 90 19:55:02 pst
|
||
From: gailt (Gail Thackeray)
|
||
To: emmanuel, jthomas, jwarren
|
||
Subject: Re: Thacvkeray and licensing
|
||
By the by -- feel free to use it -- I just don't know (after scanning%
|
||
the manual -- how to retrieve what I sent Jim, and publish it out of
|
||
e-mail. ...
|
||
**************
|
||
For those who don't know of Ms. Thackeray, she is an Assistant State
|
||
Attorney General for the State of Arizona, active in pursuing computer
|
||
crime, and controversial for some of her public statements and/or
|
||
statements that.some press *allege* she said. In some cases, she may have
|
||
been as misleadingly quoted-out-of-context -- or flat-out abusively
|
||
misquoted -- as has been the case with some reports about Mitch Kapor, John
|
||
Perry Barlow and the Electronic Frontier Foundation.
|
||
--Jim Warren [permission herewith granted to circulate this-in-full]
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: balkan!dogface!bei@CS.UTEXAS.EDU(Bob Izenberg)
|
||
Subject: a.k.a. freedom of expression
|
||
Date: Tue, 18 Dec 90 08:21:26 CST
|
||
|
||
********************************************************************
|
||
*** CuD #2.19: File 6 of 7: a.k.a. Freedom of Expression ***
|
||
********************************************************************
|
||
|
||
I read this in issue 2.16 of the Computer Underground Digest:
|
||
|
||
[ quoted text follows ]
|
||
|
||
IN THE UNITED STATES DISTRICT COURT
|
||
|
||
FOR THE NORTHERN DISTRICT OF GEORGIA
|
||
|
||
ATLANTA DIVISION
|
||
|
||
UNITED STATES OF AMERICA :
|
||
: CRIMINAL ACTION
|
||
v. :
|
||
: NO. 1:90-CR-31
|
||
:
|
||
ADAM E. GRANT, a/k/a The :
|
||
Urvile, and a/k/a Necron 99, :
|
||
FRANKLIN E. DARDEN, JR., a/k/a :
|
||
The Leftist, and :
|
||
ROBERT J. RIGGS, a/k/a :
|
||
The Prophet :
|
||
|
||
GOVERNMENT'S SENTENCING MEMORANDUM AND S.G. SS 5K1.1 MOTION
|
||
[ quoted text ends ]
|
||
|
||
The assumption here, that an alias employed in computer communications is
|
||
the same as an alias used to avoid identification or prosecution, doesn't
|
||
reflect an awareness of the context within which such communications
|
||
exist. The very nature of some computer operating systems demands some
|
||
form of alias from their users. Management policy also affects how you
|
||
can identify yourself to a computer, and to anyone who interacts with you
|
||
through that computer. Look at some of the monikers that were assigned
|
||
to me to allow me to use various computer systems:
|
||
|
||
Izenberg_Bob (pretty straightforward)
|
||
bei
|
||
76615,1413
|
||
BIZENBERG
|
||
3935gbt
|
||
root ;-)
|
||
|
||
Some of those account names identify me personally with me the computer
|
||
user easily, some not at all. Is it accurate to say that I'm Bob Izenberg,
|
||
a.k.a. one of the above account names? Sure, between you and me, outside
|
||
of a court of law. In the context of that court of law, that a.k.a. is an
|
||
accusation in itself. If we strip the implication from those three letters
|
||
that the party of the leftmost part is calling themselves the party of the
|
||
rightmost part to avoid getting nabbed with the goods, what's left? I am
|
||
known by another name when I use a computer? Where's the surprise in that?
|
||
Maybe I'm Bob the person a.k.a. Bob the user ID. For another slant on
|
||
this, let's borrow from my days covering town meetings. I might also be
|
||
Bob, trading as Bob the user ID, as in: Bob Izenberg, t/a Bob's Bar and
|
||
Grill. There's no criminal intent there, not in the kinda bar I run.
|
||
|
||
In using a computer communications medium, particularly an informal one
|
||
like a BBS, the name you choose can set the tone for the aspect of your
|
||
personality that you're going to present (or exaggerate.) Are radio
|
||
announcers using their "air names" to avoid the law? How about people with
|
||
CB handles? Movie actors and crew members? Fashion designers? Society
|
||
contains enough instances of people who, for creative reasons, choose
|
||
another name by which they're known to the public. I certainly hope that
|
||
somebody mentions that Len Rose calling himself Terminus (which springs
|
||
from his correct perception of himself as somebody who kept the wheels of
|
||
comunication between legitimate users of AT&T's products moving, or from
|
||
the Foundation series by author Isaac Asimov) is fair use of a pseudonym,
|
||
well in line with community standards set by his peers. Whenever somebody
|
||
uses a.k.a., correct them!
|
||
|
||
Bob Izenberg (512) 346 7019 [ ] cs.utexas.edu!%kvue,balkan%!dogface!bei
|
||
|
||
********************************************************************
|
||
>> END OF THIS FILE <<
|
||
***************************************************************************
|
||
|
||
------------------------------
|
||
|
||
From: Bob Mahoney (Sysop, PC-Exec)
|
||
Subject: Z-modem Virus Alert
|
||
Date: December 5, 1990
|
||
|
||
********************************************************************
|
||
*** CuD #2.19: File 7 of 7: Z-Modem Virus Alert ***
|
||
********************************************************************
|
||
|
||
%The following was downloaded from Bob Mahoney's BBS%
|
||
|
||
* * * * * W A R N I N G ! ! ! * * * * *
|
||
|
||
On December 3rd, 1990 a group called RABID National Development Corp.
|
||
released hacked version of Chuck Foresburg's DSZ Z-Modem Protocol dated
|
||
12-03-90. This is really the 11-19-90 version with the dates edited and a
|
||
virus added to the program. *** THIS VIRUS IS DESTRUCTIVE!!! ***
|
||
|
||
I obtained the virused version early this week and worked quickly to
|
||
provide this program to you. The information I provide here may not be all
|
||
there is t know about the virus, but it is sufficient to determine that the
|
||
virus is not what you want to have.
|
||
|
||
RABID Virus Information
|
||
|
||
Preliminary testing has revealed these facts about the virus:
|
||
|
||
* The virus is not memory resident.
|
||
|
||
* The virus infects .COM files only, including COMMAND.COM.
|
||
(There was one report that it infected and .EXE file and
|
||
several text files but this could not be confirmed or
|
||
duplicated.)
|
||
|
||
* Infected files increase in size by 5,302 bytes.
|
||
|
||
* The virus infects other .COM files at execution time.
|
||
|
||
* The virus will activate on 12-25-90 (Christmas) or any date
|
||
thereafter.
|
||
|
||
* When activated the boot sector, FATs and root directory will
|
||
be overwritten with garbage. Recovery is impossible unless
|
||
you use a program such as PcTools Mirror to make backup copies
|
||
of the system areas.
|
||
|
||
|
||
As far as programming goes the virus is poorly written, but it does
|
||
accomplish what it was designed to do. The actual virus code is about
|
||
1,300 bytes with a 4,000 byte ansi screen that is supposed to be displayed
|
||
upon activation. I sa "supposed to" because on every test I performed the
|
||
screen displayed as a bunc of video garbage. This occurs when loading the
|
||
screen data starting at the wrong location.
|
||
|
||
The virus has been passed along to John McAfee and he will have a fix in
|
||
his next release. However, this release is not due until February and that
|
||
is too late for those infected already. The information has also been
|
||
passed along t Chuck Foresburg and he is aware of the situation.
|
||
|
||
VirusFix Instructions
|
||
|
||
The operation of VirusFix is simple.
|
||
|
||
To scan entire disk(s), just specify the disk(s) you wish to scan.
|
||
Examples:
|
||
VIRUSFIX C:
|
||
VIRUSFIX C: D:
|
||
VIRUSFIX A:
|
||
|
||
To scan a single directory, specify the directory to scan.
|
||
Examples:
|
||
|
||
VirusFix will notify you if the RABID virus is found and ask if you wish to remove the virus. Every file that I infected and removed
|
||
the virus from has worked properly so VirusFix should work with most files. If you remove a viru from a file and it doesn't work,
|
||
delete the file and replace it with and uninfected copy. If you suspect a file other that .COM files is infected, use text search
|
||
program and search for the string "RABID" in the suspect file.
|
||
|
||
If you have questions or comments about VirusFix or need help with removing a virus from a file I can be reached through the following
|
||
sources:
|
||
|
||
CompuServe - User ID: 76645,3446
|
||
Home Phone - (313) 937-xxxx
|
||
|
||
********************************************************************
|
||
|
||
------------------------------
|
||
|
||
**END OF CuD #2.19**
|
||
-> END OF VOLUME 2 -- VOLUME 3 BEGINS NEXT ISSUE <-
|
||
********************************************************************
|
||
|
||
|
||
|