837 lines
36 KiB
Plaintext
837 lines
36 KiB
Plaintext
|
||
|
||
Computer Underground Digest--Fri Sept 14, 1991 (Vol #3.33)
|
||
|
||
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
||
CONTENTS, #3.33 ( September 14, 1991)
|
||
File 1--Moderators' Corner
|
||
File 2--Clarification of "Boycott" Comment
|
||
File 3--How BellSouth Calculated $79,000
|
||
File 4--Houston Chronicle spacemail follow
|
||
File 5--More on Casolaro (INSLAW) Suicide (Mary McGrory reprint)
|
||
File 6--"Freaker's Bureau Incorporated" (FBI)
|
||
File 7--Review of Site Security Handbook (by Dark Adept)
|
||
File 8--Complain to Journalists
|
||
File 9--Spaf's Response to Reviews of _Unix Security_
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
||
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
|
||
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
|
||
Chicago email server, send mail with the subject "help" (without the
|
||
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to the
|
||
Computer Underground. Articles are preferred to short responses.
|
||
Please avoid quoting previous posts unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 14 Sep 91 11:21:19 CDT
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 1--Moderators' Corner
|
||
|
||
++++++++++++
|
||
WIDENER FTP ADDRESS CHANGE
|
||
++++++++++++
|
||
|
||
The Internet address for ftp.cs.widener.edu (aka
|
||
ashley.cs.widener.edu) will be changing from its current of
|
||
192.55.239.132 to 147.31.254.20
|
||
|
||
+++++++++
|
||
INFO ON "OTHER VICTIMS" WANTED
|
||
+++++++++
|
||
|
||
We are putting together a story on the "other victims" of the 1990
|
||
searches/seizures by the Secret Service that focuses on the problems
|
||
various raids caused for those who where touched by, but not directly
|
||
involved in, those events. We're compiling a list of short, narrative
|
||
stories that can each be summarized in a few paragraphs.
|
||
|
||
If you or anybody you know was an indirect "victim," it would help if you
|
||
would send us their name and an email or voice phone means of contacting
|
||
them. If people have been victimized, but prefer anonymity, we can tell
|
||
the story without the name:
|
||
|
||
Jim Thomas
|
||
Co-editor, Computer underground Digest
|
||
Sociology / Northern Illinois University / DeKalb, IL 60115
|
||
email: tk0jut1@mvs.cso.niu.edu / jthomas@well.sf.ca.us
|
||
Voice: (815) 756-3839
|
||
|
||
+++++++++
|
||
PHRACK 33
|
||
+++++++++
|
||
|
||
Phrack 33 (release date 1 Sept, '91) is out and can be obtained from
|
||
the Cud archvives. FREE SPEECH BBS, Phrack's home board, will be up in
|
||
a week or so, but may periodically be down for maintenance while
|
||
testing some of the new features. The new number is (618) 549-4955.
|
||
|
||
++++++++++
|
||
NY BBS TAX
|
||
++++++++++
|
||
|
||
New York state has enacted a law that would appear to place a tax on
|
||
BBSs that sell or exchange software. Although there is some confusion
|
||
regarding the intent and applicability of the law, most agree that it
|
||
is, at best, a poor worded and potentially harmful piece of
|
||
legislation. The next Cu Digest (3.34) will be a special issue devoted
|
||
to the law.
|
||
|
||
+++++++
|
||
INFO ON THESES/DISSERTATIONS WANTED
|
||
+++++++
|
||
|
||
We've received a few responses from people working on graduate theses
|
||
or dissertations related to computer culture or computer crime. We'll
|
||
put out the information, along with a list of the few that have been
|
||
completed so far, but it appears that, to date, there are very, very
|
||
few. If you or somebody you know is working on a related project, let
|
||
us know in the next few weeks so we can include it in the
|
||
bibliography.
|
||
|
||
------------------------------
|
||
|
||
Date: 08 Sep 91 17:44:51 CDT
|
||
From: Jim Thomas <tk0jut1@mvs.cso.niu.edu>
|
||
Subject: File 2--Clarification of "Boycott" Comment
|
||
|
||
In my review of _Cyberpunk_ (CuD 3.32), I quoted a passage that
|
||
referred to a "national computer security expert's" call for a boycott
|
||
of any company that hired Robert Morris. In context, the passage would
|
||
appear to be less than charitable. Gene Spafford, the person
|
||
associated with the boycott call, never made this claim, and he has
|
||
tried without success to clarify what was actually said. He was
|
||
misquoted in a speech, and the misquote has become a reality of its
|
||
own. Although it seems like a relatively minor point, the continued
|
||
circulation of the quotation error perpetuates an unjustified aura of
|
||
extra-legal professional retaliation. Sometimes the slightest
|
||
transposition of words leads to quite different meanings, and it
|
||
appears that Gene is the victim of a shift of phrases that distorted
|
||
his message. We discussed this with him, and the following scenario
|
||
seems to be the source of the error. We have included a response he
|
||
wrote to the CACM to correct the error, but it was also garbled by the
|
||
editor to whom it was sent.
|
||
|
||
In March 1990 at the DPMA Computer Virus & Security Conference in NYC,
|
||
Gene gave the keynote address. He discussed community ethics
|
||
and made a statement like "We should boycott any company that hires
|
||
someone like Morris *because of* what he did." This was heard by at
|
||
least one person present as meaning, "Because of what he did, we
|
||
should boycott any company that hires Morris." What he meant, and
|
||
what he thought was clear from context, was "We should boycott any
|
||
company that believes what Morris did was a reason to hire him."
|
||
|
||
The quote was reported in CACM and Spaf wrote a letter (published in
|
||
the October 1990 issue) pointing out the error, but they misunderstood
|
||
the way it was supposed to have text boldfaced to indicate the emphasis.
|
||
The point did not get across clearly and was also incorrectly
|
||
paraphrased in Peter Denning's editorial in the August 1990 CACM.
|
||
|
||
Enclosed is the text of the letter he sent to CACM and which was
|
||
published in the September 1990 issue without the indicated emphasis:
|
||
|
||
[ The following uses TeX conventions: %%it text% is italics, and
|
||
%%bf text% is boldface.]
|
||
|
||
To the editor:
|
||
|
||
The May issue of %%it Communications% contained a %%News Track''
|
||
account of some of my remarks on hiring known hackers/crackers.
|
||
I believe the report was derived from my keynote presentation at
|
||
the 3rd DPMA Virus Workshop, held March 14 in New York.
|
||
Unfortunately, the item in question did not report the full
|
||
context of my remarks, and thus the actual intent was obscured.
|
||
|
||
It is my contention that we should not do business with companies
|
||
that hire known computer miscreants %%bf because of their
|
||
criminal escapades%. There are two reasons for this, one
|
||
grounded in good business sense, and the other grounded in
|
||
professional ethics.
|
||
|
||
From a business standpoint, hiring a known computer criminal
|
||
because of his criminal past is likely to be a liabilty. The
|
||
individual has already shown that he (or she) has not felt
|
||
constrained to respect legal and ethical boundaries, or that he
|
||
has exhibited poor judgment in not thinking about adverse
|
||
consequences. What indication is there that such behavior will
|
||
not be repeated? Furthermore, there is no indication that
|
||
someone who breaks into a system knows how to protect the system
|
||
or make it better -- he has only shown that he knows how to break
|
||
in. This is the origin of my %%arsonist'' statement, quoted in
|
||
the article. As a customer of such a firm, it is possible I
|
||
would never be as confident about the integrity of its products
|
||
as if the hacker had not been hired.
|
||
|
||
From a professional standpoint, I view the hiring of computer
|
||
criminals %%bf because of their notoriety or criminal success% to
|
||
be insulting and unconscionable. Consider that there are many
|
||
tens of thousands of people who have worked for years to become
|
||
knowledgeable and responsible members of the profession, and many
|
||
thousands more currently studying the discipline. What will it
|
||
mean to them if a criminal is hired to a position of
|
||
responsibility because of a violation of professional standards?
|
||
Should the rest of us seek distinguished appointments by
|
||
spectacular violations of the law? What would it say to all of
|
||
us that a business would value unethical behavior above a record
|
||
of accomplishment and professionalism? To ignore or accept such
|
||
behavior is to allow our profession to be besmirched. I view it
|
||
as an insult, and to acquiesce quietly would appear to be a
|
||
violation of our Code of Professional Conduct.
|
||
|
||
Note that I am %%bf not% in any way suggesting that we act to
|
||
prevent these individuals from being employed in a
|
||
computing-related profession. If the individual involved has the
|
||
necessary training and background, and is as qualified as other
|
||
applicants, then he should be treated as any other individual
|
||
applying for a position. This is especially true once an
|
||
individual has served a sentence for their [sic] crimes. Robert
|
||
T. Morris, for instance, has demonstrated a keen interest and
|
||
more than moderate facility with computers. To protest his
|
||
taking a computing-related job would be to unfairly embellish the
|
||
sentence already imposed by the federal court. We should not
|
||
seek to second-guess our legal system, nor extract revenge above
|
||
and beyond the punishment already meted out. To do so would be
|
||
petty and mean-spirited.
|
||
|
||
In summary, my remarks at the Virus Workshop argued that we
|
||
should protest if businesses reward these offenders for their
|
||
actions; I did not mean to suggest that we forbid these
|
||
individuals from ever working in computing-related jobs. I also
|
||
did not suggest that we devise any additional punishment for Mr.
|
||
Morris. He has been sentenced for his crime, and it is not for
|
||
us to seek to augment his punishment. It is time for all of us
|
||
to move on and put that whole incident behind us.
|
||
|
||
Eugene Spafford
|
||
Dept. of Computer Sciences
|
||
Purdue University
|
||
W. Lafayette, IN 47907-2004
|
||
spaf@cs.purdue.edu
|
||
|
||
------------------------------
|
||
|
||
Date: 24 Aug 91 00:33:31 GMT
|
||
From: eff@org
|
||
Subject: File 3--How BellSouth Calculated $79,000
|
||
|
||
(Moderators' note: The following article appeared in EFF 10 and
|
||
explains how those infamous E911 documents wound up with a value of
|
||
over $79,000. Guess it shows how figures lie and......)
|
||
|
||
WHY THE BELLSOUTH E911 DOCUMENT COST $79,000 TO PRODUCE
|
||
|
||
-==--==--==-<>-==--==--==-
|
||
|
||
IN OVER THEIR HEADS
|
||
--OR--
|
||
WHY THE 911 DOCUMENT COST $79,449 TO PRODUCE
|
||
AT BELLSOUTH
|
||
|
||
Over the months since it first came to light, many have wondered how
|
||
BellSouth could spend the immense amount of money that it claimed it
|
||
spent on producing the brochure known as the E911 document.
|
||
|
||
Now it can be told!
|
||
|
||
The following is BellSouth's actual estimate of its production costs
|
||
as sent to Bill Cook in January of 1990. We were amazed that the
|
||
company felt it necessary to add in the entire cost of a major
|
||
computer system, printer and software.
|
||
|
||
[Text of letter from K. Megahee to Bill Cook]
|
||
|
||
BellSouth
|
||
1155 Peachtree Street. N E
|
||
Atlanta, Georgia 30367 -6000
|
||
January 10, 1990
|
||
|
||
Bill Cook - Assistant United States Attorney
|
||
United States Attorney's Office
|
||
Chicago, Illinois
|
||
|
||
Dear Mr. Cook:
|
||
Per your request, I have attached a breakdown of the costs
|
||
associated with the production of the BellSouth Standard Practice
|
||
(BSP) numbered 660-225-104SV. That practice is BellSouth
|
||
Proprietary Information and is not for disclosure outside
|
||
BellSouth.
|
||
Should you require more information or clarification, please
|
||
contact my office at XXX-XXX-XXXX. FAX: XXX-XXX-XXXX
|
||
|
||
Sincerely,
|
||
Kimberly Megahee
|
||
Staff Manager - Security, Southern Bell
|
||
|
||
[Handwritten total]
|
||
17,099
|
||
37,850
|
||
24,500
|
||
------
|
||
79,449
|
||
|
||
[Attachment to letter itemizing expenses]
|
||
|
||
DOCUMENTATION MANAGEMENT
|
||
|
||
1. Technical Writer To Write/Research Document
|
||
-200 hrs x 35 = $7,000 (Contract Writer)
|
||
-200 hrs x 31 = $6,200 (Paygrade 3 Project Mgr)
|
||
|
||
2. Formatting/Typing Time
|
||
-Typing WS14 = 1 week = $721.00
|
||
-Formatting WS 14 = 1 week = $721.00
|
||
-Formatting Graphics WS16 = 1 week = $742.00
|
||
|
||
3. Editing Time
|
||
-PG2 = 2 days x $24.46 = $367
|
||
|
||
4. Order Labels (Cost) = $5.00
|
||
|
||
5. Prepare Purchase Order
|
||
-Blue Number Practice WS14 x 1 hr = $18.00
|
||
-Type PO WS10 x 1 hr = $17.00
|
||
-Get Signature (PG2 x 1 hr = $25.00)
|
||
(PG3 x lhr = $31.00)
|
||
(PG5 x 1 hr = $38.00)
|
||
|
||
6. Printing and Mailing Costs
|
||
Printing= $313.00
|
||
Mailing WS10 x 50 hrs = $858.00
|
||
(Minimum of 50 locations/ 1 hr per location/ 115 copies
|
||
|
||
7. Place Document on Index
|
||
-PG2 x 1 hr = $25.00
|
||
-WS14 x 1 hr = $18.00
|
||
|
||
Total Costs for involvement = $17,099.
|
||
|
||
HARDWARE EXPENSES
|
||
|
||
VT220 $850
|
||
Vaxstation II $31,000
|
||
Printer $6,000
|
||
Maintenance 10% of costs
|
||
|
||
SOFTWARE EXPENSES
|
||
|
||
Interleaf Software $22,000
|
||
VMS Software $2,500
|
||
|
||
|
||
//End of Document//
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 3 Sep 91 17:05:01 CDT
|
||
From: edtjda@MAGIC322.CHRON.COM(Joe Abernathy)
|
||
Subject: File 4--Houston Chronicle spacemail follow
|
||
|
||
This story appeared on Page 1A of the Houston Chronicle on Monday,
|
||
Sept. 2, 1991. Permission is granted for redistribution in the ACM
|
||
Risks Digest, Patrick Townson's Telecom Digest, the newsgroup
|
||
sci.space.shuttle, Computer Underground Digest, and the
|
||
interesting_people mailing list. Our thanks to these groups for their
|
||
ongoing contributions to the online community and our coverage of it.
|
||
Please send comments and suggestions to edtjda@chron.com.
|
||
|
||
NASA severs connection
|
||
on electronic mail linkup
|
||
|
||
By JOE ABERNATHY
|
||
Copyright 1991, Houston Chronicle
|
||
|
||
Although declaring the experiment a success, NASA has called a halt to
|
||
a project by which space shuttle astronauts briefly were linked with
|
||
the nation's computer networks through electronic mail.
|
||
|
||
The e-mail experiment, conducted during the recent flight of Atlantis,
|
||
was part of a larger effort to develop computer and communications
|
||
systems for the space station Freedom, which is to be assembled during
|
||
the late 1990s.
|
||
|
||
The National Aeronautics and Space Administration cited unauthorized
|
||
access as the reason for severing the network connection, but NASA
|
||
officials did not provide details.
|
||
|
||
The space agency initially attempted to carry out the project in
|
||
secrecy, but word leaked out on the nation's computer networks.
|
||
Details were closely guarded because of concerns over malicious
|
||
computer hacking and astronauts' privacy.
|
||
|
||
"Hello, Earth! Greetings from the STS-43 Crew! This is the first
|
||
Applelink from space. Having a GREAT time, wish you were here!" read
|
||
the first message home. It went from Atlantis astronauts Shannon Lucid
|
||
and James Adamson to Marcia Ivins, a shuttle communicator at Johnson
|
||
Space Center.
|
||
|
||
It was the use of AppleLink -- a commercial electronic mail network
|
||
connected to the global computer matrix -- that apparently contained
|
||
the seeds of trouble.
|
||
|
||
When an AppleLink electronic mail address for the shuttle was
|
||
distributed online and then published in the Houston Chronicle, it
|
||
generated about 80 responses from well-wishers.
|
||
|
||
Although the address was created just for this purpose, the flight
|
||
director nearly pulled the plug on the project, according to Debra
|
||
Muratore, the NASA experiment manager. The project was concluded as
|
||
scheduled and declared a success.
|
||
|
||
But ultimately, it was decided, at least for now, to cease all
|
||
interaction with public computer networks. The decision eventually
|
||
could mean that NASA's premier research facility, the space station,
|
||
may not have access to its premier research communications tool, the
|
||
NASA Science Internet -- the space agency's portion of the vast
|
||
Internet global computer network.
|
||
|
||
Electronic mail, which is becoming commonplace in offices, is simply
|
||
the transmission of messages via computers to one or more people,
|
||
using electronic addresses. Users linked to the right networks can
|
||
send electronic messages or other data to specific recipients nearly
|
||
anywhere in the world -- and for a short time, could send them to
|
||
space.
|
||
|
||
"The problem was that the information had gotten leaked prematurely.
|
||
There was no problem with security," Muratore said. Even previous to
|
||
the leak of the addresss, however, the experiment was structured in
|
||
such a way that it was vulnerable to hackers, she acknowledged.
|
||
|
||
"As a result of this whole experience, at least my project plans never
|
||
to use a public (electronic) mail system again," she said.
|
||
|
||
Muratore indicated that the space agency may explore other ways of
|
||
providing "connectivity" -- communication between orbiting astronauts
|
||
and NASA's broader collection of computerized resources -- which will
|
||
become increasingly important as the use of computerized information
|
||
grows.
|
||
|
||
The decision to sever the short-lived e-mail connection has drawn
|
||
strong criticism among computer security experts and other scientists,
|
||
who charge that NASA was attempting to design "security through
|
||
obscurity."
|
||
|
||
"This is another example of an ostrich-oriented protection policy --
|
||
stick your head in the sand and pretend no one will find out what you
|
||
know," wrote Peter G. Neumann, moderator of the Association for
|
||
Computing Machinery's RISKS Digest, a respected online publication
|
||
that assesses the risks posed by technology. "Things like that don't
|
||
stay 'secret' for very long."
|
||
|
||
NASA told Newsday, but would not confirm for the Chronicle, that more
|
||
than 80 "unauthorized" messages from around the world were sent to the
|
||
Atlantis address -- which a source told the Chronicle was set up
|
||
explicitly to handle public requests for a shuttle e-mail address.
|
||
Private addresses were used for the actual experiments.
|
||
|
||
"The old 'authorization' paradox has reared its ugly head again,"
|
||
wrote Neumann, who prepared a study for NASA on the security
|
||
requirements of the space station. " 'Threatened by unauthorized
|
||
e-mail,' eh? Sending e-mail to someone REQUIRES NO AUTHORIZATION."
|
||
|
||
Muratore defended the use of secrecy as a security tool.
|
||
|
||
"I feel that that was a viable option," she said. She said operators
|
||
of AppleLink told NASA that it was impossible to keep public e-mail
|
||
from being sent to the on-orbit address, so the only option was to try
|
||
to keep it secret.
|
||
|
||
But network users questioned this viewpoint.
|
||
|
||
"Why is an e-mail system 'in jeopardy' when it receives 80 messages?
|
||
And what is an 'unauthorized user?' " asked Daniel Fischer of the
|
||
Max-Planck-Institut feur Radioastronomie, in Bonn, Germany. "Once the
|
||
system is linked up to the real world, it should expect to receive
|
||
real mail from everyone.
|
||
|
||
"If NASA can't handle that, it really shouldn't get into e-mail at
|
||
all," added Fischer, writing in an online discussion group composed of
|
||
scientists involved with the space program. "Consider that (heavy
|
||
response) a success, NASA!"
|
||
|
||
The disposition of the electronic mail sent to Atlantis is still up in
|
||
the air. A Chronicle message was not acknowledged, and no one has
|
||
reported receiving a response.
|
||
|
||
+++++++++++++++++++++++++++++++++++
|
||
|
||
Chronicle reporter Mark Carreau contributed to this report.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 27 Aug 91 21:36 EDT
|
||
From: "Silicon Surfer" <unixville@news.group.com>
|
||
Subject: File 5--More on Casolaro (INSLAW) Suicide (Mary McGrory reprint)
|
||
|
||
Tentacles of Scandal Touch Journalist's Mysterious "Suicide"
|
||
(By Mary McGrory, syndicated columnist)
|
||
|
||
One thing in the sad muck is clear: Before he died, Danny Casolaro saw
|
||
an octopus. He told his friend Bill Hamilton about it. The tentacles
|
||
reached into all the scandals we are grappling with in this summer of
|
||
conspiracies unlimited.
|
||
|
||
The body of investigative reporter Joseph Daniel Casolaro, 44, was found
|
||
in the bathtub of a West Virginia motel on Saturday, Aug. 10.
|
||
Martinsburg police pronounced it a suicide and proceeded to embalm the
|
||
body with extraordinary haste - before they got around to notifying
|
||
Casolaro's family, which finally heard the news on Monday, Aug 12.
|
||
|
||
His brother, Dr. Anthony Casolaro, doesn't believe it was a suicide.
|
||
Nor does anyone who knew him - or talked to him in his last days.
|
||
|
||
A crime reporter, Casolaro was a happy, outgoing, gregarious person, the
|
||
kind who cracks wise with secretaries and waitresses and endears himself
|
||
to children. The day before he died, according to the Martinsbug Morning
|
||
Journal, Casolaro told a Pizza Hut waitress that he liked her brown eyes
|
||
and that he was a member of the Edgar Allen Poe Society. He quoted "The
|
||
Great Gatsby" to her.
|
||
|
||
He told Hamilton, his brother, his girlfriend and others that he was on
|
||
the point of cracking the story that had absorbed him for a year. He
|
||
had begun investigating the Inslaw case, a tangled affair of government
|
||
perfidy and international intrigue that has been in litigation since
|
||
1983. In his explorations, he found out about related scandals - BCCI,
|
||
S&Ls, Iran-Contra, the October Surprise - but until last week, he found
|
||
nothing about Inslaw. Then he, joyfully said, he hit Bingo. One more
|
||
interview and the case was cracked.
|
||
|
||
Suicides do not tell their intimates day before taking the hemlock that
|
||
they are "ecstatic" or "euphoric". Casolaro did. Nor do they attend
|
||
family birthday parties, as Danny Casolaro was planning to do hours
|
||
before he died. The last known call he made was to his mother. He would
|
||
be late, but he was headed home. A manic-depressive might do that.
|
||
Nobody ever suggested that Danny Casolaro was one.
|
||
|
||
All the circumstances beg for disbelief, none more than the supposed
|
||
suicide note. "I'm sorry, especially to my son," from a man who lived by
|
||
words, just doesn't ring true. Casolaro wrote a novel, a children's
|
||
book. His prose style, at least as displayed in an outline submitted to
|
||
Little Brown of a book he proposed to write about the octopus called,
|
||
"Behold, A Pale Horse," is on the florid side. Such a terse farewell,
|
||
unless composed or dictated at gunpoint, is entirely unconvincing.
|
||
|
||
The man who could have resolved the Inslaw case, Richard Thornburgh,
|
||
resigned as attorney general the day the West Virginia police came
|
||
forward with an autopsy. Excess was the hallmark of his farewell
|
||
ceremony: an honor guard, a trooping of colors, superlatives from
|
||
subordinates. Willam P. Barr, his deputy and possible successor, spoke
|
||
of Thornburgh's "leadership, integrity, professionalism and fairness,"
|
||
none of which Thornburgh - now, by the way, a candidate for the Senate -
|
||
displayed in his handling of Inslaw.
|
||
|
||
Although the Inslaw case occurred in the time of Ed Meese, Thornburgh
|
||
took it to his busom. Bill Hamilton, a perfectly nice Midwesterner,
|
||
invented Promis, a computer software program specially adapted to crime
|
||
statistics, which he sold to the Justice Department. The second year,
|
||
Justice stopped paying the bill.
|
||
|
||
Hamilton and his wife, Nancy, believed that cronies of Meese got the
|
||
franchise to sell it around the world. Promis has turned up in Canada
|
||
and Pakistan. The link with the October Surprise is Earl Brian,
|
||
allegedly the agent who paid off the Iranians to keep the hostages. He
|
||
was paid back with huge profits from Promis.
|
||
|
||
Thornburgh refused to discuss the case with the Hamiltons or their
|
||
counsel, Elliot Richardson. He did not answer Richardson's letters. He
|
||
did not return his phone calls. He refused to receive his distinguished
|
||
predecessor.
|
||
|
||
The Hamiltons have been to court many times. Judges have recused
|
||
themselves, witnesses have disappeared or recanted. The man who knows
|
||
the most, Michael Riconosciuto, was picked up in Washington state on
|
||
drug charges and is in jail. What was merely sinister has now turned
|
||
deadly.
|
||
|
||
Thornburgh calls the Inslaw case "a little contract dispute." He refused
|
||
to testify about it to the House Judiciary Committee. Richardson thinks
|
||
it could be "dirtier than Watergate," and he should know.
|
||
|
||
Thornburgh's conduct is the most powerful argument for believing that
|
||
Danny Casolaro saw an octopus before he died.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 13 Sep 91 16:37:57 EDT
|
||
From: pkumar@SUGRFX.ACS.SYR.EDU(Parvin Kumar)
|
||
Subject: File 6--"Freaker's Bureau Incorporated" (FBI)
|
||
|
||
You may, or may not have noticed a new magazine in the cyberworld:
|
||
FBI Presents. We at FBI are dedicated to bringing you the news, at
|
||
whatever the cost may be. We Specialize in Anarchy And Phreaking
|
||
files, but also attempt to bring you Hacking and Carding files
|
||
whenever we find them available.
|
||
|
||
Many of our articles deal with the rights of hackers and computer
|
||
users as a whole. So if you are interested in these, pick up a copy!
|
||
|
||
We are a monthly production, and we try to keep to our deadlines as
|
||
well as possible.
|
||
|
||
We are currently working on issue 3 of FBI Presents, It will include
|
||
such features as...
|
||
|
||
An Interview with Mitch Kapor of EFF,
|
||
How To mass Mail.
|
||
The Non-Box. (A box plan you will find VERY interesting!)
|
||
|
||
It will be available some time around the end of September.
|
||
|
||
So.. You can grab one of our previous issues at:
|
||
chsun1.spc.uchicago.edu
|
||
ashley.cs.widener.edu
|
||
|
||
IF you would like to submit an article, which I *HOPE* you will do, you can
|
||
send it to:
|
||
au530@cleveland.freenet.edu
|
||
You can also request an E-Mail subscription from this address.
|
||
|
||
So RUN to your local FTP or favorite P/H/A BBS and grab a copy of
|
||
F B I Presents.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 10 Sep 91 11:45:43 PDT
|
||
From: Dark Adept <dadept@unixville.uunet.uu.net>TNET>
|
||
Subject: File 7--Review of Site Security Handbook (by Dark Adept)
|
||
|
||
(Reviewed by Dark Adept)
|
||
|
||
The RFC 1244 - Site Security Handbook Reviewed
|
||
|
||
The Dark Adept
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
The RFC (Request for Comment series) has produced a new tome:
|
||
The Site Security Handbook. This little gem aired on July 26, 1991 on
|
||
the newsgroup comp.doc. At 250K+, it is a somewhat large file to
|
||
transfer around, but well worth it.
|
||
|
||
It has its good points and bad points, but the good seem to outweigh
|
||
the bad. So, saving the best for last, I will address some of the
|
||
major bad points first.
|
||
|
||
I. Stereotyping and other falsities
|
||
-----------------------------------
|
||
|
||
This document completely explodes hacker myths and stereotypes. Here
|
||
is an example:
|
||
|
||
"As an illustration of some of the issues that need to be dealt with
|
||
in security problems, consider the following scenarios (thanks to
|
||
Russell Brand [2, BRAND] for these):
|
||
|
||
- A system programmer gets a call reporting that a
|
||
major underground cracker newsletter is being
|
||
distributed from the administrative machine at his
|
||
center to five thousand sites in the US and
|
||
Western Europe.
|
||
|
||
Eight weeks later, the authorities call to inform
|
||
you the information in one of these newsletters
|
||
was used to disable "911" in a major city for
|
||
five hours." (RFC1244 p. 6)
|
||
|
||
|
||
Very cute. Very believeable. Very much impossible, and very much a
|
||
lie. I think we all know what this refers to (the Phrack/E911
|
||
incident), and I think that it is unprofessional of the editors of RFC
|
||
1244 to use this example which is nothing more than a scare tactic.
|
||
|
||
Also please note that all the examples, while not as blatant as this,
|
||
deal with someone on the outside breaking in. It makes one wonder why
|
||
this is true when later in the document the editors state:
|
||
|
||
"As an example, there is a great deal of publicity about intruders on
|
||
computers systems; yet most surveys of computer security show that for
|
||
most organizations, the actual loss from "insiders" is much greater."
|
||
(RFC1244 p. 10)
|
||
|
||
Why oh why, then, are all your examples so one-sided? Why the
|
||
stereotyping of intruders? Why the little E911 parody?
|
||
|
||
|
||
II. Relies more on accepted sources than reality
|
||
-------------------------------------------------
|
||
|
||
Over and over and over and over again, ad nauseum, this manual refers
|
||
to those security gods, CERT. Allow me to let you in on a little
|
||
secret. CERT has not said anything revolutionary. In fact, much of
|
||
what CERT says, and much of what is stated in this manual, has been
|
||
found in hacker G-Philes over the years.
|
||
|
||
examples:
|
||
|
||
"...the Computer Emergency Response Team/Coordination Center (CERT/CC)
|
||
at Carnegie-Mellon University (CMU) estimates that 80% or more of the
|
||
problems they see have to do with poorly chosen passwords." (RFC1244
|
||
p. 8)
|
||
|
||
Gee, does that sound familiar, or what? Every G-Phile around has in
|
||
bold-faced italicized triple underlined print: "Try his wife's maiden
|
||
name" or "try his name backwards" or "here is a list of common
|
||
passwords" or, more to the point "people are idiots when they choose
|
||
passwords" (hmm. I think that particular one was in one of my
|
||
previous CuD articles).
|
||
|
||
Here is another "cute" one:
|
||
|
||
"The Computer Emergency Response Team (CERT - see section 3.9.7.3.1)
|
||
has observed that well-known universities, government sites, and
|
||
military sites seem to attract more intruders." (RFC1244 p. 12)
|
||
|
||
Those veritable gods of observation! Gee, what would hackers break
|
||
into? Maybe John Doe's collection of x-rated .gifs? I doubt it. In
|
||
fact, 90% or more of every "hacker's atlas" (a G-Phile which is more
|
||
or less a phonebook of data lines and who owns them) consists of phone
|
||
numbers to the above named institutions.
|
||
|
||
The main point is that RFC1244 does nothing more than collect
|
||
statistics from G-Philes. This in itself is useful, however, but it
|
||
would be more beneficial if the editors read the G-Philes themselves
|
||
rather than using watered down information from CERT et al.
|
||
|
||
Now for the good points. There are so many that I dare not try to
|
||
list them all, just some highlights.
|
||
|
||
It contains an extensive overview of a step-by-step way to implement
|
||
security. From deciding who is to be involved to selecting a method
|
||
(or methods) of security, this document mentions it.
|
||
|
||
It has a list of many resources such as (ugh!) CERT, magazines
|
||
(on-line and printed), software companies, etc. This is good since it
|
||
provides the prospective securer with a starting point.
|
||
|
||
It deals with security issues not usually thought of until a disaster
|
||
happens, such as: how much should we tell the press? who should we
|
||
notify? etc.
|
||
|
||
This handbook is directed mainly at the Internet user/sysadmin, but it
|
||
can be applied to a PC in a dentist's office. For a security novice,
|
||
or someone who just wants to find out what real security entails, this
|
||
is the book, and it's free!
|
||
|
||
So, before you go hiring Tacky Thacky or ex-LoD, read this handbook
|
||
first. At least then you'll know what you're buying.
|
||
|
||
My rating: 3.5 hacks (out of 4). It loses the 0.5 for the
|
||
stereotypes and lack of first hand info, but otherwise something to
|
||
have around the office/terminal.
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 1 Sep 91 16:49:20 CDT
|
||
From: "John E. Mollwitz" <moll@MIXCOM.COM>
|
||
Subject: File 8--Complain to Journalists
|
||
|
||
The national convention of The Society of Professional Journalists,
|
||
an organization of roughly 18,000 members in the United States, Canada
|
||
and Japan, is meeting Oct. 17-19 in Cleveland. As part of that convention,
|
||
a seminar will be conducted on writing about computers and computer networks.
|
||
|
||
Since over the years, cyberspace travelers have bemoaned the accuracy of
|
||
articles relating to computers, computer networks and even telephones,
|
||
we ask that you email or snail mail examples of articles that you have
|
||
found solid and others that you have found less so. Please include a note
|
||
of explanation.
|
||
|
||
The panel then will try to compile the examples, and the comments
|
||
and produce a handout for discussion. Sometime in the week after the
|
||
convention, we will post the results of the session. The names of the
|
||
panelists will be disclosed at that time since it is possible that some of the
|
||
articles that may be submitted may have been written by a panelist.
|
||
|
||
Mail paper examples to me at the address below. Where possible, the
|
||
examples should include a copy of the article, the name of the publication
|
||
and _specific_ comments. If the article is dismissed simply as "nonsense,"
|
||
state that it is because paragraph 5 has failed to adequately explain a
|
||
concept, and that it would have been better to have said it this way or
|
||
that.
|
||
|
||
So, if you go into fits when you see the word "hacker" in print, please
|
||
mail by Sept. 30.
|
||
|
||
Thank you for your cooperation.
|
||
|
||
John E. Mollwitz,
|
||
Chair, Committee on New Information Technologies
|
||
The Society of Professional Journalists
|
||
c/o The Milwaukee Journal
|
||
P.O. Box 661
|
||
Milwaukee, WI 53201-0661
|
||
|
||
Electronic Mail--Usenet: moll@mixcom.com; CompuServe: 72240,131;
|
||
GEnie: J.Mollwitz; Prodigy: CKFB43A;
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 27 Aug 91 17:36:25 EST
|
||
From: Gene Spafford <spaf@CS.PURDUE.EDU>
|
||
Subject: File 9--Spaf's Response to Reviews of _Unix Security_
|
||
|
||
Just a couple of quick comments on some of the points made in the
|
||
reviews of "Practical Unix Security" in Volume #3.30.
|
||
|
||
Jim Thomas noted that we were brief in our explication of the laws
|
||
concerning computer intrusion. That was intended -- rather than giving
|
||
inexpert legal advice, we would prefer that the readers discover the
|
||
finer points through consultation with trained legal counsel. Although
|
||
we got advice from some experts in the area, we didn't feel up to a
|
||
formal treatment of the legal aspects related to security; we made
|
||
reference to other appropriate references in the appendix, and felt it
|
||
best left at that. Legal action is a serious step that should not be
|
||
undertaken solely on the basis of our treatment in the book!
|
||
|
||
Neil Rickert commented in his review about our recommendation not to
|
||
make the mail command the login shell on an account. He states that
|
||
the user would get the login shell using the shell escape (viz., doing
|
||
a % will result in a new invocation of mail), and this is not as clear
|
||
a problem.
|
||
|
||
On at least one system I have used, doing a "%!/bin/sh" has given me a
|
||
shell no matter what the login shell was. On some systems, escaping
|
||
into the editor with "%e" then allows the user to call up a shell. On
|
||
some versions (including SunOS), doing a "%:set SHELL=/bin/sh" lets me
|
||
bypass the current idea of login shell. Rather than give all the
|
||
what-ifs, we decided to recommend against the practice -- it is a major
|
||
accountability hole, too.
|
||
|
||
Neil caught an error with the statement about "su" -- we were both
|
||
thinking "suid" when we proofread it, and it slipped by. Mea culpa.
|
||
|
||
As for us making sound Unix scarier that it is, well, some versions of
|
||
Unix are pretty scary! We tried to keep the paranoia from overcoming
|
||
us, but after 500 pages of describing potential problems in all the
|
||
myriad forms of Unix, it became a losing battle. Then too, to get in
|
||
the proper frame of mind to do serious security work, one needs a touch
|
||
of paranoia.
|
||
|
||
That's probably one of the key concepts that we must not have stressed
|
||
enough later in the book -- not every system is vulnerable to every
|
||
problem we described. Some systems have been tightened up, and others
|
||
are like Swiss cheese.
|
||
|
||
Simson and I are grateful for any other comments people care to make,
|
||
here or in mail.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #3.33
|
||
************************************
|
||
|
||
|