892 lines
42 KiB
Plaintext
892 lines
42 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun July 26, 1992 Volume 4 : Issue 33
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Copy Editor: Etaion Shrdlu, III
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivist: Dan Carosone
|
||
|
||
CONTENTS, #4.33 (July 26, 1992)
|
||
File 1--Bellcore threatens lawsuit against 2600 Magazine
|
||
File 2--The 2600 Article in Question
|
||
File 3--2600 reply to Bellcore
|
||
File 4--Bellcore Explains its Position against 2600
|
||
File 5--CuD Comment on Bellcore Letter to 2600
|
||
File 6--Are You a Hacker?
|
||
File 7--Re: Cu Digest, #4.31 (MOD Indictment)
|
||
File 8--The Ethics of Data Communications
|
||
File 9--MOD and "West Side Story" -- NYT Summary
|
||
File 10--Documents Available: Open Platform Overview, Life in Virtual
|
||
File 11--CPSR Recommends NREN Privacy
|
||
File 12--Int'l BBSing & Elec. Comm Conference July PR
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
||
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
||
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
||
Issues of CuD can also be found in the Usenet alt.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
||
libraries; from American Online in the PC Telecom forum under
|
||
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
|
||
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
|
||
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail at the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to
|
||
computer culture and communication. Articles are preferred to short
|
||
responses. Please avoid quoting previous posts unless absolutely
|
||
necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Thu, 23 Jul 92 00:40:43 -0700
|
||
From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
|
||
Subject: File 1--Bellcore threatens lawsuit against 2600 Magazine
|
||
|
||
THE FOLLOWING CERTIFIED LETTER HAS BEEN RECEIVED BY 2600 MAGAZINE.
|
||
WE WELCOME ANY COMMENTS AND/OR INTERPRETATIONS.
|
||
|
||
Leonard Charles Suchyta
|
||
General Attorney
|
||
Intellectual Property Matters
|
||
|
||
Emanuel [sic] Golstein [sic], Editor
|
||
2600 Magazine
|
||
P.O. Box 752
|
||
Middle Island, New York 11953-0752
|
||
|
||
Dear Mr. Golstein:
|
||
|
||
It has come to our attention that you have somehow obtained and published
|
||
in the 1991-1992 Winter edition of 2600 Magazine portions of certain
|
||
Bellcore proprietary internal documents.
|
||
|
||
This letter is to formally advise you that, if at any time in the future
|
||
you (or your magazine) come into possession of, publish, or otherwise
|
||
disclose any Bellcore information or documentation which either (i) you
|
||
have any reason to believe is proprietary to Bellcore or has not been
|
||
made publicly available by Bellcore or (ii) is marked "proprietary,"
|
||
"confidential," "restricted," or with any other legend denoting
|
||
Bellcore's proprietary interest therein, Bellcore will vigorously
|
||
pursue all legal remedies available to it including, but not limited
|
||
to, injunctive relief and monetary damages, against you, your magazine,
|
||
and its sources.
|
||
|
||
We trust that you fully understand Bellcore's position on this matter.
|
||
|
||
Sincerely,
|
||
|
||
|
||
LCS/sms
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 23 Jul 92 00:42:23 -0700
|
||
From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
|
||
Subject: File 2--The 2600 Article in Question
|
||
|
||
"U.S. Phone Companies Face Built-In Privacy Hole"
|
||
(From 2600, Winter, 1991-92 (Vol 8, No. 4: pp 42-43).
|
||
|
||
Phone companies across the nation are cracking down on hacker
|
||
explorations in the world of Busy Line Verification (BLV). By
|
||
exploiting a weakness, it's possible to remotely listen in on phone
|
||
conversations at a selected telephone number. While the phone
|
||
companies can do this any time they want, this recently discovered
|
||
self-serve monitoring feature has created a telco crisis of sorts.
|
||
|
||
According to an internal Bellcore memo from 1991 and Bell Operating
|
||
Company documents, a "significant and sophisticated vulnerability"
|
||
exists that could affect the security and privacy of BLV. In addition,
|
||
networks using a DMS-TOPS architecture are affected.
|
||
|
||
According to this and other documents circulating within the Bell
|
||
Operating Companies, an intruder who gains access to an OA&M port in
|
||
an office that has a BLV trunk group and who is able to bypass port
|
||
security and get "access to the switch at a craft shell level" would
|
||
be able to exploit this vulnerability.
|
||
|
||
The intruder can listen in on phone calls by following these four
|
||
steps:
|
||
|
||
"1. Query the switch to determine the Routing Class Code assigned to
|
||
the BLV trunk group.
|
||
|
||
"2. Find a vacant telephone number served by that switch.
|
||
|
||
"3. Via recent change, assign the Routing Class Code of the BLV trunks
|
||
to the Chart Column value of the DN (directory number) of the vacant
|
||
telephone number.
|
||
|
||
"4. Add call forwarding to the vacant telephone number (Remote Call
|
||
Forwarding would allow remote definition of the target telephone
|
||
number while Call Forwarding Fixed would only allow the specification
|
||
of one target per recent change message or vacant line)."
|
||
|
||
By calling the vacant phone number, the intruder would get routed to
|
||
the BLV trunk group and would then be connected on a "no-test
|
||
vertical" to the target phone line in a bridged connection.
|
||
|
||
According to one of the documents, there is no proof that the hacker
|
||
community knows about the vulnerability. The authors did express great
|
||
concern over the publication of an article entitled "Central Office
|
||
Operations - The End Office Environment" which appeared in the
|
||
electronic newsletter Legion of Doom/Hackers Technical Journal. In
|
||
this article, reference is made to the "No Test Trunk."
|
||
|
||
The article says, "All of these testing systems have one thing in
|
||
common: they access the line through a No Test Trunk. This is a switch
|
||
which can drop in on a specific path or line and connect it to the
|
||
testing device. It depends on the device connected to the trunk, but
|
||
there is usually a noticeable click heard on the tested line when the
|
||
No Test Trunk drops in. Also, the testing devices I have mentioned
|
||
here will seize the line, busying it out. This will present problems
|
||
when trying to monitor calls, as you would have to drop in during the
|
||
call. The No Test Trunk is also the method in which operator consoles
|
||
perform verifications and interrupts."
|
||
|
||
In order to track down people who might be abusing this security hole,
|
||
phone companies across the nation are being advised to perform the
|
||
following four steps:
|
||
|
||
"1. Refer to Chart Columns (or equivalent feature tables) and validate
|
||
their integrity by checking against the corresponding office records.
|
||
|
||
"2. Execute an appropriate command to extract the directory numbers to
|
||
which features such as BLV and Call Forwarding have been assigned.
|
||
|
||
"3. Extract the information on the directory number(s) from where the
|
||
codes relating to BLV and Call Forwarding were assigned to vacant
|
||
directory numbers.
|
||
|
||
"4. Take appropriate action including on-line evidence gathering, if
|
||
warranted."
|
||
|
||
Since there are different vendors (OSPS from AT&T, TOPS from NTI,
|
||
etc.) as well as different phone companies, each with their own
|
||
architecture, the problem cannot go away overnight.
|
||
|
||
And even if hackers are denied access to this "feature", BLV networks
|
||
will still have the capability of being used to monitor phone lines.
|
||
Who will be monitored and who will be listening are two forever
|
||
unanswered questions.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 23 Jul 92 00:42:54 -0700
|
||
From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
|
||
Subject: File 3--2600 reply to Bellcore
|
||
|
||
Emmanuel Goldstein
|
||
Editor, 2600 Magazine
|
||
PO Box 752
|
||
Middle Island, NY 11953
|
||
|
||
|
||
July 20, 1992
|
||
|
||
|
||
Leonard Charles Suchyta
|
||
LCC 2E-311
|
||
290 W. Mt. Pleasant Avenue
|
||
Livingston, NJ 07039
|
||
|
||
|
||
Dear Mr. Suchyta:
|
||
|
||
|
||
We are sorry that the information published in the Winter 1991-92
|
||
issue of 2600 disturbs you. Since you do not specify which article you
|
||
take exception to, we must assume that you're referring to our
|
||
revelation of built-in privacy holes in the telephone infrastructure
|
||
which appeared on Page 42. In that piece, we quoted from an internal
|
||
Bellcore memo as well as Bell Operating Company documents. This is not
|
||
the first time we have done this. It will not be the last.
|
||
|
||
We recognize that it must be troubling to you when a journal like ours
|
||
publishes potentially embarrassing information of the sort described
|
||
above. But as journalists, we have a certain obligation that cannot be
|
||
cast aside every time a large and powerful entity gets annoyed. That
|
||
obligation compels us to report the facts as we know them to our
|
||
readers, who have a keen interest in this subject matter. If, as is
|
||
often the case, documents, memoranda, and/or bits of information in
|
||
other forms are leaked to us, we have every right to report on the
|
||
contents therein. If you find fault with this logic, your argument
|
||
lies not with us, but with the general concept of a free press.
|
||
|
||
And, as a lawyer specializing in intellectual property law, you know
|
||
that you cannot in good faith claim that merely stamping "proprietary"
|
||
or "secret" on a document establishes that document as a trade secret
|
||
or as proprietary information. In the absence of a specific
|
||
explanation to the contrary, we must assume that information about the
|
||
publicly supported telephone system and infrastructure is of public
|
||
importance, and that Bellcore will have difficulty establishing in
|
||
court that any information in our magazine can benefit Bellcore's
|
||
competitors, if indeed Bellcore has any competitors.
|
||
|
||
If in fact you choose to challenge our First Amendment rights to
|
||
disseminate important information about the telephone infrastructure,
|
||
we will be compelled to respond by seeking all legal remedies against
|
||
you, which may include sanctions provided for in Federal and state
|
||
statutes and rules of civil procedure. We will also be compelled to
|
||
publicize your use of lawsuits and the threat of legal action to
|
||
harass and intimidate.
|
||
|
||
|
||
Sincerely,
|
||
|
||
|
||
Emmanuel Goldstein
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 25 Jul, 1991 14:03:54 PDT
|
||
From: Jim Thomas <jthomas@well.sf.ca.us>
|
||
Subject: File 4--Bellcore Explains its Position against 2600
|
||
|
||
Bellcore's letter to 2600 Magazine (posted above) threatens legal
|
||
action because 2600 published alleged restricted (and therefore
|
||
"proprietary") information contained in a leaked Bellcore document(s).
|
||
According to Bellcore's General Attorney for Intellectual Property
|
||
Matters, Leonard C. Suchyta, the article reproduced protected
|
||
information of value and of a sensitive technological nature. The
|
||
intent of the letter, according to Suchyta, was to put 2600 "on
|
||
notice" of Bellcore's position in protecting intellectual property
|
||
and the willingness to pursue future monetary and injunctive relief if
|
||
necessary.
|
||
|
||
According to Suchyta, the article "U.S. Phone Companies Face Built-In
|
||
Privacy Hole" from the Winter, 1991-92 issue of 2600, included
|
||
paraphrased and direct quotes from proprietary Bell documents. At
|
||
issue, he said, were copyright and intellectual property rights rather
|
||
than potential security breaches. Citing two U.S. Supreme Court
|
||
Cases, Florida Star v. B.J.F. (1989) and Cohen v. Cowles Media (1991),
|
||
Suchyta argued that 2600 had gone beyond acceptable journalistic practices
|
||
in quoting Bell internal memos and documents in its
|
||
story. The issue, he said, wasn't whether one line or an entire
|
||
document were reproduced, because any reproduction was copyright
|
||
infringement. The Constitutional theory of "fair use," which follows a
|
||
sliding scale of copyright material allowed to be reproduced in other
|
||
media without permission, was inapplicable in this case, according to
|
||
Suchyta, because all material in the documents was restricted. He
|
||
indicated that the restrictive and proprietary nature of the original
|
||
documents was clearly marked, but he did not know the form in which
|
||
2600 received them or whether what 2600 received indicated
|
||
the proprietary markings.
|
||
|
||
When asked to compare 2600's action with commonly accepted
|
||
investigatory journalism in which government or private restricted
|
||
documents are the basis of a story, Suchyta explained that, in his
|
||
view, the 2600 action was not comparable to release of, for example,
|
||
the Pentagon Papers. With government documents, he said, the public
|
||
arguably may have an overriding interest that permits disclosure. In
|
||
the 2600 case, the information was private proprietary information.
|
||
When asked about the practice of media stories based on leaked
|
||
documents from whistle-blowers or other sources, he indicated that
|
||
without the specifics of a given case he couldn't draw a judgment.
|
||
Spokespersons at Bellcore said that although the letter was a
|
||
warning, they were not in a position to say at this time whether
|
||
litigation against 2600 was precluded.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 25 Jul, 1991 14:15:31 PDT
|
||
From: Jim Thomas <jthomas@well.sf.ca.us>
|
||
Subject: File 5--CuD Comment on Bellcore Letter to 2600
|
||
|
||
Bellcore, the company-owned research arm of the various Bell systems,
|
||
is well-staffed, possesses considerable resources, and extends
|
||
throughout the country. 2600 magazine is a small publication run on a
|
||
shoestring with few resources. The Bell system, as the pursuit of
|
||
Craig Neidorf demonstrated, seems quite willing to attack the "little
|
||
guy," even if the little guy has not demonstrably violated a law. Big
|
||
guys who pick on little guys are generally called "bullies." Bellcore
|
||
does not allege that 2600 received the information it published
|
||
illegally or that any other criminal offense is involved. Bellcore's
|
||
letter to 2600 cites the publication of the material, not the manner
|
||
in which it was obtained, as objectionable. Although called a "hacker
|
||
journal," 2600 has been active as a gadfly in exposing security flaws
|
||
in computer and related technology. Just as other media have claimed
|
||
"the public's right to know" in using confidential documents as the
|
||
basis of revelations, 2600 also revealed, arguably for the public
|
||
good, a point of vulnerability in the Bell system. This seems to be
|
||
what galls Bellcore, and it is threatening the full force of its
|
||
resources against a small publication that perhaps it presumes is
|
||
unwilling to resist bullying tactics. As Emmanuel Goldstein, the
|
||
editor of 2600, indicates in his response to Bellcore, they are
|
||
mistaken.
|
||
|
||
One can appreciate the legitimate concerns of both parties. It
|
||
becomes more difficult to appreciate the style of Bellcore in
|
||
addressing this issue. When Playboy felt that Event Horizons had
|
||
exceeded appropriate limits in using Playboy material, it attempted to
|
||
resolve the matter amicably. Bellcore, by contrast, chose to begin
|
||
with threats backed up by the full force of its legal department.
|
||
Because of its massive resources, Bellcore may feel no need to attempt
|
||
conciliatory dialogue to attempt to resolve a problem. If you have a
|
||
hammer, so their logic seems to run, why waste it?
|
||
|
||
Does Bellcore have a strong case? If the facts alleged in their
|
||
letter are correct, not a strong one according to some specialists in
|
||
copyright law. Does Bellcore have a knack for public relations? It
|
||
seems not. Just one more case of Goliath tromping on those
|
||
ill-equipped to defend themselves. And, the chilling effect of their
|
||
letter threatens to trample on a free press as well.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 24 Jul 1992 11:19:47 PDT
|
||
From: Bob Bickford <rab@well.sf.ca.us>
|
||
Subject: File 6--Are You a Hacker?
|
||
|
||
ARE YOU A HACKER?
|
||
by Robert Bickford
|
||
|
||
Are you a Hacker? How would you know? If all you know about the word
|
||
is what you've seen on the evening news, or read in a magazine, you're
|
||
probably feeling indignant at the very question! But do those
|
||
magazine-selling headlines really describe what a Hacker is?
|
||
|
||
Some time ago (MicroTimes, December 1986) I defined a Hacker as "Any
|
||
person who derives joy from discovering ways to circumvent
|
||
limitations." The definition has been widely quoted since that time,
|
||
but unfortunately has yet to make the evening news in the way that a
|
||
teenager who robs a bank with his telephone does.
|
||
|
||
Does that teenaged criminal fit my definition? Possibly. Does that
|
||
fact make all, or even most, Hackers criminals? (Does that fact make
|
||
all or most Hackers teenagers?) Of course not! So why is there such
|
||
widespread misinformation about Hackers? Very simply, it's because
|
||
the criminal hackers, or 'Crackers', have been making news, while the
|
||
rest of us are virtually invisible. For every irresponsible fool
|
||
writing a virus program, there are at least twenty software engineers
|
||
earning a living "...discovering ways to circumvent limitations."
|
||
When the much-publicized InterNet worm was released by an
|
||
irresponsible hacker, hundreds of other Hackers applied their
|
||
considerable talents to the control and eradication of the problem:
|
||
the brilliance and creativity brought to this task are typical of the
|
||
kind of people --- Hackers ---that my definition is meant to describe.
|
||
|
||
Working on the yearly Hackers Conferences has been a mixed experience:
|
||
on the one hand, helping to bring together 200 of the most brilliant
|
||
people alive today, and then interacting with them for an entire
|
||
weekend, is immensely rewarding. On the other hand, trying to explain
|
||
to others that the Hackers Conference is not a Gathering of Nefarious
|
||
Criminals out to Wreak Havoc upon Western Civilization does get a bit
|
||
wearing at times. Also, trying to convince a caller that repeatedly
|
||
crashing his school district's computer from a pay phone will not,
|
||
emphatically not, qualify him for an invitation to the conference can
|
||
be a bit annoying. None of this would be a problem if we hadn't let a
|
||
small minority --- the Crackers --- steal the show, and become
|
||
associated with the word 'Hacker' in the minds of the general public.
|
||
The attendees at the Hackers Conferences --- many of whom hold PhDs,
|
||
and/or are Presidents or other upper management of Fortune 500
|
||
companies --- are (quite understandably) very indignant at being
|
||
confused with these Crackers.
|
||
|
||
Taking myself as an example --- no, I don't have a PhD, my only degree
|
||
is from the School of Hard Knocks, and no, I'm not working in
|
||
management ---when this article was first published [1989] I was
|
||
writing software for a company that builds medical image processing
|
||
equipment. My code controls a product that can, and often does,
|
||
either improve the quality of medical care, reduce the cost, or both.
|
||
When I develop a piece of software that goes around some limit I feel
|
||
very happy, and can often find myself with a silly grin plastered
|
||
across my face. When some ignorant reporter writes a story that
|
||
equates the work I do with expensive but childish pranks committed by
|
||
someone calling himself a "Hacker", I see red.
|
||
|
||
Are you a Hacker? If you want to break rules just for the sake of
|
||
breaking rules, or if you just want to hurt or "take revenge" upon
|
||
somebody or some company, then forget it. But if you delight in your
|
||
work, almost to the point of being a workaholic, you just might be.
|
||
If finding the solution to a problem can be not just satisfying but
|
||
almost an ecstatic experience, you probably are. If you sometimes
|
||
take on problems just for the sake of finding the solution (and that
|
||
ecstatic experience that comes with it), then you almost certainly
|
||
are. Congratulations! You're in good company, with virtually every
|
||
inventor whose name appears in your high school history book, and with
|
||
the many thousands of brilliant people who have created the "computer
|
||
revolution."
|
||
|
||
What can we do about all that bad press? Meet it head on! Tell the
|
||
people you work with that you're a Hacker, and what that means. If
|
||
you know somebody whose work habits, style, or personality make them
|
||
pretty clearly a Hacker, tell them so and tell them what you mean by
|
||
that. Show them this article!
|
||
|
||
Meanwhile, have fun finding those solutions, circumventing those
|
||
limitations, and making this a better world thereby. You are an
|
||
Artist of Technology, a Rider of the Third Wave, and at least you can
|
||
enjoy the ride!
|
||
|
||
Bob Bickford is a software consultant who lives in Marin County, often
|
||
Hacking late into the night, and (usually) enjoying it immensely. His
|
||
wife, Greta, only tolerates this because she's an animation hacker and
|
||
sometimes does the same thing. Bob can be reached through InterNet at
|
||
rab@well.sf.ca.us
|
||
|
||
(An edited version of this article appeared in Microtimes in early
|
||
1989. Copyright (c) Robert Bickford, 1989, 1992)
|
||
+++
|
||
Robert Bickford "A Hacker is any person who derives joy from
|
||
rab@well.sf.ca.us discovering ways to circumvent limitations." rab'86
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
"I recognize that a class of criminals and juvenile delinquents has
|
||
taken to calling themselves 'hackers', but I consider them irrelevant
|
||
to the true meaning of the word; just as the Mafia calls themselves
|
||
'businessmen' but nobody pays that fact any attention." rab'90
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
------------------------------
|
||
|
||
Date: 18 Jul 92 07:12:11 CDT (Sat)
|
||
From: peter@TARONGA.COM(Peter da Silva)
|
||
Subject: File 7--Re: Cu Digest, #4.31 (MOD Indictment)
|
||
|
||
I'd like to make some comments on John McMullen's response to the MOD
|
||
indictment. While I agree with some of the things he has to say, I
|
||
have two serious problems with his commentary: first of all, the abuse
|
||
of the term "hacker" by phreaks and the government *is* a problem, and
|
||
attempting to trivialise people's concerns about it is
|
||
counterproductive. Second, his characterization of Phiber Optik seems
|
||
to directly contradict the facts as presented in the indictment:
|
||
|
||
> (a) On or about November 28, 1989, members of MOD
|
||
>caused virtually all of the information contained within the
|
||
>Learning Link computer operated by the Educational Broadcasting
|
||
>Corporation to be destroyed, and caused a message to be left on
|
||
>the computer that said, in part: "Happy Thanksgiving you turkeys,
|
||
>from all of us at MOD" and which was signed with the names "Acid
|
||
>Phreak," "Phiber Optik" and "Scorpion" among others.
|
||
|
||
This is not a prank, and shouldn't be shrugged off as one.
|
||
Particularly disturbing is the type of system attacked: the Learning
|
||
Link is not a typical phreak victim with a Big Bad Big Business image.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 15 Jul 1992 12:34:08 -0500
|
||
From: anonymous <anycom@sys.sys.uunet.uu.net>
|
||
Subject: File 8--The Ethics of Data Communications
|
||
|
||
The Ethics of Data Communications
|
||
By Norris Parker Smith
|
||
|
||
A report issued jointly by the U.S. Education and Justice
|
||
departments urges that instruction in computer ethics be made a part
|
||
of school curricula.
|
||
|
||
The aim is to convince young people that unauthorized copying of, say, a
|
||
new game program is plain theft, like stealing a bicycle; turning
|
||
loose a destructive worm on the Internet is criminal, a form of
|
||
high-tech arson, like setting a fire at one end of a row of condos.
|
||
|
||
This is a laudable goal, although in the real world it must be
|
||
recognized that more and more responsibilities are being heaped upon
|
||
the schools while less and less money is available to pay for basic
|
||
quality teaching.
|
||
|
||
A broader point is more important: Where does ethics in computation
|
||
begin and end?
|
||
|
||
For example, data communication today is being transformed by a
|
||
worldwide trend. High-bandwidth digital networks based on optical
|
||
fiber are supplanting low-capacity analog channels over metal wires.
|
||
|
||
The benefits to computing and to the overall economy are obvious. On
|
||
the face of it, attempts to impede this broad, positive trend would be
|
||
comparable to tampering with the adoption of a beneficial new drug.
|
||
|
||
At the same time -- in response to the same phenomena that upset the
|
||
officials at Justice and Education -- users of data communication
|
||
facilities are adopting new methods to provide simple, reliable
|
||
security for their files and messages. This also would seem a good
|
||
thing, well within the rights of people wishing to protect their
|
||
property and their ideas.
|
||
|
||
Open Lines of Communication
|
||
|
||
On the international scene, the United States and other Western
|
||
democracies have recognized that they have a real and immediate
|
||
interest in encouraging democracy in the former Soviet states to
|
||
emerge from its present fumbling, anxious childhood and mature into
|
||
solid stability.
|
||
|
||
The Russians and their former fellow victims of Communist paranoia
|
||
and incompetence say that in order to attempt this difficult
|
||
evolution, they urgently need to upgrade communications. This would be
|
||
an improvement to their national infrastructures, one of the few areas
|
||
in which outside help can readily make a difference. International
|
||
consortia, including U.S. participants, stand ready to string up the
|
||
fiber and install the switches.
|
||
|
||
It would seem reasonable -- even ethical -- for the West to support
|
||
improvements in Russia's internal communications, or, at the least,
|
||
not stand in the way.
|
||
|
||
What is the record on these two simple propositions? In Congress,
|
||
the FBI presented testimony calling for modifications in new
|
||
communications technology to make eavesdropping easier. This is
|
||
based upon the supposition that massive streams of digitalized
|
||
photons are more difficult to bug than slender flows of obedient
|
||
analog electrons.
|
||
|
||
The direct costs of this proposed degrading of the communications
|
||
system is estimated in the high hundreds of millions of dollars. The
|
||
indirect costs of less-than-optimum systems could be much higher.
|
||
|
||
The National Security Agency also raised questions about improved
|
||
measures for data security. Security is fine, it said, but it should
|
||
not be too fine, because the wicked as well as the benign might make
|
||
use of it. And when the wicked get into the act, the NSA will have to
|
||
invest in more computer time to discern what's happening.
|
||
|
||
If the Russians go modern, reasoned the NSA, it would be more
|
||
difficult for NSA satellites and other means to listen in. And who
|
||
knows what evil might lurk, even now, in the minds of the Russians?
|
||
|
||
Thus, exports of advanced communications technology to the former
|
||
Soviet Union were blocked within the federal establishment, largely by
|
||
the NSA. Approval took place only when the Germans and other
|
||
Europeans applied determined pressure.
|
||
|
||
The government has legitimate concerns about national security in an
|
||
era that looks increasingly unsanitary. Yet it is difficult to project
|
||
that any of the nasty little wars that have flamed among the embers of
|
||
communism would become genuine threats to basic U.S. interests. Other
|
||
means toward nuclear safety in Eurasia offer better prospects than a
|
||
Luddite policy on internal communication.
|
||
|
||
Crime-fighting (which sounds much more acceptable than snooping)
|
||
also has its place. It seems only fair, however, for the FBI, like
|
||
everyone else, to adapt to new technology as it comes along -- rather
|
||
than abusing its authority and prestige by lobbying for a favorable
|
||
fix at the public expense.
|
||
|
||
One of the most fundamental maxims of ethics reads this way: "At a
|
||
minimum, avoid doing unnecessary harm and get out of the way of events
|
||
that clearly bring good."
|
||
|
||
The feds should grade their own schoolwork by this ethical criterion
|
||
before they draw up computational dos and don'ts for schoolchildren.
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
SUPERNET INTERNATIONAL wants to know what you think about issues raised in
|
||
The Daily Word. For information on how to add your voice to the discussion,
|
||
see Your Feedback on the News under this topic.
|
||
|
||
Copyright 1992 by SUPERNET INTERNATIONAL. All rights reserved.
|
||
|
||
------------------------------
|
||
|
||
From: Anonymous@anywhere.edu
|
||
Subject: File 9--MOD and "West Side Story" -- NYT Summary
|
||
Date: Thu, 23 Jul 92 00:40:43 -0700
|
||
|
||
The following news summary, taking from the New York Times
|
||
News Service, appeared in the Chicago Tribune business section
|
||
on July 24 (p. 1). There was no author attributed, and the headline
|
||
was "Computer hackers put new twist on 'West Side Story'."
|
||
|
||
The article begins:
|
||
|
||
>Late into the night, in working-class neighborhoods around New
|
||
>York City, young men with code names like "acid Phreak" and
|
||
>"Outlaw" sat hunched before their glowing computer screens,
|
||
>exchanging electronic keys to complex data-processing systems.
|
||
>
|
||
>They called themselves the Masters of Deception. Their mission: to
|
||
>prove their prowess in the shadowy computer underworld.
|
||
>
|
||
>Compulsive and competitive, they played out a cybernetic version
|
||
>of "West Side Story," trading boasts, tapping into telephone
|
||
>systems, even pulling up confidential credit reports to prove
|
||
>their derring-do and taunt other hackers.
|
||
>
|
||
>Their frequent target was the Legion of Doom, a hacker group named
|
||
>after a gang of comic-book villains. The rivalry seemed to take on
|
||
>class and ethnic overtones, with the diverse New York group
|
||
>defying the traditional image of the young suburban computer
|
||
>whiz.
|
||
|
||
+++Commentary: The New York Times has finally resorted to the
|
||
sensationalism of other media that plays on public fears and
|
||
stereotyped images of the terrifying hacker menace. The Times even
|
||
goes a step further by laying out a Bloods-'n-Crips scenario, complete
|
||
with gang revenge and drive-by hackings. The Times, whose writers
|
||
should know better, also plays up the danger of obtaining credit
|
||
ratings. TRW credit reports are among the easiest of so-called
|
||
confidential data to get. The implication is that it's hackers, not
|
||
the abusive practices of used car salespeople or other marketers, that
|
||
are a danger to snatching this information.
|
||
|
||
The story continues with a summary of the MOD bust as reported in the
|
||
Times, CuD, and elsewhere. It adds some biographical information
|
||
about the MOD people indicted:
|
||
|
||
John Lee is 21, goes by the name Corrupt, and "has dreadlocks chopped
|
||
back into stubby 'twists' and live with his mother in a dilapidated
|
||
walkup in Bedford-Stuyvesant, Brooklyn." The story informs us that he
|
||
"bounced around programs for gifted students before dropping out of
|
||
school in the 11th grade." Lee works part-time as a standup comic and
|
||
is studying film production at Brooklyn University.
|
||
|
||
Paul Stira is 22 and lives in Queens and was valedictorian at Thomas
|
||
A. Edison High School. It adds that his handle was Scorpion. He is
|
||
three credits shy of a degree in computer science at Polytechnic
|
||
University.
|
||
|
||
Julio Ferndez is 18 and was known as Outlaw and studied computers in
|
||
grade school. The story includes a picture of Phiber Optik and
|
||
Scorpion.
|
||
|
||
The story continues with a brief history of MOD and the disputes
|
||
with Legion of Doom:
|
||
|
||
>The Masters of Deception were born in a conflict with the Legion
|
||
>of Doom, which had been formed by 1984 and ultimately included
|
||
>among its ranks three Texans, one of whom, Kenyon Shulman, is the
|
||
>son of a Houston socialite, Carolyn Farb.
|
||
>
|
||
>Abene had been voted into the Legion at one point. But when he
|
||
>began to annoy others in the group with his New York braggadocio
|
||
>and refusal to share information, he was banished, Legion members
|
||
>said.
|
||
>
|
||
>Meanwhile, a hacker using a computer party line based in Texas
|
||
>had insulted Lee, who is black, with a racial epithet.
|
||
>
|
||
>By 1989, both New Yorkers ((Abene and Lee)) had turned to a new
|
||
>group, MOD, founded by Ladopoulos. They vowed to replace their
|
||
>Legion rivals as the "new elite."
|
||
>
|
||
>According to a history the new group kept on the computer
|
||
>network, they enjoyed "mischievous pranks," often aimed at their
|
||
>Texas rivals, and the two groups began sparring. But in June 1990
|
||
>the three Texas-based Legion members, including Shulman, Chris
|
||
>Goggans and Scott Chasin, formed Comsec Cata Security, a business
|
||
>intended to help companies prevent break-ins by other hackers.
|
||
>
|
||
>Worried that the Texans were acting as police informers, the MOD
|
||
>members accused their rivals of defaming them on the network
|
||
>bulletin boards. MOD's activities, according to the indictment
|
||
>and other hackers, began to change and proliferate.
|
||
>
|
||
>Unlike most of the "old generation" of hackers who liked to
|
||
>joyride through the systems, the New Yorkers began using the file
|
||
>information to harass and intimidate others, according
|
||
>to prosecutors.
|
||
|
||
The article concludes by suggesting that MOD was jealous of Comsec's
|
||
media attention and mention Abene's and Ladopoulos's claims in the
|
||
media that they had a right to penetrate computer systems. It adds,
|
||
drawing from John Perry Barlow's paper, his experience with Abene in
|
||
1989. Abene allegedly downloaded Barlow's credit rating and posted it.
|
||
This was detailed in the 1990 Harper's magazine article on computer
|
||
privacy and abuse. The article was based on posts from a conference
|
||
discussion topic on a California computer system. The article
|
||
concludes by alleging that despite the indictment, MOD may still be
|
||
bugging people:
|
||
|
||
>But the battles are apparently not over. A couple of days after
|
||
>the charges were handed up, one Legion member said, he received a
|
||
>message on his computer from Abene. It was sarcastic as usual, he
|
||
>said, and it closed, "Kissy, kissy."
|
||
|
||
The Times story does challenge the myth of a stereotypical white male
|
||
locked away alone in a suburban bedroom all night. But linking it to
|
||
rival gang activity and West Side Story images seems bizarre. The
|
||
public, the fuzz, and the media pick up on these scripts. If it's in
|
||
the New Times, it must be true, right? In this case, the Times has
|
||
taken a few steps backwards in its normally competent (especially when
|
||
John Markoff writes) stories.
|
||
|
||
To the Times: "Kissy, kissy!"
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 20 Jul 1992 13:15:21 -0400
|
||
From: Christopher Davis <ckd@EFF.ORG>
|
||
Subject: File 10--Documents Available: Open Platform Overview, Life in Virtual
|
||
|
||
+======+==================================================+===============+
|
||
| FYI | Newsnote from the Electronic Frontier Foundation | July 20, 1992 |
|
||
+======+==================================================+===============+
|
||
|
||
ELECTRONIC FRONTIER FOUNDATION'S
|
||
OPEN PLATFORM PROPOSAL AVAILABLE VIA FTP
|
||
|
||
The full text of the EFF's Open Platform Proposal is available in
|
||
its current draft via anonymous ftp from ftp.eff.org as
|
||
pub/EFF/papers/open-platform-proposal.
|
||
|
||
To retrieve this document via email (if you can't use ftp), send mail to
|
||
archive-server@eff.org, containing (in the body of the message) the
|
||
command 'send eff papers/open-platform-proposal'. This is the proposal
|
||
in its 4th draft and is up-to-date as of July 2.
|
||
|
||
HOWARD RHINEGOLD'S "VIRTUAL COMMUNITIES, 1992" AVAILABLE VIA FTP
|
||
|
||
This is the full text of Howard Rhinegold's illuminating essay "A Slice
|
||
of Life In My Virtual Community" that was serialized in EFFector Online.
|
||
You can retrieve this document via anonymous ftp from ftp.eff.org as
|
||
pub/EFF/papers/cyber/life-in-virtual-community. To retrieve it via
|
||
email (if you can't use ftp), send mail to archive-server@eff.org,
|
||
containing (in the body of the message) the command 'send eff
|
||
papers/cyber/life-in-virtual-community'.
|
||
|
||
+=====+=====================================================+=============+
|
||
| EFF | 155 Second Street, Cambridge MA 02141 (617)864-0665 | eff@eff.org |
|
||
+=====+=====================================================+=============+
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 24 Jul 1992 17:25:57 EDT
|
||
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
||
Subject: File 11--CPSR Recommends NREN Privacy
|
||
|
||
CPSR Recommends NREN Privacy Principles
|
||
(PRESS RELEASE)
|
||
|
||
WASHINGTON, DC -- Computer Professionals for Social Responsibility
|
||
(CPSR), a national public interest organization, has recommended
|
||
privacy guidelines for the nation's computer network.
|
||
|
||
At a hearing this week before the National Commission on Library and
|
||
Information Science, CPSR recommended a privacy policy for the
|
||
National Research and Education Network or "NREN." Marc Rotenberg,
|
||
Washington Director of CPSR, said "We hope this proposal will get the
|
||
ball rolling. The failure to develop a good policy for the computer
|
||
network could be very costly in the long term."
|
||
|
||
The National Commission is currently reviewing comments for a report
|
||
to the Office of Science and Technology Policy on the future of the
|
||
NREN.
|
||
|
||
Mr. Rotenberg said there are several reasons that the Commission
|
||
should address the privacy issue. "First, the move toward
|
||
commercialization of the network is certain to exacerbate privacy
|
||
concerns. Second, current law does not do a very good job of
|
||
protecting computer messages. Third, technology won't solve all the
|
||
problems."
|
||
|
||
The CPSR principles are (1) protect confidentiality, (2) identify
|
||
privacy implications in new services, (3) limit collection of personal
|
||
data, (4) restrict transfer of personal information,(5) do not charge
|
||
for routine privacy protection, (6) incorporate technical safeguards,
|
||
(7) develop appropriate security policies, and (8) create an
|
||
enforcement mechanism.
|
||
|
||
Professor David Flaherty, an expert in telecommunications privacy law,
|
||
said "The CPSR principles fit squarely in the middle of similar
|
||
efforts in other countries to promote network services. This looks
|
||
like a good approach."
|
||
|
||
Evan Hendricks, the chair of the United States Privacy Council and
|
||
editor of Privacy Times, said that the United States is "behind the
|
||
curve" on privacy and needs to catch up with other countries who are
|
||
already developing privacy guidelines. "The Europeans are racing
|
||
forward, and we've been left with dust on our face."
|
||
|
||
The CPSR privacy guidelines are similar to a set of principles
|
||
developed almost 20 years ago called The Code of Fair Information
|
||
practices. The Code was developed by a government task force that
|
||
included policy makers, privacy experts, and computer scientists. The
|
||
Code later became the basis of the United States Privacy Act.
|
||
|
||
Dr. Ronni Rosenberg, who has studied the role of computer scientists
|
||
in public policy, said that "Computer professionals have an important
|
||
role to play in privacy policy. The CPSR privacy guidelines are
|
||
another example of how scientists can contribute to public policy."
|
||
|
||
CPSR is a membership organization of 2500 professionals in the
|
||
technology field. For more information about the Privacy Policies and
|
||
how to %%join CPSR, contact CPSR, P.O. Box 717, Palo Alto CA 94302.
|
||
415/322-3778 (tel) and 415/322-3798 (fax). Email at
|
||
cpsr@csli.stanford.edu.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 23 Jul 92 04:55:25 MDT
|
||
From: mbarry@NYX.CS.DU.EDU(Marshall Barry)
|
||
Subject: File 12--Int'l BBSing & Elec. Comm Conference July PR
|
||
|
||
|
||
FOR IMMEDIATE RELEASE
|
||
|
||
Contact: Terry Travis or Michelle Weisblat
|
||
Telephone: (303) 426-1847 -- Fax: (303) 429-0449
|
||
|
||
Do you want to know how to get thousands of computer programs free -
|
||
LEGALLY? Does being able to send messages around the world, and
|
||
receive replies, for the price of a local phone call interest you?
|
||
Are you confused by the terms "Hacker", "Phreak", "BBS", or "Baud"?
|
||
Do you want to know how to help keep the homebound or handicapped
|
||
from feeling cut off from society?
|
||
|
||
The answers to these questions, and much more, can be had by
|
||
attending the Second Annual International BBSing and Electronic
|
||
Communications Conference, IBECC'92, August 13-16 at the Sheraton
|
||
Denver West in Lakewood, CO.
|
||
|
||
IBECC'92 is an intensive three-day conference and workshop covering
|
||
topics ranging from "Staying Alive" (Handicapped Computing and
|
||
Accessing the World) to "Safe Computing" (Controlling the Spread of
|
||
Computer 'Infection'), and from "Why Kelly CAN Read" (Education and
|
||
the Computer) to "What IS a MODEM anyway?" (An Introduction to the
|
||
World of TeleCommunication).
|
||
|
||
At IBECC'92 you will be able to:
|
||
* Join Author and Lecturer Dr. Jerry E. Pournelle, Ph.D. for his
|
||
unique and critical views on life in the electronic future.
|
||
* Sit and discuss the electronic classroom and NREN - the
|
||
National Public SuperComputer Highway - with Telecommunications and
|
||
Education Pioneer David Hughes, Sr.
|
||
* Interact with Thom Foulks and his Award-Winning Radio Program,
|
||
"Computing Success", Live.
|
||
* Be a part of Denver's Only Live Computer Call-In Show,
|
||
"Komputer Knus" with Marshall Barry and Michelle Weisblat.
|
||
* Learn the tricks of the trade with Internationally Famous
|
||
Software Designer Andrew Milner,
|
||
* and much, much more.
|
||
|
||
You will have the chance to visit with vendors like U.S. Robotics
|
||
(modems), OnLine Communications (Remote Access and FrontDoor), MICRO
|
||
(The Users' Group for Users' and Groups), CDB Systems (Computers and
|
||
BBSes), Clark Development (PCBoard), Star Enterprises (Systems Sales
|
||
and Service), Artisoft (LANs), Second Sight (Blind and Handicapped
|
||
Systems and Software), the Electronic Frontier Foundation
|
||
(Electronic Rights) and, of course, hundreds of SySops, Users,
|
||
Educators and Enthusiasts.
|
||
|
||
IBECC'92 will truly be the Educational and Social Event of the Year!
|
||
It is designed for the beginner, the curious, the handicapped, and
|
||
educators interested in learning about tomorrow's technologies,
|
||
today. There will even be special sessions and seminars for those
|
||
who are already deeply involved in the "mysteries" of computer
|
||
communications.
|
||
|
||
For full details, schedules, conference rates and information,
|
||
please contact the sponsor, IBECC (a non-profit educational,
|
||
scientific, and literary society) at (303) 426-1847 (voice), or
|
||
(303) 429-0449 (fax).
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.33
|
||
************************************
|
||
|
||
|
||
|