810 lines
37 KiB
Plaintext
810 lines
37 KiB
Plaintext
|
||
|
||
Computer underground Digest Wed June 23 1993 Volume 5 : Issue 46
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Editor: Etaoin Shrdlu, Seniur
|
||
|
||
CONTENTS, #5.46 (June 23 1993)
|
||
File 1--Re: File 6--Course on "Politics and Technology"
|
||
File 2--A public experiment in how private our lives really are
|
||
File 3--AB1624/Calif Legislature Computer Access -- Full Text
|
||
File 4--Summercon Synopsis & Playful Precis
|
||
File 5--Defense Contractor Attacks Full Disclosure (Reprint) (#1)
|
||
File 6--The "Offending" Full Disclosure Story (#2)
|
||
File 7--The Harris Letter Threatening Litigation against FD (#3)
|
||
File 8--The Full Disclosure Atty's Response to Harris (#4)
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-6430), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) 203-832-8441 NUP:Conspiracy
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
||
uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Mon, 21 Jun 93 14:00:26 EDT
|
||
From: phyland@ESSENTIAL.ORG(Paul Hyland)
|
||
Subject: File 1--Re: File 6--Course on "Politics and Technology"
|
||
|
||
CPSR distributes for $10 (I think) a list of Course Syllabi on
|
||
Computers and Society, written by Terry Winograd and Batya Friedman.
|
||
Ordering information can be obtained in the file cpsr.books at the
|
||
info server cpsr.org (listserv/ftp/gopher/wais), or write to the
|
||
national office at cpsr@cpsr.org.
|
||
|
||
There are many other files there that chould be helpful to you in the
|
||
preparation of your class materials.
|
||
|
||
Paul Hyland phyland@gwuvm.gwu.edu or essential.org
|
||
Moderator, CPSR List cpsr@gwuvm.gwu.edu
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 21 Jun 93 14:41:58 -0700
|
||
From: gnu@TOAD.COM
|
||
Subject: File 2--A public experiment in how private our lives really are
|
||
|
||
A reported has asked me for help in finding people who will help to
|
||
penetrate the privacy of four volunteers, for a major newspaper story.
|
||
|
||
Any takers? Contact the reporter:
|
||
|
||
Reporter for major metro paper is interested in help finding out
|
||
anything there is to find on four prominent people who have
|
||
volunteered to have their privacy breached.
|
||
|
||
Financial fundamentals. Lives of crime. Aches and pains. How rich
|
||
they are, where they vacation, who they socialize with. You name it,
|
||
we're interested in seeing if it's out there.
|
||
|
||
All for a good cause.
|
||
If you're willing to advise this computer-ignorant reporter, or dig
|
||
in and get the dope on these volunteers, please contact him at
|
||
tye@nws.globe.com
|
||
Or call at +1 617 929 3342. Soon.
|
||
|
||
Thanks.
|
||
|
||
Feel free to forward this far and wide.
|
||
--
|
||
John Gilmore gnu@toad.com -- gnu@cygnus.com -- gnu@eff.org
|
||
Creating freedom, rather than longer chains, bigger cages, better meals, . . .
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 22 Jun 1993 03:54:09 GMT
|
||
From: kiddyr@GALLANT.APPLE.COM(Ray Kiddy)
|
||
Subject: File 3--AB1624/Calif Legislature Computer Access -- Full Text
|
||
|
||
Well, it has changed and it is definitely an improvement. so, without
|
||
further ado, the full text of AB1624.
|
||
|
||
AMENDED IN SENATE JUNE 17, 1993
|
||
AMENDED IN ASSEMBLY MAY 18, 1993
|
||
CALIFORNIA LEGISLATURE--1993-94 REGULAR SESSION
|
||
|
||
ASSEMBLY BILL No. 1624
|
||
|
||
Introduced by Assembly Member Bowen
|
||
(Principal coauthor: Senator Torres) (Coauthors: Assembly Members
|
||
Areias, Bornstein, Goldsmith, Isenberg, Johnson, Karnette, Katz
|
||
Mountjoy, Nolan, Polanco, Speier, and Vasconcellos)
|
||
(Coauthors: Senators Dills, Hayden, Killea, Morgan, and Rosenthal)
|
||
|
||
March 4, 1993
|
||
|
||
An act to add Section 10248 to the Government Code,
|
||
relating to the Legislature;
|
||
|
||
LEGISLATIVE COUNSELUS DIGEST
|
||
|
||
AB 1624, as amended, Bowen. Legislature: legislative
|
||
information: access by computer network.
|
||
Under existing law, all meetings of a house of the Legislature
|
||
or a committee thereof are required to be open and public, unless
|
||
specifically exempted, and any meeting that is required to be open
|
||
and public, including specified closed sessions, may be held only
|
||
after full and timely notice to the public as provided by the
|
||
Joint Rules of the Assembly and Senate.
|
||
This bill would make legislative findings and declarations that
|
||
the public should be informed to the fullest extent possible as to
|
||
the time, place, and agenda for each meeting.
|
||
This bill would require the Legislative Counsel, with the advice
|
||
of the Joint Rules Committee of the Senate and Assembly, to make
|
||
available to the public, by means of access by way of the largest
|
||
nonproprietary, nonprofit cooperative public computer network,
|
||
specified information concerning bills, the proceedings of the
|
||
houses and committees of the Legislature, statutory enactments,
|
||
and the California Constitution.
|
||
Vote: 2/3 majority. Appropriation: no. Fiscal committee: yes.
|
||
State-mandated local program: no.
|
||
|
||
The people of the State of California do enact as follows:
|
||
|
||
1 SECTION 1. Section 10248 is added to the
|
||
2 Government Code, to read:
|
||
3 10248. (a) The Legislature finds and declares that
|
||
4 the public should be informed to the fullest extent
|
||
5 possible as to the time, place, and agenda for each
|
||
6 meeting of the houses and committees of the Legislature.
|
||
7 The Legislature further finds and declares that it is
|
||
8 desirable to make timely information regarding these
|
||
9 proceedings available to each member of the public,
|
||
10 irrespective of where he or she resides, for the least cost
|
||
11 possible.
|
||
12 (b) The Legislative Counsel shall, with the advice of
|
||
13 the Joint Rules Committee, make all of the following
|
||
14 information available to the public in electronic form:
|
||
15 (1) The most recent Assembly Daily File and most
|
||
16 recent Daily Senate File.
|
||
17 (2) The text of each bill introduced in each current
|
||
18 legislative session, including all amended forms of the
|
||
19 bill.
|
||
20 (3) The bill history of each bill introduced and
|
||
21 amended in each current legislative session.
|
||
22 (4) The bill status of each bill introduced and
|
||
1 amended in each current legislative session.
|
||
2 (5) All bill analyses prepared in connection with each
|
||
3 bill in each current legislative session.
|
||
4 (6) All vote information concerning each bill in each
|
||
5 current legislative session.
|
||
6 (7) Veto messages concerning each bill, when issued,
|
||
7 in each current legislative session.
|
||
8 (8) The California Codes.
|
||
9 (9) The California Constitution.
|
||
10 (10) All uncodified statutes enacted on or after
|
||
11 January 1, 1993.
|
||
35 (11) Documentation that is available to the public and
|
||
36 maintained in computerized form by the Legislative
|
||
37 Counsel which describes the computerized digital
|
||
38 formats of the files containing the information specified
|
||
39 in this subdivision.
|
||
40 (c) The Legislative Counsel shall automatically
|
||
1 transmit copies of files of the information specified in
|
||
2 subdivision (b) by way of the largest nonproprietary,
|
||
3 nonprofit cooperative public computer network upon
|
||
4 receiving any computerized request for the files. These
|
||
5 files shall be made available in this manner immediately
|
||
6 after they are transmitted to the Office of State Printing.
|
||
7 The files shall contain all of the text and formatting
|
||
8 information transmitted to the Office of State Printing. In
|
||
9 the event that a technical malfunction prevents these
|
||
10 files from being transmitted immediately after they are
|
||
11 transmitted to the Office of State Printing, the
|
||
12 Legislative Counsel shall report that fact to the Joint
|
||
13 Rules Committee within one business day.
|
||
14 (d) Any file that is available pursuant to subdivision
|
||
15 (c) shall remain available to the public upon request by
|
||
16 electronic digital data transmission until it is updated.
|
||
17 When a file is updated, a copy of the file without the
|
||
18 updated information shall remain available to the public
|
||
19 by electronic data digital transmission for at least 90 days
|
||
20 after the update.
|
||
21 (e) The Legislative Counsel may not control which or
|
||
22 how many files are available to a person who requests the
|
||
23 files nor monitor or keep any records about those persons
|
||
24 who request files, except for the purpose of assuring the
|
||
25 quality of computer operations. No fee or other charge
|
||
26 shall be imposed as a condition to public access to any files
|
||
27 that are made available to the public pursuant to this
|
||
28 section.
|
||
29 (f) No action taken pursuant to this section shall be
|
||
30 deemed to alter or relinquish any copyright or other
|
||
31 proprietary interest or entitlement of the State of
|
||
32 California relating to any of the information made
|
||
33 available pursuant to this section.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 22 Jun 93 15:17 CDT
|
||
From: rejones@SEABASS.ST.USM.EDU
|
||
Subject: File 4--Summercon Synopsis & Playful Precis
|
||
|
||
Presenting :::
|
||
|
||
SummerCon 1993 in Review !!!
|
||
|
||
Hacking Tales and Exploits by the SotMESC
|
||
|
||
Additional Activities by the GCMS MechWarriors
|
||
|
||
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
|
||
|
||
The weather was right, too right. Something was foul in the
|
||
air. It was akin to that mythical 'Calm before the Storm' scenario
|
||
that is dreaded by so many. But, Scribbles and I boarded the
|
||
Techno-Laden SotMESC compact and took off down the Highway to our
|
||
ultimate goal . . . Hacker Heaven in Summertime Fun - SummerCon !!!
|
||
|
||
Instantly, weather was seen brewing in the Caribbean. Hints
|
||
of Hurricanes echoed through the towns we drifted through. To
|
||
alleviate any anxieties, massive quantities of Jolt! were obtained
|
||
in the infamous town of Hatties-Gulch, a small town taken over by
|
||
the virulent filth called College Students.
|
||
|
||
The trip continued, over hill and over dale. Dale was quite
|
||
considerate not to press charges. Colleges were passed in a blink
|
||
of the eye. Nothing was going to stop us. We were on a mission
|
||
from the Church. But, that's another story.
|
||
|
||
After locating that famous arch, a beeline was made at speeds
|
||
over 100 MPH through St. Louis until our destination came into
|
||
view: The St. Louis Executive International (800-325-4850). We
|
||
came to meet our nemesis and friends at the fest hosted by the
|
||
Missouri Programming Institute. Brakes were quickly applied
|
||
as the car appeared to be going off the off-ramp and into the ditch.
|
||
|
||
From the lobby it was obvious, there were unusual people here.
|
||
These were the kind of people that you fear your daughters would
|
||
never meet. The kind of people that kicked themselves into
|
||
caffeine frenzies and would become infatuated with virtual lands.
|
||
Yes, these were my kind of people.
|
||
|
||
Now, the adventure may start . . .
|
||
|
||
( More to come after I get out of the shower real quick )
|
||
|
||
-Frosty, ilKhan of the SotMESC
|
||
|
||
=========================================================================
|
||
|
||
The continuing story of Hackers gone astray in the big city =:)
|
||
|
||
For those of you that were waiting, we apologize for the delay.
|
||
But, nobody can interrupt an original episode of ST:TNG and the
|
||
discovery of the latest 2600 'zine.
|
||
|
||
Oh, and in response to A-Gal on pg 30 of 2600, Scribbles says
|
||
she's the sexiest hacker on the nets. Hmmmmm, I'm inclined to agree
|
||
with that. I'm sure Control-C will agree too, especially after he
|
||
trailed her for half of SCon.
|
||
|
||
Now, we all know that Friday is the warm-up day on what we can
|
||
expect to see at SCon during the main saturday drag. It was no
|
||
surprise to find the main junction box rewired, pay-phones providing
|
||
free services, rooms rerouted and computers running rampant down the
|
||
hallways. But, the traditional trashing of Control-C's room this
|
||
early signaled that more would be needed to top the night. The maid
|
||
was definitely not pleased.
|
||
|
||
For a list of those that attended, maybe KL can provide us
|
||
with that information. There were too many faces for my fingers
|
||
to lap into. And, there were quite a few new faces. I believe
|
||
that Weevel was the youngest hacker at 16, and Emmanuel was the
|
||
oldest, although he didn't give his age.
|
||
|
||
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
|
||
|
||
THE CONFERENCE
|
||
|
||
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
|
||
|
||
Let's get to the meat of the matter. The conference had
|
||
a nice spacious central area with tables neatly lining alongside
|
||
the wall. Between the tables and the walls were many hacks packed
|
||
as tightly as they could get. Why didn't we think of moving the tables
|
||
closer together ???
|
||
|
||
KL took control and ran the conference smoothly. dFx panned
|
||
everyone on his digital camcorder. Several cameras were around
|
||
to provide us with gifs later. And the conference took off . . .
|
||
|
||
First up was Stewart from SRI ( Stanford Research Institute ).
|
||
He elaborated on SRI's being involved in research, engineering and
|
||
design. From studies done around the world with hackers and those
|
||
associated, malicious hacking can not be stopped. There is no
|
||
evidence, though, that the current hackers are interested in bringing
|
||
the networks down at all. Concern was given to new hackers that may
|
||
be emerging with financial gain and maliciousness occurring. The top
|
||
security hole with system was noted as being the infamous social
|
||
engineering technique. SRI did note that many places did not utilize
|
||
the security that they even had in place. It was also noted that laws
|
||
against malicious hackers, and probably any hacker, should be fair and
|
||
just. The most malicious hacks that are turning up have been spotted
|
||
in the following named countries: Holland, Scandinavia countries, very
|
||
possibly soon in the UK, Australia, Israel, the former USSR, and
|
||
Bulgaria ( noted for virii writers ).
|
||
|
||
A voice made mention of Operation Rahab, hackers in German
|
||
Intelligence.
|
||
|
||
Next up was Count Zero from cDc/RDT to talk about packet radio.
|
||
His talk included information about the IESS and handed out a flyer on
|
||
America 2000 ( school under 1984 regimes ). Maybe someone will
|
||
provide us with a copy of this. A packet radio modem at 1200 can be
|
||
obtained easily for $50. TCP/IP packets are already being send over
|
||
the bandwidth along with other network protocols. The usefulness of
|
||
all this is that the information is broadcast and it is virgin
|
||
territory. The baud limitation is due only based upon the bandwidth
|
||
you are operating at and the number of collisions occurring. On a
|
||
band you can see every packet that is being transmitted if you wish.
|
||
All this is located on a 2 meter band. Currently the FCC forbids
|
||
encryptions on the airwaves, although this is noted as being virtually
|
||
impossible to enforce. It also takes 5 months to get an amateur
|
||
radio license, and your personal info is recorded in a book easily
|
||
obtained at libraries. The problem with going around the FCC is that
|
||
there exist vigilante HAMs that monitor the bands and have nothing
|
||
better to do than filter info and whine to the FCC. Bandwidths are
|
||
decreasing though. This is due to an increased interest overall by
|
||
communications in these areas. Unless you do something major the FCC
|
||
will not give you much interest. The book on preparing yourself for a
|
||
Tech Class can be obtained from Radio Shak for $9.
|
||
|
||
Next up was dFx. He was promoting the HCon and Tone-Loc t-shirts
|
||
that were for sale. Merchandising was getting pretty high. He also
|
||
gave out a few Mitsubishi 800 disks. He was also recognized as the
|
||
ONLY and LAST member of the Neon Knights, a club that had a wide range
|
||
of comedy names generated. The word was put out the HCon '93 will be
|
||
in December 17-19 with a hint that it could also wind up being in
|
||
Austin. Then the conversation turned to Lord Byron's bust, which we
|
||
should here more information on any day this week. The conversation
|
||
reiterated the government narc that was at the AA meeting that was
|
||
pressuring Byron. Byron was also noted as having rejected a plea
|
||
bargain the courts offered him. And lastly, it is going to happen
|
||
soon so get them while you can. The FTP site at eff.org will be
|
||
dropping its CuD directory due to a conflict of interest with EFFs
|
||
major contributors, mainly the RBOCs and other interest groups that
|
||
don't like us.
|
||
|
||
Erik Bloodaxe took the table next to talk about what was
|
||
happening with his involvement with Phrack and some interesting info
|
||
about Agent Steel. As for Phrack, the Email list is being with-held
|
||
by Tuc. The mailing list has been refused at Mindvox due to files
|
||
missing mysteriously at that site. And, no organization registered
|
||
for Phrack #42 since it was copyrighted with a nice and lengthy
|
||
preamble, except for one company from Midar. Currently Phrack #43 is
|
||
in limbo and is estimated at 1 Meg long. Going onto the info about
|
||
Agent Steel, basically he's a narc. Lord Havok from Canada is trying
|
||
to restart the LOD under some unknown logical rationale that since LOD
|
||
is defunct, anyone can reclaim the name. Lord HAvok, aka Cameron, has
|
||
been going around trying to get documentation to put together an LOD
|
||
technical journal #5. Supposedly there is a skin-head group in Canada
|
||
that is now tracking Cameron down.
|
||
|
||
Someone next came up and gave us an update on Codec. Two weeks
|
||
after the last SCon, Codec was pulled over while on the run from the
|
||
law for speeding and then arrested for burglary, resisting arrest, etc
|
||
. . . He is estimated to be out of jail in 1995 and still has time to
|
||
serve in a few other states. Mail can be sent to him at this address:
|
||
codec@cypher.com. Maybe Crunch can give Codec some hints on how to
|
||
get by in prison?
|
||
|
||
From the CPSR, Eric Nielson took the table. He elaborated on
|
||
the CPSR and ran a Q&A period. Basically, the CPSR files many FOIA
|
||
requests and sues the government. Their focus is on the workplace
|
||
computing. Elaboration was given on the Clipper Chip and computer
|
||
ship security. The CPSR is staffed with lawyers and takes their
|
||
funding from dues and grants. They are not sponsored by any
|
||
corporations.
|
||
|
||
From the far side of the table came the infamous Emmanuel
|
||
Goldstein from 2600. He stated how he had testified at congress and
|
||
gave them a live demonstration of bandwidth scanning and redboxing.
|
||
While he was there, the inquisition started against him on the issue
|
||
of 2600. Emmanuel then tried to explain the culture to our
|
||
representative that it is bad to classify all hackers as criminals.
|
||
Goldstein then went on to talk about the DC 2600 bust and how it has
|
||
resulted in 2600 meetings springing up all across the country. A
|
||
review of several films on software piracy at the office, disaster
|
||
recovery and viruses from Commonwealth Films was given. And, to
|
||
hilight everything, 2600 has purchased an AT&T van that they plan to
|
||
take to assorted conventions and
|
||
start a fleet of these up.
|
||
|
||
Pst, BTW, on pg 43 of 2600 the intersection should be a jump =:)
|
||
|
||
Last up was Errath Ackby, a Certified Netware Engineer. He
|
||
explained that the only upgrade in Novell 4.0 is the disk compression.
|
||
He also informed us that the supervisor and guest accounts generally
|
||
have default passwords. TO hack into this Net, you should use a PC
|
||
with full alt and functions keys. The supervisor p/w is on the
|
||
RConsole in a file called autoexec.mcf on version 3.11. Netcrack
|
||
will not work on a system with Intruder Lock-Out. Non-dedicated
|
||
netware must boot from a floppy. Best of all, you can dial out
|
||
by using cubix-quarts, which are PC with modems on the system.
|
||
|
||
Thus we have come to the end of the conference part of
|
||
SummerCon. Part III will go into detail about several of the
|
||
flyers that were floating about and the post-conference excitement
|
||
that nobody there would ever forget !!!
|
||
|
||
Below is a quick reprint of a paper that was recovered
|
||
from Control-C's trashed room.
|
||
|
||
Mrs Jarnagin,
|
||
|
||
I would like to set up a meeting
|
||
to discuss Kevin's progress in Social
|
||
Studies and English. Please let
|
||
me know when it would be
|
||
convenient.
|
||
|
||
Thank you
|
||
|
||
( Scribble , scribble )
|
||
|
||
Dear Mr + Mrs Gormby,
|
||
|
||
We would be happy
|
||
to meet with you at
|
||
9:30 on Thursday, April
|
||
1st in Room 104
|
||
|
||
Sincerely,
|
||
M.Jarnagin
|
||
&
|
||
S.Dietrich
|
||
|
||
|
||
Now, could this be Kevin Poulson ??? Naaa, no way.
|
||
Amazing what technical data trashing will uncover. I guess
|
||
I should throw this away now . . .
|
||
|
||
THE ADVENTURE CONTINUES !!!
|
||
|
||
-Frosty, ilKhan of the SotMESC
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 22 Jun 1993 22:32:12 PDT
|
||
From: Alex Zelchenko <alexz@well.sf.ca.us>
|
||
Subject: File 5--Defense Contractor Attacks Full Disclosure (Reprint) (#1)
|
||
|
||
((MODERATORS' NOTE: Glen Roberts, editor of Full Disclosure, a gadfly
|
||
hardcopy journal/newsletter, has been threatened with a lawsuit by
|
||
Harris Corp. over a review of one of its products. As the experiences
|
||
of 2600 Magazine illustrate, the threat of litigation by large
|
||
corporations seems to be a way of silencing speech of those writing on
|
||
cyber-issues.
|
||
|
||
CuD readers will recall that Roberts and his co-gadfly Bill Vajk
|
||
obtained and made available a number of sealed federal warrants and
|
||
affidavits during the so-called "Hacker Crackdown" of the 1990s,
|
||
including the Ripco BBS and Rich Andrews documents. Full Disclosure was
|
||
also one of the first print media to attack the crackdowns and
|
||
provided considerable information about the events to the computer
|
||
community. Vajk and Roberts aggressively use the Freedom of
|
||
Information Act (FOIA) to ferret out information. The generosity of
|
||
Roberts and Vajk in sharing their information with CuD, amongst
|
||
others, makes any threat to their enterprise a threat to our own
|
||
information flow for two reasons. First, if media such as 2600 or Full
|
||
Disclosure are silenced from legitimate pursuit and publication of
|
||
information because of the chilling effect of intimidation, then a
|
||
significant source of information is lost. Second, if large
|
||
corporations or government agencies can threaten publications of which
|
||
they disapprove into silence, it severely curtails the free flow of
|
||
information and makes other media more cautious lest they also be
|
||
targeted.
|
||
|
||
Alex Zelchenko collected the basic documents related to this case. In
|
||
this file, we reprint a (forthcoming) Full Disclosure piece
|
||
summarizing the events. Second is the "offending" story that resulted
|
||
in the threat of litigation. Third is the letter from Harris attorneys
|
||
threatening the suit, and finally is the response of Full Disclosure
|
||
legal counsel to Harris.
|
||
|
||
++++++
|
||
|
||
DEFENSE CONTRACTOR ATTACKS NEWSPAPER EDITOR
|
||
|
||
(CHICAGO) -- Harris Corporation, through its Electronic Systems
|
||
Sector in Melbourne, Florida, has attacked Glen L. Roberts, Editor of
|
||
Full Disclosure, the nation's #1 surveillance journal, threatening
|
||
him with civil and criminal proceedings over his editorial review of
|
||
one of their products.
|
||
|
||
In 1991, Full Disclosure reported on the National Technical
|
||
Investigators Assoc conference held Washington, DC. Harris, an
|
||
exhibitor at the conference, was included in Full Disclosure's
|
||
coverage.
|
||
|
||
A Harris product called "Triggerfish," which the company promoted at
|
||
the conference as a cellular phone interception system, was included
|
||
in Full Disclosure's report. Harris now claims that this editorial
|
||
review was an "apparently unauthorized advertisement," and that it
|
||
constitutes a deceptive trade practice, violates its trademarks and
|
||
may be a "felony."
|
||
|
||
Roberts stated, "clearly, I have a First Amendment right to discuss
|
||
the products or services of any company in my publication. The First
|
||
Amendment has no requirement that I get 'authorization' to talk about
|
||
what's being sold to the public, or law enforcement agencies."
|
||
Further, Roberts said that this issue is especially important to the
|
||
public and political discussions about privacy and surveillance
|
||
technology. Roberts thinks that Harris has failed to learn the lesson
|
||
of the "Pentagon Papers" case.
|
||
|
||
"We're seeing laws passed relating to issues of privacy, and in
|
||
particular cellular phone privacy, without informed public debate on
|
||
the issue, by either the public, or our Congress." Roberts considers
|
||
this action by Harris as an effort to prevent such public debate.
|
||
Roberts said, "Full Disclosure was started to encourage debate and
|
||
public knowledge of these topics."
|
||
|
||
FULL DISCLOSURE, BOX 903, LIBERTYVILLE, ILLINOIS 60048. PHONE:
|
||
(708) 395-6200. FAX: (708) 395-6022. TOLL FREE: (800) 235-1414
|
||
: For sub a message left on 800-235-1414 will do it
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 22 Jun 1993 22:32:12 PDT
|
||
From: Alex Zelchenko <alexz@well.sf.ca.us>
|
||
Subject: File 6--The "Offending" Full Disclosure Story (#2)
|
||
|
||
Here is the original story as it appeared in "Full Disclosure." It
|
||
will be followed by the text of a letter received by the publication.
|
||
|
||
++++++++
|
||
|
||
NATIA Conference
|
||
|
||
The following pages highlight some companies and products that
|
||
exhibited at the 1991 National Technical Investigators Conference
|
||
(NATIA) show in Washington, DC.
|
||
|
||
NATIA is an organization of over 2300 law enforcement officers,
|
||
communications and security managers assigned to support technical
|
||
investigative activities in the major federal, state and local law
|
||
enforcement and intelligence agencies.
|
||
|
||
The NATIA membership is responsible for supplying all of the various
|
||
audio, video, photographic, specialized electronic and investigative
|
||
aids used in support of these sensitive bugging, wiretapping and
|
||
intelligence activities.
|
||
|
||
As with the 1990 show, there was a strong showing of covert video
|
||
systems. Cellular phone interception systems are now becoming
|
||
commonplace.
|
||
|
||
The following information has been complied from product literature
|
||
made available at the show. It should be remembered that NATIA has a
|
||
law enforcement membership and some of the products are only available
|
||
to such agencies. Additionally, some RF devices are not FCC approved
|
||
and therefore, only available to Federal law enforcement agencies.
|
||
|
||
Even though the sale of some devices may be limited to official law
|
||
enforcement agencies, the technology is relatively simple. For
|
||
example, the cellular phone monitoring equipment is sold only to the
|
||
law enforcement market. However, anyone wishes to exert a little elbow
|
||
grease can accomplish the same on their own. This should be taken as a
|
||
stern warning to those who have an expectation of privacy when using
|
||
their cellular phones. As the information shows, commercial units can
|
||
record the calls, as well as tracking by mobile phone number,
|
||
electronic serial number and also direction finding to physically
|
||
locate an individual using a cellular phone.
|
||
|
||
+++++++++++
|
||
|
||
Harris Law Enforcement Products
|
||
|
||
TRIGGERFISH has a number of cellular phone based applications:
|
||
determining a suspects phone number, dialed number recorder, and
|
||
wiretapping. According to Harris, %%for the first time, law
|
||
enforcement is not at a disadvantage in tracking the high-tech
|
||
criminal.'' Additionally, the unit %%collects and integrates all
|
||
relevant data, including voice, directly from the ether.''
|
||
|
||
Box 91000, Melbourne, FL 32902. Phone: (800) 442-7747, Fax: (407) 768-4005
|
||
+++
|
||
Reprinted from Full Disclosure, Box 903, Libertyville, Illinois 60048
|
||
Phone: (800) 235-1414
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 22 Jun 1993 22:32:12 PDT
|
||
From: Alex Zelchenko <alexz@well.sf.ca.us>
|
||
Subject: File 7--The Harris Letter Threatening Litigation against FD (#3)
|
||
|
||
HARRIS
|
||
|
||
May 26, 1993
|
||
|
||
Mr. Glen L. Roberts
|
||
Editor/Publisher
|
||
Full Disclosure
|
||
Box 903 - FD24
|
||
Libertyville, Illinois 60048
|
||
|
||
Dear Mr. Roberts:
|
||
|
||
Your issue No. 24 of Full Disclosure has been brought to my attention
|
||
because of an apparently unauthorized advertisement on page 8 for a
|
||
Harris law enforcement product referred to as "Triggerfish." It is my
|
||
understanding that the publication of this advertisement was not
|
||
previously requested nor authorized by Harris. The unapproved use of
|
||
this advertisement constitutes a deceptive trade practice, which
|
||
would potentially subject you and your newspaper to civil liability.
|
||
Further, you have used our trademarks -- Harris and Triggerfish --
|
||
without permission.
|
||
|
||
Lastly, you may have committed a felony under 18 USC 2512(1)(c)(i).
|
||
This criminal statute prohibits the placement in a newspaper or
|
||
magazine of an advertisement for an electronic product that is
|
||
primarily useful for the purpose of surreptitiously intercepting
|
||
electronic communications. Further, these actions on your part may
|
||
have also subjected Harris Corporation to such liability under this
|
||
statute.
|
||
|
||
You are hereby instructed to immediately desist from placing
|
||
advertisements or promotional material related to Harris electronic
|
||
law enforcement products in your newspaper. Any further actions of
|
||
this nature will be dealt with by filing a suit against you and your
|
||
newspaper.
|
||
|
||
Sincerely, /s/ John L. DeAngelis, Intellectual Property and Licensing
|
||
Counsel.
|
||
|
||
JLD/bea
|
||
|
||
Harris Corporation Electronic Systems Section P.O. Box 37, Melbourne,
|
||
Florida 32902 Telephone 407-727-4000
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 22 Jun 1993 22:32:12 PDT
|
||
From: Alex Zelchenko <alexz@well.sf.ca.us>
|
||
Subject: File 8--The Full Disclosure Atty's Response to Harris (#4)
|
||
|
||
Drath & Dwyer
|
||
- Lawyers -
|
||
400 South Beverly Drive * Suite 214
|
||
Beverly Hills, California 90212-4402
|
||
|
||
Tel: (310) 364-3444 * Fax: (310) 858-7458
|
||
|
||
Tuesday, June 1, 1993
|
||
|
||
John L. DeAngelis Jr., Esq.
|
||
Harris Corp.
|
||
P.O. Box 37
|
||
Melbourne, FL 32902
|
||
|
||
Dear Mr. DeAndelis:
|
||
|
||
I write on behalf of Glen L. Roberts, the editor and publisher of the
|
||
magazine, Full Disclosure, in reply to your May 26 letter addressed to
|
||
him. In addition to advising Mr. Roberts, I serve as privacy law
|
||
columnist for his publication and co-host with him of "Full Disclosure
|
||
Live," a one-hour live radio program carried across the country on the
|
||
Let's Talk Radio Network.
|
||
|
||
It is shocking sophistry on your part to have characterized Full
|
||
Disclosure's editorial expression about the product, "Triggerfish," as
|
||
an "advertisement" Of course, I recognize your procrustean need to do
|
||
that, because "advertisement," is the operative word of the criminal
|
||
statute you cite.
|
||
|
||
Had you taken time to research even a few of the many cases in which
|
||
"advertisement" not only has been defined as the space one associated
|
||
with a product purchases from a publisher, but as well distinguished
|
||
from editorial expression or news reporting by such a publisher or his
|
||
or her subaltern, for example, an editor, you might have saved your
|
||
company the embarrassment that well may flow from your misguided
|
||
missive. Cary Grant couldn't make an Esquire magazine news article,
|
||
which used a photograph of his head, into an advertisement in the
|
||
Southern District of New York 20 years ago; I doubt you'll have any
|
||
greater success today, venue notwithstanding.
|
||
|
||
Respecting your assertion of trademark use without permission, we are
|
||
unable to locate any authority, statutory or decisional, that even
|
||
suggests that editorial mention of a product or service, which enjoys
|
||
registered or common law trade or service mark protection, obliges the
|
||
publisher to include an indication of such status or forbids such
|
||
publication "without permission." Perhaps, given your stated role as
|
||
intellectual property counsel, you can afford us the benefit of your
|
||
expertise in this realm.
|
||
|
||
What I find most troubling about your letter is your apparent
|
||
indifference to First Amendment law. A careful reading of the 1968
|
||
legislative history of 18 USC 2512 acquaints one with the fact that
|
||
Congress did not seek to abridge free press rights in proscribing the
|
||
advertising of "bugging" devices.
|
||
|
||
unknown." It continues to be Mr. Robert's persistent and pervasive
|
||
theme that for our democratic society to defeat the depredations of
|
||
privacy-invasive devices, it must know that they exist and how they
|
||
work.
|
||
|
||
Hence, attempts like yours to chill or impair free exercise of
|
||
expression in the arena of such public affairs can only be viewed as
|
||
inimical to the legislative underpinnings of the statute involved. You
|
||
use of it is akin to the drunkard's fondness for the lamppost: more
|
||
for support than illumination. Really, sir, for a lawyer to tell a
|
||
reporter that there's potential criminality involved in writing about
|
||
a product in the marketplace should make you tremble to know that God
|
||
is just.
|
||
|
||
The First Amendment, you seem to require reminding, is an absolute bar
|
||
to the imposition of such government restraints of the press as you
|
||
erroneously think your cited statute imports. The press must be free
|
||
to publish news, whatever the source, without censorship. Guarding
|
||
little secrets, like the existence of your "Triggerfish," at the
|
||
expense of an informed representative government is about as tawdry a
|
||
legal proposition as I can imagine.
|
||
|
||
Let me add that your menacing Full Disclosure's editor with the
|
||
prospect of criminal charges, in our opinion, implicates issues of
|
||
professional responsibility. When lawyers in jurisdictions with which
|
||
I am familiar try that technique to obtain an advantage in a civil
|
||
dispute, they are subject to discipline. Is there no such sanction for
|
||
Pennsylvania practitioners?
|
||
|
||
I invite your reply on the points raised, including your proposal as
|
||
to how we might avoid formal proceedings to right the wrong you have
|
||
done Full Disclosure. Failing your willingness to apologize or submit
|
||
this matter to an alternative dispute resolution mechanism for a
|
||
declaration of rights, I shall advise Full Disclosure to proceed with
|
||
an action under 28 USC 2201 as a possible predicate to seeking further
|
||
relief.
|
||
|
||
As a matter of professional courtesy, I wish to inform you that the
|
||
Harris Corp. officers and directors shown as recipients of copies of
|
||
this letter and its enclosure are not being sent a copy of your letter
|
||
to Mr. Roberts; it, I believe, more appropriately should reach them
|
||
from you. For your further information, the two other copy recipients
|
||
in addition to Mr. Roberts, namely, Messrs.. Ward and Rudnick, are,
|
||
respectively, our intellectual property adviser and our litigation
|
||
counsel. You doubtless know Mr. Ward from his prominence at the
|
||
trademark bar. Mr. Rudnick, who would handle a Rule 57 matter, if such
|
||
proves necessary, is a former federal prosecutor with the Los Angeles
|
||
Strike Force.
|
||
|
||
Sincerely, /s/ Will Dwyer II
|
||
|
||
Enclosure
|
||
|
||
Copies: Richard L. Ballantyne, Esq., Mr. John T. Hartley, Mr. Joseph Boyd,
|
||
Mr. Lester Coleman, Mr. Ralph D. Denunzio, Mr. C. Jackson Grayson, Jr.,
|
||
Mr. George I. Meisel, Mr. Walter Raab, Mr. Robert Cizik. Mr. Joseph
|
||
Dionne, Mr. Alexander Trowbrige, Mr. Allan J. Huber, Mr. Glen L. Roberts,
|
||
Marvin L. Rudnick, Esq., Thomas J. Ward, Esq.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.46
|
||
************************************
|
||
|
||
|