907 lines
42 KiB
Plaintext
907 lines
42 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Oct 17 1993 Volume 5 : Issue 81
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Eidtor: Etaoin Shrdlu, III
|
||
|
||
CONTENTS, #5.81 (Oct 17 1993)
|
||
File 1--Another BBS/Bombing Connection (Ill.)
|
||
File 2--BBS "Porn" Bust in Oklahoma - Another LE Misstep?
|
||
File 3--A Few Biblio Items (Paulsen, Encryption, & P. Zimmerman)
|
||
File 4--Fourth Annual HOHOCON
|
||
File 5--"Hacker" Documentary Proposed
|
||
File 6--CuNews
|
||
File 7--Student Pugwash Conference
|
||
File 8--Response to CuD 5.80 - Itar article
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
||
UNITED STATES:
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
||
ftp.eff.org (192.88.144.4) in /pub/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Thu, 14 Oct 1993 21:18:43 CDT
|
||
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
Subject: File 1--Another BBS/Bombing Connection (Ill.)
|
||
|
||
Another incident of an alleged BBS/bombing connection has occurred,
|
||
this time in Cook County (Illinois). WILLIAM PRESECKY, "6 Youth's
|
||
Hobby was Bombs, Police Say," (Chicago Tribute, 8 October, 1993:
|
||
Section 2,pp1, 4) summarizes six 15 and 16 year-old highschool
|
||
students' escapades in blowing up over 70 mailboxes in Lyons Township,
|
||
Ill., in Cook County near Chicago. The story begins:
|
||
|
||
Armed with potentially deadly materials and some
|
||
computer-generated know-how, six west suburban teenagers
|
||
allegedly formed the nucleus of a bomb-making club broken up
|
||
by authorities this week.
|
||
|
||
....
|
||
|
||
At least two of the suspected teens could be charged as
|
||
adults, pending a review of the juvenile petitions next week
|
||
by the Cook County state's attorney's office, authorities
|
||
said.
|
||
|
||
....
|
||
|
||
"These are A and students, honor roll students. They come
|
||
from well-to-do families," but appear to have no other
|
||
activities to keep themselves busy, according to ((a police
|
||
spokesperson)).
|
||
|
||
As many as 10 more teenagers from the same area are
|
||
suspected of being involved in the manufacture and
|
||
detonation of assorted homemade bombs that police said may
|
||
have damaged or destroyed as many as 70 mailboxes in the
|
||
west and southwest suburbs over the past several months,
|
||
according to ((a police spokesperson)).
|
||
|
||
....
|
||
|
||
A search of two of the teens' homes yielded a large cache of
|
||
bomb-making material, including pipes, chemicals, black
|
||
powder and detonating devices as well as eight to 10
|
||
partially made bombs. Also found were several ready-to-use
|
||
bombs that were rendered harmless by members of the Cook
|
||
County Bomb Squad and sent for analysis to the federal ATF's
|
||
laboratory in Maryland.
|
||
|
||
Also confiscated from one of the homes were three computer
|
||
didks containing recorded information that, despite its
|
||
disclaimers, ((the police spokesperson)) said could be used
|
||
to create an assortment of mayhem, with titles such as "22
|
||
Ways to Kill a Human Being With your Bare Hands." The disks
|
||
contained information on advanced bomb-making technology,
|
||
including the use of remote-control and time delay
|
||
detonation, ((the spokesperson)said.
|
||
|
||
Whether the teens accused of making and using the bombs
|
||
actually used the computer-generated information to
|
||
manfacture the devices isn't certain.
|
||
|
||
....
|
||
|
||
"It's a frightening thing that kids have this kind ov
|
||
access, that anyone with access to this kind of material
|
||
would be this irresponsible," said Burr Ridge Police Chief
|
||
Herbert Timm.
|
||
|
||
Chicago's Channel 2 tv, a CBS affiliate, also covered the story on
|
||
it's evening news. "The SHOCKING part of it is where they learned" the
|
||
information, intoned the story (original emphasis). In a substantial
|
||
(by news standards) segment, Channel 2 reporters interviewed what
|
||
appeared to be a computer store owner who claimed that most BBS sysops
|
||
are "kids from 8 to 14" and that there are even a few adults who run
|
||
BBSes. The reporters informed the audience that most "hackers" are
|
||
under 14, and that there are "thousands of BBSes in the Chicago area
|
||
and elsewhere." Although the intent to inform parents of their
|
||
responsibility in monitoring juveniles and instilling a social ethic
|
||
is laudable, the factual errors and superficial hyperbole are not.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 14 Oct 1993 18:22:21 CDT
|
||
From: CuD Moderators <jthomas@well.sf.ca.us>
|
||
Subject: File 2--BBS "Porn" Bust in Oklahoma - Another LE Misstep?
|
||
|
||
((MODERATORS' NOTE: A number of posters forwarded the following,
|
||
apparently originally posted on Usenet, to us. We have edited the
|
||
stories down to conform to "fair use."
|
||
|
||
++++
|
||
|
||
From The Dialy Oklahoman Newspaper, September 27, 1993, Page 1:
|
||
|
||
COMPUTER PORN CASE TRIGGERS LEGAL QUESTIONS
|
||
By David Zizzo, Staff Writer
|
||
|
||
Is talking to Anthony Davis hazardous to your health?
|
||
|
||
In a manner of speaking, that's what numerous people with computers and
|
||
modems apparently have been worrying about since late July. That's
|
||
when Oklahoma City police raided Davis' software publishing firm and
|
||
confiscated his sophisticated commercial computer bulletin board
|
||
system. Authorities allege Davis was selling pornographic computerized
|
||
materials on CD-ROM and through files downloaded over phone lines.
|
||
|
||
Names of everyone who signed onto Davis' bulletin board service, those
|
||
who downloaded or uploaded graphic files depicting sexual acts and
|
||
those who didn't are in the hands of investigators.
|
||
|
||
.....
|
||
|
||
The Davis bust sent a chill throughout the national computer community,
|
||
said Jack Rickard, editor and publisher of Boardwatch magazine, a
|
||
bulletin board newsletter published in Littleton, Colo. "It's causing
|
||
chaos," he said. Rickard said Oklahoma City is being viewed "a little
|
||
bit like clown city" in computer circles, since the explicit material
|
||
Davis offered can be purchased in nearly every computer magazine and is
|
||
carried by numerous bulletin boards. "This is off the shelf," he said.
|
||
"It's considered pretty mundane stuff."
|
||
|
||
.....
|
||
|
||
The bust will test Oklahoma laws on "community standards" regarding
|
||
pornography, said Mike Godwin, attorney for the Electronic Frontier
|
||
Foundation. The Washington, D.C., advocacy group is funded by donors
|
||
that include large software companies. "When you talk about community
|
||
standards, who's the real community?" Godwin wonders. "Is it the city
|
||
or ... the community of people on-line?"
|
||
|
||
Holmes, a former Cleveland County prosecutor, calls Oklahoma's
|
||
pornography law "an extremely broad statute." "I'm not sure it wouldn't
|
||
include Playboy or Penthouse type publications," he said.
|
||
|
||
.....
|
||
|
||
Critics also say police over reached in grabbing Davis' entire system,
|
||
shutting down his pay-for-play computer service, because of four CDs.
|
||
Prosecutors are seeking forfeiture of the system, which includes a 13
|
||
gigabyte memory unit and 10 high speed modems. "They don't have to
|
||
seize it any more than they have to seize the building when they
|
||
confiscate a bookstore," said Godwin of the Electronic Frontier
|
||
Foundation.
|
||
|
||
================================================
|
||
From Boardwatch Magazine / September, 1993. Under the byline of
|
||
Lance Rose:"BBS BURNINGS" in the Legally Online column, p. 62
|
||
================================================
|
||
|
||
OKLAHOMA BBS RAIDED ON PORNOGRAPHY CHARGES
|
||
|
||
The legal assault on bulletin boards continues this month with a raid
|
||
by Oklahoma City Police Department Vice Division on Tony Davis's
|
||
OKLAHOMA INFORMATION EXCHANGE BBS and his associated Mid-America
|
||
Digital Publishing Company.
|
||
|
||
About 4:00 PM on July 20, four officers of the Oklahoma City Police
|
||
Department arrived at the offices of Mid-America Digital Publishing
|
||
with a search warrant for "pornographic CD-ROMs." Davis was arrested
|
||
on suspicion of the sale and distribution of pornographic CD-ROM
|
||
disks. Of the 2000 CD ROM disks available on site, they confiscated
|
||
about 50 disks, and an estimated $75,000 worth of equipment Davis runs
|
||
his 10-line OKLAHOMA INFORMATION EXCHANGE BBS on. The equipment
|
||
including two computers with gigabyte hard drives, two Pioneer 6-disk
|
||
drives, four single CD ROM drives, 10 High Speed Hayes modems, Novell
|
||
network software and associated hardware, etc.
|
||
|
||
Apparently, an undercover agent had contacted Mid-America Digital
|
||
Publishing on two occasions and purchased CD-ROM disks containing
|
||
adult material from the company. At the raid, Davis cooperated with
|
||
the police showing them whatever they wanted to see, and even removing
|
||
four disks from CD-ROMS on the BBS machine and showing them to the
|
||
police. Curiously, these were standard off-the-shelf CD ROM
|
||
collections NOT published by Davis, including "Busty Babes", "For
|
||
Adults Only #2," "For Adults Only #3", and "Storm II". More
|
||
curiously, the police themselves put the disks BACK into the BBS in
|
||
order to video tape callers accessing the files on the disks.
|
||
|
||
......
|
||
|
||
Despite Davis' notification, none of the specific procedures required
|
||
by federal law (Privacy Protection Act) when serving search warrants
|
||
on publishers was followed, and no acknowledgement or even apparent
|
||
cognizance of the Electronic Communications Privacy Act made when
|
||
notified of the electronic mail for some 2000 BBS users available on
|
||
the system. OKLAHOMA INFORMATION EXCHANGE carries some 750 FidoNet
|
||
conferences, an additional 750 Usenet Newsgroups, and offers callers
|
||
private FidoNet mail and Internet mail and actually hubs mail for
|
||
other bulletin board systems as well.
|
||
|
||
......
|
||
|
||
All possible charges relate to Oklahoma State statutes against
|
||
obscenity. Located in the heart of the Bible Belt, this could be
|
||
serious. A penalty of up to $5000 and 5 years in prison per infraction
|
||
is possible. If you count each file on a CD-ROM as an infraction, Mr.
|
||
Davis could in theory be facing over a 100,000 years in jail and
|
||
nearly a $100 million in fines - another contrast between
|
||
technological reality and our legal system. From what we understand,
|
||
in Oklahoma, it is technically illegal to actually BE naked at any
|
||
time when not actually getting wet somehow, and some legal theorists
|
||
posit that HBO and Showtime cable television channels are actually
|
||
infractions under the state laws as written.
|
||
|
||
((MODERATORS' NOTE: BOARDWATCH Magazine, chalked full of information
|
||
and news, can be obtained for $36/year (12 issues) from:
|
||
Boardwatch Magazine / 8500 W. Bowles Ave. / Suite 210 / Littleton,
|
||
CO 80123)).
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 17 Oct 1993 17:22:11 CDT
|
||
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
||
Subject: File 3--A Few Biblio Items (Paulsen, Encryption, & P. Zimmerman)
|
||
|
||
--JULIAN DIBBELL'S "Code Warriors: Battling for the Keys to Privacy in
|
||
the Info Age," (The Village Voice, 28 July, 1993: pp 33-37) summarizes
|
||
the debates in encryption and privacy. It includes snippets from John
|
||
Gilmore, Tim May, and Eric Hughes, and cleanly and concisely explains
|
||
in simple (but not simplistic) lay terms the nature of the debates
|
||
underlying Clipper, Moby Crypto, and other issues in the encryption
|
||
wars.
|
||
|
||
--ERIC DEXHEIMER, in Denver Westord (Vol.17, #6, 29 Sept '93), "Secrets
|
||
gend: The Government wants to Breakhim,but Boulder's Prince of Privacy
|
||
remains Cryptic" summarizes the issues in the Phil Zimmerman/PGP
|
||
encryption controversy. The story inludes an indepth analysis and a
|
||
strong profile of Zimmerman (in CuD archives).
|
||
|
||
--JONATHAN LITTMAN, "The Last Hacker," in Los Angeles Times Magazine (p
|
||
18), 12 September, '93, focuses on Kevin Poulsen and his recent legal
|
||
problems.
|
||
While not unsympathetic to Paulsen, the story concludes:
|
||
|
||
Born in a time when hacking was an innocent rite of
|
||
boyhood, when laws were as unclear as the boundaries of the
|
||
Arpanet, Kevin Poulsen had outlived his era.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 12 Oct 93 2:46:47 CDT
|
||
From: Drunkfux <drunkfux@CYPHER.COM>
|
||
Subject: File 4--Fourth Annual HOHOCON
|
||
|
||
[Official Announcement / Call For Participation - October 11, 1993]
|
||
(Distribute Freely)
|
||
|
||
|
||
|
||
dFx, Phrack Magazine and cDc - Cult Of The Dead Cow proudly present :
|
||
|
||
The Fourth Annual
|
||
|
||
|
||
H O H O C O N
|
||
|
||
|
||
"Cliff Stoll My K0DEZ!@$#!"
|
||
|
||
|
||
Who: All Hackers, Journalists, Security Personnel, Federal Agents,
|
||
Lawyers, Authors, Cypherpunks, Virtual Realists, Modem Geeks,
|
||
Telco Employees, and Other Interested Parties.
|
||
|
||
|
||
Where: Austin North Hilton & Towers and Super 8 Motel
|
||
6000 Middle Fiskville Road
|
||
Austin, Texas 78752
|
||
U.S.A.
|
||
Hilton : (800) 347-0330 / (512) 451-5757
|
||
Super 8: (800) 800-8000 / (512) 467-8163
|
||
|
||
|
||
When: Friday December 17 through Sunday December 19, 1993
|
||
|
||
|
||
|
||
What is HoHoCon?
|
||
----------------
|
||
|
||
HoHoCon is the largest annual gathering of those in, related to, or
|
||
wishing to know more about the computer underground. Attendees
|
||
generally include some of the most notable members of the "hacking"
|
||
and "telecom" community, journalists, authors, security professionals,
|
||
lawyers, and a host of others. Previous speakers include John Draper
|
||
(Cap'n Crunch), Ray Kaplan, Chris Goggans (Erik Bloodaxe), Bruce
|
||
Sterling, and many more. The conference is also one of the very few
|
||
that is completely open to the public and we encourage anyone who is
|
||
interested to attend.
|
||
|
||
|
||
Hotel Information -----------------
|
||
|
||
The Austin North Hilton recently split its complex into two separate
|
||
hotels; the Hilton and the newly added Super 8. HoHoCon guests have
|
||
the choice of staying in either hotel. Group rates are as followed :
|
||
|
||
Super 8: Single - $46.50, Double - $49.50, Triple - $52.50, Quad -
|
||
$55.50 Hilton : Single - $69.00, Double - $79.00, Triple - $89.00,
|
||
Quad - $99.00
|
||
|
||
Once again, the hotel has set aside a block of rooms for the
|
||
conference and we recommend making your reservations as early as
|
||
possible to guarantee a room within the block, if not to just
|
||
guarantee a room period. Rooms for the handicapped are available upon
|
||
request. To make your reservations, call the the number listed above
|
||
that corresponds with where you are and where you want to stay and
|
||
make sure you tell them you are with the HoHoCon conference or else
|
||
you'll end up throwing more money away. The hotel accepts American
|
||
Express, Visa, Master Card, Discover, Diner's Club, and Carte Blanche
|
||
credit cards.
|
||
|
||
Check-in is 3:00 p.m. and check-out is 12:00 noon. Earlier check-in is
|
||
available if there are unoccupied rooms available. Please note that in
|
||
order for the hotel to hold a room past 6:00 p.m. on the date of
|
||
arrival, the individual reservation must be secured by a deposit or
|
||
guaranteed with one of the credit cards listed above. Also, any
|
||
cancellations of guaranteed reservations must be made prior to 6:00
|
||
p.m. on the date of arrival. You will be responsible for full payment
|
||
of any guaranteed reservations which are not cancelled by this time.
|
||
|
||
The hotel provides transportation to and from the airport and will give
|
||
you full information when you make your reservations.
|
||
|
||
|
||
Directions ----------
|
||
|
||
For those of you who will be driving to the conference, the following
|
||
is a list of directions provided by the hotel (so, if they're wrong,
|
||
don't blame me):
|
||
|
||
Dallas : Take IH 35 south to exit 238-B, the Houston exit. At the
|
||
first stop light, turn right on to 2222. Turn off of 2222
|
||
onto Clayton Lane (by the Greyhound Station). At the stop
|
||
sign, turn right onto Middle Fiskville, the hotel is on the
|
||
left.
|
||
|
||
San Antonio : Take IH 35 north to exit 238-B, the Houston exit. At the
|
||
second stop light, turn left onto 2222. Turn off 2222 onto
|
||
Clayton Lane (by the Greyhound Station). At the stop sign,
|
||
turn right onto Middle Fiskville, the hotel is on the left.
|
||
|
||
Houston (on 290) : Take 290 west into Austin. Exit off of 290 at the IH35
|
||
exit (do not get on 35). Stay on the access road
|
||
heading west, you will pass two stop lights. Turn off
|
||
the access road onto Clayton Lane (by the Greyhound
|
||
Station). At the stop sign, turn right onto Middle
|
||
Fiskville, the hotel is on the left.
|
||
|
||
Houston (on 71) : Take 71 west into Austin. Exit onto 183 north. Take
|
||
183 north to 290 west. Take 290 west to the IH 35 exit.
|
||
Exit off of 290 at the IH 35 exit (do not get on 35).
|
||
Stay on the access road heading west, you will pass two
|
||
stop lights. Turn off the access road onto Clayton Lane
|
||
(by the Greyhound Station). At the stop sign, turn
|
||
right onto Middle Fiskville, the hotel in on the left.
|
||
|
||
Airport : Exit the airport parking lot and turn right onto Manor Road.
|
||
Take Manor Road to Airport Boulevard and turn right. Take
|
||
Airport Boulevard to IH 35 north. Take IH 35 to exit 238-B. At
|
||
the second stop light, turn left onto 2222. Turn off of 2222
|
||
onto Clayton Lane (by the Greyhound Station). At the stop sign,
|
||
turn right onto Middle Fiskville, the hotel is on the left.
|
||
|
||
Call the hotel if these directions aren't complete enough or if you need
|
||
additional information.
|
||
|
||
|
||
Conference Details
|
||
__________________
|
||
|
||
HoHoCon will last 3 days, with the actual conference being held on
|
||
Saturday, December 18 starting at 11:00 a.m. and continuing until 5 p.m.
|
||
or earlier depending on the number of speakers. Although a few speakers
|
||
have confirmed their attendance, we are still in the planning stages and
|
||
will wait until the next update to release a speaking schedule. We welcome
|
||
any speaker or topic recommendations you might have (except for, say, "Why
|
||
I Luv Baked Potatoes On A Stik!"), or, if you would like to speak yourself,
|
||
please contact us as soon as possible and let us know who you are, who you
|
||
represent (if anyone), the topic you wish to speak on, a rough estimate of
|
||
how long you will need, and whether or not you will be needing any
|
||
audio-visual aids.
|
||
|
||
We would like to have people bring interesting items and videos again this
|
||
year. If you have anything you think people would enjoy having the chance
|
||
to see, please let us know ahead of time, and tell us if you will need any
|
||
help getting it to the conference. If all else fails, just bring it to the
|
||
con and give it to us when you arrive. Any organization or individual that
|
||
wants to bring flyers to distribute during the conference may do so. You
|
||
may also send your flyers to us ahead of time if you can not make it to
|
||
the conference and we will distribute them for you. Left over flyers are
|
||
included with information packets and orders that we send out, so if you
|
||
want to send extras, go ahead.
|
||
|
||
|
||
Cost
|
||
----
|
||
|
||
Unlike smaller, less informative conferences, we do not ask you to shell
|
||
out hundreds of dollars just to get in the door, nor do we take your money
|
||
and then make you sleep in a tent. We are maintaining the motto of "give
|
||
$5 if you can", but due to the incredibly high conference room rate this
|
||
year, we may step up to "$5 minimum required donation" or "give us $5 or
|
||
we'll smash your head in". Five dollars is an outrageously low price
|
||
compared to the suit infested industry conferences or even the new "Cons
|
||
are k00l and trendy, I gotta do one too!" conferences that are charging
|
||
up to $50 for admission alone.
|
||
|
||
To encourage people to donate, we will once again be having our wonderless
|
||
"Raffle For The Elite" during the conference. We will issue a prize list
|
||
in a future update, but we can guarantee that this year there will be a
|
||
lot more (and better) prizes than last year, including a full system (and,
|
||
no, it's not a c64 or 286). Anyone who wishes to donate worthwhile items
|
||
to the raffle, please let us know ahead of time, or if it's a last minute
|
||
acquirement, just bring it to the conference.
|
||
|
||
|
||
Miscellaneous Notes
|
||
-------------------
|
||
|
||
To save myself some time by mailing responses to a lot of the same
|
||
questions I expect to get, I'll answer a few of them here.
|
||
|
||
Although I have not talked to him myself yet, Steve Ryan has told me that
|
||
Bruce Sterling will indeed be in attendance and may say a few words.
|
||
|
||
As far as I know, there will not be any visitors from any other planets
|
||
at the conference. Scot Chasin is still on Earth and will be making an
|
||
appearance.
|
||
|
||
Video cameras will *not* be allowed inside the conference room without
|
||
prior consent due to previous agreements made with speakers who do not
|
||
wish for certain parts of their speech to be rebroadcast. Still cameras
|
||
and Etch-A-Sketch's are fine and tape recorders are too easily hidden
|
||
for us to be able to control.
|
||
|
||
Videos and T-Shirts from last year's conference are still available, and
|
||
will also be on hand during the conference. We do not handle the LoD World
|
||
Tour shirts, but I can tell you that that the old ones are gone and a
|
||
*new* LoD shirt will be unveiled at the conference. The HoHoCon shirts are
|
||
$15 plus $3 shipping ($4.00 for two shirts). At this time, they only come
|
||
in extra large. We may add additional sizes if there is a demand for them.
|
||
The front of the shirt has the following in a white strip across the
|
||
chest:
|
||
|
||
I LOVE FEDS
|
||
|
||
(Where LOVE = a red heart, very similar to the I LOVE NY logo)
|
||
|
||
|
||
And this on the back:
|
||
|
||
dFx & cDc Present
|
||
|
||
HOHOCON '92
|
||
|
||
December 18-20
|
||
Allen Park Inn
|
||
Houston, Texas
|
||
|
||
|
||
There is another version of the shirt available with the following:
|
||
|
||
I LOVE WAREZ
|
||
|
||
|
||
The video includes footage from all three days, is six hours long and
|
||
costs $18 plus $3 shipping ($4.00 if purchasing another item also). Please
|
||
note that if you are purchasing multiple items, you only need to pay one
|
||
shipping charge of $4.00, not a charge for each item. If you wish to send
|
||
an order in now, make all checks or money orders payable to O.I.S.,
|
||
include your phone number and mail it to the street address listed below.
|
||
Allow a few weeks for arrival.
|
||
|
||
There will be new HoHoCon '93 shirts available at the conference and a
|
||
video of the festivities will be out early next year.
|
||
|
||
|
||
Correspondence
|
||
--------------
|
||
|
||
If anyone requires any additional information, needs to ask any questions,
|
||
wants to RSVP, wants to order anything, or would like to be added to the
|
||
mailing list to receive the HoHoCon updates, you may mail us at:
|
||
|
||
|
||
hohocon@cypher.com
|
||
drunkfux@cypher.com
|
||
cDc@cypher.com
|
||
drunkfux@crimelab.com
|
||
dfx@nuchat.sccsi.com
|
||
drunkfux@5285 (WWIV Net)
|
||
|
||
or via sluggo mail at:
|
||
|
||
HoHoCon
|
||
1310 Tulane, Box 2
|
||
Houston, Texas
|
||
77008-4106
|
||
|
||
|
||
We also have a VMB which includes all the conference information and is
|
||
probably the fastest way to get updated reports. The number is:
|
||
|
||
713-867-9544
|
||
|
||
You can download any of the conference announcements and related
|
||
materials by calling Metalland Southwest at 713-468-5802, which is the
|
||
official HoHoCon BBS. The board is up 24 hours a day and all baud rates
|
||
are supported.
|
||
|
||
Those of you with net access can ftp to cypher.com and find all the
|
||
HoHoCon information available in /pub/hohocon. The .gifs from previous
|
||
cons are *not* currently online.
|
||
|
||
Conference information and updates will most likely also be found in most
|
||
computer underground related publications and mailing lists, including
|
||
CuD, CSP, Mondo 2000, 2600, Phrack, TUC, phn0rd, cypherpunks, etc. They
|
||
should also appear in a number of newsgroups including comp.dcom.telecom,
|
||
alt.security, comp.org.eff.talk, and sci.crypt. We completely encourage
|
||
people to use, reprint, and distribute any information in this file.
|
||
|
||
|
||
Same stupid ending statement from last year to make us look good
|
||
----------------------------------------------------------------
|
||
|
||
HoHoCon '93 will be a priceless learning experience for professionals
|
||
and gives journalists a chance to gather information and ideas direct
|
||
from the source. It is also one of the very few times when all the
|
||
members of the computer underground can come together for a realistic
|
||
purpose. We urge people not to miss out on an event of this caliber,
|
||
which doesn't happen very often. If you've ever wanted to meet some of
|
||
the most famous people from the hacking community, this may be your
|
||
one and only chance. Don't wait to read about it in all the magazines
|
||
and then wish you had been there, make your plans to attend now! Be a
|
||
part of what we hope to be our largest and greatest conference ever.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 27 Sep 93 21:36:59 -0700
|
||
From: annaliza@netcom.com (Annaliza T. Orquamada)
|
||
Subject: File 5--"Hacker" Documentary Proposed
|
||
|
||
((MODERATORS' NOTE: Annaliza Orquamada, a film-school graduate from
|
||
London, intends to challenge conventional media myths about "hackers"
|
||
in a proposed documentary. Below, we print a summary of her project.
|
||
We will post a substantial version in about a week. From our
|
||
conversations and e-mail interaction with her, we find her a highly
|
||
informed and competent observer and a refreshing change from most
|
||
conventional media folk)).
|
||
|
||
|
||
UNAUTHORIZED ACCESS ONLY
|
||
|
||
Computers are becoming an integral part of our everyday existence.
|
||
They are used to store a multitude of information, from credit reports
|
||
and bank withdrawals to personal letters and highly sensitive military
|
||
documents. So how secure are our computer systems?
|
||
|
||
The computer hacker is an expert at infiltrating secured systems, such
|
||
as those at AT&T, TRW, NASA and the DMV. Most computer systems that
|
||
have a telephone connection have been under siege at one time or
|
||
another, many without their owner's knowledge. The really good
|
||
hackers can re-route the telephone system, obtain highly sensitive
|
||
coporate and government documents, download individuals credit
|
||
reports, make free phone calls globally, read private electronic mail
|
||
and corporate bulletins and get away without ever leaving a trace.
|
||
|
||
So who are these hackers? Just exactly WHAT do they DO, and WHY do
|
||
they do it? Are they really a threat? What do they do with the
|
||
information they obtain? Are hackers simply playing an intellectual
|
||
game of chess or are hackers using technology to effectively take
|
||
control of corporate and government systems that have previously
|
||
appeared omnipotent?
|
||
|
||
Our group is in the course of filming "Unauthorized Access", a
|
||
documentary that will demystify the hype and propaganda surrounding
|
||
the computer hacker.
|
||
|
||
We will expose the truths of this sub-culture focusing on the hackers
|
||
themselves. This will be a view from inside the global underground.
|
||
We intend to shoot in the United States, Holland and Germany.
|
||
|
||
This documentary will be of the highest broadcast quality and is
|
||
intended for international television, festival and theatrical
|
||
distribution.
|
||
|
||
We are currently looking for additional financial backers interested
|
||
in this project. For more information about "Unauthorized Access" or
|
||
if you are intrested in providing any information or support, please
|
||
contact annaliza@netcom.com.
|
||
|
||
------------------------------
|
||
|
||
From: grmeyer@GENIE.GEIS.COM
|
||
Date: Sun, 10 Oct 93 22:32:00 BST
|
||
Subject: File 6--CuNews
|
||
|
||
Extortion at AT&T
|
||
=================
|
||
Two men, one a former computer support services employee at AT&T, have
|
||
pleaded guilty to conspiring to extort one million dollars from the
|
||
company. The US Attorney in Newark, NJ reports that Lou Pacich and
|
||
Richard Vignevic sent AT&T a tape-recorded message claiming sensitive
|
||
information about commercial accounts was being leaked to competitors.
|
||
The two offered to plug the leak in exchange for the money. To bolster
|
||
the claim they sent copies of account information on 4,000 AT&T
|
||
commercial customers. The information has been obtained, w/out
|
||
authorization, from AT&T computer systems. Each man faces 20 years and
|
||
$250,000 in fines.
|
||
(Information Week. Sept 20, 1993 pg8)
|
||
|
||
Piracy Around the Globe
|
||
=======================
|
||
The Oct 1993 issue of Technology Training reports on software piracy
|
||
in various countries. In Cuba, there is a National Software
|
||
Interchange Center where all types of software is available to any
|
||
Cuban at no charge. The estimated piracy rate in China and South
|
||
Korea is about 90%. Italy checks in at 80%.
|
||
(Information Week. Sept 20, 1993 pg62)
|
||
|
||
How do I love thee...
|
||
=====================
|
||
In "Hard Drives" (Los Angeles Times Magazine, Sept 12, 1993 pg26)
|
||
author James Fallows says that we value computers for the ways they
|
||
increase our efficiency and productivity. But we love them for the way
|
||
they undermine productivity (games, BBSing, etc) and satisfy our
|
||
craving for new possessions. Computers play on one of our basic needs,
|
||
the compulsion to figure something out and make it work.
|
||
(Information Week. Sept 20, 1993 pg62)
|
||
|
||
IW Security Survey Results
|
||
==========================
|
||
Information Week magazine and Ernst and Young conducted an extensive
|
||
security survey and found, to their surprise, that a _minority_ of
|
||
organizations polled considered security to be an important issue.
|
||
They also found that one in four companies had last money over last
|
||
two years due to security breaches in their networks. Most
|
||
organizations don't even have full time security staffs. CuD
|
||
encourages you to refer to "Tempting Fate", pgs42-52, October 4, 1993
|
||
for complete details.
|
||
|
||
P&G Consultant Indicted
|
||
=======================
|
||
A Procter & Gamble consultant, Matthew Daughtery, has been charged
|
||
with three felony counts for using P&G computers to access a company
|
||
bulletin board without authorization. The BBS is identified as
|
||
"Regulatory and Clinical Development Network". Ohio prosecutors have
|
||
not said what information Daughtery could have obtained from the
|
||
system.
|
||
(Information Week. pg8. Oct 4, 1993)
|
||
|
||
Consumer Privacy Survey ======================= A Harris poll,
|
||
sponsored by the non-profit Center for Social and Legal Research
|
||
(Washington, DC), found that 53% OF American adults are very concerned
|
||
about threats to their privacy from corporations. This is a
|
||
substantial increase over results in previous years. Respondents were
|
||
most concerned about financial services and health industries (72%),
|
||
with mail-order consumer goods businesses rating 48%. For complete
|
||
results refer to the Privacy & American Business newsletter. For more
|
||
summary information refer to Information Week, pg58, Oct 4, 1993.
|
||
|
||
Internet Access in NJ
|
||
=====================
|
||
New Jersey Bell and Bellcore are sponsoring a two-year experiment to
|
||
allow people free access to the Internet in three dozen public
|
||
libraries in the Garden State. Anyone with a modem can also tap into
|
||
portions of the Internet from home by calling the project's dial-up at
|
||
(201) 989-5999. Plans are in the works to have fiber-optic cable
|
||
installed in every home and business throughout NJ by 2010. Officials
|
||
will monitor this experiment to see how pedestrians interact with the
|
||
worldwide network and hope the project will become a model for the
|
||
nation.
|
||
(Communications of the ACM, pg11, Oct 1993. Reprinted with permission)
|
||
|
||
Sex and Violence Nipper Chip
|
||
============================
|
||
For as little as $5 parents may soon be able to implement a computer
|
||
chip in televisions to monitor programs their children watch. With the
|
||
growing concern over TV sex and violence comes the debate whether
|
||
"lock out" technologies are the solution. Under pressure from
|
||
Congress, networks and stations may eventually be forced to rate shows
|
||
-- "V" for violence, "N" for nudity, for instance -- and broadcast a
|
||
code along with the show which could then be read by the "V-chip"
|
||
installed in the set or cable box. The same technology is already used
|
||
for broadcasting closed captioned information for the hearing impaired
|
||
and will be used to transmit and display information such as the title
|
||
and time remaining of shows in progress. Broadcasters and program
|
||
producers are no fans of this idea, arguing the technology will take
|
||
away viewers and frighten advertisers. (Communications of the ACM,
|
||
pg12, Oct 1993. Reprinted with permission)
|
||
|
||
Nightline on Security/Privacy?
|
||
==============================
|
||
According to James Daly ("Security Watch") the folks at NBC's
|
||
Nightline have been talking to folks in the computer security industry
|
||
over the past few weeks. A show on security/privacy can't be far
|
||
behind. Keep an eye out for it.
|
||
(Computerworld, pg56, Oct 4, 1993.)
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 15 Oct 1993 01:45:35 EDT
|
||
From: Nikki Draper <draper@EUPHRATES.STANFORD.EDU>
|
||
Subject: File 7--Student Pugwash Conference
|
||
|
||
ANNOUNCING: Student Pugwash USA's Eight International Conference
|
||
|
||
"SCIENCE AND TECHNOLOGY FOR THE 21ST CENTURY
|
||
MEETING THE NEEDS OF THE GLOBAL COMMUNITY"
|
||
|
||
JOIN: 100 talented students from over 25 countries to meet with
|
||
accomplished professionals from science, government, industry,
|
||
non-governmental organizations, and academe for a week-long
|
||
educational forum to explore the impacts of technology on society and
|
||
world affairs.
|
||
|
||
TOPICS:
|
||
* Resource Stewardship for Environmental Sustainability
|
||
* Preventive Diplomacy and Conflict Resolution for a Secure Future
|
||
* The Social Costs and Medical Benefits of Human Genetic Information
|
||
* Overcoming Barriers to Health Care Education and Delivery
|
||
* Designing the Future--From Corporations to Communities
|
||
* Communications and Information Technologies
|
||
|
||
ELIGIBILITY: ALL students (undergraduate, graduate and professional)
|
||
from any and all disciplines. Student Pugwash USA encourages
|
||
participation that represents a diversity of race, age, gender, sexual
|
||
orientation, and national origin.
|
||
|
||
APPLICATION INFORMATION:Participants will be chosen through a
|
||
competitive, merit-based application process based, in part, upon
|
||
applicants' submission of a brief 'issue paper' on one of the topics
|
||
listed above. For an application or additional information, please
|
||
CONTACT: Nicky Short Student Pugwash USA 1638 R Street NW, Suite 32
|
||
Washington, D.C., 20009 phone:(202) 328-6555 email:uspugwash@igc.org
|
||
|
||
PRELIMINARY APPLICATION DEADLINE: December 15, 1993
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 14 Oct 93 04:55:32 PDT
|
||
From: Fredrick B. Cohen <fc@JUPITER.SAIC.COM>
|
||
Subject: File 8--Response to CuD 5.80 - Itar article
|
||
|
||
((MODERATORS' NOTE: The following post was originally less than 25
|
||
percent substance, the remainder cascading citations and headers. At
|
||
the poster's request, we edited out the superfluous citing while
|
||
leaving the poster's comments intact.
|
||
|
||
We remind readers that CuD is *not* a Usenet discussion group in which
|
||
cascades are accepted)).
|
||
|
||
++++
|
||
|
||
In CuD 5.80, bjones@WEBER.UCSD.EDU(Bruce Jones) writes:
|
||
|
||
> Please note that the posting site for Mr. Cohen's message is
|
||
> the Science Applications International Corporation, a La Jolla
|
||
> California based think tank that has deep ties to the U.S. Gov't and
|
||
> does lots of work for the DoD. Given his ties to the DoD, it comes
|
||
> as small surprise that he was able to get export permission for his
|
||
> RSA cryptosystem.
|
||
|
||
Wrongo - This application was made by ASP, my company (then) in
|
||
Pittsburgh, PA and with no government contracts whatsoever. This is a
|
||
typical assumptive response from someone who doesn't understand that
|
||
poor people like me get access to computers by the grace of others.
|
||
Perhaps you think I was previously a professor at Duquesne University,
|
||
and before that an employee of the NSA, and before that an employee of
|
||
wherever my previous mail account came from. This kind of response
|
||
from someone who appears from his mailing address to be from a person
|
||
at a major university who is almost certainly getting government
|
||
grants is certainly the pot calling the kettle black.
|
||
|
||
> Why should a software manufacturer or a private citizen have to ask
|
||
> permission in the first place, from the DoD (operating under the
|
||
> guise of the Dept of Commerce) to export software that uses
|
||
> encryption algorithms freely available in the country to which the
|
||
> product is being exported?
|
||
|
||
Interesting question, and one that I have asked, but then why should I
|
||
need any permission from the government for anything? Perhaps I
|
||
shouldn't, but the fact is, they have the power, and if you work
|
||
within the structure, you may find that it is not as oppressive as you
|
||
thought.
|
||
|
||
> >IBM has been exporting DES for quite a few years according to sources
|
||
> >I have in EC who have seen IBM chips with DES on them in EC computers.
|
||
> >I believe they simply asked for permission and got it.
|
||
|
||
> Again, it's likely quite simple for someone who does business with
|
||
> the DoD and the U.S. Gov't to get permission to export.
|
||
|
||
The point is that even ASP, a tiny company with no government ties got
|
||
permission by simply following the rules. Should IBM be treated
|
||
unfairly?
|
||
|
||
> >I applaud the EFF for helping defend people in this area, but maybe if
|
||
> >they tried to work within the law in the first place, they would have
|
||
> >found it was easier to obey the law than break it.
|
||
>
|
||
> Serious charges without foundation. Whom within the EFF has been
|
||
> accused of breaking the law?
|
||
|
||
Try reading more closely. The EFF is defending those who may have
|
||
broken the law. Sorry if I mixed my pronouns, I am a human being.
|
||
|
||
> >Maybe if they apply now, they will end up with a no-case (assuming
|
||
> >they get permission).
|
||
>
|
||
> A dodge of the issue, which is not about whether or not one can get
|
||
> permission to do something specific, but whether or not the
|
||
> government has a right to require permission in the first place.
|
||
|
||
The government certainly has the right to require it, but perhaps it
|
||
won't have that right as a result of the PGP case. The issue is that
|
||
if they didn't want to go to federal court, why were they trying to
|
||
play it so close to the edge? If I walk up to you and swing a
|
||
baseball bat within a few inches of your head, are you going to ignore
|
||
me because I didn't hit you?
|
||
|
||
> One of the founding tenets of the Unites States of America is the
|
||
> idea that its citizens may do whatever they like, so long as their
|
||
> chosen activity is not proscribed by law and doesn't violate the
|
||
> rights of their neighbors. The opposite is ostensibly true for
|
||
> the government, which may only do what has been permitted it under
|
||
> the law. We live in a society where those distinctions apparently
|
||
> collapsed some time ago.
|
||
|
||
Where does the constitution say this? I agree that I would prefer it that
|
||
way, but I don't think there is any basis in law for your statement.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #581
|
||
************************************
|
||
|
||
|