910 lines
41 KiB
Plaintext
910 lines
41 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Nov 21 1993 Volume 5 : Issue 88
|
||
ISSN 1004-042X
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Ian Dickinson
|
||
Copy Editor: Etaoin Shrdlu, III
|
||
|
||
CONTENTS, #5.88 (Nov 21 1993)
|
||
File 1--Michael Elansky ("Ionizer") Sentenced / Saga ends
|
||
File 2--Electronic Bill Of Rights and Responsibilities
|
||
File 3--Student sues to regain Internet access
|
||
File 4--Toll Fraud on French PBXs--Phreaking
|
||
File 5--Brendan Kehoe
|
||
File 6--Advertise your skills!
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
||
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
the PC Telecom forum under "computing newsletters;"
|
||
On Delphi in the General Discussion database of the Internet SIG;
|
||
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
||
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
||
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
||
nodes and points welcome.
|
||
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
||
In ITALY: Bits against the Empire BBS: +39-461-980493
|
||
|
||
ANONYMOUS FTP SITES:
|
||
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
||
EUROPE: ftp.funet.fi in pub/doc/cud. (Finland)
|
||
UNITED STATES:
|
||
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
||
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
||
ftp.eff.org (192.88.144.4) in /pub/cud
|
||
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
||
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
||
KOREA: ftp: cair.kaist.ac.kr in /doc/eff/cud
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Authors hold a presumptive copyright, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Sun, 21 Nov 1993 14:12:31 EST
|
||
From: Sue D'Onym <sdo@anon.omous.com>
|
||
Subject: File 1--Michael Elansky ("Ionizer") Sentenced / Saga ends
|
||
|
||
((MODERATORS' NOTE: The Elansky case has ended. Michael Elansky was
|
||
sentenced to 28 months in prison, which--with "good time" and credit
|
||
for time served--should make him eligible for release under
|
||
Connecticut law in about 10 months. The charges relating to First
|
||
Amendment issues that bothered many of us were not pursued by the
|
||
prosecution, perhaps in part because of the incisive and accurate
|
||
reporting by John Moran of the Hartford Courant. Moran's work
|
||
established him as one of the rare media reporters whose knowledge of
|
||
computers and related issues gives them considerable credibility.
|
||
Thanks to the Connecticut readers who sent over the edited story)).
|
||
|
||
SOURCE: Hartford Courant (Nov. 20, 1993)
|
||
By: John M. Moran, Courant Staff Writer
|
||
|
||
Michael Elansky's volatile mixture of computers and pyrotechnics
|
||
backfired Friday when a Superior Court judge sentenced him to 28
|
||
months in prison.
|
||
|
||
Judge Thomas P. Miano said Elansky, a 21-year-old West Hartford
|
||
resident, remains dangerous because he still hasn't curbed his impulse
|
||
to dabble in explosives.
|
||
|
||
"You've got to accept responsibility for what you do, it's that
|
||
simple," Miano said.
|
||
|
||
Elansky has been jailed at Hartford Correctional Center since
|
||
August on charges of illegally maintaining bomb-making instructions on
|
||
his computer bulletin board.
|
||
|
||
At the time, he also was facing other charges, including conspiracy
|
||
to commit burglary and two counts of violating his probation. Bail was
|
||
set at $500,000, which Elansky could not meet.
|
||
|
||
((The article explains that Elansky pled guilty in October, agreeing
|
||
to terms that included no more than three years in prison, and that
|
||
prosecution and defense attorneys have spend the last few weeks
|
||
debating the final sentence)).
|
||
|
||
In recent weeks, friends and family testified that Elansky was
|
||
interested in odd topics, but that he was not dangerous or
|
||
destructive. Prosecution witnesses, however, painted a far different
|
||
picture of a man they said repeatedly broke the law while
|
||
experimenting with explosives.
|
||
|
||
In reaching his decision, Miano said he was troubled by evidence
|
||
that Elansky had lied to police, to the court, to his parents and to
|
||
others. But Miano also was disturbed at the prospect of sending to
|
||
prison someone who had the potential to straighten out his life.
|
||
|
||
"I can candidly say... that I have agonized more over this matter
|
||
than any other matter that I can remember," the judge said.
|
||
|
||
((The article explains that the judge decided on imprisonment
|
||
and long probation as necessary for Elansky to "change his ways."))
|
||
|
||
On both probation violations, Elansky was sentenced to 28 months in
|
||
prison and probation for five years. Conditions of his probation
|
||
include the following:
|
||
|
||
* A ban on Elansky allowing anyone under 18 years old to use
|
||
his computer bulletin board, which was known as "The Ware
|
||
House."
|
||
|
||
* A ban on Elansky, whose computer nickname is the
|
||
"Ionizer," placing pyrotechnic information or another other
|
||
harmful information on his bulletin board.
|
||
|
||
* A requirement that a probation officer have complete
|
||
freedom to search Elansky's computer system to ensure the
|
||
requirements have not been violated.
|
||
|
||
* Evaluation by a mental health counselor.
|
||
|
||
* 100 hours of community service for each year on probation.
|
||
|
||
Throughout the sentencing, a pale and thin Elansky stood silently
|
||
at the defense table. His father, David Elansky, and grandmother,
|
||
Debra Elansky, sat behind him in the courtroom.
|
||
|
||
"I know you're not happy with it," Miano told Elansky after the
|
||
sentence was pronounced. "I know you expected to walk out with your
|
||
parents. No more."
|
||
|
||
The conspiracy to commit burglary charges and the charges relating
|
||
to bomb-making instructions on the computer bulletin board were not
|
||
pursued.
|
||
|
||
Elansky will almost certainly get credit for the 3 1/2 months he's
|
||
already served in jail. In addition, he will be able to apply for
|
||
parole after he has served half of the prison term.
|
||
|
||
was surprised and disappointed by the sentencing. "It's not going to
|
||
make him a better person by keeping him in jail," he said.
|
||
|
||
Brown, the defense attorney, said he had asked for a lesser
|
||
sentence, but respected the judge's treatment of the case.
|
||
|
||
"It was obvious to me that the judge certainly spent a great deal
|
||
of time on this case, which is all a defendant can really ask for," he
|
||
said.
|
||
((The article concludes by summarizing the disappointment that the
|
||
parents and defense attorney expressed)).
|
||
|
||
------------------------------
|
||
|
||
Date: 12 Nov 1993 16:34:28 U
|
||
From: "Anne" <harwell@BANDW.PANAM.EDU>
|
||
Subject: File 2--Electronic Bill Of Rights and Responsibilities
|
||
|
||
[I'm forwarding this to CuD with the permission of Frank Connolly of
|
||
The American University. Information on how to contact him is at the
|
||
end of this document.
|
||
-abh]
|
||
|
||
++++++++++++++++++
|
||
The following document might be of interest to members of the Computer
|
||
Underground Digest. Called the Bill of Rights and Responsibilities
|
||
for Electronic Learners, it is a model policy statement regarding the
|
||
rights and responsibilities of individuals and institutions regarding
|
||
computers and electronic networks in education. Although the project
|
||
was begun as part of EDUCOM, it is now an initiative of the American
|
||
Association of Higher Education (AAHE).
|
||
|
||
Your comments and suggestions for gaining consideration and discussion
|
||
of the Bill on campuses, in school districts and professional forums
|
||
would be appreciated.
|
||
|
||
To retrieve the text via ftp do the following:
|
||
|
||
1. FTP to ftp.american.edu
|
||
2. Give your id as . . . . . . anonymous
|
||
3. As your password use . . . your email address
|
||
Once accepted to the system,
|
||
4. Change directories by entering cd au
|
||
5. To retrieve the file type get brrec.text
|
||
|
||
=============== TEXT OF BILL FOLLOWS ===========================
|
||
|
||
|
||
PREAMBLE
|
||
|
||
In order to protect the rights and recognize the responsibilities of
|
||
individuals and institutions, we, the members of the educational
|
||
community, propose this Bill of Rights and Responsibilities for the
|
||
Electronic Community of Learners. These principles are based on a
|
||
recognition that the electronic community is a complex subsystem of
|
||
the educational community founded on the values espoused by that
|
||
community. As new technology modifies the system and further empowers
|
||
individuals, new values and responsibilities will change this culture.
|
||
As technology assumes an integral role in education and lifelong
|
||
learning, technological empowerment of individuals and organizations
|
||
becomes a requirement and right for students, faculty, staff, and
|
||
institutions, bringing with it new levels of responsibility that
|
||
individuals and institutions have to themselves and to other members
|
||
of the educational community.
|
||
|
||
|
||
ARTICLE I: INDIVIDUAL RIGHTS
|
||
|
||
The original Bill of Rights explicitly recognized that all individuals
|
||
have certain fundamental rights as members of the national community.
|
||
In the same way, the citizens of the electronic community of learners
|
||
have fundamental rights that empower them.
|
||
|
||
Section 1.
|
||
A citizen's access to computing and information resources shall
|
||
not be denied or removed without just cause.
|
||
|
||
Section 2.
|
||
The right to access includes the right to appropriate training and
|
||
tools required to effect access.
|
||
|
||
Section 3.
|
||
All citizens shall have the right to be informed about personal
|
||
information that is being and has been collected about them, and
|
||
have the right to review and correct that information,. Personal
|
||
information about a citizen shall not be used for other than the
|
||
expressed purpose of its collection without the explicit
|
||
permission of that citizen.
|
||
|
||
Section 4.
|
||
The constitutional concept of freedom of speech applies to
|
||
citizens of electronic communities.
|
||
|
||
Section 5.
|
||
All citizens of the electronic community of learners have
|
||
ownership rights over their own intellectual works.
|
||
|
||
|
||
ARTICLE II: INDIVIDUAL RESPONSIBILITIES
|
||
|
||
Just as certain rights are given to each citizen of the electronic
|
||
community of learners, each citizen is held accountable for his
|
||
or her actions. The interplay of rights and responsibilities
|
||
within each individual and within the community engenders
|
||
the trust and intellectual freedom that form the heart of our
|
||
society. This trust and freedom are grounded on each person's
|
||
developing the skills necessary to be an active and contributing
|
||
citizen of the electronic community. These skills include an
|
||
awareness and knowledge about information technology and
|
||
the uses of information and an understanding of the roles in the
|
||
electronic community of learners.
|
||
|
||
Section 1.
|
||
It shall be each citizen's personal responsibility to actively
|
||
pursue needed resources: to recognize when information is
|
||
needed, and to be able to find, evaluate, and effectively use
|
||
information.
|
||
|
||
Section 2.
|
||
It shall be each citizen's personal responsibility to recognize
|
||
(attribute) and honor the intellectual property of others.
|
||
|
||
Section 3.
|
||
Since the electronic community of learners is based upon the
|
||
integrity and authenticity of information, it shall be each
|
||
citizen's personal responsibility to be aware of the potential for
|
||
and possible effects of manipulating electronic information: to
|
||
understand the fungible nature of electronic information; and to
|
||
verify the integrity and authenticity, and assure the security of
|
||
information that he or she compiles or uses.
|
||
|
||
Section 4.
|
||
Each citizen, as a member of the electronic community of
|
||
learners, is responsible to all other citizens in that community:
|
||
to respect and value the rights of privacy for all; to recognize and
|
||
respect the diversity of the population and opinion in the
|
||
community; to behave ethically; and to comply with legal
|
||
restrictions regarding the use of information resources.
|
||
|
||
Section 5.
|
||
Each citizen, as a member of the electronic community of
|
||
learners, is responsible to the community as a whole to
|
||
understand what information technology resources are
|
||
available, to recognize that the members of the community
|
||
share them, and to refrain from acts that waste resources or
|
||
prevent others from using them.
|
||
|
||
|
||
ARTICLE III: RIGHTS OF EDUCATIONAL INSTITUTIONS
|
||
|
||
Educational institutions have legal standing similar to that of
|
||
individuals. Our society depends upon educational institutions
|
||
to educate our citizens and advance the development of
|
||
knowledge. However, in order to survive, educational
|
||
institutions must attract financial and human resources.
|
||
Therefore, society must grant these institutions the rights to the
|
||
electronic resources and information necessary to accomplish
|
||
their goals.
|
||
|
||
Section 1.
|
||
The access of an educational institutions to computing and
|
||
information resources shall not be denied or removed without
|
||
just cause.
|
||
|
||
Section 2.
|
||
Educational institutions in the electronic community of learners
|
||
have ownership rights over the intellectual works they create.
|
||
|
||
Section 3.
|
||
Each educational institution has the authority to allocate
|
||
resources in accordance with its unique institutional mission.
|
||
|
||
|
||
ARTICLE IV: INSTITUTIONAL RESPONSIBILITIES
|
||
|
||
Just as certain rights are assured to educational institutions in
|
||
the electronic community of learners, so too each is held
|
||
accountable for the appropriate exercise of those rights to foster
|
||
the values of society and to carry out each institution's mission.
|
||
This interplay of rights and responsibilities within the
|
||
community fosters the creation and maintenance of an
|
||
environment wherein trust and intellectual freedom are the
|
||
foundation for individual and institutional growth and success.
|
||
|
||
Section 1.
|
||
The institutional members of the electronic community of
|
||
learners have a responsibility to provide all members of their
|
||
community with legally acquired computer resources (hardware,
|
||
software, networks, data bases, etc.) in all instances where access
|
||
to or use of the resources is an integral part of active
|
||
participation in the electronic community of learners.
|
||
|
||
Section 2.
|
||
Institutions have a responsibility to develop, implement, and
|
||
maintain security procedures to insure the integrity of
|
||
individual and institutional files.
|
||
|
||
Section 3.
|
||
The institution shall treat electronically stored information as
|
||
confidential. The institution shall treat all personal files as
|
||
confidential, examining or disclosing the contents only when
|
||
authorized by the owner of the information, approved by the
|
||
appropriate institutional official, or required by local, state or
|
||
federal law.
|
||
|
||
Section 4.
|
||
Institutions in the electronic community of learners shall train
|
||
and support faculty, staff, and students to effectively use
|
||
information technology. Training includes skills to use the
|
||
resources, to be aware of the existence of data repositories and
|
||
techniques for using them, and to understand the ethical and
|
||
legal uses of the resources.
|
||
|
||
August, 1993
|
||
|
||
* Frank Connolly The American University *
|
||
* FRANK@American.EDU 119 Clark Hall *
|
||
* (202) 885-3164 Washington, D.C 20016 *
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 14 Nov 93 10:51:37 CST
|
||
From: peterson@ZGNEWS.LONESTAR.ORG(Bob Peterson)
|
||
Subject: File 3--Student sues to regain Internet access
|
||
|
||
The August 17, 1993 (Volume 5, Issue 62) issue of CuD contained a
|
||
brief mention of Microsoft's termination of Mr. Gregory Steshenko,
|
||
apparently due to political statements he made in newsgroups and email.
|
||
Today's Dallas Morning News (Nov. 14, 1993: Vol. 145, No. 45) published
|
||
a front page article, with a jump to an interior page dedicated to the
|
||
story, describing Gregory Steshenko's encounter with the University of
|
||
Texas at Dallas over essentially the same issue.
|
||
|
||
Below I quote from the article. I enclosed my summarizations in
|
||
square brackets. A sidebar on the interior page describes, at a high
|
||
level, how messages flow in the Internet. (I didn't include anything
|
||
from that sidebar.)
|
||
|
||
Free-speech suit focuses on E-mail
|
||
Emigre at UTD lost access to network
|
||
|
||
By Tom Steinert-Threlkeld
|
||
Staff Writer of The Dallas Morning News
|
||
|
||
Gregory N. Steshenko is not sure freedom of expression will survive
|
||
the digital age in the Western world.
|
||
|
||
Twice in the last five months, authorities in the United States have
|
||
pulled the plug on his comments on Ukrainian and Russian politics that
|
||
he has posted on the Internet, a network of computer networks that
|
||
spans the globe.
|
||
|
||
In June, he was fired from Microsoft Corp. after the big supplier of
|
||
personal computer software fielded dozens of complaints that his
|
||
messages were offensive and even obscene.
|
||
|
||
In October, he was disconnected again from the Internet by the
|
||
University of Texas at Dallas, where he is a graduate student in
|
||
electrical engineering.
|
||
|
||
[Note: One of Microsoft's regional telephone support centers is
|
||
located in the Dallas area, so Gregory probably didn't move after
|
||
leaving Microsoft. -BP)
|
||
|
||
The university withdrew his privileges after a barrage of complaints,
|
||
saying his electronic messages strayed from any possible educational
|
||
purposes. Mr. Steshenko has countered with a lawsuit that seeks $2
|
||
million for damages to his career.
|
||
|
||
[Here the article jumps to page 28A, with the headline _Student sues
|
||
UTD over access to computer network_. -BP)
|
||
|
||
[... Steshenko asserts this is a First Amendment issue. -BP]
|
||
|
||
The university says the matter is more basic. Mr. Steshenko simply
|
||
did not follow its rules, which limit use of the Internet to exchanges
|
||
related to coursework.
|
||
|
||
+++
|
||
|
||
"What makes it unique is that we're talking about a brand new
|
||
medium," said Shari Steele, counsel for the Electronic Frontier
|
||
Foundation, a group that tries to protect the freedom of individuals
|
||
who communicate by computer.
|
||
|
||
She and other legal experts say that government-funded institutions,
|
||
such as UTD, can't infringe First Amendment rights, even in electronic
|
||
forums.
|
||
|
||
[... Omitted text describing the school's position that they have the
|
||
right to control how their facilities are used, the absence of relevant
|
||
court rulings, the issue of permissible language in newsgroups, and the
|
||
general anarchy of newsgroups.]
|
||
|
||
Mr. Steshenko also retaliates against "denunciators." He has sent
|
||
copies of what he says are personal attacks by on-line adversaries to
|
||
the chief executive officers of their employers, such large industrial
|
||
companies as Bell Communications Research Inc. and WilTel Inc.
|
||
|
||
"I can take a lot in stride, but if someone sends a posting to the
|
||
CEO of Bellcore (threatening) a lawsuit about me calling (him) a fool
|
||
and it has implications with my position here at the company, then I'm
|
||
going to get a little bit upset," said Andre Stynyk, a systems engineer
|
||
at Bell Communications Research Inc., the research arm of regional Bell
|
||
telephone companies.
|
||
|
||
Mr. Stynyk responded by complaining to UTD. The university won't
|
||
acknowledge the sources of the complaints it received.
|
||
|
||
"Let's just say he (Mr. Steshenko) was not following the rules and we
|
||
received complaints from the outside. After review, we determined that
|
||
he should not have the privileges anymore," said UTD president Robert
|
||
H. Rutford.
|
||
|
||
"The rules," in this case are not those of the Internet, but those of
|
||
UTD. Like other universities, UTD becomes part of the Internet by
|
||
allowing outsiders into its computers and paying for the maintenance of
|
||
its on-campus computing and communications network.
|
||
|
||
When it allows students access to the Internet, the university
|
||
requires them to sign an agreement that they only use the resources of
|
||
the Internet for instructional, research or administrative purposes.
|
||
|
||
[... The article quotes (acting executive director of the Internet
|
||
Society) Howard Funk's assertion that the university can control how
|
||
its facilities are used. Mr. Steshenko, in turn, asserts the
|
||
university's interpretation of "instructional" is too narrow. -BP]
|
||
|
||
In hallways, classrooms and dormitories, for instance, students are
|
||
not limited to talking only about the classes they sign up for, notes
|
||
Marc Rotenberg, director of the Washington office of the Computer
|
||
Professionals for Social Responsibility.
|
||
|
||
"It's a little bit like taking a classroom for a club meeting after
|
||
classes end. Maybe the university doesn't want you doing that," but it
|
||
may be hard to say students can't.
|
||
|
||
This could make the Steshenko case "a good test of free speech on
|
||
computer networks," he and Ms. Steele said, because the university not
|
||
only is an academic institution, but receives funding from state
|
||
government.
|
||
|
||
[... Comments about current case law extending prohibitions on laws
|
||
abridging free expression to "government-run institutions" and how the
|
||
Steshenko case may expand the prohibition to electronic exchanges of
|
||
ideas. The article then describes the self-regulation of Usenet,
|
||
Compuserve, mailing lists, et al.]
|
||
|
||
The Internet Society's Mr. Funk, for instance, says Mr. Steshenko
|
||
would have avoided trouble at Microsoft and the university if he had
|
||
only used a personal account to access the Internet. But Mr. Steshenko
|
||
rejects that as costly and says the primary issue is the exercise of
|
||
First Amendment privileges at a state-run institution.
|
||
|
||
Regardless, cooler commentary may be inevitable. Mr. Stynyk, the
|
||
Bell systems engineer, believes that arguments on the Internet will
|
||
have to take on more "politically correct" terminology, as millions of
|
||
new, nontechnical subscribers log in to the Internet.
|
||
|
||
But Houston environmental scientist Larisa Streeter, whose husband's
|
||
employer was also contacted by Mr. Steshenko, says the Dallas site's
|
||
discourse does not "have anything to do with political correctness at
|
||
all. It has to do with civil discussion."
|
||
|
||
She draws the analogy to allowing a member of the Ku Klux Klan to
|
||
participate in a forum on African-American affairs.
|
||
|
||
"It's fine. You can have the Klan member there listening and
|
||
participating and having a discussion," she said. But, Ms. Streeter
|
||
says, limits should be set if racial epithets start flying because
|
||
nothing is added to the discussion.
|
||
|
||
Ultimately, canceling access to the Internet altogether is seen by
|
||
Mr. Steshenko as an unfair abrogation of his rights as a student.
|
||
|
||
He maintains that other students using their Internet accounts can
|
||
join "news groups" that discuss anything from events in Haiti to sex.
|
||
If he is cut off from talking about Russia and Ukraine, he feels other
|
||
students shouldn't be permitted to participate in forums not related to
|
||
their coursework.
|
||
|
||
While the university does have a right to provide resources only for
|
||
particular purposes, "it really hinges on whether or not they really
|
||
don't permit the accounts to be used for anything other than the
|
||
studies," Ms. Steele said.
|
||
|
||
W.O. Shultz, associate general counsel for the University of Texas
|
||
system, says he does not know how the accounts are used by other
|
||
students or whether they have formed news groups or lists of their own.
|
||
|
||
If the university consistently enforces its limits on the use of the
|
||
Internet for instructional, research and administrative purposes, then
|
||
it is likely on safe ground, said Henry H. Perritt Jr., a Villanova
|
||
University professor of information technology law.
|
||
|
||
[... UTD investigates student use of the Internet only when they get a
|
||
complaint, which could leave an opening for Mr. Steshenko's suit, which
|
||
he drafted and filed himself. -BP]
|
||
|
||
If the university does not know how its students are using the
|
||
Internet, it is "going to have a very hard time saying" it is not
|
||
granting students the right to participate in electronic forums on
|
||
whatever subjects they please, Mr. Perritt said.
|
||
|
||
"If the university's argument is that "we claim the power to control
|
||
the use of our resources and direct the resources only for certain
|
||
purposes," then I don't see what that has to do with the complaints.
|
||
Then they have a duty to know what's going on," he said.
|
||
|
||
[End of article, which also features a four column by 5" photo of Mr.
|
||
Steshenko in front of an IBM PS/2. The writer, Mr. Tom
|
||
Steinert-Threlkeld, covers technology stories for the paper. -BP]
|
||
|
||
Bob Peterson Waffle BBS: peterson@ZGNews.LoneStar.Org
|
||
P.O. Box 865132 Internet: peterson@csc.ti.com TelCo: 214 995-6080
|
||
Plano, Tx USA 75086-5132 BBS: 214 596-3720 @ speeds to 14400 (HST & V.32bis)
|
||
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 16 Nov 93 14:48:59 EST
|
||
From: cccf@ALTERN.COM(cccf)
|
||
Subject: File 4--Toll Fraud on French PBXs--Phreaking
|
||
|
||
Toll Fraud on French PBXs - Phreaking
|
||
|
||
In France it is estimated that PBX trunk fraud (toll fraud) costs
|
||
companies over $220 million a year. Criminal phreakers figure out how
|
||
to access PBXs owned by businesses and then sell long-distance calling
|
||
capacities provided by these systems to the public. In European
|
||
markets where PSTN to PSTN connections are illegal it has not to date
|
||
been such an issue. However, for a number of reasons this is likely to
|
||
change.
|
||
|
||
Trunk to trunk connection barring through PBXs is expected to be
|
||
deregulated throughout Europe.
|
||
|
||
The telecom industry has done more this year to prevent toll fraud
|
||
than any other time. Yet, toll fraud losses will top more than $2
|
||
billion again this year. If you aren't doing anything to prevent being
|
||
hit, it's not a matter of if you'll be hit, it's when you'll be hit
|
||
and for how much. So, here are some low-cost ways to stop toll
|
||
fraud-or at least lessen the blow if you do get hit.
|
||
|
||
Increasing numbers of international companies have private networks
|
||
and provide DISA (Direct Inward System Access) access to employees.
|
||
Such companies are prime victims for Phreaking. For example, a phone
|
||
hacker can access the network in the UK, France, or Germany and break
|
||
out in another country where it is legal to make trunk to trunk calls,
|
||
and from that point they can call anywhere in the world.
|
||
|
||
Voice Mail is taking off across Europe. This, together with DISA, is
|
||
one of the most common ways phreakers enter a company's PBX.
|
||
|
||
Raising these issues now and detailing precautionary measures will
|
||
enable companies to take steps to reduce such frauds. The following
|
||
looks at the current situation in France.
|
||
|
||
In France a whole subculture, like a real phone underground culture,
|
||
of these technology terrorists is springing up on city streets. Stolen
|
||
access codes are used to run call-sell operations from phone booths or
|
||
private phones. The perpetrators offer international calls for circa
|
||
FF 20, which is considerably less than it could cost to dial direct.
|
||
When calls are placed through corporate PBXs rather than carrier
|
||
switches, the companies that own the PBXs end up footing the bill.
|
||
|
||
What are the warning signs that your own communication systems are
|
||
being victimised by toll fraud? In inbound call detail records, look
|
||
for long holding times, an unexplained increased in use, frequent use
|
||
of the system after normal working hours, or a system that is always
|
||
busy. In records of outbound calls, look for calls made to unusual
|
||
locations or international numbers, high call volumes, long duration
|
||
of calls, frequent calls to premium rate numbers and frequently
|
||
recurring All Trunks Busy (ATB) conditions.
|
||
|
||
Toll fraud is similar to unauthorised access to mainframe computers or
|
||
hacking. Manufacturers such as Northern Telecom have developed
|
||
security features that minimise the risk of such theft.
|
||
|
||
Telecommunication managers, however, are the only ones who are ensure
|
||
that these features are being used to protect their systems from
|
||
fraud.
|
||
|
||
Areas of Intrusion Into Corporate Systems
|
||
|
||
PBX features that are vulnerable to unauthorised access include call
|
||
forwarding, call prompting and call processing features. But the most
|
||
common ways phreakers enter a company's PBX is through DISA and voice
|
||
mail systems. They often search a company's rubbish for directories
|
||
or call detail reports that contain a companies own 05 numbers and
|
||
codes. They have also posed as system administrators or France Telecom
|
||
technicians and conned employees into telling them PBX authorisation
|
||
codes. More sophisticated hackers use personal computers and modems to
|
||
break into data bases containing customer records showing phone
|
||
numbers and voice mail access codes, or simply dial 05 numbers with
|
||
the help of sequential number generators and computers until they find
|
||
one that gives access to a phone system.
|
||
|
||
Once these thieves have the numbers and codes, they can call into the
|
||
PBX and place calls out to other locations. In many cases, PBX is only
|
||
the first point of entry for such criminals. They can also use the PBX
|
||
to access company's data system. Call-sell operators can even hide
|
||
their activities from law enforcement officials by using
|
||
PBX-looping-using one PBX to place calls out through another PBX in
|
||
another state.
|
||
|
||
Holding the Line-Steps That Reduce Toll Fraud
|
||
|
||
Northern Telecom's Meridian 1 systems provide a number of safety
|
||
features to guard against unauthorised access. It is the most popular
|
||
PBX phreaked in France. The following information highlights Meridian
|
||
1 features that can minimise such abuse.
|
||
|
||
DISA Security
|
||
|
||
The DISA feature allows users to access a company's PBX system from
|
||
the public network by dialling a telephone number assigned to the
|
||
feature. Once the system answers the DISA call, the caller may be
|
||
required to enter a security code and authorisation code. After any
|
||
required codes are entered, the caller, using push button tone
|
||
dialling, is provided with the calling privileges, such as Class of
|
||
Service (COS), Network Class of Service (NCOS) and Trunk Group Access
|
||
Restrictions (TGAR), that are associated with the DISA DN or the
|
||
authorisation code entered.
|
||
|
||
To minimise the vulnerability of the Meridian 1 system to unauthorised
|
||
access through DISA, the following safeguards are suggested:
|
||
|
||
1) Assign restricted Class of Service, TGAR and NCOS to the DISA DN;
|
||
2) Require users to enter a security code upon reaching the DISA DN;
|
||
3) In addition to a security code, require users to enter an
|
||
authorisation code. The calling privileges provided will be those
|
||
associated with the specific authorisation code;
|
||
4) Use Call Detail Recording (CDR) to identify calling activity
|
||
associated with individual authorisation codes. As a further
|
||
precaution, you may choose to limit printed copies of these
|
||
records;
|
||
5) Change security codes frequently;
|
||
6) Limit access to administration of authorisation codes to a
|
||
few, carefully selected employees.
|
||
|
||
Meridian Mail Security
|
||
|
||
Northern Telecom's Meridian Mail voice messaging system is also
|
||
equipped with a number of safeguarding features. The features that
|
||
allow system users to dial out; Through Dial, Operator Revert and
|
||
Remote Notification (Outcalling) should be controlled to reduce the
|
||
likelihood of unauthorised access. The following protective measures
|
||
can be used to minimise tool fraud:
|
||
|
||
Voice Security Codes
|
||
|
||
Set security parameters for ThroughDial using the Voice Security
|
||
Options prompt from the Voice Systems Administration menu. This prompt
|
||
will list restricted access codes to control calls placed using the
|
||
Through-Dial function of Meridian Mail. An access code is a prefix for
|
||
a telephone number or a number that must be dialled to access outside
|
||
lines or long-distance calling. If access cides are listed as
|
||
restricted on the Meridian Mail system, calls cannot be placed through
|
||
Meridian Mail to numbers beginning with the restricted codes. Up to 10
|
||
access codes can be defined.
|
||
|
||
Voice Menus
|
||
|
||
With the Through-Dial function of Voice Menus, the system
|
||
administrator can limit dialling patterns using restricted dialling
|
||
prefixes. These access codes, which are defined as illegal, apply only
|
||
to the Through-Dial function of each voice menu. Each Through-Dial
|
||
menu can have its own restricted access codes. Up to 10 access codes
|
||
can be programmed.
|
||
|
||
Meridian Mail also allows system administrators to require that users
|
||
enter an Access Password for each menu. In this way, the Through-Dial
|
||
menu can deny unauthorised callers access to Through-Dial functions,
|
||
while allowing authorised callers access.
|
||
|
||
Additional Security Features
|
||
|
||
The Secured Messaging feature can be activated system-wide and
|
||
essentially blocks external callers from logging to Meridian Mail. In
|
||
addition, the system administrator can establish a system-wide
|
||
parameter that forces user to change their Meridian Mail passwords
|
||
within a defined time period. Users can also change their passwords at
|
||
any time when logged in to Meridian Mail.
|
||
|
||
System administrator can define a minimum acceptable password length
|
||
for Meridian Mail users. The administrators can also determine the
|
||
maximum number of times an invalid password can be entered before a
|
||
log-on attempt is dropped and the mailbox log-on is disabled.
|
||
|
||
Some of the features that provide convenience and flexibility are also
|
||
vulnerable to unauthorised access. However, Meridian 1 products
|
||
provide a wide array of features that can protect your system from
|
||
unauthorised access.
|
||
|
||
In general, you can select and implement the combinaison of features
|
||
that best meets your company's needs.
|
||
|
||
General Security Measures
|
||
|
||
Phone numbers and passwords used to access DISA and Meridian Mail
|
||
should only be provided to authorised personnel. In addition, call
|
||
detail records and other reports that contain such numbers should be
|
||
shredded or disposed of in an appropriate manner for confidential
|
||
material. To detect instances of trunk fraud and to minimise the
|
||
opportunities for such activity, the system administrator should take
|
||
the following steps frequently (the frequency is determined on a per
|
||
site basis according to need):
|
||
|
||
1) Monitor Meridian 1 CDR output to identify sudden unexplained
|
||
increases in trunk calls. Trunk to trunk/Tie connections should
|
||
be included in CDR output;
|
||
2) Review the system data base for unauthorised changes;
|
||
3) Regularly change system passwords, and DISA authorisation and
|
||
security codes;
|
||
4) Investigate recurring All Trunks Busy (ATB) conditions to determine the
|
||
cause;
|
||
5) If modems are used, change access numbers frequently, and
|
||
consider using dial-back modems;
|
||
6) Require the PBX room to be locked at all times. Require a
|
||
sign-in log and verification of all personnel entering the PBX
|
||
room.
|
||
|
||
Two Practical Cases
|
||
|
||
Bud Collar, electronic systems manager with Plexus in Neenah, Wis.,
|
||
transferred from its payphone operations branch. As the PBX manager,
|
||
he's blocked all outside access to his Northern Telecom Meridian 1 and
|
||
meridian Mail. Just in case a phreaker does again access, Collar
|
||
bought a $600, PC-based software package from Tribase Systems in
|
||
Springfield, NJ, called Tapit. With Tapit, Collar runs daily reports
|
||
on all overseas call attempts and completions. But the drawback to
|
||
Tapit is that by itself it has no alarm features, so if a phreaker
|
||
does get in, Collar won't know about it until he runs the next report.
|
||
Tribase does offer Fraud Alert with alarms for $950, but Collar chose
|
||
not to use it.
|
||
|
||
Erica Ocker, telecom supervisor at Phico Insurance in Mechaniscsburg,
|
||
PA, also wanted to block all of her outside ports. But she has
|
||
maintenance technicians who need routine access, so she needed a way
|
||
to keep her remote access ports open, without opening up her Rolm 9751
|
||
to toll fraud. The solution is to buy LeeMah DataCom Security Corps's
|
||
TraqNet 2001. For $2,000, Ocker got two secured modems that connect to
|
||
her maintenance port on her PBX and to her Rolm Phone Mail port. When
|
||
someone wants to use these features, they dial into the TraqNet and
|
||
punch in their PIN number. TraqNet identifies the user by their PIN
|
||
and asks them to punch in a randomly selected access code that they
|
||
can only get from a credit card-sized random number generator, called
|
||
an InfoCard. That access code matches the codes that are generated
|
||
each time the TraqNet is accused. The TraqNet 2001 is a single-line
|
||
model that supports up to 2,304 users for $950. More upscale can
|
||
support up to 32 lines and run call detail reports, but they cost as
|
||
much as $15,000. InfoCards each cost an additional $50.
|
||
|
||
Conclusions
|
||
|
||
The ultimate solution will be, as I read in a French consultancy
|
||
review, <to program the PBX ACD agent ports as toll denied.>
|
||
|
||
The more pleasant story directly linked with French phreaking was the
|
||
night that I see on my TV screen in Paris a luxurious computer ad for
|
||
the Dell micro-computers. At the end of the ad, a toll-free number
|
||
will be present in green: 05-444-999. I immediately phone to this
|
||
number... and found the well-known voice of all French Northern
|
||
Telecom's Meridian Mail saying in English language: "For technical
|
||
reasons, your call cannot be transferred to the appropriate person.
|
||
Call later or leave a message after the tune." The dial of 0* give the
|
||
open door to more than... Dell informations. My letter to this company
|
||
already is without (free voice-) answer!
|
||
|
||
--
|
||
Jean-Bernard Condat, General Secretary
|
||
Chaos Computer Club France [cccf]
|
||
First European Hacking, Phreaking & Swapping Club
|
||
Address: B.P. 8005, 69351 Lyon cedex 08, France.
|
||
Phone: +33 1 47874083; Fax: +33 1 47874919; E-mail: cccf@altern.com
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 16 Nov 93 03:08:47 EST
|
||
From: gronez@AOL.COM
|
||
Subject: File 5--Brendan Kehoe
|
||
|
||
Hello to everyone behind the scenes at CuD.. For anyone who didn't see
|
||
it, I'd like to acknowledge Brendan Kehoe and his excellent appearance
|
||
on Computer Chronicle's. Imagine my surprise as the name I have known
|
||
for months now was finally given a voice. Great idea-- the more people
|
||
on the Internet the better for our virtual communities. I have one
|
||
question though. Why wasn't DELPHI, probably the most popular gateway
|
||
to the Internet not featured on the show?
|
||
|
||
I hope that you or one of you colleagues may be able to shed some
|
||
light on this,
|
||
|
||
Thank You
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 18 Nov 1993 22:49:17 +0000
|
||
From: 3W - Global Networking Newsletter <3W@UKARTNET.DEMON.CO.UK>
|
||
Subject: File 6--Advertise your skills!
|
||
|
||
3W MAGAZINE OFFERS FREE ADVERTS FOR NETWORKERS
|
||
|
||
3W Global Networking Newsletter is offering free small ads for
|
||
individuals who provide services relating to the global networks.
|
||
|
||
In an attempt to widen knowledge about how to access and use the
|
||
networks, 3W is starting a free adverts section as from Issue 3,
|
||
Jan/Feb 1993. This section will be open to any individuals who wish to
|
||
advertise their professional skills to potential users. This covers
|
||
consultancy, teaching, training, info-searching, research, writing,
|
||
development, setup, maintenance, management or any others that pertain
|
||
directly to the new global networks.
|
||
|
||
These ads will run in a section called NETWORKERS within the
|
||
(Re)Source section of the magazine.
|
||
|
||
All ads will consist of a Heading (max 4 words) and text (max 30
|
||
words). All ads must contain an e-mail contact address, though they
|
||
may contain other contact information. All submissions must have a
|
||
subject line of NETWORKERS. Mail ads to
|
||
networkers@ukartnet.demon.co.uk
|
||
|
||
Please note that there is no guarantee of inclusion, due to space
|
||
limitations. Publishers decision is final. For information about
|
||
other advertising in 3W please mail ads@ukartnet.demon.co.uk
|
||
|
||
Ivan Pope
|
||
Editor
|
||
ivan@ukartnet.demon.co.uk
|
||
+----------------------------
|
||
3W - Global Networking Newsletter +44 (0)81 533 0818
|
||
13 Brett Rd Fax: +44 (0)81 533 0818
|
||
London E8 1JP 3W@ukartnet.demon.co.uk
|
||
UK
|
||
++++++++++++++++++++++++
|
||
3W is a bi-monthly paper-based subscription newsletter that covers the new
|
||
global networks.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #5.88
|
||
************************************
|
||
|
||
|
||
|