833 lines
40 KiB
Plaintext
833 lines
40 KiB
Plaintext
Computer underground Digest Sun Feb 27, 1994 Volume 6 : Issue 19
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe (He's lurking in the archives now)
|
|
Acting Archivist: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Clipper Editor: Hank O'Haira
|
|
|
|
CONTENTS, #6.19 (Feb 27, 1994)
|
|
File 1--"Clipper Chip will Block Crime" / D. Denning (Newsday)
|
|
File 2--Re: "Clipper Chip will Block Crime" (#1)
|
|
File 3--Re: "Clipper Chip will Block Crime" (#2)
|
|
File 4--Nat'l Symposium on Proposed Arts & Humanities Policies
|
|
File 5--Criticism of CuD post on Virus Contest
|
|
File 6--Media "Hackers" Whack Harding's E-mail
|
|
File 7--Entrapment Scam?
|
|
File 8--Letter to Rep. Molinari (R-Brooklyn)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
To subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115.
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|
|
|
ANONYMOUS FTP SITES:
|
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|
EUROPE: ftp.funet.fi in pub/doc/cud. (Finland)
|
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|
UNITED STATES:
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
|
etext.archive.umich.edu (141.211.164.18) in /pub/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
|
|
ftp.halcyon.com (192.135.191.2) in mirror2/cud
|
|
KOREA: ftp: cair.kaist.ac.kr in /doc/eff/cud
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Mon, 21 Feb 1994 22:45:51 EST
|
|
From: Moderators <cudigest@mindvox.phantom.com>
|
|
Subject: File 1--"Clipper Chip will Block Crime" / D. Denning (Newsday)
|
|
|
|
Newsday, Tuesday, February 22, 1994, Viewpoints
|
|
The Clipper Chip Will Block Crime
|
|
By Dorothy E. Denning
|
|
|
|
Hidden among the discussions of the information highway is a fierce
|
|
debate, with huge implications for everyone. It centers on a tiny
|
|
computer chip called the Clipper, which uses sophisticated coding to
|
|
scramble electronic communications transmitted through the phone
|
|
system.
|
|
|
|
The Clinton administration has adopted the chip, which would allow
|
|
law enforcement agencies with court warrants to read the Clipper codes
|
|
and eavesdrop on terrorists and criminals. But opponents say that, if
|
|
this happens, the privacy of law-abiding individuals will be a risk.
|
|
They want people to be able to use their own scramblers, which the
|
|
government would not be able to decode.
|
|
|
|
If the opponents get their way, however, all communications on the
|
|
information highway would be immune from lawful interception. In a
|
|
world threatened by international organized crime, terrorism, and rogue
|
|
governments, this would be folly. In testimony before Congress, Donald
|
|
Delaney, senior investigator with the New York State Police, warned
|
|
that if we adopted an encoding standard that did not permit lawful
|
|
intercepts, we would have havoc in the United States.
|
|
|
|
Moreover, the Clipper coding offers safeguards against casual
|
|
government intrusion. It requires that one of the two components of
|
|
a key embedded in the chip be kept with the Treasury Department and the
|
|
other component with the Commerce Department's National Institute of
|
|
Standards and Technology. Any law enforcement official wanting to
|
|
wiretap would need to obtain not only a warrant but the separate
|
|
components from the two agencies. This, plus the superstrong code and
|
|
key system would make it virtually impossible for anyone, even corrupt
|
|
government officials, to spy illegally.
|
|
|
|
But would terrorists use Clipper? The Justice Department has
|
|
ordered $8 million worth of Clipper scramblers in the hope that they
|
|
will become so widespread and convenient that everyone will use them.
|
|
Opponents say that terrorists will not be so foolish as to use
|
|
encryption to which the government holds the key but will scramble
|
|
their calls with their own code systems. But then who would have
|
|
thought that the World Trade Center bombers would have been stupid
|
|
enough to return a truck that they had rented?
|
|
|
|
Court-authorized interception of communications has been essential
|
|
for preventing and solving many serious and often violent crimes,
|
|
including terrorism, organized crime, drugs, kidnaping, and political
|
|
corruption. The FBI alone has had many spectacular successes that
|
|
depended on wiretaps. In a Chicago case code-named RUKBOM, they
|
|
prevented the El Rukn street gang, which was acting on behalf of the
|
|
Libyan government, from shooting down a commercial airliner using a
|
|
stolen military weapons system.
|
|
|
|
To protect against abuse of electronic surveillance, federal
|
|
statutes impose stringent requirements on the approval and execution
|
|
of wiretaps. Wiretaps are used judiciously (only 846 installed
|
|
wiretaps in 1992) and are targeted at major criminals.
|
|
|
|
Now, the thought of the FBI wiretapping my communications appeals to
|
|
me about as much as its searching my home and seizing my papers.
|
|
But the Constitution does not give us absolute privacy from
|
|
court-ordered searches and seizures, and for good reason. Lawlessness
|
|
would prevail.
|
|
|
|
Encoding technologies, which offer privacy, are on a collision
|
|
course with a major crime-fighting tool: wiretapping. Now the
|
|
Clipper chip shows that strong encoding can be made available in a way
|
|
that protects private communications but does not harm society if it
|
|
gets into the wrong hands. Clipper is a good idea, and it needs
|
|
support from people who recognize the need for both privacy and
|
|
effective law enforcement on the information highway.
|
|
|
|
======================================================
|
|
Copyright Newsday. All rights reserved. This article can be freely
|
|
distributed on the net provided this note is kept intact, but it may
|
|
not be sold or used for profit without permission of Newsday.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 25 Feb 1994 22:43:48 EST
|
|
From: rivest@theory.lcs.mit.edu (Ron Rivest)
|
|
Subject: File 2--Re: "Clipper Chip will Block Crime" (#1)
|
|
|
|
(Fwd by CPSR)
|
|
|
|
Hi Dorothy --
|
|
|
|
Thanks for sending me a copy of your editorial. But I find the
|
|
reasoning you present misleading and unpersuasive.
|
|
|
|
First, you argue that the clipper chip will be a useful law
|
|
enforcement tool. Given the small number of currently authorized
|
|
wiretaps per year (under 1000) and the ease of using alternative
|
|
encryption technology or superencryption, it seems plausible to me
|
|
that law enforcement could expect at most ten "successful" clipper
|
|
wiretaps per year. This is a pretty marginal basis for claiming that
|
|
clipper will "block crime".
|
|
|
|
Second, you seem to believe that anything that will "block crime" must
|
|
therefore be a "good thing" and should therefore be adopted. This is
|
|
not true, even if it is not subject to government abuse. For example,
|
|
a system that could turn any telephone (even when on-hook) into an
|
|
authorized listening microphone might help law enforcement, but would
|
|
be unacceptable to almost all Americans. As another example, tattooing
|
|
a person's social security number on his or her buttocks might help
|
|
law enforcement, but would also be objectionable. Or, you could
|
|
require all citizens to wear a bracelet that could be remotely queried
|
|
(electronically, and only when authorized) to return the location of
|
|
that citizen. There are all kinds of wonderfully stupid things one
|
|
could do with modern technology that could "help" law enforcement.
|
|
But merely being of assistance to law enforcement doesn't make a
|
|
proposal a good thing; many such ideas are objectionable and
|
|
unacceptable because of the unreasonably large cost/benefit ratio
|
|
(real or psychological cost). The clipper proposal, in
|
|
my opinion, is of exactly this nature.
|
|
|
|
Third, you seem unnecessarily polly-annish about our government and the
|
|
potential for abuse. The clipper proposal places all trust for its
|
|
management within the executive branch; a corrupt president could
|
|
direct that it be used for inappropriate purposes. The unspecified
|
|
nature of many of the associated procedures leaves much room to
|
|
speculate that there are "holes" that could be exploited by government
|
|
officials to abuse the rights of American citizens. Even if the
|
|
proposal were modified to split the trust among the various branches
|
|
of government, one might still reasonably worry about possible abuse.
|
|
Merely because you've met the current set of representatives of
|
|
various agencies, and feel you can trust them, doesn't mean that such
|
|
trust can be warranted in their successors. One should build in
|
|
institutional checks and balances that overcome occasional moral
|
|
lapses in one or more office holders.
|
|
|
|
Fourth, your discussion of "searching your home and seizing your
|
|
papers" is misleading. You seem to imply that because law enforcement
|
|
can be issued a warrant to search your home, that we should adopt
|
|
clipper. Yet this analogy only makes sense if individuals were
|
|
required to deposit copies of their front door keys with the
|
|
government. I can build any kind of house I wish (out of steel, for
|
|
example), and put any kind of locks on it, and wire up any kind of
|
|
intrusion detectors on it, etc. The government, armed with a search
|
|
warrant, is not guaranteed an "easy entry" into my home at all. The
|
|
appropriate analogical conclusion is that individuals should be able
|
|
to use any kind of encryption they want, and the government should be
|
|
allowed (when authorized, of course) to try and break their
|
|
encryption.
|
|
|
|
Finally, you argue (elsewhere, not in this editorial) that the decision
|
|
rests in part on "classified" information. Such an argument only makes
|
|
sense if there is a specific law-enforcement situation that makes such
|
|
classified information timely and relevant. (E.g., if there was a
|
|
current investigation as to whether the Department of the Treasury had
|
|
been infiltrated by organized crime.) The use of "classified information"
|
|
is otherwise generally inappropriate in discussing communications policy
|
|
that will last over decades.
|
|
|
|
This hardly covers all of the relevant issues, but it covers the
|
|
points that came immediately to mind in reading your editorial...
|
|
|
|
Cheers,
|
|
Ron
|
|
|
|
P.S. Feel free to pass along, quote, or otherwise re-distribute this...
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 25 Feb 1994 18:43:12 PST
|
|
From: Jim Thomas <jthomas@well.sf.ca.us>
|
|
Subject: File 3--Re: "Clipper Chip will Block Crime" (#2)
|
|
|
|
Dorothy Denning's defense of Clipper as a crime-fighting strategy (as
|
|
reported in Newsday, 22 Feb--see above file) reflects sincerity and
|
|
passion. I have considerable intellectual and personal respect for
|
|
Dorothy. In 1990, she was among the first to challenge media and law
|
|
enforcement myths of the "dangerous hacker," and she did so while
|
|
working in the private sector at the peak of the "hacker crackdown,"
|
|
which took considerable courage. She, along with John Nagel, also was
|
|
instrumental in deflating the Government's case against Craig Neidorf
|
|
in the Phrack/E911 trial in June, 1990, when she and John flew to
|
|
Chicago at their own expense to help the defense prepare its case. Her
|
|
good will, altruism, and integrity are unimpeachable. However, her
|
|
defense of Clipper on the grounds that it will help fight crime
|
|
requires some examination.
|
|
|
|
CPSR, EFF and others have addressed some of the issues the Newsday
|
|
story raises (see past CuDs and the documents in EFF's archives at
|
|
ftp.eff.org /pub/EFF and browse). There are, however, a few specific
|
|
examples used in the story to defend Clipper that I find troublesome.
|
|
Among them:
|
|
|
|
1) Citing Don Delaney, senior investigator of the New York State
|
|
Police, inspires little confidence. Dorothy notes that Delaney said
|
|
that without an encoding standard that would not permit lawful
|
|
intercepts, "we would have havoc in the United States." The hyperbole
|
|
makes a dramatic media sound byte, but I can think of no society,
|
|
none, ever, in which social stability and order were based on a
|
|
government's ability and legitimate (or even illicit) power to surveil
|
|
citizens at will. Generally, societies in which government ability to
|
|
monitor citizens was high historically have been those in which
|
|
respect for government authority was low, or in which stability was
|
|
imposed by political repression. Although a minor point, the appeal
|
|
to fears of undemonstrated social chaos to enact policies that
|
|
threaten privacy are misdirected.
|
|
|
|
If Delaney's comments before last summer's Congressional hearings are
|
|
to be adduced as justification for Clipper, then his comments must be
|
|
placed in the context in which they were made. The context does little
|
|
to assure those of use concerned with the implications of Clipper for
|
|
civil liberties. Delaney's comments occurred as critical commentary on
|
|
2600 Magazine, which we judged as dangerous to teenagers (emphasis added):
|
|
|
|
Publications, such as "2600," which teach subscribers how to
|
|
commit telecommunications crime are protected by the First
|
|
Amendment, but disseminating pornography to minors is illegal. In
|
|
that many of the phone freaks are juveniles, I BELIEVE
|
|
LEGISLATION BANNING THE DISSEMINATION TO JUVENILES OF MANUALS ON
|
|
HOW TO COMMIT CRIME WOULD BE APPROPRIATE.
|
|
From a law enforcement perspective, I applaud the proposed
|
|
Clipper chip encryption standard which affords individuals
|
|
protection of privacy yet enables law enforcement to conduct
|
|
necessary court-ordered wiretaps, and with respect to what was
|
|
being said in the previous conversation, last year there were
|
|
over 900 court-ordered wiretaps in the United States responsible
|
|
for the seizure of tons of illicit drugs coming into this
|
|
country, solving homicides, rapes, kidnappings. If we went to an
|
|
encryption standard without the ability for law enforcement to do
|
|
something about it, we would have havoc in the United States --
|
|
my personal opinion.
|
|
|
|
Delaney expands in his later remarks:
|
|
|
|
Well, the problem is that teenagers do read the "2600" magazine.
|
|
I have witnessed teenagers being given free copies of the
|
|
magazine by the editor-in-chief. I have looked at a historical
|
|
perspective of the articles published in "2600" on how to engage
|
|
in different types of telecommunications fraud, and I have
|
|
arrested teenagers that have read that magazine.
|
|
THE PUBLISHER, OR THE EDITOR-IN-CHIEF, DOES SO WITH IMPUNITY
|
|
UNDER THE CLOAK OF PROTECTION OF THE FIRST AMENDMENT. However, as
|
|
I indicated earlier, in that the First Amendment has been
|
|
abridged for the protection of juveniles from pornography, I also
|
|
FEEL THAT IT COULD BE ABRIDGED FOR JUVENILES BEING PROTECTED FROM
|
|
MANUALS ON HOW TO COMMIT CRIME -- children, especially teenagers,
|
|
who are hackers, and who, whether they be mischievous or
|
|
intentionally reckless, don't have the wherewithal that an adult
|
|
does to understand the impact of what he is doing when he gets
|
|
involved in this and ends up being arrested for it.
|
|
|
|
There is considerable room for disagreement on whether 2600 Magazine
|
|
is any more a manual for crime than thousands of others examples drawn
|
|
from movies, television, comic books, magazines, or radio programs
|
|
are. What I find disturbing is the explicit advocacy that First
|
|
Amendment protections be so easily abridged on the basis of simplistic
|
|
opinions and interpretations. Following Delaney's logic for abridging
|
|
First Amendment rights, one could with equal ease justify banning
|
|
Bevis and Butthead, "Gangsta rap," and other forms of expression that
|
|
law enforcement perceived to contribute to potential criminal behavior.
|
|
Delaney's comments--although certainly well meaning and for a "higher
|
|
goal"--do little to inspire confidence that some over-zealous law
|
|
enforcement agents, believing they are acting for some higher purpose,
|
|
won't abuse their power and authority. Those who remember the
|
|
systematic abuses of law enforcement agents at all levels, especially
|
|
the FBI, in the political surveillance excesses of the 1960s have no
|
|
reason to trust the good faith of law enforcement in
|
|
following-the-rules.
|
|
|
|
2) The double escrow systems of the two components of the chip's key
|
|
do offer considerable protection from abuse, but the potential flaws
|
|
have not been addressed, as many critics (eg, CPSR, EFF) have noted.
|
|
The flaws include a) the ease of obtaining warrants, b) the misuse of
|
|
warrants to justify overly-broad searches, c) the possibility of
|
|
release of the key to unauthorized persons once obtained, and d) the
|
|
assumption that collusion between persons to obtain a given set of
|
|
keys is "impossible." Fully detailed discussion of security problems
|
|
can be found in the position papers of the groups in the ftp.eff.org
|
|
archives.
|
|
|
|
3) It is claimed that terrorists and others would, in fact, use
|
|
Clipper, and the World Trade Center bombers, who were "stupid enough
|
|
to return a truck that they had rented," is used as an example.
|
|
Although a small detail, the bombers did not return the truck--it was
|
|
destroyed in the blast. They returned for their deposit. Nonetheless,
|
|
the argument could also be made that, if criminals are stupid, then
|
|
why would they encrypt at all? Or, if they encrypted, why would they
|
|
necessarily have an unbreakable code? The fact is that sophisticated
|
|
criminals concerned with security of communications would likely
|
|
circumvent Clipper, and Clipper is not the answer to intercepting such
|
|
communications.
|
|
|
|
4) Clipper will have no significant impact on crime, and playing on
|
|
the current "fear of crime" hysteria ignores several points. First,
|
|
most of "crime" with which the public is concerned, street (or index)
|
|
crimes, constitutes only a small fraction (under 15 percent by most
|
|
estimates) of all crime. In dollar costs to society, white collar
|
|
crime and tax fraud constitute almost two-thirds ($131 billion).
|
|
Clipper will do absolutely nothing to reduce these offenses. Further,
|
|
interception of communications is rarely used in apprehending
|
|
criminals, and therefore would not be a significant factor in fighting
|
|
crimes at all.
|
|
|
|
Lets take a look at some figures on court-authorized orders granted
|
|
for intercepts:
|
|
|
|
YEAR STATE FEDERAL
|
|
|
|
1969 174 0
|
|
1974 607 121
|
|
1979 466 87
|
|
1984 512 289
|
|
1989 453 310
|
|
1991 500 386
|
|
|
|
Intercepts are useful for law enforcement, but they are simply not
|
|
used often enough to justify the claim that Clipper would reduce
|
|
crime, let alone that without Clipper we'd have social "havoc." What
|
|
kinds of crimes are intercepts used for? In 1991, the Sourcebook of
|
|
Criminal Justice Statistics (p. 474) lists the following:
|
|
|
|
OFFENSE TOTAL FEDERAL STATE
|
|
|
|
Narcotics 536 228 308
|
|
Racketeering 114 61 53
|
|
Gambling 98 19 79
|
|
Other 108 48 60
|
|
|
|
So, about 63 percent of intercepts are for drug dealers, and about
|
|
another quarter are for racketeering and gambling. Intercepts for
|
|
homicide (21) and kidnaping (5) were the only violent crimes for which
|
|
intercepts were listed in 1991. This is hardly sufficient grounds on
|
|
which to base an argument that Clipper will reduce crime or help stem
|
|
social havoc.
|
|
|
|
5) The story alludes to the "success" of FBI wire taps of the El Rukns,
|
|
a Chicago Street gang:
|
|
|
|
In a Chicago case code-named RUKBOM, they prevented the El Rukn
|
|
street gang, which was acting on behalf of the Libyan government,
|
|
from shooting down a commercial airliner using a stolen military
|
|
weapons system.
|
|
|
|
My recollection of these events is quite different than those
|
|
described above. The FBI did, in fact, intercept considerable
|
|
communications between El Rukn members, include Jeff Forte, the
|
|
group's leader, who led the gang from federal prison. The El Rukns
|
|
attempted to obtain money from the Libyans for a variety of schemes,
|
|
and one of the schemes included shooting down an airliner. Nothing
|
|
ever came of the solicitations, and I recall no evidence that the plan
|
|
described above was foiled by the FBI through wire taps or any other
|
|
tactic. Some news accounts described it as a ploy to establish
|
|
credibility with the Libyans. Others saw it as a fantasy, and some saw
|
|
it as a potential danger that never went beyond posturing. I recall no
|
|
evidence that law enforcement intervened to prevent it. Perhaps those
|
|
with a better memory or with a press release at hand can refresh my
|
|
memory, but I'm inclined to judge the story as at best a distortion of
|
|
events and at worst simply false.
|
|
|
|
6) There's a sidebar to the El Rukn story relevant to Clipper.
|
|
Federal prosecutors successfully prosecuted and imprisoned the gang's
|
|
hierarchy. In 1993, it was revealed that the federal prosecutors
|
|
engaged in illegal behaviors, including providing gang members with
|
|
sex and drugs while in their custody to obtain testimony of some
|
|
against the others. The fallout from the incident is still settling,
|
|
but gross legal violations and other improprieties were commited
|
|
under "color of law." It is ironic that the El Rukn investigation be
|
|
used as an example of effective law enforcement when, in fact, it is
|
|
an example of federal malfeasance and justice at its worst. It is
|
|
precisely the blatant disregard of the rule of law by federal
|
|
prosecutors in the El Rukn case that causes some of us to question the
|
|
blind faith that others invest in it. It's an example of the dangers
|
|
of law enforcement out of control.
|
|
|
|
None of us like crime. All of us support reasonable ways to fight it,
|
|
and most of us recognize the need for communications' intercepts on
|
|
rare occasions. However, most U.S. citizens overwhelmingly oppose
|
|
wiretapping (70 percent in 1991, down from 80 percent in 1974,
|
|
according to Department of Justice Statistics). The history of
|
|
government abuse of surveillance and the continued willingness of
|
|
government agents to bend the law in pursuit of "justice," as the El
|
|
Rukn incident above illustrates, suggests that Clipper poses far more
|
|
risks to the commonweal than it offers protections. The subtext of the
|
|
Newsday story, which ironically argues for Clipper on the basis of a
|
|
case of government circumvention of law and a citation that occurred in
|
|
the context of arguing for abridging Constitutional rights to argue
|
|
FOR Clipper, in fact provides one of the best arguments against it.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 21 Feb 1994 17:11:23 -0500
|
|
From: tomd@PANIX.COM(Tom Damrauer)
|
|
Subject: File 4--Nat'l Symposium on Proposed Arts & Humanities Policies
|
|
|
|
CALL FOR PAPERS, PANELS, AND PRESENTATIONS
|
|
|
|
On October 14th, 15th and 16th, the Center for Art Research in Boston
|
|
will sponsor a National Symposium on Proposed Arts and Humanities
|
|
Policies for the National Information Infrastructure.
|
|
|
|
Participants will explore the impact of the Clinton Administration's
|
|
AGENDA FOR ACTION and proposed NII (National Information
|
|
Infrastructure) legislation on the future of the arts and the
|
|
humanities in 21st Century America.
|
|
|
|
The symposium, which will be held at the American Academy of Arts and
|
|
Sciences in Cambridge, Massachusetts, will bring together government
|
|
officials, academics, artists, writers, representatives of arts and
|
|
cultural institutions and organizations, and other concerned individuals
|
|
from many disciplines and areas of interest to discuss specific issues of
|
|
policy which will effect the cultural life of *all* Americans during the
|
|
coming decades.
|
|
|
|
To participate, submit a 250-word abstract of your proposal for a paper,
|
|
panel-discussion or presentation, accompanied by a one-page vitae, by March
|
|
15, 1994.
|
|
|
|
Special consideration will be given to those efforts that take a critical
|
|
perspective of the issues, and are concerned with offering specific
|
|
alternatives to current administration and congressional agendas.
|
|
|
|
NOTE: PLEASE FORWARD AND/OR RE-POST TO APPROPRIATE NEWSGROUPS AND
|
|
MAILING LISTS.
|
|
|
|
+------------------------------------------------------------
|
|
Jay Jaroslav, Director
|
|
jaroslav@artdata.win.net
|
|
CENTER FOR ART RESEARCH
|
|
241 A Street
|
|
Boston, MA 02210-1302 USA
|
|
voice: (617) 451-8030
|
|
fax: (617) 451-1196
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 25 Feb 1994 13:05:59 -0500
|
|
From: skirkham@ERC.CAT.SYR.EDU(Shawn Kirkham)
|
|
Subject: File 5--Criticism of CuD post on Virus Contest
|
|
|
|
Dear CuD,
|
|
|
|
I find it offensive that you would allow a user to have his application
|
|
for writing a virus published in CuD Issue 6.18. I think that this
|
|
world has enough problems without someone trying to show how much grief
|
|
they can cause on innocent computer users such as myself.
|
|
|
|
I even created a virus or two in my years of computing, but never with
|
|
the purpose of trying to harm another user's system! I create them only
|
|
for testing purposes, and when I find one that fails a scanned test, I
|
|
forward it to the company that created the anti-virus software.
|
|
|
|
My main concern on this issue is will this company (American Eagle)
|
|
forward all the viruses to all the possible anti-virus companies? If
|
|
they don't then this is considered an illegal activity.
|
|
|
|
**NOTE: It is ok to write a virus for your own use, but illegal if
|
|
someone else gets your program and causes damage**
|
|
|
|
I am sure the editors of CuD do not want their publication to say it's
|
|
O.K. to be a virus distributor. If you disagree with this, then you
|
|
have not proven to me that you are not out to destroy the world.
|
|
|
|
Sincerely,
|
|
Shawn Kirkham
|
|
02/25/94
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 26 Feb 1994 15:54:54 CST
|
|
From: CuD Moderators <cudigest@mindvox.phantom.com>
|
|
Subject: File 6--Media "Hackers" Whack Harding's E-mail
|
|
|
|
((MODERATORS' COMMENT: CuD has periodically reported on the manner in
|
|
which the media cover hackers. Perhaps we should have been paying more
|
|
attention to the manner in which the media covers by hacking. Perhaps
|
|
the lesson of the following story is that "hacking" should be
|
|
reclassified as a sport?))
|
|
|
|
NOT EVEN HARDING'S MAIL SAFE
|
|
REPORTERS BREAK INTO HER ELECTRONIC MAIL SYSTEM
|
|
Reporter: John Husar, Tribune Staff Writer
|
|
(From: Chicago Tribune, 26 Feb, 1994 (Sect 3, p. 7))
|
|
|
|
LILLEHAMMER, Norway--In what was described as a "stupid,
|
|
foolish mistake," perhaps as many as 100 American
|
|
journalists peeked into figure skater Tonya Harding's
|
|
private electronic mailbox at the Olympics.
|
|
|
|
According to the story, no one claimed to have read the story or used
|
|
the information. One reporter, Michelle Kaufman of the Detroit Free
|
|
Press, explained that the offense was a "spur-of-the moment" incident
|
|
that occurred after pizza at 2 a.m. According to Kaufman, the reporters
|
|
merely attempted to see if a code, reputed to be Tonya's, would work.
|
|
|
|
The story explains that an electronic information system is available
|
|
to all members of the "Olympic family" of coaches, athletes,
|
|
journalists, and others. The electronic system provides information
|
|
(weather, sports, news) and allows for sending or receiving messages.
|
|
|
|
The story explains that a double code is required to access messages:
|
|
One is the user's Olympic accreditation number, and the other the
|
|
secret password. The initial password is the user's birthdate.
|
|
Harding's accreditation number was retrieved from an enlarged photo of
|
|
her wearing an official Olympic ID tag. Her birthdate is readily
|
|
available from publicity and other sources.
|
|
|
|
Kaufman said she and a few others found that the code did
|
|
gain access to Harding's mailbox. A sign reported 68 unread
|
|
messages for Harding.
|
|
|
|
"But we never opened any messages," Kaufman said. "There were
|
|
none sent under her name. We made a joke--something about
|
|
her not being smart enough to figure out how to get her
|
|
mail--and closed the file and walked away. It couldn't have
|
|
lasted for more than a minute."
|
|
|
|
The story identifies Ann Killion of the San Jose Mercury News and
|
|
Jerry Longman of the New York Times as being among the group. Both
|
|
denied reading Harding's messages.
|
|
|
|
Mike Moran, head of the U.S. Olympic Committee's
|
|
information section, said he considered the situation an
|
|
ethical matter for journalists to settle rather than
|
|
anything that would require any kind of official reaction.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 24 Feb 1994 12:39:12 CST
|
|
From: frank232@TAMPA.RELAY.UCM.ORG
|
|
Subject: File 7--Entrapment Scam?
|
|
|
|
re:Software Evaluation Survey - Entrapment Fraud?
|
|
|
|
I've voluntarily enrolled with a company based in England, which
|
|
says it's purpose is to recruit shareware evaluators for various
|
|
shareware software developers. Since processing the enrollment program,
|
|
I've come to wonder if this could possibly be just an entrapment scam to
|
|
try and catch users of nonregistered software.
|
|
I first heard of this offer on a FIDONET announcement. The
|
|
sender was looking for software evaluators, who would be offered
|
|
free software in exchange for their evaluations. It sounded like it
|
|
might be all right, so I e-mailed my name and a private postal box I
|
|
have. Within about a month, I got a diskette and a cover letter, a
|
|
copy of which I'll include below. The company is called Scancom.
|
|
When you process the registration program, called an Electronic
|
|
Response Card, you are asked to key in your name, address, and phone
|
|
number, and to provide some info about your PC, as well as an indication
|
|
of what kinds of software you have. If you choose, you can take the
|
|
option to have the program scan your hard drive, and it will record
|
|
software you have. You can de-select some or all of it before
|
|
registering.
|
|
I didn't take the option to scan my hard disk. I'm a freelance
|
|
writer and evaluate a lot of shareware. I wouldn't want shareware
|
|
authors to think I'm stealing their products.
|
|
At the end of the program, you have a screen with several numbers
|
|
generated by the program, allegedly representing your name, address and
|
|
phone number. You can complete registration by modem (I couldn't
|
|
get that to work) or by calling a toll free 800 number. You key in
|
|
responses to a series of recorded queries, and finally get a serial
|
|
number. Keying that in gives you access to 5 "free" programs.
|
|
The programs are shareware. Three were games, one was an older
|
|
version of McAffee's SCAN; I forget the fifth. A windows game, I think.
|
|
The cover letter also invites you to e-mail one of their reps, on
|
|
Compuserve. I went ahead and sent in a little note to the address given.
|
|
I remember in the past couple of years something similar. The
|
|
program ended up actually being a way to spot unregistered software, and
|
|
the results were given to the manufacturer's legal department, to press
|
|
legal action. I think Microsoft may have been involved.
|
|
Anyway, I was wondering if another entrapment scam was involved
|
|
here. Maybe you could put this out as a query on CUD, and see what
|
|
anyone knows.
|
|
|
|
Here is the letter. I may upload this to some local bulletin
|
|
boards, so added some info for those on FIDONET.
|
|
|
|
|
|
|
|
o / o / o / o /
|
|
-----Cut-here----X-----Snip------X---Cut-here----X-----Snip------X---Ouch !
|
|
o \ o \ o \ o \
|
|
|
|
|
|
SCANCOM
|
|
Scancom Distribution
|
|
P O Box 175
|
|
Guildford
|
|
Surry
|
|
GU1 1UL
|
|
UK
|
|
Telephone: +44 483 450949
|
|
FAX: +44 483 452631
|
|
****************************************************************************
|
|
This section added by me
|
|
|
|
(Please note that this is an international call. You might prefer to write,
|
|
or try e-mail instructions given below)
|
|
****************************************************************************
|
|
|
|
PC USER SURVEY
|
|
|
|
Thank you for participating in the survey. In these files you will find
|
|
a copy of the Electronic Response Card (ERC) and a file with 5 different
|
|
high quality shareware/software titles. As you probably know, shareware
|
|
often requires a payment to the author if you continue to use it after a
|
|
certain period of time. We will do our est to find the right software
|
|
and shareware for you, including titles which do not require any payment
|
|
even if you continue to use them, but we encourage you always to review
|
|
the license agreement for each separate product.
|
|
|
|
In future surveys you will be able to send the results back to us via
|
|
CompuServe, but this very first time I encourage you to call the 800
|
|
number given in the ERC program and try the touch tone relay as we need
|
|
to know how acceptable this method is for users without modems. Be sure
|
|
to key in your name and address, and let us know what you think about
|
|
the system.
|
|
|
|
I would appreciate comments directly to me on CompuServe (user ID
|
|
76116,2214). Also, I would appreciate if you could let me know about as
|
|
many applications you use as possible (legal only please) and a maximum
|
|
of 2 categories or types of software which you would prefer to receive
|
|
with future surveys (such as games, business, Windows, etc.). The survey
|
|
program automatically scans for many popular applications which you can
|
|
deselect if you do not wish to include them in the survey. Please also
|
|
let me know if you do not wish your name and address to be passed on to
|
|
any third parties, but be aware that this may restrict what future
|
|
software we can send to you, as some vendors will want to know to whom
|
|
they contribute free software for direct marketing and research
|
|
purposes.
|
|
|
|
If you know of other users who might be interested in participating,
|
|
please pass along this archive.
|
|
*************************************************************************
|
|
This section added by me
|
|
|
|
The ERC program will want to be run from a floppy drive. So, dearchive
|
|
these files onto a floppy, then place into drive A: or B:. Type START
|
|
and hit [ENTER]. Now follow the instructions on the screen to install
|
|
and run the survey.
|
|
*************************************************************************
|
|
|
|
Call, fax, e-mail or write if you have any problems. Thank you for your
|
|
participation.
|
|
|
|
Mads K. Larsen
|
|
Scancom Distribution
|
|
|
|
Partners: R E Braithwaite, S C Grundy
|
|
****************************************************************************
|
|
This added by me
|
|
|
|
P.S. If you are not on CompuServe, but have access to Internet or
|
|
FIDONET e-mail, here are the ways to send e-mail to me on Compuserve:
|
|
|
|
|
|
Internet: send to - 76116.2214@compuserve.com
|
|
|
|
FIDONET: in the TO portion, use UUCP. In the body of the message,
|
|
use these as the first two lines:
|
|
|
|
@>1:103/208
|
|
to: 76116.2214@compuserve.com
|
|
|
|
Some fidonet hosts will want you to use (1:103/208), instead, for
|
|
the first line. The parenthesis must be included. If both of these
|
|
reject, check with your fidonet host sysop. In order to receive e-mail
|
|
back, use this format for your address:
|
|
|
|
If your FIDONET address is 1:123/456, I should be able to reach you
|
|
with this address:
|
|
|
|
your.name%p0.f456.n123.z1.fidonet.org@ofa123.fidonet.org
|
|
|
|
If all of this fails, then sending a letter by post will be your only
|
|
alternative.
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 20 Feb 1994 18:04:32 -0500 (EST)
|
|
From: "Shabbir J. Safdar" <shabbir@panix.com>
|
|
Subject: File 8--Letter to Rep. Molinari (R-Brooklyn)
|
|
|
|
Please find enclosed my letter to Rep. Molinari (R-NY). Rep. Cantwell's
|
|
bill would liberalize cryptographic exports, encouraging the production
|
|
of stronger crypto software by US firms. This would result in stronger
|
|
cryptography in products for ordinary people such as you and I.
|
|
|
|
What can you do? Help get your NY or NJ rep. to cosponsor HR 3627.
|
|
Commit to writing your rep. It's so easy! You didn't buy that
|
|
fax modem for nothing! If you don't have a fax modem, you've got
|
|
a phone or a stamp.
|
|
|
|
Want to help? Send me your rep's name as a commitment that you will
|
|
write to them. OR, send me your zip code or your nearest city. I will
|
|
email you with a letter of who your rep is if you don't know it.
|
|
(I just got a new book with district maps) Alternatively
|
|
you can just call the League of Women Voters (phone number below)
|
|
|
|
|
|
-Shabbir
|
|
shabbir@panix.com
|
|
|
|
The Honorable Representative Susan Molinari
|
|
Thirteenth District
|
|
123 Cannon Building
|
|
Washington, D.C. 20515
|
|
|
|
Dear Representative Molinari,
|
|
|
|
Recently Rep. Maria Cantwell (D-WA) introduced HR 3627. I am writing
|
|
you to urge you to co-sponsor it. This bill would lift the outdated
|
|
restrictions on export of cryptographic technology. As you may already
|
|
know, it is illegal for an American business to produce hardware
|
|
products, such as software to encrypt electronic mail or hardware to
|
|
encrypt private telephone conversations, and then ship it to markets
|
|
outside the United States.
|
|
|
|
Such technology is available outside the United States already. In
|
|
fact, many US businesses purchase their equipment from companies
|
|
outside the US because they cannot obtain the equivalent products for
|
|
their offices worldwide from US distributors. As you can imagine, such
|
|
regulations hurt the global competitiveness of US technology firms.
|
|
Furthermore, US citizens cannot easily purchase privacy-enhancing
|
|
products because they are not available from US firms. This results in
|
|
a lack of privacy for US citizens and consumers.
|
|
|
|
Instead of developing products that incorporate strong
|
|
privacy-enhancing cryptographic technology, US firms are forced to
|
|
either develop two separate products (one for US use, and one for
|
|
international use), or to simply develop a single product with
|
|
sub-standard privacy-enhancing cryptographic technology. These
|
|
products cannot compete in the global marketplace with products
|
|
produced in other countries that do not have cryptographic export
|
|
restrictions.
|
|
|
|
Rep. Cantwells bill would allow US firms to compete alongside other
|
|
international firms in the area of privacy-enhancing technology. Also,
|
|
by creating a larger market for US firms, better privacy-enhancing
|
|
products will be available for purchase by US citizens. Products such
|
|
as encrypting cellular telephones are long overdue; we have seen way
|
|
too many examples of overheard cellular conversations tape-recorded by
|
|
radio-voyeurs.
|
|
|
|
As the press publicizes more examples of the security problems on the
|
|
Internet, it becomes more apparent that US Citizens need to be able to
|
|
purchase software to encrypt their electronic mail. Wouldn't it be
|
|
better for Americans to use American-written privacy software?
|
|
|
|
In closing, let me urge you to take a moment to read this analysis that
|
|
I am enclosing, and join your colleagues (such as Donald Manzullo R-IL)
|
|
in co-sponsoring HR 3627.
|
|
|
|
Thank you for your time,
|
|
|
|
Shabbir J. Safdar
|
|
115 Pacific St, #3
|
|
Brooklyn, NY 11201
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #6.19
|
|
************************************
|
|
|