857 lines
46 KiB
Plaintext
857 lines
46 KiB
Plaintext
|
|
Computer underground Digest Wed May 17, 1995 Volume 7 : Issue 39
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Goddess of Judyism Editor: J. Tenuta
|
|
|
|
CONTENTS, #7.39 (Wed, May 17, 1995)
|
|
|
|
File 1--Gov't Appeal in 2600 Case
|
|
File 2-- Making Bombs
|
|
File 3--Mendacity
|
|
File 4--(fwd) "Blacklisted! 411" - a direct ripoff of 2600 Magazine (fwd)
|
|
File 5--Response to teleright critics
|
|
File 6--(review) "Alive 0, Alive 1", Suzana Stojakovic-Celustka, 1994
|
|
File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: 17 May 1995 15:54:26 -0400
|
|
From: "David Sobel" <sobel@EPIC.ORG>
|
|
Subject: File 1--Gov't Appeal in 2600 Case
|
|
|
|
The U.S. Secret Service has filed an appellate brief seeking to
|
|
overturn a lower court decision ordering the release of information on
|
|
a controversial "hacker" investigation. At issue are documents
|
|
detailing the Secret Service's role in the so-called "Pentagon City
|
|
Mall Raid."
|
|
|
|
In November 1992, a group of young people affiliated with the computer
|
|
magazine "2600" were confronted by mall security personnel, local
|
|
police officers and several unidentified individuals. The group
|
|
members were ordered to identify themselves and to submit to searches
|
|
of their personal property. Their names were recorded and some of
|
|
their property was confiscated. However, no charges were ever brought
|
|
against any of the individuals. Although the Secret Service has never
|
|
formally acknowledged its role in the incident, it eventually conceded
|
|
that it did possess relevant information.
|
|
|
|
Computer Professionals for Social Responsibility (CPSR) filed suit in
|
|
federal court in early 1993 seeking the release of Secret Service
|
|
records under the Freedom of Information Act. In July 1994, U.S.
|
|
District Judge Louis Oberdorfer ordered the Secret Service to release
|
|
the vast majority of documents it maintains on the incident. The
|
|
Electronic Privacy Information Center (EPIC) is litigating the appeal
|
|
that is now pending.
|
|
|
|
The Secret Service has maintained that the disputed records were
|
|
collected during the course of an investigation of telephone toll
|
|
fraud. In its recently-filed brief, the agency asserts that
|
|
"obviously, a meeting of individuals 'affiliated with 2600 Magazine'
|
|
would be of interest to such an investigation since those individuals
|
|
have, by their conduct, evidenced an interest in the technical
|
|
intricacies of the telephone system." The government also reveals for
|
|
the first time that the underlying investigation was closed on March
|
|
14 of this year.
|
|
|
|
The Pentagon City incident has been described as an example of
|
|
over-zealous law enforcement activities directed against so-called
|
|
computer "hackers." The case raises significant issues of free speech
|
|
and assembly, privacy and government accountability. EPIC is seeking
|
|
support to assist with its defense of the lower court decision
|
|
ordering disclosure. Tax-deductible contributions (payable to EPIC)
|
|
can be sent to FOIA Project, EPIC, 666 Pennsylvania Avenue, S.E.,
|
|
Suite 301, Washington, DC 20003.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 17 May 95 07:59:41 MST
|
|
From: Dan Lester <ALILESTE@IDBSU.IDBSU.EDU>
|
|
Subject: File 2-- Making Bombs
|
|
|
|
Those who worry about bomb making should worry about an outfit
|
|
called Loompanics, in Port Townsend, WA, before they worry about the nets.
|
|
These folks (Box 1197, 98368, catalog $5.00, mail order only) sell books on
|
|
a wide variety of interesting topics. Every time I lecture to classes
|
|
(library science, journalism, political science, philosophy, education, etc.)
|
|
on censorship I don't just take "dirty books". I also take the loompanics
|
|
catalog and let them browse the titles in it to decide what, if anything,
|
|
should be kept from kids, adults, etc.
|
|
|
|
Here are some titles from the latest Loompanics Catalog:
|
|
|
|
How to get tax amnesty, a guide to the forgiveness of IRS debt.
|
|
The complete book of international smuggling.
|
|
The organization of illegal makets.
|
|
Sneak it through: smuggling made easier.
|
|
How to build a bugproof room.
|
|
Telling lies: clues to deceit in the marketplace, politics, and marriage.
|
|
Reborn in the USA: personal privacy through a new identity.
|
|
Counterfeit ID made easy.
|
|
How to get anything on anybody.
|
|
Techniques of the professional pickpocket.
|
|
Escape from controlled custody.
|
|
How to steal food from the supermarket.
|
|
Techniques of safecracking.
|
|
Deal the first deadly blow: an encyclopedia of unarmed and hand to hand combat.
|
|
Screw the bitch: divorce tactics for men.
|
|
Gunrunning for fun and profit.
|
|
How to make disposable silencers. (also volume 2)
|
|
Ragnar's homemade detonators.
|
|
Ragnar's guide to home and recreational use of high explosives.
|
|
Kitchen improvised plastic explosives.
|
|
Kitchen improvised fertilizer explosives. "Among the everyday materials used
|
|
in the manufacture are such things as fertilizer, fuel oil, diesel fuel,
|
|
....etc....etc....." "Because of the nature of this material, we must
|
|
emphasize that this book is sold for informational purposes only."
|
|
Mercenary operations manual.
|
|
Coup d'etat: a practical handbook. "Remember: Coup d'etat is more common
|
|
and more successful than free elections."
|
|
The poisoner's handbook.
|
|
21 techniques of silent killing.
|
|
How to date young women, for men over 35. (what every older geek needs? o-) )
|
|
Getting started in the illicit drug business.
|
|
|
|
That should be enough to give you the flavor of this catalog of almost
|
|
300 pages, several books per page. Some of the other books cover living
|
|
off the land, surviving in the wilds, building shelter from natural
|
|
materials, and related topics.
|
|
|
|
Should the catalog and the books in it be legal? Of course they should.
|
|
All of them. Every blasted one, regardless of how disgusting, offensive,
|
|
evil, or nasty you or I might think they are.
|
|
|
|
One of the local TV stations did a feature last week on "bombmaking info
|
|
on the internet". I called and informed them that it was a "so what?"
|
|
topic since all the stuff was in print and freely available anyway. They
|
|
said they didn't care...the internet was what was hot and of interest right
|
|
now. Yeah, no surprise.....
|
|
|
|
cyclops
|
|
|
|
Dan Lester Internet: alileste@idbsu.idbsu.edu
|
|
Network Information Coordinator WWW: http://cyclops.idbsu.edu/
|
|
Boise State University Library
|
|
Boise, Idaho 83725 How can one fool make another wise?
|
|
208-385-1235 Kansas, "No One Together," 1979
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 11 May 95 10:11:36 EDT
|
|
From: Jerry Leichter <leichter@LRW.COM>
|
|
Subject: File 3--Mendacity
|
|
|
|
It's said that all organizations come to resemble their opponents. Sad to
|
|
say, this has happened - with a vengence - with the organizations that
|
|
nominally started out to protect Internet users. (I'm deliberately avoiding
|
|
naming particular organizations because all have good and bad sides.) Now
|
|
that they've entered the political realm, truth and careful analysis have
|
|
tended to disappear. All that matters is public appeal. Numbers are not
|
|
there for explanation; they are there to serve propaganda needs. Even when
|
|
I agree with the aims of the groups and people involved, the ever-growing
|
|
intellectual dishonesty of their means disgusts me.
|
|
|
|
A case in point is Marc Rotenberg's recent CuD article quoting "Dave Banisar
|
|
['s recent efforts] ... going through the wiretap reports for 1994." I have no
|
|
idea whether the interpretations below are due to Banisar or Rotenberg.
|
|
Rotenberg's intent in quoting them was clear, however.
|
|
|
|
Rotenberg and others have quoted fairly low numbers of total wiretaps in the
|
|
past to show that wiretaps are not very important to law enforcement, so
|
|
cannot justify various measures proposed by the FBI that the FBI claims are
|
|
necessary to keep them possible. So now we have:
|
|
|
|
-- wiretapping reached an all-time high in 1994, 1,154 taps authorized
|
|
for federal and state combined up from 976 in 1993.
|
|
|
|
In context (we'll see more below), it's clear that the intent of this quote
|
|
(and of using language like "all-time high") is to produce a feeling of a
|
|
growing threat to civil liberties. Of course, one could equally argue that
|
|
1,154 taps in a country of 300,000,000 or so, that pursued millions of
|
|
criminal investigations in 1994, is so insignificant that it could be tossed
|
|
out without any noticeable effect. I suppose others *will* make that
|
|
argument, simply ignoring the increase.
|
|
|
|
The numbers are wonderful. If they are small, they aren't important and it's
|
|
no great loss if they are eliminated. If they are large, civil liberties are
|
|
threatened, so they should be cut down. If they are increasing (decreasing)
|
|
... well, you can fill in the arguments.
|
|
|
|
-- 75% of all taps were authorized for narcotics investigations, 8%
|
|
for gambling, and 8% for racketeering
|
|
|
|
OK.
|
|
|
|
-- Not a single tap was authorized for investigations involving
|
|
"arson, explosives, or weapons" in 1994. In fact, such an order
|
|
hasn't been approved since the late 1980s. Keep that in mind when
|
|
people say wiretapping is necessary to prevent tragedies like Oklahoma
|
|
City.
|
|
|
|
I guess whoever wrote this hasn't been listening to the radio, watching
|
|
television, or reading the newspapers. Guess what: The investigative agen-
|
|
cies of the government are under severe criticism for *ignoring* the threat
|
|
posed by right-wing extremists. Not only haven't they wire-tapped these
|
|
people; they basically haven't investigated them at all. One could equally
|
|
well argue that "the FBI tells us FBI agents are necessary to prevent
|
|
tragedies like Oklahoma City, but a look at the record indicates that they
|
|
haven't been used in relevant investigations in 1994, so clearly they are
|
|
wrong." (Oh, yes "preventing tragedies like Oklahoma City" is one of those
|
|
little phrases all the best spin-doctors are using. Tugs so nicely at the
|
|
heart strings. Can justify anything at all. Let's give it a try: "If money
|
|
were available to provide better pre-school education, people like Timothy
|
|
McVay would be better adjusted, better educated, and have better jobs. That
|
|
would get at the root causes, the frustrations with modern life, and would be
|
|
a big step toward preventing tragedies like Oklahoma City." OK, class, your
|
|
assignment: Justify government funding of laptop computers for all citizens.
|
|
Extra credit assignment: Justify better traffic control systems. Hint: TV
|
|
cameras to monitor traffic.)
|
|
|
|
By the way, the FBI more or less stopped investigating nominally-political
|
|
groups in the mid- to late-1980's after changes in procedures made it very
|
|
difficult. Under current rules, the FBI needs pre-existing evidence of
|
|
criminal acts to "infiltrate" - i.e., send someone to a meeting without first
|
|
identifying him as from the FBI - such a group. These rules were imposed in
|
|
reaction to the perception of abuses, particularly in the infiltration of
|
|
various political organizations concerned with Nicaragua. There is debate
|
|
now as to whether the rules have gone too far and made investigation too
|
|
difficult. Perhaps not, but *as the FBI has chosen to interpret them*, these
|
|
rules have shut down investigation of "political" groups - which certainly
|
|
includes shutting down wiretapping of such groups.
|
|
|
|
-- Only 17% of all conversations intercepted were deemed
|
|
"incriminating" by prosecutors. That figure is at an all-time low (in
|
|
the early '70s it was closer to 50%), and it means that the FBI is
|
|
gathering far more information through electronic surveillance
|
|
unrelated to a criminal investigation than ever before.
|
|
|
|
-- Also, the duration of the taps is way up, now around 40 days on
|
|
average. Twenty years ago, it was closer to 18.
|
|
|
|
So, if we put these together, it seems that the FBI is tapping phones that
|
|
are being used for multiple purposes, rather than "criminal business lines"
|
|
so to speak. So? We know from earlier figures that narcotics investigations
|
|
made up the bulk of wiretaps. It seems logical that narcotics trafficers need
|
|
to make relatively few "business-related" calls. Suppose twenty years ago a
|
|
much larger percentage of taps were in gambling investigations. Many of those
|
|
taps would be of bookie's phone lines, which are used for hours on end just
|
|
for taking bets. Could this be the cause of the change? We can't say,
|
|
because we aren't given any comparative numbers. Again, the numbers aren't
|
|
being quoted here for information; they are being quoted to make a point.
|
|
|
|
Finally:
|
|
|
|
The FBI's claim that new technologies are frustrating wiretap is
|
|
completely without support.
|
|
|
|
The FBI has claimed that new technologies are just beginning to frustrate
|
|
wiretapping, but that they will be an increasing problem in the future. The
|
|
deployment of many of these technologies is limited even today. Yes, the
|
|
FBI has at times been guilty of overstating the current problems. They too
|
|
have been more interested in propaganda value than truth. I don't approve of
|
|
mendacity on their part any more than I approve of it on the part of others -
|
|
but lying doesn't justify more lying.
|
|
|
|
Any objective look at the technologies that are beginning to be introduced
|
|
into the telephone system make it clear that the FBI is correct. As a simple
|
|
example, a traditional analogue telephone line can be tapped anywhere along
|
|
its length with simple, inexpensive equipment. An ISDN voice line cannot be
|
|
tapped without great difficulty and expense anywhere except within the
|
|
telephone company central office, or within the premises where the phone is
|
|
located. (This is inherent in the nature of the coding on the line, which
|
|
is the combination of signals going both ways. The two endpoints each know
|
|
their own signal and can subtract it off to figure out the other guy's
|
|
signal; but in the middle, you know neither signal and so can get neither.
|
|
The only way to "tap" the line is to physically cut it and break it into two
|
|
separate lines, with you sitting in the middle, playing the role of telephone
|
|
to the central office and central office to the telephone. Possible but not
|
|
cheap or easy compared to a pair of clips and an amplifier. This is a fairly
|
|
*simple* technology to deal with!)
|
|
|
|
That new technologies will, in the near future, make tapping more difficult
|
|
and expensive is clear fact. How important that fact is - how important the
|
|
ability to wiretap is - can be argued. What we as a society choose to do
|
|
about it is a political question. We've been conflating fact with political
|
|
choices for too many years. We want to spend more and tax less - fine, come
|
|
up with some "facts" to prove that (a) if the government taxes less, it will
|
|
bring in more money; (b) deficits don't matter anyway. We want to provide
|
|
Social Security for everyone - fine, cite the "fact" that it's an insurance
|
|
system while implementing a pay-as-you-go system. We want cleaner air, so
|
|
cite the "fact" that electic cars are "zero-pollution"; ignore such incon-
|
|
veniences as emissions from the power plants, or the lead emitted into the
|
|
environment in the process of making the batteries for those cars. (See a
|
|
recent New York Times article.)
|
|
|
|
If the remedy for bad speech is better speech, the remedy for propaganda
|
|
masquerading as facts is real facts, not more propaganda.
|
|
|
|
But if the $500,000,000 to make the
|
|
network wiretap ready is appropriated, the current trends will be
|
|
amplified: more surveillance, longer duration, less well targeted -->
|
|
less privacy for all Americans.
|
|
|
|
Pure hyperbole, speculation upon speculation all heaped on top of numbers way
|
|
too flimsy to bear any such weight.
|
|
-- Jerry
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 12 May 1995 22:04:43 -0500 (CDT)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 4--(fwd) "Blacklisted! 411" - a direct ripoff of 2600 Magazine (fw
|
|
d)
|
|
|
|
---------- Forwarded message ----------
|
|
|
|
Recently a number of people have contacted 2600 concerning another
|
|
hacker magazine called "Blacklisted! 411". Having more hacker
|
|
publications has always been something we've tried to encourage.
|
|
Zines like Cybertek, 40Hex, Hack Tic, and Private Line have been
|
|
helped or inspired by 2600 over the years, not to mention numerous
|
|
other zines that we have trade arrangements with. The current zine
|
|
scene is healthy and prospering. So we were happy to see that there
|
|
was another hacker rag in the works.
|
|
|
|
Then we got our first look at "Blacklisted! 411". To say it's similar
|
|
in appearance to 2600 would be an incredible understatement. Anyone
|
|
looking at the two publications will notice a very disturbing amount
|
|
of unattributed duplication which, we regret to say, goes far over
|
|
the line to the category of blatant ripoff.
|
|
|
|
This is not about style similarity. True, their zine is the same size
|
|
as ours. They use the exact same font style and size, their text
|
|
boxes are the same, the staff box looks almost identical (except, of
|
|
course, for the staff). Not too original, but so what. The real
|
|
problem comes from the fact that this publication has taken numerous
|
|
pieces of 2600 and published them as their own without any credit
|
|
given and without ever asking permission. We've nearly always granted
|
|
permission for zines to reprint selected articles of ours, as long as
|
|
the author and 2600 are credited. Our primary goal, after all, is to
|
|
get the word out. But this goes way beyond any conceivable 'sharing
|
|
of information' between two publications.
|
|
|
|
The two feature articles in the current issue of "Blacklisted! 411"
|
|
were both printed years ago in 2600. One of the articles (on 5ESS
|
|
switches) was also printed in Phrack a few years back. No mention
|
|
of this fact is made, no credit to the authors is given. Both articles
|
|
appear to have been written by the staff of "Blacklisted! 411".
|
|
We've heard reports that most of the other articles were also lifted
|
|
from other publications or the net, again without accreditation and
|
|
leaving the impression that "Blacklisted! 411" is the originator.
|
|
|
|
"Blacklisted! 411" has a section very similar to the 2600 Marketplace.
|
|
They call theirs the Marketplace. Our wording for our marketplace
|
|
advertising is: "Marketplace ads are free to subscribers! Send your
|
|
ad to: <address>. Ads may be edited or not printed at our discretion."
|
|
Their wording reads: "Marketplace Ads are FREE to subscribers! Send
|
|
your ad to: <address>. Ads may be edited or not printed at our
|
|
discretion." Not only that, but these people have actually gone so
|
|
far as to reproduce our subscribers' ads without their permission,
|
|
no doubt as part of a plan to obtain more advertising by appearing
|
|
to have many customers. They did such a poor job covering this up
|
|
that one of "their" ads has a line reading "All 2600 subscribers
|
|
gain complete access". Throughout its pages, "Blacklisted 411"
|
|
reproduces our house ads *word for word* as if they were their own.
|
|
|
|
Perhaps the most disturbing examples of this magazine's ill intent
|
|
lie in the replies to their letters. Not surprisingly, some of their
|
|
readers think they're somehow affiliated with 2600 and address them
|
|
as such. In one reply, the editor says, "I wonder why everyone keeps
|
|
addressing us as 2600? Are we THAT much alike? haha."
|
|
|
|
So now we're faced with the unpleasant prospect of what to do about
|
|
this. To do or say nothing would be a disservice to our magazine,
|
|
our readers, and all that we've accomplished over the last 11 years.
|
|
At the same time, we have no desire to emulate the corporate giants
|
|
who try to intimidate us into not publishing what we publish, even
|
|
though a number of people are advising us to take some sort of legal
|
|
action.
|
|
|
|
The truth is, we haven't decided yet on a course of action. Suggestions
|
|
would be welcomed. Our only goals are to get these people to stop printing
|
|
material from our magazine without permission or credit, to stop copying
|
|
our in-house and subscriber advertisements, and to stop representing
|
|
themselves fraudulently to the hacker community.
|
|
|
|
Emmanuel Goldstein
|
|
Editor, 2600 Magazine
|
|
(516) 751-2600
|
|
emmanuel@2600.com
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 13 May 1995 13:40:30 -0500 (CDT)
|
|
From: Wade Riddick <riddick@JEEVES.LA.UTEXAS.EDU>
|
|
Subject: File 5--Response to teleright critics
|
|
|
|
Reply to Teleright Criticism
|
|
|
|
(c) 1995 By Wade Riddick
|
|
Circulate freely unaltered
|
|
|
|
|
|
I have made an effort to respond to most of my private critics and
|
|
I believe the exchange has been mutually beneficial. Because of space
|
|
constraints and other factors, I apparently failed to fully address
|
|
certain areas which others found important to my argument so I will try
|
|
to share the fruits of these exchanges with CUD readers and also address
|
|
public comments made by David Gersic in CUD 7.37.
|
|
Let me first thank everyone for their constructive criticism.
|
|
|
|
The first major issue pertains to cryptography and piracy. As
|
|
many have noted, no system of cryptography is full-proof. In Mr.
|
|
Gersic's words, I've "missed the basic method of software piracy; remove
|
|
the protection." While at least one of my respondents believes that
|
|
secure hardware encryption devices are possible, I do not share this
|
|
faith in technology. That is why I dedicated several paragraphs in my
|
|
original essay to discussing the possibilities of piracy.
|
|
Where there's a key, there's always a way to pick the lock. In
|
|
the case of cryptography, there is always the danger that individuals
|
|
with the proper keys (or technical knowledge) will undermine the system.
|
|
This is a social-economic problem having to do with the way technology
|
|
is used. But I do not wish to use cryptography to eliminate piracy and
|
|
I implied as much in my reasoning. I just want to change the economic
|
|
incentive structures to make piracy less prevalent.
|
|
My aim is not to do away with fraud but to discourage it. It has
|
|
been pointed out that licensing programmers will not put a stop to
|
|
fraud. Well, licensing lawyers does not prevent them from abusing their
|
|
powers of attorney. The potential for disbarment (not to mention jail)
|
|
does, however, severely curtail these abuses. Plenty of people also run
|
|
around counterfeiting currency, but I see no reason to legalize this
|
|
activity for the general public. In Mr. Gersic's phrase, "information
|
|
[is] neither 'good' nor 'bad.'" We may not be able to restrict
|
|
information, but I think we can and must prosecute its misuse.
|
|
When it comes to piracy, I can think of two separate sets of
|
|
problems. The first problem comes from individuals decrypting and re-
|
|
telerighting documents as their own in order to make money. If
|
|
publications are issued from a public utility, that utility can ask for
|
|
decrypted copies of the document and always check for pirated copies.
|
|
In any event, a teleright document always contains its source and a
|
|
company scanning the market for pirated copies could quite easily trace
|
|
a pirated document back to its source, assuming network nodes can't be
|
|
faked. There is the possibility that con-artists could set up and
|
|
strike down node sites quite quickly to pick up a fast buck, but given
|
|
the amount of time it would take to build a client base relative to the
|
|
amount of time it would take to be detected I do not think this would
|
|
usually be economically feasible.
|
|
The second method of piracy is harder to detect and involves the
|
|
possession/transmission of decrypted documents. Someone stealing
|
|
information on their home computer wouldn't cost companies much unless
|
|
they started passing it around. As long as the skills for doing such
|
|
things are fairly restricted, the loss from private abuse is not likely
|
|
to be great enough to worry companies.
|
|
On the other hand, corporations will probably have the necessary
|
|
talent base and economic incentives to buy a copy, decrypt it and pass
|
|
it around the company. This sort of thing may be detectable by using
|
|
intelligent software agents and packet sniffers on public right-of-ways
|
|
to scan for copyrighted materials that has been decrypted. There is an
|
|
optimization problem as far as deciding how much data to scan for and
|
|
how high to set pirating fines. This sort of thing tends to be easier
|
|
to detect the larger the organization is.
|
|
I think, though, there is a better social solution. We can make
|
|
individuals and corporations with the skills to pirate materials part of
|
|
the legitimate distribution system. We can give them a re-publication
|
|
franchise and a legal share of the gains made from their distribution
|
|
efforts, cutting both the distribution and enforcement costs for normal
|
|
publishers. This was essentially the solution accepted in the Chinese
|
|
trade dispute over CDs several months ago.
|
|
Sadly, this will not work for those individuals who pirate
|
|
information for ideological and not economic reasons. One must make an
|
|
effort to trace the decrypted documents back to their source and
|
|
prosecute the original decryptor/distributor. Of course, the only real
|
|
way society can deal with harmful beliefs is to insure that it does not
|
|
produce individuals holding them.
|
|
When it comes to piracy, as it does with any other form of
|
|
criminal behavior, the question is not how to prevent something but how
|
|
to discourage it from happening and reduce losses associated with it.
|
|
The best example of this type of reasoning is found in Madison's
|
|
Federalist #10.
|
|
|
|
The second criticism leveled at telerights has to do with privacy.
|
|
Many people balk at the idea of using a copyright protection system that
|
|
links users and publishers so closely.
|
|
People often give up a small amount of privacy for even more
|
|
convenience. This happened with checks and credit cards. Cash is
|
|
anonymous but people regularly use these easier forms of transactions,
|
|
despite the fact that they have the buyer's name attached to them and
|
|
pass through numerous institutions. From the privacy standpoint you
|
|
would expect individuals to want to keep their most expensive purchases
|
|
private and not care about smaller items, but we see exactly the
|
|
opposite sort of behavior in the market. There are even laws that force
|
|
companies to report large cash transactions ($10,000+).
|
|
If this is of concern, though, it would be possible to use public
|
|
libraries and private corporations as firewalls. The library would
|
|
double encrypt the works it lent out with a time-expiring key and the
|
|
library, not the borrower, would show up to the publisher as the user.
|
|
One benefit to using a public utility is that it can act as just such a
|
|
firewall; indeed, in many ways, libraries are already model utilities.
|
|
One of my respondents indicated you could also use zero-knowledge proofs
|
|
as one way to guarantee anonymity in the transaction.
|
|
There are even ways telerights can strengthen individual privacy.
|
|
A user could, for instance, teleright personal information about
|
|
themselves to control who has access to it and to have knowledge about
|
|
who's using it. There is also nothing to prevent the fragmentation of
|
|
keys or the adoption of a public key system so that with credit records,
|
|
let's say, you have to get the key from my site and the bank's in order
|
|
to check my credit record. Technically I'm supposed to know about
|
|
everyone who looks at my credit record, but in practice we rarely have
|
|
time to request such information and the agencies that maintain the data
|
|
don't ever go to the trouble to notify us on their own.
|
|
Any agency collecting private information about us could be forced
|
|
by law - depending on the type of information - to use a public key to
|
|
encrypt that information and give us (and a government repository) the
|
|
key necessary to decrypt it (or rather, we would give them the public
|
|
key for encryption). It would be impossible to view such telerighted
|
|
documents without first informing the individual concerned. The
|
|
government would act as a disinterested third party that would verify to
|
|
the company that the keys were valid.
|
|
|
|
A third misconception is that telerights mandate a certain form of
|
|
contract in the market, namely per-use billing for material. Mr. Gersic
|
|
writes that "each time I want to refer to a diagram in this
|
|
document I have to insert a quarter in the coin slot in the side of
|
|
my monitor." Telerights, by strengthening private property rights,
|
|
makes a variety of contracts possible. I would hope that companies
|
|
continue to sell permanent rights to documents. I'm not trying to push
|
|
a particular contract on the industry, just lower the general
|
|
transaction cost for intellectual property.
|
|
|
|
I think a telerights system, just like many digital technologies,
|
|
causes us to rethink the mission of public libraries. Libraries not
|
|
only create a barrier of anonymity between readers and publishers, they
|
|
also serve as an archive for valuable information that may not be used
|
|
for years to come. Under telerights, libraries get specifically
|
|
encrypted copies to loan out. It is the publisher's duty to store the
|
|
decrypted copies. I think telerighted libraries turn into archives for
|
|
decrypted information, information that publishers no longer have an
|
|
economic incentive to maintain.
|
|
In this sense telerights might squeeze more money out of large
|
|
publishing houses because it would force them to be more creative and
|
|
more productive. Why buy a reprint of Machiavelli when you can get your
|
|
own copy for free at the school library?
|
|
|
|
I will now address the rest of Mr. Gersic's criticisms. I would
|
|
normally not address some of these points, since they are minor, but
|
|
they were made in a public forum.
|
|
Mr. Gersic states that "At best, the current copyright code does
|
|
not map well onto the computer information it is being applied to" but
|
|
he himself offers no alternative method for rewarding producers of
|
|
information, nor does he offer any revisions to the copyright code.
|
|
This conceptual gap is most apparent when he links copyright law to the
|
|
print media: "the print media are attempting to maintain their monopoly
|
|
on information distribution." Copyrights apply to a number of
|
|
electronic media as well.
|
|
He does make a legitimate point that people will attempt to scan
|
|
back in information for electronic distribution, in his words,
|
|
"bootlegging movies... [with] a cam-corder." He also mentions "lousy"
|
|
bootlegged copies of rock concerts and indicates these items tend to do
|
|
well in the market. I would say that they only do well when better
|
|
copies are unavailable. In both instances, they do not compete well at
|
|
all with the genuine item. When the producers release the movie on
|
|
videotape, I'll bet the bootleg market dries up unless the price for the
|
|
legitimate item is exorbitantly high. Given that electronic
|
|
distribution and teleright protection will lower transaction costs, I do
|
|
not normally think this will be a problem.
|
|
This also pertains to another point I made about non-linear media.
|
|
There aren't any physical hard copies that can be scanned back in.
|
|
Hypertext links and other non-linear structures can't be printed because
|
|
they aren't of use on paper.
|
|
The only real threat is to traditional linear media like books
|
|
that can be perfectly scanned. Ignoring the re-publication and piracy
|
|
issue which I've already covered, it's unclear why someone would scan a
|
|
book back in for individual use if the license was inexpensive enough.
|
|
Special care does have to be taken when it comes to fair use quotation,
|
|
since that material may circulate around electronically.
|
|
Mr. Gersic has also either failed to correctly read my essay or
|
|
deliberately distorted it by taking portions out of context. If I can
|
|
quote myself, I said in my opening paragraphs that,
|
|
|
|
"Some have proposed drastically curtailing electronic technology in
|
|
order to protect future publishers. They want to put all forms of
|
|
computer copying under the copyright code... They want to ban the
|
|
electronic resale or renting of copyrighted material fearing that the
|
|
piracy which has plagued software will plague movies and books when they
|
|
enter cyberspace."
|
|
|
|
Mr. Gersic, though, only quotes the last sentence and asks the question,
|
|
"Who are 'they'?", implying some sort of attempt on my part to be
|
|
conspiratorial. "They" refers to the "some" people mentioned in the
|
|
opening sentence of the paragraph - conveniently not quoted.
|
|
Mr. Gersic does make valid points that a teleright system assumes,
|
|
to use Mr. Gersic's words, "that I'll have a network connection wherever
|
|
I might want to use this document... If I carry my laptop out under a
|
|
tree to sit in the sunshine, I'm screwed and have to go back inside
|
|
where the ethernet is."
|
|
I happen to agree that this assumes a personal, high-bandwidth
|
|
network connection. That's why I made the point in my original essay.
|
|
"[E]ven though the technology exists, the infrastructure needed to make
|
|
a system like telerights work is not yet in place." Mr. Gersic has
|
|
conveniently omitted this quotation in his criticism.
|
|
Regardless, I don't see why telerights could not operate over the
|
|
airwaves, since the bandwidth that's needed to transmit the keys is much
|
|
lower than that needed to transmit the entire document. And I don't
|
|
think it's much of a burden to make someone get up from under a tree to
|
|
go inside and purchase a copy of the movie. <Sigh> The life of digital
|
|
convenience is a hard one.
|
|
Mr. Gersic also assumes that "I have to pay for [network links] on
|
|
a per-call basis." No one is forced to pay for local phone service on a
|
|
per-call basis. I think this reasoning assumes network exchanges will
|
|
periodically shut down and start up at fixed and knowable intervals. I
|
|
see the networked future (in twenty years, say) as being something more
|
|
or less continuous. I also think, given a high volume of network
|
|
traffic and a flat rate for local use, that resending keys will be
|
|
fairly cheap.
|
|
Also, I believe I pointed out that the document stays decrypted in
|
|
RAM once that link is made. Mr. Gersic seems to think that "if that
|
|
document has a link to another document, there's another phone call to
|
|
validate the new document, and possibly a third one to get back to my
|
|
original document." No, it stays around - unless you lack the 4
|
|
terabytes needed to run Windows 2019, in which case the operating system
|
|
can just cache the key.
|
|
Although I have already covered the issue of privacy, I wish to
|
|
reiterate that I do, in fact, share Mr. Gersic's desire to protect
|
|
individual privacy. I do not think that the FBI (or the NSC, in
|
|
particular) should run around making unwarranted checks on what
|
|
everyone's doing. As one reader has pointed out, it is impossible to
|
|
look at a library's records without a warrant. It ought to be the same
|
|
with telerights.
|
|
I do think these agencies should have warranted access to these
|
|
records. If the FBI can convince a judge that there's reasonable cause
|
|
Tim McVeigh bombed a federal building, then they should have the ability
|
|
to search through all his records. There is no such thing as an
|
|
absolute right to privacy.
|
|
If individuals fail to produce cryptological keys when faced with
|
|
a court order, they should be jailed for contempt just like a witness
|
|
who refuses to testify. We don't make exceptions for witnesses in
|
|
trails and we shouldn't make exceptions for inanimate lumps of bits.
|
|
I do also agree with Mr. Gersic that international export poses a
|
|
problem for telerights, though not on the cryptological dimension he
|
|
points out. Obviously the American government will have to get past its
|
|
problems with strong cryptography, but there are more important points
|
|
with international copyright law. Telerights would automate and enforce
|
|
a number of laws that some countries have up until now only paid lip
|
|
service to.
|
|
|
|
This brings me to my final point. Mr. Gersic sums up an number of
|
|
common opinions found on the internet when he examines my degree program
|
|
(political science) and states
|
|
|
|
"I'm just another net.admin/programmer out here in the world.
|
|
Maybe I don't know any better, but I worry when the government
|
|
(or, in this case, somebody majoring in government) wants to help me."
|
|
|
|
Well, I feel sorry that Mr. Gersic is unable to take individuals who
|
|
profess to have an interest in the common good of society at their word.
|
|
If I didn't feel that this attitude was dangerously prevalent, I would
|
|
let this comment pass.
|
|
I don't, in fact, feel that Mr. Gersic has been malicious in any
|
|
of his criticisms - after all, he did call my proposal "well-meaning" -
|
|
but he has been careless. The same National Science Foundation which
|
|
has funded my analysis of politics also helped fund his beloved
|
|
internet.
|
|
I think the attitude - and I'm not accusing anyone in particular
|
|
of having it, just pointing out its prevalence - that I've gotten mine
|
|
now you get yours is quite harmful to society. All too often the
|
|
government seems to be invisible when it's helping us. When it's
|
|
helping others it looks, to use PJ O'Rourke's phrase, as if public
|
|
restrooms are the pinnacle of public works projects.
|
|
The real solution to government problems is not to become detached
|
|
from the public discourse, but rather to join it. I don't think Mr.
|
|
Gersic realizes that in responding to my essay he has made an important
|
|
contribution to public political discourse. Why we see such activities
|
|
as somehow being 'non-political' is beyond me.
|
|
In any event, I have received a number of similar responses
|
|
indicating a distrust in government. As a political refugee from
|
|
Louisiana living in Texas (not much of an improvement), all I can say is
|
|
that the solution to 'corruption' isn't to do away with warranted
|
|
searches or to dismantle the 'government.' The solution is to go to the
|
|
polls and carefully select your elected representatives.
|
|
Trust me. The potential for abusing any kind of private
|
|
information is far greater when it's in private hands. By and large,
|
|
the people working in government are more diligent and honest than those
|
|
in private industry (I would include Mr. Gersic in the former group
|
|
since his net address indicates he works for a university).
|
|
Few go into government service to get rich, though they may go
|
|
there to make their friends rich. There is a corruption problem in
|
|
politics and I've experienced it first-hand in a way that most of my
|
|
readers have not. The solution isn't to get rid of government, but
|
|
rather to get involved. I've seen the private sector at work too and I
|
|
think we fail to realize that private market economics is all too often
|
|
the prime cause of government corruption. If anything, we should be
|
|
distrustful of the market. We don't always have a vote in it. We do
|
|
with government.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 11 May 1995 14:18:23 EST
|
|
From: "Rob Slade, Social Convener to the Net" <roberts@MUKLUK.DECUS.CA>
|
|
Subject: File 6--(review) "Alive 0, Alive 1", Suzana Stojakovic-Celustka, 1994
|
|
MLALIVE.RVW 950508
|
|
|
|
"Alive 0, Alive 1", Suzana Stojakovic-Celustka, 1994
|
|
%A Suzana Stojakovic-Celustka celustka@sun.felk.cvut.cz
|
|
%B Alive Ejournal
|
|
%C Prague/Zagreb
|
|
%D March 1994, July 1994
|
|
%E Suzana Stojakovic-Celustka celustka@sun.felk.cvut.cz
|
|
%P Alive 0, 25K Alive 1, 100K
|
|
%S Alive
|
|
%T Alive 0, Alive 1
|
|
|
|
Suzana Celustka is part of the international virus research community. She
|
|
became active in research while attending university in Prague, but
|
|
comes originally from Croatia and is currently resident in Zagreb. In
|
|
1993 she attempted to spur development of a proper definition of a
|
|
viral program (which still eludes researchers and writers) by
|
|
promoting a virus definition contest. (She did put a bit of life into
|
|
the proceedings by calling for definitions not only in text and
|
|
mathematical forms, but also jokes and poetry.)
|
|
|
|
The lack of success in this area will be familiar to workers in the
|
|
field of artificial life, who have had similar difficulties in
|
|
delineating life. As it happens, this is another area of Ms.
|
|
Celustka's interests, and in 1994 she started "Alive" magazine,
|
|
distributed electronically, in order to examine the relation between
|
|
computer viral programs and artificial life.
|
|
|
|
Two editions of the magazine have been published so far, with a third
|
|
now in process. (The move back to Croatia and a period of ill health
|
|
contributed to the delay.) "Alive 0" is stated to be the zeroth, or
|
|
beta, edition, and explains the background of the project. It also
|
|
contains the results of the first contest the definition of a computer
|
|
virus in the technical categories. There are also articles on the
|
|
"lifelike" characteristics of code for LAN token regeneration and on
|
|
Cohen's theorem of the "undecidability" of viral detection.
|
|
|
|
In "Alive 1", Ms. Celustka contributes two articles herself, one on
|
|
the nature and limitations of language (in regard to the problem of
|
|
technical definition), and another on the "Great Debate" about the
|
|
benefits versus dangers of viral programs.
|
|
|
|
In addition to the feature and invited articles, each edition includes
|
|
an interview with at least one (and usually more) researcher prominent
|
|
in the field. The participants in "The Great Debate", for example,
|
|
were Fred Cohen (cf BKSHRTVR.RVW and BKITSALV.RVW), Mark Ludwig (cf
|
|
BKLUDWIG.RVW) and Vesselin Bontchev. The questions asked are incisive
|
|
and insightful.
|
|
|
|
Alive is available in a number of ways. Subscriptions requests should
|
|
be sent
|
|
to mxserver@ubik.demon.co.uk. Back issues are available from
|
|
ftp://ftp.informatik.uni-hamburg.de/pub/virus/texts/alive,
|
|
ftp://ftp.demon.co.uk/pub/antivirus/journal/alive,
|
|
ftp://ftp.elte.hu/pub/virnews, ftp://ftp.u.washington.edu/public/Alive,
|
|
gopher://saturn.felk.cvut.cz, and gopher://ursus.bke.hu. Send your
|
|
contributions and comments to celustka@sun.felk.cvut.cz.
|
|
|
|
Alive represents very real explorations in both virus and artificial
|
|
life research. The opinions and thought presented are sometimes
|
|
radical departures from mainstream discussion. With careful
|
|
moderation and editing, however, there is no chance of the "high
|
|
noise/low signal" traffic one usually sees in many more well known
|
|
fora. Alive is highly recommended for any interested in viral or
|
|
artificial life studies.
|
|
|
|
copyright Robert M. Slade, 1995 MLALIVE.RVW 950508
|
|
|
|
Postscriptum: As this review was being written, anti-personnel rounds
|
|
were falling on Zagreb. Although the situation seems to have eased,
|
|
momentarily, Croatia still does not seem to be a preferred situation
|
|
for raising a family. Although Ms. Celustka does not know I am adding
|
|
this message, I have reason to believe that she would appreciate any
|
|
assistance with employment or immigration which those in safer parts
|
|
of the world could give her.
|
|
|
|
=============
|
|
Vancouver ROBERTS@decus.ca | "The only thing necessary
|
|
Institute for Robert_Slade@sfu.ca | for the triumph of evil
|
|
Research into Rob_Slade@mindlink.bc.ca | is for good men to do
|
|
User slade@freenet.victoria.bc.ca | nothing."
|
|
Security Canada V7K 2G6 | - Edmund Burke
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CUDIGEST <your name>
|
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: Bits against the Empire BBS: +39-464-435189
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.39
|
|
************************************
|
|
|