822 lines
39 KiB
Plaintext
822 lines
39 KiB
Plaintext
|
|
Computer underground Digest Wed Jun 30, 1996 Volume 8 : Issue 50
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.50 (Wed, Jun 30, 1996)
|
|
|
|
File 1--CWD -- Jacking in from the "Keys to the Kingdom" Port
|
|
File 2--Sen. Crypto Hearing; SAFE Forum Cybercast; CDT on
|
|
File 3--Feds aim low
|
|
File 4--PROFS Case: State E-mail Regulations
|
|
File 5--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Wed, 3 Jul 1996 01:19:09 -0700 (PDT)
|
|
From: Declan McCullagh <declan@eff.org>
|
|
Subject: File 1--CWD -- Jacking in from the "Keys to the Kingdom" Port
|
|
|
|
CyberWire Dispatch // Copyright (c) 1996 //
|
|
|
|
|
|
Jacking in from the "Keys to the Kingdom" Port:
|
|
|
|
Washington, DC -- This is a tale of broken codes, betrayal of a social
|
|
contract, morality run amuck, and a kind of twisted John Le Carre
|
|
meets the Crying Game encounter.
|
|
|
|
For a range of companies producing so-called "blocking software"
|
|
designed to keep kids from accessing undesirable material in
|
|
cyberspace, the road to such a moral high ground turns out to be a
|
|
slippery slope. These programs, spawned in the wake of the hysteria
|
|
over how much porn Junior might find on the Net, have chosen the role
|
|
of online guardians. The resulting array of applications, including
|
|
names like SurfWatch, CyberPatrol, NetNanny and CyberSitter, acts as a
|
|
kind of digital moral compass for parents, educators, paranoid
|
|
Congressmen, and puritanical PTAs.
|
|
|
|
Install the programs and Junior can't access porn. No fuss, no muss,
|
|
no bother. "Parental empowerment" is the buzzword. Indeed, it was
|
|
these programs that helped sway the three-judge panel in Philly to
|
|
knock down the Communications Decency Act as unconstitutional.
|
|
|
|
But there's a darker side. A close look at the actual range of sites
|
|
blocked by these apps shows they go far beyond just restricting
|
|
"pornography." Indeed, some programs ban access to newsgroups
|
|
discussing gay and lesbian issues or topics such as feminism. Entire
|
|
*domains* are restricted, such as HotWired. Even a web site dedicated
|
|
to the safe use of fireworks is blocked.
|
|
|
|
All this might be reasonable, in a twisted sort of way, if parents
|
|
were actually aware of what the programs banned. But here's the rub:
|
|
Each company holds its database of blocked sites in the highest
|
|
security. Companies fight for market share based on how well they
|
|
upgrade and maintain that blocking database. All encrypt that list to
|
|
protect it from prying eyes --- until now.
|
|
|
|
Dispatch received a copy of each of those lists. With the codes
|
|
cracked, we now held the keys to the kingdom: the results of hundreds,
|
|
no, thousands of manhours of smut-surfing dedicated to digging up the
|
|
most obscene and pornographic sites in the world. And it's in our
|
|
possession. But it didn't come easy...
|
|
|
|
|
|
|
|
I'd just spent the better part of a muggy Washington night knocking
|
|
back boilermakers in an all-night Georgetown bistro waiting for a
|
|
couple of NSA spooks that never showed.
|
|
|
|
I tried to stumble to the door and an arm reached out and gently
|
|
shoved me back to my table. At the end of that arm was a leggy
|
|
redhead; she had a fast figure and even faster smile. There was a
|
|
wildness about her eyes and I knew it was the crank. But something
|
|
else wasn't quite right.
|
|
|
|
As I fought with my booze-addled brain, struggling to focus my eyes, I
|
|
noticed her adam's apple.
|
|
|
|
"Who needs this distraction," I thought, again wondering what kind of
|
|
comic hellhole I fell into that put me in the middle of yet another
|
|
bizarre adventure.
|
|
|
|
"I have something for you," she/he deadpanned. Red had the voice of a
|
|
baritone and a body you could break bricks on.
|
|
|
|
No introductions, no chit-chat. This was strictly business and for a
|
|
moment I thought I was being set up by the missing spooks. The hair on
|
|
the back of my neck stood on end.
|
|
|
|
Out from Red's purse came a CD-ROM. She/he shoved the jewel box across
|
|
the table. It was labeled: "The keys to the kingdom." What the fuck
|
|
was this? I must be on Candid Camera.
|
|
|
|
Red anticipated my question: "I can't say; I won't say. Just take it,
|
|
use it. That's all I'm supposed to say." And she/he got up, stretched
|
|
those mile-high legs, and loped into the night.
|
|
|
|
The next morning I slipped the disc in my Mac and the secret innards
|
|
of the net-blocking programs flowed across my screen. CyberPatrol,
|
|
SurfWatch, NetNanny, CyberSitter. Their encrypted files -- thousands
|
|
and thousands of web pages and newsgroups with the best porn on the
|
|
Net. Not surprising, really -- the net-blocking software companies
|
|
collect smut-reports from customers and pay college kids to grope
|
|
around the Net for porn.
|
|
|
|
This shit was good. Even half-awake with a major league hangover, I
|
|
could tell the smut-censoring software folks would go ballistic over
|
|
Red's delivery. To Junior, these lists would be a one-stop-porn-shop.
|
|
|
|
Susan Getgood from CyberPatrol emphasized this to Dispatch. She said:
|
|
"The printout of the 'Cybernot' list never *ever* leaves this
|
|
building. It's under lock and key... Once it left this building we'd
|
|
see it posted on the Net tomorrow. It would be contributing to the
|
|
problem it was designed to solve -- [it would be] the best source of
|
|
indecent material anywhere."
|
|
|
|
She's right. A recent version of CyberPatrol's so-called "Cybernot"
|
|
list featured 4,800 web sites and 250 newsgroups. That's a lot of
|
|
balloon-breasted babes.
|
|
|
|
CyberPatrol is easily the largest and most extensive smut-blocker. It
|
|
assigns each undesirable web site to at least one and often multiple
|
|
categories that range from "violence/profanity" to "sexual acts,"
|
|
"drugs and drug culture," and "gross depictions."
|
|
|
|
The last category, which includes pix of syphilis-infected monkeys and
|
|
greyhounds tossed in a garbage dump, has some animal-rights groups in
|
|
a tizzy. They told Dispatch that having portions of their sites
|
|
labeled as "gross depictions" is defamatory -- and they intend to sue
|
|
the bastards.
|
|
|
|
"We're somewhat incensed," said Christina Springer, managing director
|
|
of Envirolink, a Pittsburgh-based company that provides web space to
|
|
environmental and animal-rights groups. "Pending whether [our
|
|
attorney] thinks we have a case or not, we will actually pursue legal
|
|
actions against CyberPatrol."
|
|
|
|
Said Springer: "Animal rights is usually the first step that children
|
|
take in being involved in the environment. Ignoring companies like
|
|
Mary Kay that do these things to animals and allowing them to promote
|
|
themselves like good corporate citizens is a 'gross depiction.'"
|
|
|
|
CyberPatrol's Getgood responded: "We sent a note back to [the
|
|
Envirolink director] and haven't heard back from him. Apparently he's
|
|
happy with our decision. I still think the monkey with its eye gouged
|
|
out is a gross depiction."
|
|
|
|
Rick O'Donnell from the Progress and Freedom Foundation is amazed that
|
|
Envirolink would threaten legal action. "It's new technology. It's
|
|
trial-and-error... There will be glitches."
|
|
|
|
"Filtering software firms have the right to choose whatever site they
|
|
want to block since it's voluntary... Government-imposed [blocking] is
|
|
censorship. Privately-chosen is editing, discernment, freedom of
|
|
choice," he said.
|
|
|
|
The Gay and Lesbian Alliance Against Defamation (GLAAD) is as unhappy
|
|
as Envirolink. When Dispatch spoke with GLAAD's Alan Klein and rattled
|
|
off a list of online gay and lesbian resources that the overeager
|
|
blocking software censored, he was horrified.
|
|
|
|
"We take this very seriously," said Klein. "Lesbian and gay users
|
|
shouldn't be treated as second-class users on the Net. These companies
|
|
need to understand that they can't discriminate against lesbian and
|
|
gay users... We will take an active stance on this."
|
|
|
|
CyberPatrol blocks a mirror of the Queer Resources Directory (QRD) at
|
|
http://qrd.tcp.com/ and USENET newsgroups including clari.news.gays
|
|
(home to AP and Reuters articles) alt.journalism.gay-press, and
|
|
soc.support.youth.gay-lesbian-bi, Red's list revealed. CyberSitter
|
|
also bans alt.politics.homosexual and the QRD at qrd.org. NetNanny
|
|
blocks IRC chatrooms such as #gaysf and #ozgay, presumably discussions
|
|
by San Francisco and Australian gays.
|
|
|
|
GLAAD told Dispatch they were especially surprised that CyberPatrol
|
|
blocked gay political and journalism groups since the anti-defamation
|
|
organization has a representative on the "Cybernot" oversight
|
|
committee, which meets every few weeks to set policies. However,
|
|
Dispatch learned the oversight group never actually sees the
|
|
previously top-secret "Cybernot" list. They don't know what's *really*
|
|
banned.
|
|
|
|
Why should alt.journalism.gay-press, for instance, be blocked? There's
|
|
no excuse for it, said GLAAD's Klein. "A journalism newsgroup
|
|
shouldn't be blocked. It's completely unacceptable... This is such an
|
|
important resource for gay youth around the country. If it weren't for
|
|
the Net, maybe thousands of gay teens around the country would not
|
|
have come out and known there were resources for them."
|
|
|
|
He's right. Even a single directory at the QRD, such as the
|
|
Health/AIDS area, has vital information from the Centers for Disease
|
|
Control and Prevention, the AIDS Book Review Journal, and AIDS
|
|
Treatment News.
|
|
|
|
In response to Dispatch's questions about these sites being blocked,
|
|
CyberPatrol's Getgood said: "It doesn't block materials based on
|
|
sexual preference. If a site would be blocked if there are two
|
|
heterosexuals kissing, we'd block it if there are two homosexuals
|
|
kissing."
|
|
|
|
Fine, but we're not talking about gay porn here. What about some of
|
|
the political groups? "We'll look into it," said Getgood.
|
|
|
|
NetNanny is just as bad, argues GLAAD's Loren Javier, who called the
|
|
software's logging features "dangerous." (The program lets parents
|
|
review what their kids have been doing online.) "If you have someone
|
|
who has homophobic parents, it gives them a way of keeping tabs on
|
|
their kid and possibly making it worse for their children," said
|
|
Javier.
|
|
|
|
Worse yet, CyberPatrol doesn't store the complete URL for blocking --
|
|
it abbreviates the last three characters. So when it blocks the
|
|
"CyberOS" gay video site by banning http://www.webcom.com/~cyb,
|
|
children are barred from attending the first "Cyber High School" at
|
|
~cyberhi, along with 16 other accounts that start with "cyb." In
|
|
attacking Shawn Knight's occult resources at
|
|
http://loiosh.andrew.cmu.edu/~sha, the program cuts off 23 "sha"
|
|
accounts at Carnegie Mellon University, including Derrick "Shadow"
|
|
Brashear's web page on Pittsburgh radio stations.
|
|
|
|
The geeks at CMU's School of Computer Science had fun with this. In
|
|
March they cobbled together a "Banned by CyberPatrol" logo that they
|
|
merrily added to their blocked homepages:
|
|
http://nut.compose.cs.cmu.edu/images/ban3.gif
|
|
|
|
NetNanny also has a fetish for computer scientists. For instance, it
|
|
blocks all mailing lists run out of cs.colorado.edu -- including such
|
|
salacious ones as parallel-compilers, systems+software, and
|
|
computer-architecture. Guess those computer geeks talk blue when
|
|
they're not pumping out C code.
|
|
|
|
Dispatch asked Getgood why CyberPatrol blocks access to other
|
|
seemingly unobjectionable web sites including the University of
|
|
Newcastle's computer science department, the Electronic Frontier
|
|
Foundation's censorship archive, and the League for Programming
|
|
Freedom at MIT, a group that opposes software patents.
|
|
|
|
Getgood replied via email: "I'll forward this message to our Internet
|
|
Research Supervisor and have her look into the specific sites you
|
|
mention..." She said there is a "fair process" for appeals of
|
|
unwarranted blocking.
|
|
|
|
But CyberPatrol doesn't stop at EFF and MIT. It also goes after gun
|
|
and Second Amendment pages including http://www.shooters.com/,
|
|
http://www.taurususa.com/, http://206.31.73.39/, and
|
|
http://www-199.webnexus.com/nra-sv/, according to a recent "Cybernot"
|
|
list.
|
|
|
|
The last site is run by the National Rifle Association (NRA) Members'
|
|
Council of Silicon Valley, and bills itself as "the NRA's grass roots
|
|
political action and education group for the San Jose, Santa Clara,
|
|
Milpitas, and surrounding areas."
|
|
|
|
Peter Nesbitt, an air-traffic controller who volunteers as part of the
|
|
Silicon Valley NRA group, says "it's terrible" that CyberPatrol blocks
|
|
gun-rights web sites. "The people who are engaging in censoring gun
|
|
rights or gun advocates groups are the opposition who want to censor
|
|
us to further their anti-gun agenda."
|
|
|
|
An unlikely bedfellow, the National Organization of Women (NOW) ain't
|
|
too pleased neither. Of course, they're unlikely to feel any other way
|
|
-- CyberSitter blocks their web site at www.now.org.
|
|
|
|
Not to be outdone, NetNanny blocks feminist newsgroups while
|
|
CyberSitter slams anything dealing with "bisexual" or "lesbian"
|
|
themes." CyberPatrol beats 'em all by going after alt.feminism,
|
|
alt.feminism.individualism, soc.feminism, clari.news.women,
|
|
soc.support.pregnancy.loss, alt.homosexual.lesbian, and
|
|
soc.support.fat-acceptance.
|
|
|
|
Dispatch reached Kim Gandy, NOW's executive vice president, at home as
|
|
she was preparing dinner for her 3-year old daughter. Gandy charged
|
|
the companies with "suppressing information" about feminism. She said:
|
|
"As a mother myself, I'd like to limit my kids from looking at
|
|
pornography but I wouldn't want my teenage daughter [prevented] from
|
|
reading and participating in online discussions of important current
|
|
issues relating to womens rights."
|
|
|
|
An indignant NOW? Let 'em rant, says CyberSitter's Brian Milburn. "If
|
|
NOW doesn't like it, tough... We have not and will not bow to any
|
|
pressure from any organization that disagrees with our philosophy."
|
|
|
|
Unlike the others, CyberSitter doesn't hide the fact that they're
|
|
trying to enforce a moral code. "We don't simply block pornography.
|
|
That's not the intention of the product," said Milburn. "The majority
|
|
of our customers are strong family-oriented people with traditional
|
|
family values. Our product is sold by Focus on the Family because we
|
|
allow the parents to select fairly strict guidelines." (Focus on the
|
|
Family, of course, is a conservative group that strongly supports the
|
|
CDA.)
|
|
|
|
Dispatch particularly enjoyed CyberSitter's database, which reads like
|
|
a fucking how-to of conversations the programmers thought distasteful:
|
|
|
|
[up][the,his,her,your,my][ass,cunt,twat][,hole]
|
|
[wild,wet,net,cyber,have,making,having,getting,giving,phone][sex...]
|
|
[,up][the,his,her,your,my][butt,cunt,pussy,asshole,rectum,anus]
|
|
[,suck,lick][the,his,her,your,my][cock,dong,dick,penis,hard on...]
|
|
[gay,queer,bisexual][male,men,boy,group,rights,community,activities...
|
|
[gay,queer,homosexual,lesbian,bisexual][society,culture]
|
|
[you][are][,a,an,too,to][stupid,dumb,ugly,fat,idiot,ass,fag,dolt,dummy
|
|
|
|
|
|
CyberSitter's Milburn added: "I wouldn't even care to debate the
|
|
issues if gay and lesbian issues are suitable for teenagers. If they
|
|
[parents] want it they can buy SurfWatch... We filter anything that
|
|
has to do with sex. Sexual orientation [is about sex] by virtue of the
|
|
fact that it has sex in the name."
|
|
|
|
That's the rub. It's a bait and switch maneuver. The smut-censors say
|
|
they're going after porn, but they quietly restrict political speech.
|
|
|
|
All this proves is that anyone setting themselves up as a kind of
|
|
digital moral compass quickly finds themselves plunged into a kind of
|
|
virtual Bermuda Triangle, where vertigo reigns and you hope to hell
|
|
you pop out the other side still on course. Technology is never a
|
|
substitute for conscience.
|
|
|
|
And for anyone thinking of making an offer for the disc, forget it.
|
|
Like a scene out of Mission Impossible, we came back from a late-night
|
|
binge to find the CD-ROM melted and the drive smoldering. Thank God
|
|
there's a backup somewhere. Red, get in touch.
|
|
|
|
Meeks and McCullagh out...
|
|
|
|
-------------
|
|
|
|
While Brock N. Meeks (brock@well.com) did the heaving drinking for
|
|
this article, Declan B. McCullagh (declan@well.com) did the heavy
|
|
reporting.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 28 Jun 1996 19:12:18 -0400
|
|
From: Bob Palacios <editor@cdt.org>
|
|
Subject: File 2--Sen. Crypto Hearing; SAFE Forum Cybercast; CDT on
|
|
|
|
From: CDT POLICY POST Volume 2, Number 26 June 28, 1996
|
|
|
|
|
|
(1) SENATE ENCRYPTION HEARING ILLUSTRATES SEA CHANGE IN POLICY DEBATE
|
|
|
|
On Wednesday June 26, 1996 the Senate Commerce Subcommittee on Science,
|
|
Space, and Technology held a hearing to consider legislation designed to
|
|
encourage the widespread availability of strong, easy-to-use, privacy and
|
|
security technologies for the Internet. Wednesday's hearing illustrated
|
|
that a sea change has occurred in Congressional attitude towards the
|
|
encryption policy debate.
|
|
|
|
While members of the Subcommittee noted the complex law enforcement issues
|
|
raised by the encryption policy debate, the Senators also recognized that
|
|
because of the global nature of the Internet, top down regulations such as
|
|
export controls and centralized government mandates like the Clipper
|
|
schemes will not address the needs of individuals, business, and even law
|
|
enforcement in the Information Age.
|
|
|
|
In addition, several Senators noted that future of electronic commerce,
|
|
privacy, and the competitiveness of the US computer industry should not be
|
|
held hostage to law enforcement considerations.
|
|
|
|
This change in Congressional attitude towards encryption policy is
|
|
significant and extremely encouraging.
|
|
|
|
Wednesday's hearing was also significant because it was the first ever
|
|
Congressional hearing cybercast live on the Internet. Details on the
|
|
Cybercast are attached below.
|
|
|
|
The hearing, chaired by Senator Conrad Burns (R-MT), was called to consider
|
|
the Promotion Of Commerce Online in the Digital Era (Pro-CODE) legislation,
|
|
which would relax current regulations restricting the export of strong
|
|
encryption.
|
|
|
|
Witnesses testifying before the panel included:
|
|
|
|
* Phil Zimmermann, Inventor of PGP
|
|
* Whit Diffie, Sun Microsystems, Father of Public-Key Cryptography
|
|
* Phil Karn, Qualcomm Inc, Cryptographer
|
|
* Marc Rotenberg, Director, Electronic Privacy Information Center
|
|
* Jerry Berman, Executive Director, Center for Democracy and Technology
|
|
* Matt Blaze, Lucent Technologies Cryptographer,
|
|
* Barbara Simons, Chair of US Public Policy Committee, ACM
|
|
* And 135 Netizens (http://www.crypto.com)
|
|
|
|
CDT Executive Director Jerry Berman also testified before the Subcommittee.
|
|
Noting that the current US encryption policy has left individual Internet
|
|
users without adequate privacy and businesses without necessary security,
|
|
Berman urged Congress to instead move forward to reform US policy based on
|
|
the following principals:
|
|
|
|
* THE INTERNET IS NOT LIKE A TELEPHONE SYSTEM: The traditional approach
|
|
to wiretapping cannot simply be extended to the Internet. This new
|
|
medium encompasses a range of social functions far beyond simple two-
|
|
way voice communication. These broad activities demand a heightened
|
|
capacity for uses to protect their security and privacy online.
|
|
|
|
* THE INTERNET IS A GLOBAL, DECENTRALIZED MEDIUM: Efforts to impose
|
|
unilateral national policies -- such as export controls or key escrow
|
|
proposals -- are unlikely to be accepted widely. Decentralized user
|
|
choice solutions to privacy problems are preferable to and more
|
|
effective than centralized, governmental mandates (such as the
|
|
Clipper proposals).
|
|
|
|
* ON THE INTERNET, THE BILL OF RIGHTS IS A LOCAL ORDINANCE:
|
|
Constitutional guarantees of privacy and free expression to U.S.
|
|
Citizens whose communications regularly cross national borders.
|
|
Policies should be designed to protect Americans outside the shelter
|
|
of U.S. law.
|
|
|
|
Berman expressed CDT's strong support for Congressional efforts to reform
|
|
US Encryption policy, and urged Congress to act quickly to liberalize
|
|
export controls and provide American Internet users with the strong
|
|
security and privacy they so badly need.
|
|
|
|
Audio transcripts of the Hearing, copies of the prepared statements of the
|
|
witnesses, and other background information is available at CDT's
|
|
encryption policy web page: http://www.cdt.org/crypto/
|
|
|
|
HEARING SHOWS NEW SENSE OF URGENCY AND FOCUS IN CONGRESS
|
|
|
|
The clearest example of the emerging frustration in Congress with the
|
|
current export restrictions came in an exchange between Senator John
|
|
Aschroft (R-MO) and Phil Karn, a cryptographer with Qualcomm and a
|
|
plaintiff in a case challenging the export restrictions:
|
|
|
|
Sen. Aschroft: So for all other countries, the world is the market, but
|
|
for American companies, America is the only market and
|
|
the rest of the world is off limits?
|
|
|
|
Karn: You've got it.
|
|
|
|
Sen. Aschroft: Mr. Chairman, I think that's one of the reasons we need
|
|
to look very carefully at the bill (Pro-CODE) we are
|
|
looking at here today...
|
|
|
|
Sen. Aschroft: In all our discussions about whether it (cryptography) is
|
|
good or bad, we ignore the fact that it's THERE, and it
|
|
can be available to Americans by American companies, it
|
|
cannot be available to anyone else by American companies,
|
|
but it can be available around the world by a company in
|
|
any other country.
|
|
|
|
This exchange, as well as strong statements in support of the Burns
|
|
Pro-CODE bill from Senators Patrick Leahy (D-VT), Ron Wyden (D-OR), and
|
|
Representative Bob Goodlatte (R-VA), who made the unusual move of coming to
|
|
a Senate hearing, show that Congress is finally giving the need to reform
|
|
US encryption policy serious support.
|
|
|
|
A hearing of the full Senate Commerce Committee, chaired by Senator Larry
|
|
Pressler (R-SD) is expected in mid July. Representatives from the
|
|
Administration and Law Enforcement agencies are expected to testify. CDT
|
|
is working with Senator Burns' and Senator Pressler to bring that hearing
|
|
live online. Check CDT's "Congress and the Net" Web Page at
|
|
http://www.cdt.org/net_congress/
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 25 Jun 1996 07:07:19 -0400 (EDT)
|
|
From: Noah <noah@enabled.com>
|
|
Subject: File 3--Feds aim low
|
|
|
|
(Headers removed)
|
|
|
|
-Noah
|
|
==========================================================
|
|
|
|
From--Rogue Agent :::
|
|
|
|
Feds aim low on hacker crackdown
|
|
by Lewis Z. Koch
|
|
Upside Online News, June 21 1996
|
|
|
|
Nineteen-year-old Christopher Schanot of St. Louis, Mo. has been
|
|
languishing in a Federal jail since March 25, 1996, charged with four
|
|
counts of computer hacking. He is not allowed to post bond, because
|
|
Federal authorities contend he is "a computer genius intent on
|
|
infiltrating computer systems of some of the largest companies and
|
|
entities in the country," and because a jailhouse snitch claims Schanot
|
|
bragged he would run away if he were released. He has never been charged
|
|
with a crime or arrested before.
|
|
|
|
So, why should you be concerned about a young, middle-American kid hacker?
|
|
|
|
It's comforting to know that government police agencies are combating the
|
|
wave of billion-dollar computer thievery. The question is: should Schanot,
|
|
and people like him, be their target?
|
|
|
|
It appears that thousands of Federal hours and hundreds of thousands of
|
|
dollars were spent to catch this Wendy's burger-tossing hacker and
|
|
charging him with crimes for which he could spend 30 years in jail and owe
|
|
a $1.25 million fine -- the kind of fine leveled at international
|
|
narco-terrorists. First, however, Schanot will have to cough up the $225
|
|
he owed in back rent at the time he was arrested.
|
|
|
|
Schanot's problems began after he ran away from home on May 30, 1995,
|
|
taking some of his disks, a hard drive and personal items. According to a
|
|
knowledgeable source close to Schanot, Chris felt his parents, especially
|
|
his father Michael, didn't understand or respect him.
|
|
|
|
Less rocky, it seems, was his relationship with Netta Gilboa, a
|
|
38-year-old woman living near Philadelphia. Gilboa is editor-in-chief and
|
|
publisher of _Gray Areas_, a slick, text-heavy, irregular magazine that
|
|
explores the "grey areas" of "alternative lifestyles and deviant
|
|
subcultures."
|
|
|
|
_Gray Areas_ is concerned with what's happening on the edges of law,
|
|
music, technology, popular culture -- who is pushing the envelope and how
|
|
they are doing it. Hooker housewives. Hacking. Psychoanalysis and
|
|
feminism. Computer crime. Music. Porno film stars. The usual suspects. It
|
|
provides interesting, in-depth coverage of these areas, but it ain't quite
|
|
_Foreign Affairs_ or _The Public Interest_.
|
|
|
|
There is no doubt that Schanot and Gilboa had talked on the phone before
|
|
Schanot left home. Schanot told her how he was unhappy in St. Louis, that
|
|
he didn't have many friends and hated high school. So Gilboa dug into her
|
|
purse and bought Schanot a ticket to Philadelphia so he could live with
|
|
her.
|
|
|
|
When he disappeared from home, Schanot's parents did the usual thing --
|
|
they called the cops and the FBI. But Schanot didn't attract much police
|
|
attention until the feds quizzed one of his friends, who said that Schanot
|
|
had been hacking.
|
|
|
|
According to a government memorandum in the suppressed indictment, Schanot
|
|
told one of his buddies what he was doing, where he was running and with
|
|
whom he was going to live. He needed to "lie low" because, as his buddy
|
|
later told the FBI, Schanot said he had been hacking and feared he was in
|
|
trouble with the law.
|
|
|
|
FBI agents returned to Schanot's home and asked his parents if they could
|
|
look through his room. It might give them a clue as to where Schanot could
|
|
be. (Didn't anyone want to check the phone bill and ask who Schanot was
|
|
talking to in Philadelphia?) The feds left with a computer hard drive,
|
|
some disks and some of Schanot's notes.
|
|
|
|
The feds dug deeply into his hard drive, scanned his disks, and read his
|
|
papers. Now comes the tricky part. Follow the bouncing ball . . .
|
|
|
|
According to the memorandum, the government has evidence that Schanot may
|
|
have ties to (are you ready for this?) the long-feared Internet Liberation
|
|
Front (ILF). It is important to note that there is absolutely no truth to
|
|
the rumor that the ILF has ties with the NLF -- the dreaded North
|
|
Vietnamese National Liberation Front, which the U.S. government once said
|
|
might be landing black pajama-clad Viet Cong guerillas onto the shore near
|
|
San Diego.
|
|
|
|
The ILF, however, is the group accused of the 1994 vandalizing of service
|
|
to Pipeline, an Internet service provider, causing it to go off-line for
|
|
several hours, as well as disrupting the electronic mailbox belonging to
|
|
General Electric/NBC/Channel 4 in New York. Both Pipeline and GE/NBC
|
|
reported they had been hacked.
|
|
|
|
The government memorandum states it has evidence tying Schanot to the ILF,
|
|
including a "typewritten list of questions and answers that correspond to
|
|
the ILF interview [with references to Pipeline and GE/NBC] . . . saved to
|
|
Schanot's computer on January 22 , 1995, at least three months before the
|
|
issue of _Gray Areas_ containing the [ILF] interview was released." That
|
|
is hard to explain, but curiously the government has chosen -not- to
|
|
indict or charge Chris with any infractions against Pipeline or GE/NBC.
|
|
|
|
The memorandum also says the Feds found other ILF messages, including the
|
|
famous "FEAR US!" ILF manifesto in his hard drive, as well as files
|
|
containing "hundreds of passwords to various multinational corporations,
|
|
universities, governmental organizations, military contractors and credit
|
|
reporting agencies." The computer allegedly also contained a file of
|
|
hundreds of credit card numbers and AT&T calling card numbers. But once
|
|
again, -no indictment-.
|
|
|
|
No doubt, Schanot may have to come up with a believeable explanation of
|
|
why his computer allegedly had some of ILF quotes in its hard drive three
|
|
months before Gilboa published them in her magazine, and why he had all
|
|
those passwords. But he probably won't have to offer those explanations
|
|
under oath, because there's no indictment stemming from that evidence.
|
|
|
|
As for those "hundreds of credit card numbers and AT&T calling card
|
|
numbers," there is one indictment against Chris pertaining to that
|
|
evidence -- illegal use of three Sprint calling card numbers for "an
|
|
aggregate value of one thousand ($1,000) or more, said use affecting
|
|
interstate commerce."
|
|
|
|
What is the evidence against Chris? Federal authorities contend that
|
|
while Schanot's busy little fingers were typing away at his keyboard he
|
|
found a security hole in a computer known as "bigbird" -- belonging to
|
|
Southwestern Bell and caused a loss of $1,000 or more during the period
|
|
of October 23, 1994 to April 23, 1995. The indictment includes those
|
|
stolen card numbers from Sprint and an uninvited visit to Bell
|
|
Communications Research and SRI -- no big-bucks damage, and it was all
|
|
fixed pretty quickly.
|
|
|
|
Apparently, Southwestern Bell did not report being hacked. Fact is, it may
|
|
not even have known that an unauthorized person had come to visit.
|
|
According to sources, the FBI visited Southwestern Bell and asked about
|
|
"bigbird," i.e., had there been any damage from illegal and unauthorized
|
|
entry? Whaddaya know? Somebody had made an unannounced visit or two!
|
|
|
|
The FBI wanted to know in dollars and cents what the smart little runaway
|
|
had cost the company, because the FBI isn't interested in low-dollar
|
|
crimes, and the U.S. Attorney's office has enough prime-time crime on its
|
|
hands to keep assistant federal attorneys busy without adding $100 cases
|
|
to its inventory.
|
|
|
|
Kind of hard to figure out, Southwestern Bell responded. Try, said the
|
|
FBI. Southwestern Bell huffed and puffed and came up with a figure of
|
|
$500,000. Now, that's a figure you can take to the U.S. Attorney and get
|
|
an indictment, maybe some headlines, even a promotion to headquarters in
|
|
D.C. Only it turns out that Southwestern Bell fudges a bit. There wasn't
|
|
$500,000 worth of damage to "bigbird," but $500,000 Southwestern Bell
|
|
spent repairing the security hole Schanot uncovered.
|
|
|
|
Let's be very clear here. The security hole was there. Schanot didn't
|
|
create it. He found it.
|
|
|
|
The Feds were no longer looking for a runaway teen, but rather an
|
|
arch-criminal/diabolical mastermind, "a computer genius intent on
|
|
infiltrating computer systems of some of the largest companies and
|
|
entities in the country, and compromising the security of those systems,
|
|
enabling him to seize control of those computers," as the U.S. Attorney's
|
|
office put it. What did the Justice Department have in mind, "War Games"?
|
|
|
|
When arch-criminal/mastermind Schanot was arrested by FBI agents, he was
|
|
paying Social Security taxes under his own name, slinging burgers at
|
|
Wendy's to earn a living. Considering his reputation with the feds, you
|
|
would have thought he'd have been downloading proprietary information
|
|
from the Human Genome Project or playing hide-the-billions with some fat
|
|
Boston banks.
|
|
|
|
Schanot was arrested without a struggle. Were you expecting him to go a la
|
|
James Cagney, just before he was immolated by the fiery inferno in "White
|
|
Heat," screaming out to the cops below, "Top o' the world, Ma! Top o' the
|
|
world!"? So Schanot wound up in a Philadelphia jail.
|
|
|
|
There was a bond hearing, because most people who aren't charged with
|
|
first-degree murder, treason or bombing the World Trade Center, can be
|
|
freed on bond. But the federal prosecutor wasn't taking any chances with a
|
|
burger-slinging, computer break-in demon. If Schanot is freed on bond,
|
|
the prosecutor insists, he must not be allowed near a computer, must not
|
|
talk about computers on the phone, must not be allowed to even tinker with
|
|
a phone, lest he crash every telco in the land . . . or maybe round the
|
|
edges on every square Wendy's burger.
|
|
|
|
Then, according to the feds, just as Schanot was to be released from the
|
|
slammer, the cunning, insightful hacker allegedly told one of his new jail
|
|
buddies that as soon as he was released, he would run away.
|
|
|
|
Schanot is probably in jail because he bragged, because he showed off,
|
|
because he behaved like a 17-year-old computer genius who is as
|
|
emotionally immature as he is bright. In fact, Schanot may be guilty of,
|
|
well, acting his age. Federal authorities have a hard time understanding
|
|
that young adolescents sometimes behave like adolescents.
|
|
|
|
It's true, among wanna-know adolescent computer crackers who just want to
|
|
break in, look around and learn something without doing any harm there are
|
|
others with a degree of criminal intent. But their criminality seems a tad
|
|
less serious than selling crack or carrying Uzis as they take part in
|
|
drive-by shootings. Some create frightening names for their (four- or
|
|
five-member) gangs, such as "Legion of Doom" or "Masters of Destruction."
|
|
They pick fear-inspiring pen names such as "Scorpion," "Phiber Optic," "
|
|
Zod," "The Wing," "Damage" or "Acid Phreak." (Aren't we having fun!)
|
|
They're just thieving hacker kids stealing phone card numbers, credit card
|
|
numbers, hassling others, reading other people's e-mail, and sometimes
|
|
bringing e-mail systems down.
|
|
|
|
It's wrong, illegal -- no question. But is it big-time hacker crime?
|
|
|
|
Even journalists are caught in the game, dubbing schlepper Kevin Mitnick
|
|
"the dark side hacker," as if he were accompanied by Satan. In the media,
|
|
hackers are often depicted with brimstone wafting over their heads and new
|
|
120 MHz Pentium laptops at hand.
|
|
|
|
The adolescent hacker/cracker's criminality and destructiveness pale in
|
|
comparison to their street gang counterparts in the Gangster Disciples,
|
|
Vice Lords, Latin Kings or Maniac Latin Disciples, who have an estimated
|
|
100,000 members in Chicago alone, according to the Chicago Crime
|
|
Commission. These gangs peddle millions of dollars in drugs, murder and
|
|
terrorize entire neighborhoods as well as the jails and prisons (And don't
|
|
forget about the serious hackers and their yearly billions).
|
|
|
|
Gilboa says Chris has met a lot of new people in jail -- mafia members,
|
|
child molesters, etc. Travel can be so enlightening.
|
|
|
|
The government, with its limited resources, needs to make a simple
|
|
business decision: should it continue harassing and jailing teenage
|
|
hackers for specious or petty crimes, or should it concentrate its efforts
|
|
on catching true criminal cyberthieves who roam free, stealing their
|
|
annual quota of billions of dollars in computer secrets? It's your tax
|
|
dollar, your secrets, your kids.
|
|
|
|
Stay tuned. Keep your bookmark turned to this station.
|
|
|
|
----------
|
|
|
|
RA
|
|
|
|
agent@l0pht.com (Rogue Agent/SoD!/TOS/attb) - pgp key on request
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 3 Jul 1996 14:33:07 -0400 (EDT)
|
|
From: Eddie Becker <ebecker@CNI.ORG>
|
|
Subject: File 4--PROFS Case: State E-mail Regulations
|
|
|
|
Florida, Maryland decide e-mail messages are public records
|
|
|
|
--A pair of attorney general opinions issued in Maryland
|
|
and Florida in May have declared that e-mail messages are public
|
|
records subject to disclosure.
|
|
In Maryland, Attorney General Joseph Curran responded in late May
|
|
to two questions concerning e-mail: first, does the Maryland Open
|
|
Meetings Act prohibit e-mail communications among a quorum of members
|
|
of a public body, and second, does the Maryland Public Information Act
|
|
apply to e-mail communications?
|
|
The Attorney General found that the Open Meetings Act does not
|
|
apply to e-mail communications among members of a public body, unless
|
|
a quorum of a public body is engaged in a simultaneous exchange of e-
|
|
mail on a matter of public business.
|
|
Curran also found that an e-mail message sent between government
|
|
officials "surely falls within [the] definition" of public records
|
|
under the Public Information Act. "[E]ven if the message was never
|
|
printed, the version of the e-mail message retained in the computer's
|
|
storage would also be a `public record,'" Mr. Curran opined.
|
|
Florida Attorney General Robert Butterworth issued a similar
|
|
opinion in mid-May.
|
|
The Sarasota County Property Appraiser had asked for an opinion
|
|
on whether e-mail messages made or received by the employees of the
|
|
appraiser's office or to other governmental agencies were "public
|
|
records" under the law, and whether, and for how long and in what form
|
|
such messages must be saved.
|
|
Reposting this brief *with permission* from:
|
|
NEWS MEDIA UPDATE - Digest version VOL. 2, NO. 9 July 1, 1996
|
|
published by the Reporters Committee for Freedom of the Press
|
|
Note: Anyone can subscribe *free* to the digest:
|
|
send e-mail to rcfp@rcfp.org with "subscribe"
|
|
(without quotes) as the subject.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 5--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.50
|
|
************************************
|
|
|