801 lines
36 KiB
Plaintext
801 lines
36 KiB
Plaintext
|
|
Computer underground Digest Tue June 10, 1997 Volume 9 : Issue 44
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.44 (Tue, June 10, 1997)
|
|
|
|
File 1--Sen Murkowski's comments on S 771 (anti-spam bill)
|
|
File 2--NASA Nabs Teen Computer Hacker
|
|
File 3--Phil Zimmermann on PGP's future, lawsuits, next steps
|
|
File 4-- TEXANS SUE TO RECOVER DAMAGES FOR INTERNET "SPAM"
|
|
File 5--Purpose of CuD
|
|
File 6--Re: Germany "cybercops" battle offensive speech, violent games
|
|
File 7--RE: Anti-Spam bills....
|
|
File 8--Invitation - Interop Security Teleconference
|
|
File 9--Beyond Hope "Hackers Conference" '97
|
|
File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Thu, 29 May 1997 16:49:16 -0500
|
|
From: jthomas2@SUN.SOCI.NIU.EDU(Jim Thomas)
|
|
Subject: File 1--Sen Murkowski's comments on S 771 (anti-spam bill)
|
|
|
|
((MODERATORS' NOTE: Following is the introductin to Senator
|
|
Murkowski's note, obtained from his homepage))
|
|
|
|
S. 771
|
|
The Unsolicited
|
|
Commercial Email
|
|
Choice Act of 1997
|
|
|
|
I introduced S. 771, the Unsolicited Commercial Email Choice Act of
|
|
1997, on May 21, 1997 to combat the growing cost to society of
|
|
unsolicited bulk electronic mail messages. All Americans including
|
|
Alaskans waste time and money having to receive and delete unsolicited
|
|
commercial e-mails. Rural Americans pay transmission charges to
|
|
receive this unwanted information. While the cost of these
|
|
transmission charges may not be extreme, I fail to see why any
|
|
American should bear any costs for receiving something they did not
|
|
ask for.
|
|
|
|
Please note that my bill does not ban such emails. Some may oppose
|
|
this approach. However, I have no desire to set a precedent of the
|
|
government telling you what you can and cannot see in your inbox. My
|
|
bill merely provides a means for Internet users to filter out e-mails
|
|
that they do not wish to receive by requiring that senders of
|
|
unsolicited e-mails to include Advertisement as the first word of the
|
|
subject line and that the real street address, e-mail address and a
|
|
telephone number be contained within the body of the message. Routing
|
|
information that accompanies the message must also be accurate.
|
|
|
|
Internet users can request that their ISP filter out all such emails
|
|
at their request. ISP's can also unilaterally block all such inbound
|
|
messages. Consumers who are disappointed with a unilateral blocking
|
|
policy of their ISP can always seek another ISP that allows such
|
|
messages on its network. Per their ISP policy, Internet users can also
|
|
choose to receive such messages and filter them individually by seeing
|
|
the Advertisement tag and using the delete key or to stop them
|
|
permanently from specific senders by sending a message to that effect
|
|
to the original e-mail originating address.
|
|
|
|
Some have raised the concern that an offshore marketer sending out
|
|
junk e-mails would be beyond the reach of these restrictions. It is
|
|
certainly true that no bill that Congress passes can reach directly
|
|
beyond American territory. This does not mean, however, that S. 771
|
|
would not have an impact upon marketers who mass e-mail from overseas.
|
|
If the initiator of the message has a meaningful presence in the
|
|
United States such as an office, parent company, bank to deposit
|
|
funds, etc..., S. 771 would still reach these marketers under what's
|
|
generally known as "long arm jurisdiction." I feel that most Americans
|
|
would be hesitant to send money overseas to order from an item
|
|
advertised in an unsolicited e-mail.
|
|
|
|
As with most Internet users, I have no personal objection to the
|
|
concept of unsolicited commercial e-mails if those who receive them
|
|
actually want to receive them. Today, Internet users subscribe to
|
|
electronic mailing lists of their own free will and whatever topic
|
|
they choose.
|
|
|
|
The Internet is an excellent tool for commerce though the use of
|
|
commercial world wide web sites. However, America should be not be
|
|
burdened by unwanted commercial e-mail.
|
|
|
|
I welcome the Internet community's comments and suggestions on this
|
|
bill. Please feel free to make them to me at
|
|
commercialemail@murkowski.senate.gov
|
|
|
|
Signature
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 04 Jun 1997 22:32:06 -0400
|
|
From: "Evian S. Sim" <evian@escape.com>
|
|
Subject: File 2--NASA Nabs Teen Computer Hacker
|
|
|
|
.c The Associated Press
|
|
Monday, June 2, 1997
|
|
|
|
WASHINGTON (AP) - A Delaware teen-ager who hacked his way into a
|
|
NASA web site on the Internet and left a message berating U.S.
|
|
officials is being investigated by federal authorities, agency
|
|
officials said Monday.
|
|
|
|
NASA Inspector General Robert Gross cited the incident - the most
|
|
recent example of a computer invasion of a NASA web site - as an
|
|
example of how the space agency has become ``vulnerable via the
|
|
Internet.''
|
|
|
|
"We live in an information environment vastly different than 20
|
|
years ago," Gross said in a written statement. "Hackers are
|
|
increasing in number and in frequency of attack."
|
|
|
|
In the latest case, the Delaware teen, whose name, age and
|
|
hometown were not released, altered the Internet web site for the
|
|
Marshall Space Flight Center in Huntsville, Ala., according to
|
|
the statement from the computer crimes division of NASA's
|
|
Inspector General Office.
|
|
|
|
"We own you. Oh, what a tangled web we weave, when we practice to
|
|
deceive," the teen's message said, adding that the government
|
|
systems administrators who manage the site were "extremely
|
|
stupid."
|
|
|
|
The message also encouraged sympathizers of Kevin Mitnick, a
|
|
notorious computer hacker, to respond to the site. Mitnick was
|
|
indicted last year on charges stemming from a multimillion-dollar
|
|
crime wave in cyberspace.
|
|
|
|
The altered message was noticed by the computer security team in
|
|
Huntsville but the NASA statement did not mention how long the
|
|
message was available to the public or exactly when it was
|
|
discovered. NASA officials weren't made available to answer
|
|
questions about the event.
|
|
|
|
In the statement, NASA called the teen's hacking "a cracking
|
|
spree" and said it was stopped May 26 when his personal computer
|
|
was seized.
|
|
|
|
Prosecutors from the U.S. Attorney's office in Delaware and
|
|
Alabama are handling the case with NASA's computer crimes
|
|
division.
|
|
|
|
Last March, cyberspace invaders made their way into another NASA
|
|
web site and threatened an electronic terrorist attack against
|
|
corporate America. The group, which called itself ``H4G1S'' in
|
|
one message and ``HAGIS'' in another, also called for some
|
|
well-known hackers to be released from jail.
|
|
|
|
Engineers at the Goddard Space Flight Center in Greenbelt, Md.,
|
|
quickly noticed the change and took the page off the Internet
|
|
within 30 minutes. NASA officials said the agency installed
|
|
electronic security measures designed to prevent a recurrence.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 6 Jun 1997 19:51:15 -0400
|
|
From: Declan McCullagh <declan@well.com>
|
|
Subject: File 3--Phil Zimmermann on PGP's future, lawsuits, next steps
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
((Fwd from Phil Zimmerman))
|
|
|
|
Last month, Pretty Good Privacy Inc went through a reorganization in
|
|
its top management. We were spending too much money, too fast. Tom
|
|
Steding was replaced by Phil Dunkelberger as the president of PGP, and
|
|
I handed over the chairman title to Jonathan Seybold, who had been, with
|
|
me, the original cofounder of the company. Jonathan is devoting his time
|
|
to the business side of things, while I am focussing my attention on my
|
|
role as chief technology officer.
|
|
|
|
I have seen some speculation in some usenet newsgroups that these changes
|
|
were in some way connected with the fact that PGP was recently sued by RSA
|
|
Data Security over some dispute regarding royalties for use of the RSA
|
|
patent, which PGP holds a license to. Let me set the record straight
|
|
on this. There are sound business reasons why this shuffling of top
|
|
management occurred at PGP, and these reasons are known to all of our
|
|
employees. The RSA lawsuit against PGP is absolutely not one of the
|
|
reasons, not even remotely. I don't think shuffling top management is
|
|
a likely reaction for any company to take in response to a lawsuit, even
|
|
if the lawsuit had merit, which this one does not. We fully expect the
|
|
RSA matter to be resolved in arbitration proceedings, in our favor.
|
|
|
|
I know that it is common practice for some companies to issue statements
|
|
to "spin" the story about certain events, sometimes at the expense of
|
|
truth. This makes a lot of people understandably skeptical about such
|
|
explanations. I do have responsibilities toward my company, but no
|
|
one could get me to deny a truth about the reasons for the restructuring.
|
|
The truth is, the restructuring had absolutely nothing at all to do with
|
|
the RSA lawsuit.
|
|
|
|
I would now like to announce that we will be releasing PGP 5.0 in mid-June.
|
|
It's in beta release right now on our web page (www.pgp.com). In keeping
|
|
with my own dedication to personal freedom and privacy, we will be releasing
|
|
a freeware version for noncommercial use through MIT's web site
|
|
(web.mit.edu/pgp), just like in the old days before the company was formed.
|
|
And we do plan to publish the full PGP source code for Mac, Windows 95,
|
|
and Linux.
|
|
|
|
There are a lot of new exciting features, including automatic key lookups
|
|
from remote key servers on the Internet, which will likely result in the
|
|
rapid growth of a ready-made nationwide PGP public-key infrastructure,
|
|
on an unprecedented scale. We are also encouraging the migration to new
|
|
public key algorithms in addition to RSA, namely the NIST Digital
|
|
Signature Standard (DSS), as well as Diffie-Hellman (Elgamal) keys.
|
|
We expect most of the new users to be using these new algorithms instead
|
|
of RSA, in part because they offer new features, better performance, and
|
|
better security for the same key sizes. I hope that you will all join me
|
|
in this opportunity to move to these new algorithms, allowing everyone to
|
|
finally enjoy the use of public key cryptography without the encumberances
|
|
of patents.
|
|
|
|
Philip Zimmermann
|
|
Chief Technology Officer, PGP Inc.
|
|
|
|
-----BEGIN PGP SIGNATURE-----
|
|
Version: PGP for Personal Privacy 5.0
|
|
Charset: noconv
|
|
|
|
iQCVAwUBM5WoZWV5hLjHqWbdAQGaxgP/UM+i7Pz38x68zdWVOsTrQVepa+0FUndC
|
|
NkvTi5iMTC9up7HJgleXMWuAB00qVB8XlC1/6oSx4Ot+gTecu0wXgNG/l8LXFBAo
|
|
YYxlPhR497fvKfnWXATkJ3jQJAQbACHXzh7Wycc1MGq+46o6+CkECrUvUs8//KQT
|
|
toJMdfVJEVA=
|
|
=ywNo
|
|
-----END PGP SIGNATURE-----
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 29 May 1997 20:06:51 -0700 (PDT)
|
|
From: jonl@well.com
|
|
Subject: File 4-- TEXANS SUE TO RECOVER DAMAGES FOR INTERNET "SPAM"
|
|
|
|
FOR IMMEDIATE RELEASE
|
|
|
|
TEXANS SUE TO RECOVER DAMAGES FOR INTERNET "SPAM" CLAIMING
|
|
ELECTRONIC TRESPASS AND NUISANCE
|
|
|
|
Austin, Texas, May 28, 1997: Several Internet leaders in Austin,
|
|
Texas filed a lawsuit yesterday afternoon against a company and an
|
|
individual believed to be responsible for the mass distribution of
|
|
junk mail over the Internet, also called "spam." The suit claims that
|
|
C.N. Enterprises and Craig Nowak of San Diego, California, sent
|
|
thousands of electronic messages selling information on "Free Cash
|
|
Grants" for $19.95. The ad's content was not only misleading, the
|
|
lawsuit claims, but the company's e-mail used a false return address,
|
|
causing the electronic mail boxes of several Austin residents to
|
|
overflow with returned copies of the junk mail.
|
|
|
|
According to the lawsuit, by using a false return address, those who
|
|
send junk mail over the Internet can avoid the anger that results from
|
|
this controversial practice. They can also avoid dealing with the
|
|
thousands of "bounce" messages that result from sending e-mail to
|
|
invalid or outdated addresses. "In effect," the lawsuit alleges,
|
|
"C.N. Enterprises deliberately dumped tons of its electronic garbage
|
|
and pollution" into the Austin residents' mailboxes. The lawsuit
|
|
claims that the use of false return addresses on junk e-mail, and the
|
|
resulting fallout on those who own the addresses used, is illegal
|
|
under the traditional common law causes of action of nuisance,
|
|
trespass and conversion.
|
|
|
|
The lead plaintiff is Tracy LaQuey Parker, a leading Internet
|
|
author, who owns the Internet domain name used by C.N. Enterprises
|
|
without her permission. Said Ms. Parker, "As a long-time Internet
|
|
advocate, I am saddened that the goodwill spirit of the Internet is
|
|
being spoiled by irresponsible individuals who forge their identity in
|
|
order to make a quick buck. There are plenty of examples of
|
|
legitimate commercial uses of the Internet. This isn't one of them."
|
|
|
|
Joining Ms. Parker in the lawsuit are her husband Patrick Parker and
|
|
Peter Rauch, both Ms. Parker's business partners. Also joining the
|
|
suit are Zilker Internet Park, Ms. Parker's Internet service provider,
|
|
which had to deal with the flood of messages stemming from the "spam,"
|
|
and two active Texas Internet groups, the Texas Internet Service
|
|
Providers Association (TISPA), a group of commercial Internet service
|
|
providers, and EFF-Austin, a local Internet civil liberties
|
|
organization.
|
|
|
|
John Quarterman, an owner of Zilker Internet Park, stated, "'Spam'
|
|
is a large and rapidly growing problem which has cost Zilker Internet
|
|
Park and many other ISPs and Internet users much time and money. We
|
|
have put many technical blocks in place to limit it. With this
|
|
lawsuit, we are taking the next step to help stop this abuse of the
|
|
Internet."
|
|
|
|
TISPA and EFF-Austin joined the lawsuit in an effort to broaden the
|
|
legal precedent beyond Ms. Parker's single Internet domain name,
|
|
according to Gene Crick, TISPA's president. "Increasingly, 'spammers'
|
|
are using false return addresses to avoid taking full responsibility
|
|
for the harm caused by their unsolicited commercial e-mail," Crick
|
|
said. "These forgeries dump huge volumes of unwanted junk mail onto
|
|
Internet companies and their customers. TISPA would like to see the
|
|
court grant a broad and clear injunction prohibiting this practice."
|
|
|
|
The lawsuit was filed on behalf of LaQuey and the others by Pete
|
|
Kennedy and Roger Williams of George, Donaldson & Ford, L.L.P. of
|
|
Austin. Among its other Internet related cases, the law firm has
|
|
been
|
|
involved in lawsuits against the United States Secret Service and
|
|
Simon Leis, the Hamilton County (Ohio) Sheriff, over the seizure of
|
|
private e-mail.
|
|
|
|
# # #
|
|
|
|
For more information, contact:
|
|
|
|
Plaintiffs:
|
|
Tracy LaQuey Parker and Patrick Parker, 512-454-7748
|
|
John Quarterman, Zilker Internet Park, 512-451-7620
|
|
Gene Crick, Texas Internet Service Providers Association (TISPA),
|
|
512-303-1021
|
|
Jon Lebkowsky, EFF-Austin, 512-444-5175
|
|
|
|
Law Firm:
|
|
Peter Kennedy or Roger Williams
|
|
George, Donaldson & Ford, L.L.P., 512-495-1400
|
|
|
|
Media Contact:
|
|
Peggy Hubble or Sondra Williams, MEM/Hubble Communications,
|
|
512-480-8961
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 4 Jun 1997 09:19:26 -0700
|
|
From: Mike Oar <mike_oar@MENTORG.COM>
|
|
Subject: File 5--Purpose of CuD
|
|
|
|
Dear Editors,
|
|
|
|
I general, I have enjoyed skimming or reading through CuD. Much
|
|
of what is contained in there tends to speak towards the
|
|
controversial issues which surround computing and society. Many
|
|
good points have been raised and provocative and/or
|
|
thought-provoking articles are common. I'm sorry to say though
|
|
that I've removed myself from the mailing list due to some brash
|
|
and poor-taste articles that you've allowed to be published.
|
|
Most recently the article (Cu Digest, #9.42) by Meeks. His
|
|
hostile tone and language disgust me and make me wonder that if
|
|
such people are the main stream of the "movement" to combat
|
|
government control over the internet and information, can such a
|
|
battle be won?
|
|
|
|
You may guess that I tend to draw a middle of the road
|
|
perspective on censorship. I believe that participants
|
|
(on-liners) need to be more civil than they now are, and that
|
|
those that aren't continue to destroy the reputation and ability
|
|
of the "real" users to use the information that is/could be out
|
|
there.
|
|
I also believe that while there's nothing inherently wrong with
|
|
annonimity, it is often abused and used to cover up sick and
|
|
disgusting acts by those who are simply too cowardly or perverse
|
|
to reveal their true identity.
|
|
|
|
However, I have not found that the majority of your articles are
|
|
far off the mark or raise concerns that are not worthy to be
|
|
heard. As a whole, I think that the information and service that
|
|
CuD provides is good. I take note against articles such as
|
|
Meeks' which voice slanderous and degrading feelings or opinions
|
|
with the intent of putting down people, not policies. I also do
|
|
not feel that his use of language is warranted or needed.
|
|
|
|
There are real issues to deal with as technology becomes more
|
|
readily available to the world. It's no longer the play ground
|
|
of the select few who can learn how to program or spend endless
|
|
hours on-line. And as this technology and it's uses begin to
|
|
demand more information and becomes more intimately a part of our
|
|
lives, it begins to become the responsibility of those that
|
|
create it to do all that they can to educate the users to it's
|
|
proper use. Computers are becomming the tool of non-programmers
|
|
(and I think that some programmers find that irksome). The
|
|
governments are simply responding (fairly well I think) to
|
|
something that they don't understand well but that the public
|
|
demands. I think it is our charge as the creators of technology
|
|
to promote and insure it's proper use, it's ethical use, and do
|
|
all that we can to support actions against using it to hurt
|
|
others or to promote illeagal behavior. I would like to see CuD
|
|
begin to become more proactive in the fight for the proper use of
|
|
current and developing technology. I would like to see CuD
|
|
support ethical uses of technology instead of complaining about
|
|
cyber-cops doing their best to crack down against child
|
|
pornography, etc. True, there are some censorship activities
|
|
that are going much too far. But I think that we need to realize
|
|
that there are malicious people who choose to use it as a weapon;
|
|
we should do what we can to stop that. If you will work to
|
|
better edit the articles you publish, and begin to look into the
|
|
issues I've state above, pleae let me know as I will want to
|
|
resume my readings.
|
|
|
|
Thank you.
|
|
|
|
|
|
--
|
|
*********************************
|
|
Mike Oar
|
|
Intern, QA Engineer
|
|
Mentor Graphics Corp.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 4 Jun 1997 06:32:52 -0700 (PDT)
|
|
From: Elric of Imrryr <elric.of.imrryr@USA.NET>
|
|
Subject: File 6--Re: Germany "cybercops" battle offensive speech, violent games
|
|
|
|
From--Gurney Halleck <gurneyh@ix.netcom.com>
|
|
>I guess now any jerkwater police department can become an International
|
|
>Cyberspace Policing Unit.
|
|
|
|
>While they can do what ever they want in their country (I still don't
|
|
>like it), I don't see how they get off "policing" the world Internet.
|
|
>Do they plan to extradite "criminals" to Germany to face charges there?
|
|
>Seems that this police department is over stepping its jurisdiction
|
|
>(unless German police is nationalized and has authority to prosecute
|
|
>national/international crime a la US FBI, DOJ...)
|
|
|
|
They could issue a european warrent which could result in your
|
|
arrest if you travel to any country in european. An american who
|
|
was selling nazi matarial by mail to residents of Germany was
|
|
arrested in Denmark at the request of Germany authorities.
|
|
|
|
The US is supposely considering changes to its laws to allow one
|
|
to be prosecuted here for "morals" offenses committed abroad. So
|
|
if you violate morals laws in Germany, you could faces charges in
|
|
US, especially with hot botton issues like child porn.
|
|
|
|
Also, they don't need to convict to win. Just having someone
|
|
accused can result in that person losing their job and/or being
|
|
run out of town. Having to fight an international criminal
|
|
charge could drive most people into bankruptcy.
|
|
|
|
------------------------------
|
|
|
|
From: rsh@IDIRECT.COM(RSH)
|
|
Subject: File 7--RE: Anti-Spam bills....
|
|
Date: Mon, 09 Jun 1997 12:01:09 -0400
|
|
|
|
In Canada and using a .com address, as you can see from the return
|
|
address in this message, I too get spams from Cyberpromotions,
|
|
etc. and cannot see how either of these bills will enable ME to
|
|
stop the spams. There seems to be nothing in either of these
|
|
bills that makes it clear that Canadians can avail themselves of
|
|
the right to demand removal from the spammer's lists or avail
|
|
themselves of the remedy provided re the $500.
|
|
|
|
Therefore the question: Is it possible for someone NOT in the US
|
|
to stop spams from the US using either of these vehicles, should
|
|
either pass the Congress?
|
|
|
|
Bob
|
|
|
|
R.S. (Bob) Heuman - Willowdale, ON, Canada
|
|
===================================================
|
|
reply to: <heuman@mtnlake.com> or <rsh@idirect.com>
|
|
Copyright retained. My opinions - no one elses...
|
|
If this is illegal where you are, do not read it!
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 9 Jun 1997 14:45:12 -0500 (CDT)
|
|
From: Samantha Leggat <sleggat@ix.netcom.com>
|
|
Subject: File 8--Invitation - Interop Security Teleconference
|
|
|
|
June 9, 1997
|
|
MEDIA ALERT
|
|
|
|
SOFTBANK Forums to Hold Teleconference
|
|
Tuesday, June 17, 1997 at 10:00 a.m. Pacific/1:00 p.m. Eastern
|
|
Topic: Security -- Issues, Solutions and Controversies
|
|
|
|
CONTACT:
|
|
Samantha Leggat, Lighthouse Public Relations, (760) 773-4870,
|
|
sleggat@ix.netcom.com
|
|
|
|
WHAT:
|
|
SOFTBANK Forums will host a press and analyst teleconference with industry
|
|
experts presenting and discussing security issues for enterprise networked
|
|
applications and public Internet access and use. SOFTBANK Forums will also
|
|
be announcing a new event focusing on these issues, the Interop Security
|
|
Symposium, to be held in conjunction with NetWorld+Interop 97 Atlanta,
|
|
October 6-10, 1997.
|
|
|
|
WHERE:
|
|
Teleconference dial-in: 1-800-260-0712
|
|
Reference conference subject "Interop Security Teleconference"
|
|
|
|
WHEN:
|
|
Tuesday, June 17, 1997 at 10:00 a.m. Pacific/1:00 p.m. Eastern
|
|
|
|
WHO:
|
|
SOFTBANK Forums Interop Security Symposium program committee members will
|
|
present information on security issues and answer questions:
|
|
|
|
Frederick M. Avolio, Vice President of Technology, Trusted Information
|
|
Systems Inc. (TIS)
|
|
|
|
Michael Millikin, Senior Vice President of Worldwide Content, Interop,
|
|
SOFTBANK Forums
|
|
|
|
David M. Piscitello, President, Core Competence, Inc., and Program
|
|
Committee member, NetWorld+Interop
|
|
|
|
Marcus J. Ranum, CEO of Network Flight Recorder, Inc. and Chief Scientist,
|
|
V-One Corporation
|
|
|
|
BACKGROUND INFORMATION
|
|
|
|
Significant milestones will be crossed in the field of Internet and
|
|
networked applications security in the coming year. Security and
|
|
communications vendors are expected to announce the availability of
|
|
products that will satisfy several of the most sought-after and urgently
|
|
needed security requirements for secure networking, including: strong
|
|
authentication for core Internet applications (e.g., DNS), new methods for
|
|
defending intranets and extranets against intrusion, hardware-based
|
|
cryptographic protection of data in modems and remote access servers, new
|
|
techniques affording stronger authentication for remote and roaming access
|
|
to enterprise networks over the public Internet, data confidentiality
|
|
through the use of encryption of Internet Protocol payloads, data
|
|
confidentiality for NOS protocols through the use of encrypted tunnels
|
|
through the public Internet, and alternatives for digital key management,
|
|
escrow and recovery.
|
|
|
|
Many of these features will be based on de facto Internet standards, and
|
|
others will be based on innovative or bleeding edge technology. With these
|
|
issues come certain controversial problems, such as restrictions and
|
|
control, and the controversy should not be dismissed as being of concern to
|
|
academics and security professionals only. During this teleconference,
|
|
industry experts will discuss the subject of security and some of the
|
|
issues involved in securing networks, and answer questions regarding the
|
|
controversies involved.
|
|
|
|
The Interop Security Symposium is a new Interop event, officially being
|
|
announced June 17, to be held conjunction with NetWorld+Interop 97 Atlanta,
|
|
October 6-10, 1997. In addition to the sessions and presentations in the
|
|
Interop Security Symposium, there will be a hands-on, educational Security
|
|
Hot Spot demonstration on the NetWorld+Interop interactive show floor,
|
|
emphasizing authentication systems, encryption, access controls and
|
|
auditing systems.
|
|
|
|
The teleconference is open to press and analysts, and time will be allotted
|
|
for questions from the teleconference audience.
|
|
|
|
|
|
Samantha Leggat
|
|
Lighthouse Public Relations
|
|
281 Strada Fortuna
|
|
Palm Desert, CA 92260
|
|
Tel: 760/773-4870
|
|
Fax: 760/773-4821
|
|
Email: sleggat@ix.netcom.com
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 3 Jun 1997 01:26:56 -0400 (EDT)
|
|
From: Emmanuel Goldstein <emmanuel@2600.COM>
|
|
Subject: File 9--Beyond Hope "Hackers Conference" '97
|
|
|
|
*** B E Y O N D H O P E ***
|
|
|
|
the sequel to
|
|
|
|
H A C K E R S O N P L A N E T E A R T H !
|
|
=====================================================================
|
|
* A G l o b a l H a c k i n g E x p e r i e n c e *
|
|
* A u g u s t 8 , 9 , 1 0 , 1 9 9 7 *
|
|
* N e w Y o r k C i t y *
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
It's time for the inevitable - the sequel to 1994's Hackers On Planet Earth
|
|
conference. If you missed that event, you'll feel even worse if you miss this
|
|
one! Don't let that happen. Beyond Hope will be everything HOPE was and
|
|
probably a lot more.
|
|
|
|
SPEAKERS/PANELS
|
|
|
|
So far we're lining up people for panels on social engineering, encryption,
|
|
surveillance, PCS/GSM technology, legal issues, hacker ex-prisoners, "pirate"
|
|
radio, the media, boxing, and a whole lot more. Our biggest worry at this
|
|
point is figuring out how to fit it all into three days. If you have ideas,
|
|
contact us using the methods below.
|
|
|
|
THE NETWORK
|
|
|
|
Even though we only had a 28.8 link to the outside world at the 1994 HOPE,
|
|
we still had a lot of fun networking all our computers together. This time
|
|
things will be different. Our link to the net will be faster than ever - at
|
|
the very least a T1 - and we will also be experimenting with video links to
|
|
the Hacking In Progress (HIP) conference going on in Holland. Plus we'll have
|
|
an amazing internal network of old and new machines. Bring your computer and
|
|
whatever toys you have! As in 1994, all attendees will get an account on
|
|
our hope.net machine. Valuable prizes will be awarded to those who
|
|
hack root.
|
|
|
|
LOGISTICS
|
|
|
|
It all takes place starting Friday evening, August 8th, running until Sunday
|
|
night, August 10th at the Puck Building in New York City, on the corner
|
|
of Houston and Lafayette Streets. The main part of the conference begins at
|
|
noon on Saturday, with registration starting at 10 am. However, you will also
|
|
be able to register Friday evening beginning at 6 pm and help us set up the
|
|
network for the weekend. There will be a special 2600 meeting beginning
|
|
at 5 pm on Friday at the Citicorp Center, located at 53rd and Lexington.
|
|
To get to the conference from the meeting, take the #6 train downtown to
|
|
Bleecker Street. Follow the signs and portents. ** NOTE: There will also
|
|
be a TAP reunion at Eddie's on Waverly and Mercer - if you were part of the
|
|
old TAP crowd, keep checking our web site (www.hope.net) for specifics! **
|
|
|
|
THE NEIGHBORHOOD
|
|
|
|
The Puck Building is in one of the liveliest sections of Manhattan, next to
|
|
Greenwich Village, Chinatown, Little Italy, and SoHo within easy walking
|
|
distance of Bleecker Street, Broadway, Avenue A, and St. Mark's Place. We
|
|
will have a full guide of places and Hope-related activities on our web site
|
|
and at the conference.
|
|
|
|
TRAVEL
|
|
|
|
There are many cheap ways to get to New York City in August but you may want
|
|
to start looking now, especially if you're coming from overseas. Travel
|
|
agencies will help you for free. Also, look in various magazines like
|
|
Time Out, Village Voice, local alternative weeklies, and travel sections of
|
|
newspapers. Buses, trains, and carpools are great alternatives to domestic
|
|
flights. Keep in touch with the update sites for more information as it
|
|
comes in.
|
|
|
|
GETTING TO THE SITE
|
|
|
|
From the airports: From all three airports (Kennedy, LaGuardia, Newark) you
|
|
can either take a cab or bus to the city - from Kennedy you can take a free
|
|
bus to the subway and take the A train into Manhattan for $1.50. To get to
|
|
the Puck Building in this manner, take the A train to West 4th in Manhattan
|
|
and transfer to a Brooklyn bound B, D, F, or Q for one stop to
|
|
Broadway/Lafayette. If you take a bus, see the directions below from the
|
|
Port Authority.
|
|
|
|
By car: We'll assume you can find New York City on your own. Once you're
|
|
actually over the bridge or through the tunnel, head for Houston Street,
|
|
just south of 1st Street. The conference takes place on the southeast corner
|
|
of Houston and Lafayette. There are parking garages in the neighborhood and
|
|
many nearby streets allow free parking from Friday evening through the weekend.
|
|
|
|
By train: From Penn Station, take the A train downtown to West 4th, transfer
|
|
to a Brooklyn bound B, D, F, or Q for one stop to Broadway/Lafayette. From
|
|
Grand Central, take the #6 subway downtown to Bleecker Street.
|
|
|
|
By bus: From the Port Authority Bus Terminal, take the A train downtown to
|
|
West 4th, transfer to a Brooklyn bound B,D, F, or Q for one stop to
|
|
Broadway/Lafayette.
|
|
|
|
WHERE TO STAY
|
|
|
|
The Puck Building is not a hotel, which we believe will make the conference
|
|
itself a lot more interesting. We will be compiling a list of places to stay
|
|
in the city, ranging in price from $40 a night on up. So far, we suggest the
|
|
following: the YMCA at 215 W 23rd Street between 7th and 8th Avenues
|
|
(212-741-9226) - rooms start at $40 and there are no age restrictions;
|
|
Off Soho Suites Hotel on 11 Rivington Street. This hotel is only a couple of
|
|
blocks away from the Puck Building and you can get European style suites,
|
|
complete with kitchens, for a low price. A suite for 2 is $89, for 4 it's
|
|
$149. They also have a location on East 12th Street off 3rd Avenue. Both of
|
|
these hotels don't have a huge number of rooms so we suggest making
|
|
reservations early (212-979-9808); Howard Johnson on 429 Park Avenue South
|
|
between 29th and 30th Streets (212-532-4860) - rooms start at around $100
|
|
a night; and Holiday Inn at 132 Lafayette Street (212-966-8898) - rooms are
|
|
around the $150 level. There are also youth hostels, bed and breakfasts,
|
|
and hundreds of other hotels in the city. This is only a preliminary list -
|
|
check with us for more details as the conference draws closer. You should
|
|
make reservations no closer than three weeks prior to the conference.
|
|
Remember, the cost of a room is lessened significantly if you split it with
|
|
other people. Bring sleeping bags to increase your flexibility.
|
|
|
|
WHAT WE NEED
|
|
|
|
Ideas, people, computers, technology of all sorts.
|
|
|
|
HOW TO STAY UPDATED
|
|
|
|
There are many ways to keep updated as preparations get underway. We will be
|
|
posting updates on our office phone line - (516) 751-2600 - as well as
|
|
the 2600 voice BBS - (516) 473-2626. The official Beyond Hope website can be
|
|
reached at www.hope.net and updates will also be found on the 2600 website at
|
|
www.2600.com. On the websites you'll find details on how to be part of the
|
|
Beyond Hope mailing lists. Email info@hope.net for the latest information,
|
|
travel@hope.net for cheap fares and advisories, tech@hope.net for technical
|
|
questions and suggestions, speakers@hope.net for anyone interested in
|
|
speaking at the conference, and vol@hope.net for those of you who want to
|
|
volunteer to help. On usenet, read alt.2600.hope.announce for the latest
|
|
announcements, alt.2600.hope.d for an ongoing discussion about the
|
|
conference, and alt.2600.hope.tech for technical setup discussion.
|
|
|
|
REGISTRATION
|
|
|
|
The cost for pre-registration is $20 for the weekend. While we hope to keep
|
|
the cost at $20 for those who register at the conference, we may wind up
|
|
filling the place up (capacity is only around 2,000 after all) and, in that
|
|
event, pre-registrants will have priority. So send us $20, your name and
|
|
address, and we'll send you a pass that will get you in without a hassle or
|
|
a wait. Make checks payable to 2600. The address is Beyond Hope,
|
|
c/o 2600 Magazine, PO Box 848, Middle Island, NY 11953. Don't send us
|
|
anything after July 15, 1997 to ensure that your pass is received in time.
|
|
Special Offer: FREE ADMISSION for anyone coming to Beyond Hope from
|
|
overseas with a foreign passport. North Americans not eligible.
|
|
|
|
|
|
NAME: _____________________________________________________________________
|
|
|
|
ADDRESS: __________________________________________________________________
|
|
|
|
CITY, STATE, ZIP, COUNTRY: ________________________________________________
|
|
|
|
PHONE (optional): ________________ email (optional): ______________________
|
|
|
|
IMPORTANT: If you're interested in participating in other ways or
|
|
volunteering assistance, please give us those details in addition.
|
|
So we can have a better idea of how big the network will be, please
|
|
let us know what, if any, computer equipment you plan on bringing.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 10--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.44
|
|
************************************
|
|
|