878 lines
38 KiB
Plaintext
878 lines
38 KiB
Plaintext
|
|
Computer underground Digest Tue July 8, 1997 Volume 9 : Issue 54
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.54 (Tue, July 8, 1997)
|
|
|
|
File 1--CyberPromo/Wallace meet the Hormel Spammers (fwd)
|
|
File 2--(Fwd) Spam Lawsuit
|
|
File 3--Solid Oak's response to "G-17 error"
|
|
File 4-- Re: CYBERsitter problems
|
|
File 5--Islands in the Clickstream
|
|
File 6--HIGH CONCEPT VIRUS FILM IN PRODUCTION
|
|
File 7--book on hacker cult/underground.
|
|
File 8--Underground extract: System X
|
|
File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Sun, 6 Jul 1997 23:18:31 -0400 (EDT)
|
|
From: editor@TELECOM-DIGEST.ORG
|
|
Subject: File 1--CyberPromo/Wallace meet the Hormel Spammers (fwd)
|
|
|
|
Source - TELECOM Digest, Sun, 6 Jul 97 - Volume 17 : Issue 173
|
|
|
|
((MODERATORS' NOTE: For those not familiar with Pat Townson's
|
|
TELECOM DIGEST, it's a an exceptional resource. From the header
|
|
of TcD:
|
|
"TELECOM Digest is an electronic journal devoted mostly but
|
|
not exclusively to telecommunications topics. It is
|
|
circulated anywhere there is email, in addition to various
|
|
telecom forums on a variety of public service systems and
|
|
networks including Compuserve and America On Line. It is also
|
|
gatewayed to Usenet where it appears as the moderated
|
|
newsgroup 'comp.dcom.telecom'. Subscriptions are available to
|
|
qualified organizations and individual readers. Write and tell
|
|
us how you qualify:
|
|
* ptownson@massis.lcs.mit.edu * ======" ))
|
|
|
|
|
|
Date--Sun, 06 Jul 1997 17:08:30 -0400
|
|
From--The Old Bear <oldbear@arctos.com>
|
|
Subject--Hormel Takes Action Against Spammer
|
|
|
|
|
|
The ultimate irony ...
|
|
|
|
ON THE INTERNET, NO ONE KNOWS THAT SPAM COMES IN CANS
|
|
|
|
To Internet users, "spamming" means wholesale distribution of
|
|
junk e-mail, but to the Hormel Foods Corporation, Spam is a
|
|
scrumptious and nutritious pressed meat that they sell in a can.
|
|
|
|
So Hormel has demanded that junk e-mail distributor Cyber
|
|
Promotions Inc. stop using the name Spam and also stop using a
|
|
picture of a can of Span on its Internet site. "We want them
|
|
to recognize that Spam has been a widely known Hormel Foods
|
|
trademark for 60 years and they are not authorized to use that
|
|
trademark for their commercial use."
|
|
|
|
[as summarized from 'USA Today' (July 3, 1997) by Edupage]
|
|
|
|
------------------------------
|
|
|
|
Subject--Hormel Objects to Use of Name "Spam"
|
|
Date--Sun, 6 Jul 1997 00:00:37 PDT
|
|
From--tad@ssc.com (Tad Cook)
|
|
|
|
|
|
Hormel Foods Warns Junk E-mailer to Drop Use of `Spam' Trademark
|
|
|
|
BY REID KANALEY, THE PHILADELPHIA INQUIRER
|
|
Knight-Ridder/Tribune Business News
|
|
|
|
PHILADELPHIA--Jul. 3--They kept a lid on their feelings for the last few
|
|
years, but the people who can Spam are finally opening up.
|
|
|
|
They hate ... "spam." At least, they hate to see their beloved product
|
|
associated with junk e-mail.
|
|
|
|
Hormel Foods Corp. has put the Internet's self-proclaimed Spam King,
|
|
Philadelphian Sanford "Spamford" Wallace, on notice: It considers his
|
|
adoption of the famous luncheon meat's name in connection with Cyber
|
|
Promotions Inc., his junk e-mail business, an unauthorized use of the Spam
|
|
trademark.
|
|
|
|
In the online world, the term "spam" is a common and disparaging
|
|
reference to unsolicited mass e-mailings that promote everything from
|
|
fad diets to get-rich-quick schemes and porn sites on the World Wide
|
|
Web.
|
|
|
|
Wallace said he decided to use "spam" in his name after his most
|
|
enraged critics began doing it to him. "I thought it would be catchy,"
|
|
he said yesterday. Three months ago, he registered the e-mail domain
|
|
names "spamford.net" and "spamford.com." He is often pictured with
|
|
cans of Spam.
|
|
|
|
"The irony here is that we're actually promoting the name Spam. Hormel
|
|
is probably getting a benefit from it," contended Wallace.
|
|
|
|
Hormel thinks otherwise. Wallace is blurring the distinctiveness of
|
|
the trademark, company lawyers told him in a stern letter last week:
|
|
"Nor does Hormel Foods wish to be affiliated with your company, your
|
|
bulk e-mail business, or the usage you have made of Hormel Foods'
|
|
trademark, which we view as tarnishing its image." The letter demands
|
|
that Wallace drop "spam."
|
|
|
|
The official response, a letter Wednesday from Wallace's attorney
|
|
Ralph Jacobs, was just as emphatic: "If all your client wants is for
|
|
Mr. Wallace to agree not to pose next to a can of Spam ... we can
|
|
probably work something out. If your client objects to the use of the
|
|
word `spam' to refer to my client's business, it's far too late to
|
|
change the vocabulary of 25 million Internet users."
|
|
|
|
------------------------------
|
|
|
|
From--Ed Ellers <kd4awq@worldnet.att.net>
|
|
Subject--Spamford Blows Off Hormel
|
|
Date--6 Jul 1997 01:46:29 GMT
|
|
Organization: AT&T WorldNet Services
|
|
|
|
|
|
This is a press release that Cyber Promotions issued on Wednesday
|
|
after Hormel demanded that the term "spam" no longer be used to
|
|
describe unsolicited messages.
|
|
|
|
--------------------------------
|
|
|
|
SPAM I'm Not
|
|
|
|
Cyber Promotions says "NO" to Cease & Desist from Spam distributor, Hormel
|
|
Foods.
|
|
|
|
For Immediate Release:
|
|
|
|
Philadelphia 7-2-97 --- Cyber Promotions, Inc., the country's best
|
|
known Internet mass e-mail firm, announced today that it had rebuffed
|
|
threats by Hormel Foods Corporation over the use of the word SPAM in
|
|
connection with unsolicited Internet e-mail. Cyber Promotions
|
|
received a cease and desist letter from lawyers for Hormel,
|
|
distributors of the Spam meat product, complaining that Cyber had
|
|
disparaged Hormel's trademark.
|
|
|
|
Cyber Promotions rejection of Hormel came in a letter from Cyber's
|
|
counsel, Ralph A. Jacobs, Esq., of the law firm of Hoyle, Morris &
|
|
Kerr in Philadelphia. In the letter, Jacobs reminded Hormel that
|
|
there was no likely confusion because in cyberspace, spam refers to an
|
|
e-mail practice, not to a food product, and he quoted a recent {Wall
|
|
Street Journal} article in which Hormel's general counsel acknowledged
|
|
as much. Mr. Jacob's letter also reminded Hormel's lawyers that a
|
|
federal court in New York had rejected Hormel's trademark infringement
|
|
case against Jim Henson over a Muppet named Spa'am.
|
|
|
|
Sanford Wallace, a.k.a. SPAMford, president of Cyber Promotions,
|
|
commented: "We had no thought of Hormel when we registered
|
|
www.spamford.com. On the Net, when people say spam they think of us,
|
|
not a processed meat product. Try searching for spam on the Internet
|
|
and you'll find that's true. Our business is e-mail, not canned meat.
|
|
It's far too late to change the vocabulary of 25 million Internet
|
|
users."
|
|
|
|
|
|
[TELECOM Digest Editor's Note: None the less I hope Hormel sues him
|
|
vigorously and forces him to discontinue *his* use of the term to
|
|
describe his practices. Anyone who wishes to sue Spamford and cause
|
|
him to have obscene legal bills is my friend. Anyone who wants to
|
|
cause him as much grief as possible should be saluted, and that most
|
|
definitly includes the various hackers who are trying hard to put him
|
|
out of business. Perhaps Hormel should start a web page which has
|
|
various recipies involving their meat product and then proceed with
|
|
their suit against him. Does anyone know what his current 800 number
|
|
is? Netters who want to contact him by phone are asking. PAT]
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 31 May 1997 11:48:13 -0500
|
|
From: David Smith <bladex@bga.com>
|
|
Subject: File 2--(Fwd) Spam Lawsuit
|
|
|
|
Here is our foray into the world of fighting spam. Our target :
|
|
forged return e-mail addresses to systems the spammers don't have
|
|
permission to use.
|
|
|
|
I can send a copy of the actual lawsuit, upon request.
|
|
|
|
------- Forwarded Message Follows -------
|
|
|
|
FOR IMMEDIATE RELEASE
|
|
|
|
TEXANS SUE TO RECOVER DAMAGES FOR INTERNET "SPAM" CLAIMING ELECTRONIC
|
|
TRESPASS AND NUISANCE
|
|
|
|
Austin, Texas, May 28, 1997: Several Internet leaders in Austin,
|
|
Texas filed a lawsuit yesterday afternoon against a company and an
|
|
individual believed to be responsible for the mass distribution of junk mail
|
|
over the Internet, also called "spam." The suit claims that C.N.
|
|
Enterprises and Craig Nowak of San Diego, California, sent thousands of
|
|
electronic messages selling information on "Free Cash Grants" for
|
|
$19.95. The ad's content was not only misleading, the lawsuit claims,
|
|
but the company's e-mail used a false return address, causing the
|
|
electronic mail boxes of several Austin residents to overflow with
|
|
returned copies of the junk mail.
|
|
|
|
According to the lawsuit, by using a false return address, those who
|
|
send junk mail over the Internet can avoid the anger that results
|
|
from this controversial practice. They can also avoid dealing with
|
|
the thousands of "bounce" messages that result from sending e-mail to
|
|
invalid or outdated addresses. "In effect," the lawsuit alleges,
|
|
"C.N. Enterprises deliberately dumped tons of its electronic garbage
|
|
and pollution" into the Austin residents' mailboxes. The lawsuit
|
|
claims that the use of false return addresses on junk e-mail, and the
|
|
resulting fallout on those who own the addresses used, is illegal
|
|
under the traditional common law causes of action of nuisance,
|
|
trespass and conversion.
|
|
|
|
The lead plaintiff is Tracy LaQuey Parker, a leading Internet
|
|
author, who owns the Internet domain name used by C.N. Enterprises
|
|
without her permission. Said Ms. Parker, "As a long-time Internet
|
|
advocate, I am saddened that the goodwill spirit of the Internet is being
|
|
spoiled by irresponsible individuals who forge their identity in order to
|
|
make a quick buck. There are plenty of examples of legitimate
|
|
commercial uses of the Internet. This isn't one of them."
|
|
|
|
Joining Ms. Parker in the lawsuit are her husband Patrick Parker
|
|
and Peter Rauch, both Ms. Parker's business partners. Also joining the
|
|
suit are Zilker Internet Park, Ms. Parker's Internet service provider, which
|
|
had to deal with the flood of messages stemming from the "spam," and
|
|
two active Texas Internet groups, the Texas Internet Service Providers
|
|
Association (TISPA), a group of commercial Internet service providers,
|
|
and EFF-Austin, a local Internet civil liberties organization.
|
|
|
|
(more)
|
|
|
|
Page Two -- Texans Sue to Recover Damages for Internet "Spam"
|
|
|
|
|
|
John Quarterman, an owner of Zilker Internet Park, stated, "'Spam'
|
|
is a large and rapidly growing problem which has cost Zilker Internet
|
|
Park and many other ISPs and Internet users much time and money. We
|
|
have put many technical blocks in place to limit it. With this lawsuit, we
|
|
are taking the next step to help stop this abuse of the Internet."
|
|
|
|
TISPA and EFF-Austin joined the lawsuit in an effort to broaden
|
|
the legal precedent beyond Ms. Parker's single Internet domain name,
|
|
according to Gene Crick, TISPA's president. "Increasingly, 'spammers'
|
|
are using false return addresses to avoid taking full responsibility for the
|
|
harm caused by their unsolicited commercial e-mail," Crick said. "These
|
|
forgeries dump huge volumes of unwanted junk mail onto Internet
|
|
companies and their customers. TISPA would like to see the court grant
|
|
a broad and clear injunction prohibiting this practice."
|
|
|
|
The lawsuit was filed on behalf of LaQuey and the others by Pete
|
|
Kennedy and Roger Williams of George, Donaldson & Ford, L.L.P. of
|
|
Austin. Among its other Internet related cases, the law firm has been
|
|
involved in lawsuits against the United States Secret Service and Simon
|
|
Leis, the Hamilton County (Ohio) Sheriff, over the seizure of private
|
|
e-mail.
|
|
|
|
# # #
|
|
|
|
For more information, contact:
|
|
|
|
Plaintiffs:
|
|
Tracy LaQuey Parker and Patrick Parker, 512-454-7748
|
|
John Quarterman, MIDS 512-451-7620
|
|
Gene Crick, Texas Internet Service Providers Association (TISPA),
|
|
512-303-1021
|
|
Jon Lebkowsky, EFF-Austin, 512-444-5175
|
|
|
|
Law Firm:
|
|
Peter Kennedy or Roger Williams
|
|
George, Donaldson & Ford, L.L.P., 512-495-1400
|
|
|
|
Media Contact:
|
|
Peggy Hubble or Sondra Williams, MEM/Hubble Communications,
|
|
512-480-8961
|
|
|
|
|
|
|
|
|
|
David Smith
|
|
bladex@bga.com
|
|
512-304-6308
|
|
|
|
------------------------------
|
|
|
|
Date: Sun, 06 Jul 1997 19:01:26 -0500 (CDT)
|
|
From: Bennett Haselton <bennett@peacefire.org>
|
|
Subject: File 3--Solid Oak's response to "G-17 error"
|
|
|
|
Source - fight-censorship@vorlon.mit.edu
|
|
|
|
This is the letter that Solid Oak Software sent out to one person who wrote
|
|
to them reporting a "G-17" error (the fake error that the installer gives if
|
|
it detects that you have visited the Peacefire web site).
|
|
|
|
He was told that he had to pay for the full version. This puts a new spin
|
|
on what Milburn said in the PC World article
|
|
(http://www.pcworld.com/cgi-bin/database/body.pl?ID=970702181157) when he
|
|
admitted that the installer scans the user's hard drive: ""We reserve the
|
|
right to say who gets to install our software for free." But even people
|
|
who have visited Peacefire can install the software, as long as they pay?
|
|
|
|
He also said in the article: "If Bennett Haselton is alleging that we get
|
|
some kind of information sent to us, I mean that's ridiculous. If the
|
|
program fails to install, I don't see how any way shape or form that would
|
|
be an invasion of privacy." But judging by the response from Solid Oak tech
|
|
support, if you tell them that you got the error, they discern that you have
|
|
visited Peacefire and tell you something that isn't true (you can't use the
|
|
program) in order to get you to pay them money. Hence, the error results in
|
|
information being sent to them that you would probably rather keep private.
|
|
|
|
I deleted the address of the sender and the text of his original message to
|
|
avoid tipping off Solid Oak who the person actually was.
|
|
|
|
From: Technical Support <support@solidoak.com>
|
|
To: [name and address deleted -Bennett]
|
|
Date: June 5, 1997 6:38 pm
|
|
Subject: File 4-- Re: CYBERsitter problems
|
|
|
|
I am sorry, but you will not be able to run the trial version of CYBERsitter.
|
|
|
|
The retail version _will_ install properly, but the trial version will not
|
|
install on your computer.
|
|
|
|
On 06/05/97 6:20pm you wrote...
|
|
|
|
[a message reporting the G-17 error, text deleted -Bennett]
|
|
|
|
bennett@peacefire.org http://www.peacefire.org
|
|
(901) 366-1452 (home) after 6 PM central time and all day on weekends
|
|
(901) 922-6930 (work)
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 20 Jun 1997 22:34:10
|
|
From: Richard Thieme <rthieme@thiemeworks.com>
|
|
Subject: File 5--Islands in the Clickstream
|
|
|
|
Islands in the Clickstream:
|
|
The Power of Projection, the Power of Digital Presence
|
|
|
|
|
|
|
|
Welcome to the blank screen.
|
|
A computer monitor glowing in the dark. Pixels constellated
|
|
as an image of printed text. The belief that behind those images
|
|
is a human intelligence, whose energy and presence you sometimes
|
|
swear you can "feel." Once that belief becomes our shared or
|
|
consensus reality, you believe that "I" am talking to "you."
|
|
Believing is seeing. Believing is the precondition of a
|
|
possibility.
|
|
So ... here I am again.
|
|
|
|
Twenty years ago, I moved to Mutton Hollow, a rural area of
|
|
northern Utah. Since I had lived only in Chicago, London, and
|
|
Madrid previously, this took some getting used to. The pleasures
|
|
of a big city were far, far away.
|
|
We were high against the Wasatch Front, and the winter skies
|
|
were magnificent. I bought a telescope with a long barrel. Since
|
|
the seeing was best at the top of the sky where the air was
|
|
clearest, I often lay a tarp on the frozen snow so I could lie on
|
|
my back and look straight up.
|
|
I moved slowly through the star fields, pausing at a cluster
|
|
or the Great Nebula in Orion before losing myself in the three-
|
|
dimensional darkness among the blue, white, yellow, and blood-red
|
|
stars.
|
|
The stars and the vast spaces between them became my
|
|
companions. I still can't identify most constellations, however.
|
|
A constellation is an arbitrary pattern imposed on a random
|
|
scattering of stars. I guess I can see it's a bull, but it might
|
|
as well be a bear or a crawling baby.
|
|
The images our forebears used to connect the dots were
|
|
projected from within their own psyches. Once there was a
|
|
consensus reality about what they were, the projections became
|
|
"real." It really was a herdsman or a bear "out there."
|
|
|
|
The computer monitor at which we are both looking right now
|
|
is a powerful invitation to project a pattern onto what we are
|
|
seeing.
|
|
Haven't you read an email or an IRC communication when your
|
|
emotion was running high, and you could swear you felt the
|
|
presence of the sender in the room? As if they were right there
|
|
in the words you were reading? Hasn't it sometimes seemed beyond
|
|
coincidence when you went on-line with someone on your mind and
|
|
bingo! there they were!
|
|
Or there their words were. But were they in the words you
|
|
read? And did the words mean what you thought they meant?
|
|
It is a perpetual dilemma of the human condition that we can
|
|
not easily distinguish our projections from genuine perceptions.
|
|
Carl Jung said the soul or psyche projects its contents onto
|
|
archetypal symbols that invite them. You can tell there's
|
|
projection, he said, when there's secrecy, fascination, and high
|
|
energy.
|
|
A speech I have given for portfolio managers and others
|
|
interested in the psychology of investment is called "The Stock
|
|
Market, UFOs, and Religious Experience." What do those three
|
|
things have in common? All three domains invite powerful
|
|
projections, and we think we see "out there" in the economy or
|
|
the markets, in the night sky, or in the universe itself that
|
|
which we have projected onto it.
|
|
Something is out there, something elicited the projection,
|
|
but we can't see what it is until we withdraw our projections and
|
|
integrate them once again into our selves. Then we can see where
|
|
we end and someone else begins.
|
|
Confusion of boundaries bedevils online relationships as
|
|
well as those in the flesh.
|
|
All religious and spiritual traditions have tools designed
|
|
to help us integrate our projections into our selves. We call the
|
|
process "getting it together," the end result "integrity." We say
|
|
we "feel centered," when we take back the power we have projected
|
|
onto another or given away.
|
|
|
|
The pixels on your monitor invite projection.
|
|
Secrecy, fascination, and high energy.
|
|
How about it? Have they characterized any of your online
|
|
exchanges or adventures?
|
|
If there is a context for a personal or business
|
|
relationship before email is exchanged, the online exchange is
|
|
anchored. Face-time and telephone-time too ground the exchange.
|
|
When people connect online and do not mitigate their encounter
|
|
with a context that grounds it, the projections -- and the sparks
|
|
-- can fly.
|
|
The greater your intention to crate a context that grounds
|
|
your email, the greater the likelihood you will not be
|
|
misunderstood. That requires imagination, an ability to see
|
|
different interpretations for your words. You may think the words
|
|
you sent were crystal clear, but the person on the other end,
|
|
returning to their cubicle in a dour mood, may receive them like
|
|
a boxing-glove coming out of a closet.
|
|
The fewer words you provide, the greater the invitation to
|
|
project. The stars can be a bull or a bear or a crawling baby.
|
|
In business as well as personal online communication, we are
|
|
responsible for creating a context that enables our words to
|
|
vibrate with obvious meaning.
|
|
The digital image at which you are looking is a simulation
|
|
of printed text, which simulated written words, which simulated
|
|
spoken words. Reading silently to ourselves is a relatively late
|
|
practice. T. S. Eliot may have thought that his "words echo thus
|
|
in your mind," but only a few generations ago, schoolchildren
|
|
read aloud, all together, so the schoolmaster would know they
|
|
weren't shirking. The only real words were spoken words.
|
|
Some think spoken words are a specialized kind of gesture.
|
|
Gestures are feelings felt so strongly they make the whole body
|
|
vibrate like a violin.
|
|
When I intend to communicate to you in this medium, all I
|
|
have is my intention to focus energy and information so you "get
|
|
it." We human beings are nothing but organized systems of energy
|
|
and information. That's what computers are too. The words on your
|
|
screen are merely the echo of a gesture, feelings felt so
|
|
strongly they show up and glow through the words. It isn't words
|
|
alone, though, it's the energy or the shape of the energy seen
|
|
and felt through the words that you "get." A spirit making the
|
|
electrons coalesce by sheer force of will so you see, and
|
|
sometimes feel, my presence in the room, in your life, in your
|
|
head and heart.
|
|
Believing is seeing.
|
|
So ... as I said ... here I am again.
|
|
|
|
|
|
|
|
|
|
**********************************************************************
|
|
|
|
Islands in the Clickstream is a weekly column written by
|
|
Richard Thieme exploring social and cultural dimensions
|
|
of computer technology. Comments are welcome.
|
|
|
|
Feel free to pass along columns for personal use, retaining this
|
|
signature file. If interested in (1) publishing columns
|
|
online or in print, (2) giving a free subscription as a gift, or
|
|
(3) distributing Islands to employees or over a network,
|
|
email for details.
|
|
|
|
To subscribe to Islands in the Clickstream, send email to
|
|
rthieme@thiemeworks.com with the words "subscribe islands" in the
|
|
body of the message. To unsubscribe, email with "unsubscribe
|
|
islands" in the body of the message.
|
|
|
|
Richard Thieme is a professional speaker, consultant, and writer
|
|
focused on the impact of computer technology on individuals and
|
|
organizations.
|
|
|
|
Islands in the Clickstream (c) Richard Thieme, 1997. All rights reserved.
|
|
|
|
ThiemeWorks P. O. Box 17737 Milwaukee WI 53217-0737 414.351.2321
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 26 Jun 1997 13:44:54 -0500 (CDT)
|
|
From: Crypt Newsletter <crypt@sun.soci.niu.edu>
|
|
Subject: File 6--HIGH CONCEPT VIRUS FILM IN PRODUCTION
|
|
|
|
Source - CRYPT NEWSLETTER 43
|
|
June -- July 1997
|
|
|
|
HIGH CONCEPT VIRUS FILM IN PRODUCTION
|
|
|
|
While visiting the East Coast in June, Crypt Newsletter ran
|
|
across the filming of a computer virus movie in Hampton Roads,
|
|
Virginia. Starring Jamie Lee Curtis and William Baldwin, the movie
|
|
is based on a old comic book series entitled "Virus." Alert readers
|
|
may remember Crypt News covering it -- tongue in cheek -- way
|
|
back in 1993.
|
|
|
|
For those who don't, here's the scoop.
|
|
|
|
Originally published by a company called Dark Horse, "Virus" was
|
|
the very essence of high concept: non-stop action, nonsensical
|
|
pseudo-science, absence of plot, and gruesome mutilations with a
|
|
somewhat pretty-looking woman heroine thrown in for punctuation.
|
|
|
|
Dark Horse made its name peddling an endless flood of such titles,
|
|
most devoted to squeezing the last drop of greenish ichor from movies
|
|
like "Alien" and "Predator." That philosophy ensured just about anything
|
|
it printed was a big hit, selling out immediately in the kinds of comic
|
|
stores run by tubercular-looking men with an intense dislike
|
|
for patrons who don't reserve at least ten new titles each month.
|
|
|
|
That said, the first issue of "Virus" was almost OK. But
|
|
almost only counts in quoits and horseshoes. "Virus
|
|
featured fair art, tiresome dialogue and a story that
|
|
revolved around an abandoned Chinese radar and telemetry ship that
|
|
comes under the power of some inter-cosmic computer virus that has
|
|
been beamed down from the aether through a radio antenna connected
|
|
to the ship's mainframe computer. The original crew of Chinamen is, of
|
|
course, dispensed with through a spasm of casual mechanized butchery,
|
|
necessitating the trapping of some ocean-wandering riff-raff who think
|
|
they're going to appropriate the vessel's equipment for lots of cash
|
|
money. Apparently, this is where Jamie Lee Curtis comes in.
|
|
|
|
Anyway, "Virus" -- the villain -- nixes this plan at once
|
|
by ripping the breast-bone out of one of the looter/scientists with
|
|
the aid of a computer-controlled winch. E-mail Risks Digest and report
|
|
this to Peter Neuman at once!
|
|
|
|
"Aaaiiieeee!" screech the trapped sailors. They want out, but not
|
|
before being attacked by something that looks like a cross between
|
|
a kite and a flying pipe-wrench made from sails and human integument.
|
|
|
|
While perhaps potentially interesting to infowar shamans at the National
|
|
Defense University, Crypt News suspects the movie adaptation will be as
|
|
numbingly contrived and psychotically bloody as the original. Look for
|
|
it next summer.
|
|
|
|
Postscript: Rumors that John Buchanan is serving as technical
|
|
advisor on the "Virus" set are scurrilous lies!
|
|
|
|
((CRYPT Newsletter is published once a month. For subscription
|
|
or other information, contact the editor:
|
|
|
|
Editor: Urnst Kouch (George Smith, Ph.D.)
|
|
Contributing Editors: Stephen Poole, Rob Rosenberger
|
|
INTERNET: 70743.1711@compuserve.com
|
|
crypt@sun.soci.niu.edu
|
|
|
|
Mail to:
|
|
Crypt Newsletter
|
|
1635 Wagner St.
|
|
Pasadena, CA 91106
|
|
ph: 818-568-1748
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 23 Jun 1997 06:02:58 -0700 (PDT)
|
|
From: Darren Reed <darrenr@CYBER.COM.AU>
|
|
Subject: File 7--book on hacker cult/underground.
|
|
|
|
Most of us are used to reading stories about hacking by the people
|
|
who did the catching of the hackers...this one is an ongoing story
|
|
of the local hacker scene...with not so local contacts and exploits.
|
|
|
|
Some of the important things to note are just how well they do work
|
|
together, as well as competing with each other and what they do when
|
|
they get pissed off with each other. Meanwhile most of the white hats
|
|
are too busy trying to hoard information from the other white hats...
|
|
|
|
Having been on the "victim" side in the past, it is quite frustrating
|
|
when someone you've worked to have arrested gets off with a fine. Most
|
|
of us would agree that they should be locked up somewhere, but
|
|
accoriding to what's in the book, most of them are suffering from either
|
|
problems at home or other mental disorders (including one claim in court
|
|
to being addicted to hacking). Anyone for a "Hackers Anonymous Association"
|
|
for help in drying out from this nefarious activity ? At least in one
|
|
case documented within the perpetrators get sentenced to time behind bars.
|
|
|
|
It's somewhat comforting to read that people have actually broken into
|
|
the machines which belong to security experts such as Gene Spafford and
|
|
Matt Biship, although I'd have prefered to have not read how they
|
|
successfully broke into the NIC :-/ Don't know about you, but I don't
|
|
care what motives they have, I'd prefer for them to not be getting inside
|
|
machines which provide integral services for the Internet.
|
|
|
|
For all of you who like to hide behind firewalls, in one instance a hacker
|
|
comes in through X.25 and out onto the Internet. Nice and easy 'cause
|
|
we don't need to firewall our X.25 connection do we ? :-)
|
|
|
|
Oh, and just for all those VMS weenies who like to say "We're secure,
|
|
we run VMS not Unix" - the first chapter of the book is on a VMS worm
|
|
called "WANK" that came close to taking the NASA VMS network completely
|
|
off air. I wonder how long it will take for an NT equivalent to surface...
|
|
|
|
All in all, a pretty good read (one from which I'm sure hackers will learn
|
|
just as much from as the rest of us).
|
|
|
|
|
|
The book's details are:
|
|
Title: UNDERGROUND - Tales of Hacking, madness and obsession on the
|
|
Electronic Frontier
|
|
ISBN 1-86330-595-5
|
|
Author: Suelette Dreyfus
|
|
Publisher: Random House
|
|
Publisher's address: 20 Alfred St, Milsons Point, NSW 2061, Australia
|
|
Price: AUS$19.95
|
|
|
|
before I forget, the best URL for the book I've found is:
|
|
http://www.underground.org/book
|
|
or
|
|
http://www.underground.-book.com
|
|
|
|
(the publisher's one is rather lame)
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 24 Jun 1997 19:07:08 -0700 (PDT)
|
|
From: proff@IQ.ORG
|
|
Subject: File 8--Underground extract: System X
|
|
|
|
Anyone read this book? Apparently the first in-depth investigation
|
|
into the international computer underground to come out of the
|
|
Southern-Hemisphere - or so I'm told ;) - J.A
|
|
|
|
Extracts from Underground - The true nature of System X
|
|
|
|
Extracted from Chapter 10 - "Anthrax - The Outsider"
|
|
|
|
Note: System X's name has been changed for legal reasons.
|
|
|
|
Sometimes the time just slipped away, hacking all night. When
|
|
the first hint of dawn snuck up on him, he was invariably in
|
|
the middle of some exciting journey. But duty was duty, and it
|
|
had to be done. So Anthrax pressed control S to freeze his
|
|
screen, unfurled the prayer mat with its built-in compass,
|
|
faced Mecca, knelt down and did two sets of prayers before
|
|
sunrise. Ten minutes later he rolled the prayer mat up, slid
|
|
back into his chair, typed control Q to release the pause on
|
|
his computer and picked up where he left off.
|
|
|
|
This company's computer system seemed to confirm what he had
|
|
begun to suspect. System X was the first stage of a project,
|
|
the rest of which was under development. He found a number of
|
|
tables and reports in System X's files. The reports carried
|
|
headers like 'Traffic Analysis', 'calls in' and 'calls out',
|
|
'failure rate'. It all began to make sense to Anthrax.
|
|
|
|
System X called up each of the military telephone exchanges in
|
|
that list. It logged in using the computer-generated name and
|
|
password. Once inside, a program in System X polled the
|
|
exchange for important statistics, such as the number of calls
|
|
coming in and out of the base. This information was then stored
|
|
on System X. Whenever someone wanted a report on something, for
|
|
example, the military sites with the most incoming calls over
|
|
the past 24 hours, he or she would simply ask System X to
|
|
compile the information. All of this was done automatically.
|
|
|
|
Anthrax had read some email suggesting that changes to an
|
|
exchange, such as adding new telephone lines on the base, had
|
|
been handled manually, but this job was soon to be done
|
|
automatically by System X. It made sense. The maintenance time
|
|
spent by humans would be cut dramatically.
|
|
|
|
A machine which gathers statistics and services phone exchanges
|
|
remotely doesn't sound very sexy on the face of it, until you
|
|
begin to consider what you could do with something like that.
|
|
You could sell it to a foreign power interested in the level of
|
|
activity at a certain base at a particular time. And that is
|
|
just the beginning.
|
|
|
|
You could tap any unencrypted line going in or out of any of
|
|
the 100 or so exchanges and listen in to sensitive military
|
|
discussions. Just a few commands makes you a fly on the wall of
|
|
a general's conversation to the head of a base in the
|
|
Philippines. Anti-government rebels in that country might pay a
|
|
pretty penny for getting intelligence on the US forces.
|
|
|
|
All of those options paled next to the most striking power
|
|
wielded by a hacker who had unlimited access to System X and
|
|
the 100 or so telephone exchanges. He could take down that US
|
|
military voice communications system almost overnight, and he
|
|
could do it automatically. The potential for havoc creation was
|
|
breathtaking. It would be a small matter for a skilled
|
|
programmer to alter the automated program used by System X.
|
|
Instead of using its dozen or more modems to dial all the
|
|
exchanges overnight and poll them for statistics, System X
|
|
could be instructed to call them overnight and reprogram the
|
|
exchanges.
|
|
|
|
---
|
|
|
|
No-one would be able to reach one another. An important part of
|
|
the US military machine would be in utter disarray. Now, what
|
|
if all this happened in the first few days of a war? People
|
|
trying to contact each other with vital information wouldn't be
|
|
able to use the telephone exchanges reprogrammed by System X.
|
|
|
|
THAT was power.
|
|
|
|
It wasn't like Anthrax screaming at his father until his voice
|
|
turned to a whisper, all for nothing. He could make people sit
|
|
up and take notice with this sort of power.
|
|
|
|
Hacking a system gave him a sense of control. Getting root on a
|
|
system always gave him an adrenalin rush for just that reason.
|
|
It meant the system was his, he could do whatever he wanted, he
|
|
could run whatever processes or programs he desired, he could
|
|
remove other users he didn't want using his system. He thought,
|
|
I own the system. The word 'own' anchored the phrase which
|
|
circled through his thoughts again and again when he
|
|
successfully hacked a system.
|
|
|
|
The sense of ownership was almost passionate, rippled with
|
|
streaks of obsession and jealousy. At any given moment, Anthrax
|
|
had a list of systems he owned and that had captured his
|
|
interest for that moment. Anthrax hated seeing a system
|
|
administrator logging onto one of those systems. It was an
|
|
invasion. It was as though Anthrax had just got this woman he
|
|
had been after for some time alone in a room with the door
|
|
closed. Then, just as he was getting to know her, this other
|
|
guy had barged in, sat down on the couch and started talking to
|
|
her.
|
|
|
|
It was never enough to look at a system from a distance and
|
|
know he could hack it if he wanted to. Anthrax had to actually
|
|
hack the system. He had to own it. He needed to see what was
|
|
inside the system, to know exactly what it was he owned.
|
|
|
|
The worst thing admins could do was to fiddle with system
|
|
security. That made Anthrax burn with anger. If Anthrax was
|
|
on-line, silently observing the adminsU activities, he would
|
|
feel a sudden urge to log them off. He wanted to punish them.
|
|
Wanted them to know he was into their system. And yet, at the
|
|
same time, he didnUt want them to know. Logging them off would
|
|
draw attention to himself, but the two desires pulled at him
|
|
from opposite directions. What Anthrax really wanted was for
|
|
the admins to know he controlled their system, but for them not
|
|
to be able to do anything about it. He wanted them to be
|
|
helpless.
|
|
|
|
Anthrax decided to keep undercover. But he contemplated the
|
|
power of having System X's list of telephone exchange dial-ups
|
|
and their username - password combinations. Normally, it would
|
|
take days for a single hacker with his lone modem to have much
|
|
impact on the US military's communications network. Sure, he
|
|
could take down a few exchanges before the military wised up
|
|
and started protecting themselves. It was like hacking a
|
|
military computer. You could take out a machine here, a system
|
|
there. But the essence of the power of System X was being able
|
|
to use its own resources to orchestrate widespread pandemonium
|
|
quickly and quietly.
|
|
|
|
Anthrax defines power as the potential for real world impact.
|
|
At that moment of discovery and realisation, the real world
|
|
impact of hacking System X looked good. The telecommunications
|
|
company computer seemed like a good place to hang up a sniffer,
|
|
so he plugged one into the machine and decided to return in a
|
|
little while. Then he logged out and went to bed.
|
|
|
|
When he revisited the sniffer a day or so later, Anthrax
|
|
received a rude shock. Scrolling through the sniffer file, he
|
|
did a double take on one of the entries. Someone had logged
|
|
into the company's system using his special login patch
|
|
password.
|
|
|
|
He tried to stay calm. He thought hard. When was the last time
|
|
he had logged into the system using that special password?
|
|
Could his sniffer have logged himself on an earlier hacking
|
|
session? It did happen occasionally. Hackers sometimes gave
|
|
themselves quite a fright. In the seamless days and nights of
|
|
hacking dozens of systems, it was easy to forget the last time
|
|
you logged into a particular system using the special password.
|
|
The more he thought, the more he was absolutely sure. He hadn't
|
|
logged into the system again.
|
|
|
|
Which left the obvious question. Who had?
|
|
___________________________________________________
|
|
[This extract may be reposted non-commercially and without charge only]
|
|
|
|
Underground; Tales of Hacking, Madness and Obsession on the Electronic
|
|
Frontier, by Suelette Dreyfus; published by Mandarin (Random House
|
|
Australia); (P) 475 pages with bib. http://www.underground-book.com/ or
|
|
http://underground.org/book
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 9--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.54
|
|
************************************
|
|
|