home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Aug 15 1993 Volume 5 : Issue 61
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copie Editor: Etaoin Shrdlu, Senior
-
- CONTENTS, #5.61 (Aug 15 1993)
- File 1--ERRATA in CuD #5.60
- File 2--EFF Job Opening for ONLINE ACTIVIST
- File 3--NSA Seeks Delay in Clipper
- File 4--CPSR and the Nat'l Info Infrastructure
- File 5--Call for Papers IFIP SEC'94 Caribbean
- File 6--UPDATE #21-AB1624: *ACTION ALERT*: END-GAME APPROACHING
- File 7--Illinois BBS Sysop Busted for "porn-to-minors"
- File 8--In response to E-fingerprinting in Calif
- File 9--Re--NIRVANAnet (A View from Brazil)
- File 10--Public Domain Internet Information for Teachers <fwd>
- File 11--Gory details about texsun (breakin) (fwd)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
- etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Sat, 14 Aug 1993 22:51:01 CDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 1--ERRATA in CuD #5.60
-
- Ooops---In thanking our NIU folk in CuD 5.60, we misspelled the
- name of the Director of our Academic Computing Service. Michael
- Prais, not "Preis." Sorry 'bout that, Michael.
-
- We also indicated that WYLBUR was our operating system. Neil Rickert
- gently corrected us:
-
- Actually WYLBUR is not an operating system at all. It is
- just a multi-user interactive text editor which runs under
- the operating system MVS-XA.
-
- The computer center is finally taking the plunge and getting
- a Unix system for those university users who need Unix.
- We've been pushing them in this direction. I don't yet know
- what the arrangements and policies will be for this system.
-
- ------------------------------
-
- From: Shari Steele <ssteele@EFF.ORG>
- Date: Thu, 5 Aug 1993 17:04:14 -0400
- Subject: File 2--EFF Job Opening for ONLINE ACTIVIST
-
- The Electronic Frontier Foundation (EFF), a nonprofit organization
- dedicated to protecting civil liberties for users of newly emerging
- technologies, is looking to hire an Online Activist.
-
- The Online Activist will actively participate in and organize EFF's
- sites on CompuServe, America Online, GEnie, Usenet and the WELL and
- will distribute feedback from the various networks to EFF staff and
- board through regular online summaries. This person will provide
- leadership to groups of members and will possibly set up and maintain
- an EFF BBS. The Online Activist will help to maintain EFF's ftp
- library. This person will train new EFF staff members on online
- communications. S/he will collect and solicit articles for, write
- articles for, edit and assemble our biweekly electronic newsletter,
- EFFector Online. The Online Activist will work with the System
- Administrator to distribute and post EFFector Online and other EFF
- electronic publications and to maintain a database of form answers for
- commonly asked questions, along with the Membership Coordinator. This
- person must be willing to work out of EFF's offices in Washington, DC.
-
- The Electronic Frontier Foundation offers a competitive salary with
- excellent benefits. For immediate consideration, please forward a
- resume, along with a cover letter describing your online experience
- and reason for applying for this job by August 23, 1993, to:
-
- Online Activist Search
- Electronic Frontier Foundation
- 1001 G Street, NW
- Suite 950 East
- Washington, DC 20001
- fax (202) 393-5509
- e-mail ssteele@eff.org (ASCII only, please)
-
- ------------------------------
-
- Date: Wed, 11 Aug 1993 16:05:14 EST
- From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
- Subject: File 3--NSA Seeks Delay in Clipper
-
- NSA Seeks Delay in Clipper Case
-
-
- The National Security Agency (NSA) has asked a federal court for
- a one-year delay in a lawsuit challenging the secrecy of the
- government's "Clipper Chip" encryption proposal. The suit was filed
- by Computer Professionals for Social Responsibility (CPSR) on May 28
- and seeks the disclosure of all information concerning the
- controversial plan.
-
- In an affidavit submitted to the United States District Court for
- the District of Columbia on August 9, NSA Director of Policy Michael
- A. Smith states that
-
- NSA's search for records responsive to [CPSR's] request is under
- way, but is not yet complete. Because the Clipper Chip program
- is a significant one involving the participation of organizations
- in four of NSA's five Directorates and the Director's staff, the
- volume of responsive documents is likely to be quite large.
- Moreover, because the Clipper Chip program is highly complex and
- technical and is, in substantial part, classified for national
- security purposes, the review process cannot be accomplished
- quickly.
-
- CPSR called for the disclosure of all relevant information and
- full public debate on the proposal on April 16, the day it was
- announced. While NSA has insisted from the outset that the "Skipjack"
- encryption algorithm, which underlies the Clipper proposal, must
- remain secret, the Smith affidavit contains the first suggestion that
- the entire federal program is classified "in substantial part." In
- the interest of obtaining timely judicial review of the agency's broad
- classification claim, CPSR intends to oppose NSA's request for delay
- in the court proceedings.
-
- In another case involving government cryptography policy, CPSR
- has challenged NSA's classification of information concerning the
- development of the Digital Signature Standard (DSS). The court is
- currently considering the issue and a decision is expected soon.
-
- CPSR is a national public-interest alliance of computer industry
- professionals dedicated to examining the impact of technology on
- society. CPSR has 21 chapters in the U.S. and maintains offices in
- Palo Alto, California, and Washington, DC. For additional information
- on CPSR, call (415) 322-3778 or e-mail <cpsr@cpsr.org>.
-
- David L. Sobel
- CPSR Legal Counsel
- <sobel@washofc.cpsr.org>
-
- ------------------------------
-
- Date: Tue, 10 Aug 1993 09:43:40 PDT
- From: Nikki Draper <draper@CSLI.STANFORD.EDU>
- Subject: File 4--CPSR and the Nat'l Info Infrastructure
-
- COMPUTER PROFESSIONALS ADD SOCIAL CONSCIENCE
- TO NATIONAL NETWORK DEBATE
-
- Palo Alto, Calif., August 6, 1993 -- At a recent meeting in
- Washington D.C., board members from Computer Professionals for Social
- Responsibility (CPSR) were challenged by top level telecommunications
- policy experts to craft a public interest vision of the National
- Information Infrastructure (NII). The experts at the roundtable
- discussion included Mike Nelson from the President's Office of Science
- and Technology, Vint Cerf from the Internet Society, Jamie Love from
- the Taxpayer's Assets Project, Ken Kay from Computer Systems Policy
- Project, and Laura Breeden from FARnet.
-
- "We were excited to discover that CPSR is in a position to play a key
- role in shaping NII policy," said CPSR Board President, Eric Roberts.
- "The commercial sector is already in the thick of the debate, but
- there has been little coordinated response from the noncommercial
- constituencies. After talking about the issues and CPSR's role, the
- Board committed to meeting this challenge."
-
- So far, the debate about the NII has centered around fiber versus
- ISDN, cable companies versus telephone companies, research versus
- commercialization, and so on. These are real questions with
- important implications. However, CPSR believes that a better
- starting point is a set of guiding principles as the context for all these
- more detailed questions about "architecture," technical standards,
- and prime contractor. Before arguing over bits and bytes, it is crucial
- to clarify the vision and values that underlie a major endeavor like
- the NII.
-
- As individuals in the computing profession, CPSR's membership
- knows that new technologies bring enormous social change.
- CPSR's goal is to help shape this change in an informed manner.
- Key issues discussed in the paper will include:
-
- o ensuring that the design remains both open and flexible so
- that it can evolve with changing technology.
-
- o ensuring that all citizens have affordable network access and
- the training necessary to use these resources.
-
- o ensuring that risks of network failure and the concomitant
- social costs are carefully considered in the NII design.
-
- o protecting privacy and First Amendment principles in
- electronic communication.
-
- o guaranteeing that the public sector, and particularly schools
- and libraries, have access to public data at a reasonable cost.
-
- o seeking ways in which the network can strengthen democratic
- participation and community development at all levels.
-
- o ensuring that the network continues to be a medium for
- experimentation and non commercial sharing of resources,
- where individual citizens are producers as well as consumers.
-
- o extending the vision of an information infrastructure beyond
- its current focus of a national network, to include a global
- perspective.
-
- The national membership of CPSR brings a unique perspective to the
- overall conception of the NII. Throughout CPSR's history, the
- organization has worked to encourage public discussion of decisions
- involving the use of computers in systems critical to society and to
- challenge the assumption that technology alone can solve political and
- social problems. This past year, CPSR's staff, national and chapter
- leadership have worked on privacy guidelines for the National Research
- and Education Network (NREN), conducted a successful conference on
- participatory design, created local community networks, organized
- on-line discussion groups on intellectual property, and much more.
-
- To ensure that its position paper is broadly representative, CPSR will
- work in concert with other public interest groups concerned about the
- NII, such as the newly established coalition in Washington D.C., the
- Telecommunications Policy Roundtable. CPSR chapters are will be
- conducting a broad based public campaign to reach out beyond the
- technical experts and producers -- to people who will be affected by
- the NII even if they never directly log on.
-
- CPSR will begin distributing its completed paper to policy makers on
- October 16th at its annual meeting in Seattle, Washington. The
- meeting will bring together local, regional and national decision
- makers to take a critical look at the NII.
-
- Founded in 1981, CPSR is a national, non-profit, public interest
- organization of computer scientists and other professionals concerned
- with the impact of computer technology on society. With offices in
- Palo Alto, California, and Washington D.C., CPSR works to dispel
- popular myths about technological systems and to encourage the use of
- computer technology to improve the quality of life.
-
- For more information on CPSR's position paper , contact Todd Newman,
- CPSR board member, at 415-390-1614 .
-
- For more information about CPSR, contact Nikki Draper, Communications
- Director, at 415-322-3778 or draper@csli.stanford.edu.
-
- ------------------------------
-
- Date: Thu, 12 Aug 1993 01:43 +0100
- From: fortrie@CIPHER.NL
- Subject: File 5--Call for Papers IFIP SEC'94 Caribbean
-
- Call for Papers IFIP SEC'94 - updated information August 1993
-
- Technical Committee 11 - Security and Protection in Information
- Processing Systems - of the UNESCO affiliated INTERNATIONAL
- FEDERATION FOR INFORMATION PROCESSING - IFIP,
-
- announces:
-
- Its TENTH INTERNATIONAL INFORMATION SECURITY CONFERENCE, IFIP SEC'94
- TO BE HELD IN THE NETHERLANDS ANTILLES (CARIBBEAN), FROM MAY 23
- THROUGH MAY 27, 1994.
-
- Organized by Technical Committee 11 of IFIP, in close cooperation with
- the Special Interest Group on Information Security of the Dutch
- Computer Society and hosted by the Caribbean Computer Society, the
- TENTH International Information Security Conference IFIP SEC'94 will be
- devoted to advances in data, computer and communications security
- management, planning and control. The conference will encompass
- developments in both theory and practise, envisioning a broad perspective of
- the future of information security.
- The event will be lead by its main theme "Dynamic Views on
- Information Security in Progress".
-
-
- Papers are invited and may be practical, conceptual, theoretical, tutorial
- or descriptive in nature, addressing any issue, aspect or topic of
- information security. Submitted papers will be refereed, and those presented
- at the conference, will be included in the formal conference proceedings.
- Submissions must not have been previously published and must be the
- original work of the author(s). Both the conference and the five
- tutorial expert workshops are open for refereed presentations.
-
- The purpose of IFIP SEC'94 is to provide the most comprehensive international
- forum and platform, sharing experiences and interchanging ideas, research
- results, development activities and applications amongst academics,
- practitioners, manufacturers and other professionals, directly or indirectly
- involved with information security. The conference is intended for computer
- security researchers, security managers, advisors, consultants, accountants,
- lawyers, edp auditors, IT, administration and system managers from
- government, industry and the academia, as well as individuals interested and/or
- involved in information security and protection.
-
- IFIP SEC'94 will consist of a FIVE DAY - FIVE PARALLEL STREAM - enhanced
- conference, including a cluster of SIX FULL DAY expert tutorial workshops.
-
- In total over 120 presentations will be held. During the event the second
- Kristian Beckman award will be presented. The conference will address
- virtually all aspects of computer and communications security, ranging
- from viruses to cryptology, legislation to military trusted systems,
- safety critical systems to network security, etc.
-
- The six expert tutorial workshops, each a full day, will cover the
- following issues:
-
- Tutorial A: Medical Information Security
- Tutorial B: Information Security in Developing Nations
- Tutorial C: Modern Cryptology
- Tutorial D: IT Security Evaluation Criteria
- Tutorial E: Information Security in the Banking and Financial Industry
- Tutorial F: Security of Open/Distributed Systems
-
- Each of the tutorials will be chaired by a most senior and internationally
- respected expert.
-
- The formal proceedings will be published by Elsevier North Holland
- Publishers, including all presentations, accepted papers, key-note talks,
- and invited speeches.
-
- The Venue for IFIP SEC'94 is the ITC World Trade Center Convention
- Facility at Piscadera Bay, Willemstad, Curacao, Netherlands Antilles.
-
- A unique social program, including formal banquet, giant 'all you can eat'
- beach BBQ, island Carnival night, and much more will take care of leisure
- and relax time.
-
- A vast partners program is available, ranging from island hopping, boating,
- snorkeling and diving to trips to Bonaire, St. Maarten, and Caracas.
- A special explorers trip up the Venezuela jungle and the Orinoco River
- is also available.
- For families a full service kindergarten can take care of youngsters.
-
- The conference will be held in the English language. Spanish translation
- for Latin American delegates will be available.
-
- Special arrangements with a wide range of hotels and apartments complexes
- in all rate categories have been made to accommodate the delegates and
- accompanying guests. (*)
- The host organizer has made special exclusive arrangements with KLM Royal
- Dutch Airlines and ALM Antillean Airlines for worldwide promotional fares
- in both business and tourist class. (**)
-
- (*)(**) Our own IFIP TC11 inhouse TRAVEL DESK will serve from any city on
- the globe.
-
- All authors of papers submitted for the referee process will enjoy special
- benefits.
-
- Authors of papers accepted by the International Referee Committee will enjoy
- extra benefits.
-
- If sufficient proof (written) is provided, students of colleges, universities
- and science institutes within the academic community, may opt for
- student enrollment. These include special airfares, apartment accommodations,
- discounted participation, all in a one packet prepaid price.
- (Authors' benefits will not be affected)
-
- **************************
-
- INSTRUCTIONS FOR AUTHORS
-
- **************************
-
- Five copies of the EXTENDED ABSTRACT, consisting of no more than 25 double
- spaced typewritten pages, including diagrams and illustrations, of
- approximately 5000 words, must be received by the Program Committee no
- later than November 15th, 1993.
-
- We regret that electronically transmitted papers, papers on diskettes,
- papers transmitted by fax and handwritten papers are not accepted.
-
- Each paper must have a title page, which includes the title of the paper,
- full names of all author(s) and their title(s), complete address(es),
- including affiliation(s), employer(s), telephone/fax number(s) and
- email address(es).
- To facilitate the blind refereeing process the author(s)' particulars
- should only appear on the separate title page. The language of the
- conference papers is English.
- The first page of the manuscript should include the title, a keyword list
- and a 50 word introduction. The last page of the manuscript should include
- the reference work (if any).
-
- Authors are invited to express their interest in participating in the
- contest, providing the Program Committee with the subject or issue that
- the authors intend to address (e.g. crypto, viruses, legal, privacy, design,
- access control, etc.) This should be done preferably by email to
- < TC11@CIPHER.NL >, or alternately sending a faxmessage to
- +31 43 619449 (Program Committee IFIP SEC'94)
-
- The extended abstracts must be received by the Program Committee on or
- before November 15th, 1993.
-
- Notification of acceptance will be mailed to contestants on or before
- December 31, 1993. This notification will hold particular detailed
- instructions for the presentation and the preparation of camera ready
- manuscripts of the full paper.
-
- Camera ready manuscripts must be ready and received by the Program Committee
- on or before February 28, 1994.
-
- If you want to submit a paper, or you want particular information on
- the event, including participation, please write to:
-
- IFIP SEC'94 Secretariat
- Postoffice Box 1555
- 6201 BN MAASTRICHT
- THE NETHERLANDS - EUROPE
-
- or fax to:
-
- IFIP SEC'94 Secretariat: +31 43 619449 (Netherlands)
-
- or email to:
-
- < TC11@CIPHER.NL >
-
- ***************************************************************
-
- Special request to all electronic mail readers:
-
- Please forward this Call for Papers to all networks and listservices
- that you have access to, or otherwise know of.
-
- ****************************************************************
-
- Sincerely
-
- IFIP TC 11 Secretariat
-
- Call for Papers - updated information August 1993
-
- ------------------------------
-
- Date: Mon, 9 Aug 1993 16:49:06 -0700
- From: Jim Warren <jwarren@WELL.SF.CA.US>
- Subject: File 6--UPDATE #21-AB1624: *ACTION ALERT*: END-GAME APPROACHING
-
- *** PLEASE WRITE, NOW!*** PLEASE, DON'T STOP NOW!
-
- Assembly Bill 1624, mandating online public access to public
- legislative information via the public networks (i.e., the Internet
- and all the nets connected to it - including wherever you are
- receiving this msg), will either pass the Legislature by Sept. 10th,
- or will die - and we have to re-fight the whole battle, year after
- year.
-
- LETTERS & FAXES ARE *NEEDED*!. THEY *WILL* DETERMINE THE OUTCOME.
-
- REMAINING 1993 LEGISLATION SCHEDULE
- Jul 16th, the Legislature went into remission - uh, recess.
- Aug 16th, the Legislature reconvenes to diddle remaining 1993 business.
- Sep 10th, the Legislature quits working in Sacramento for the year.
- Oct 10th, the Governor must veto legislatively-approved bills he opposes.
- On AUGUST 18TH, the Senate Rules Committee run by Sen. Dave Roberti
- (D-Van Nuys area) will hear AB1624. If Roberti doesn't like it, he can and
- will kill it. If Roberti passes it, it will almost-certainly pass the
- Senate. Then we need for the Assembly to "concur in amendments" and the
- Governor to not veto it.
-
-
- Address letters/faxes to "State Capitol, Sacremanto CA 95814."
-
- AS SOON AS POSSIBLE, send a one-page letter supporting AB1624 to the
- Senate Rules Committee - who have seen essentially *no* support for it:
- Sen. David Roberti, Chair, Room 400; fax/916-323-7224; voice/916-445-8390.
- and to the other four members (tiny, *powerful* committee!):
- Sen. Ruben Ayala (D-Chino area), Room 5108; f/916-445-0128; v/916-445-6868.
- Sen. Robert Beverly (R-Long Bch), Room 5082; f/not avail.; v/916-445-6447.
- Sen. William Craven (R-Oceanside), Room 3070; f/not avail.; v/916-445-3731.
- Sen. Nick Petris (D-Alameda), Room 5080; fax/916-327-1997; v/916-445-6577.
-
- Important: Please send COPIES of ALL letters to the AB1624 author:
- Hon. Debra Bowen, Room 3126; voice/916-445-8528; fax/916-327-2201.
-
-
- CAN EMAIL VIA ME, IF YA CAN'T FIND TIME FOR SNAIL-MAIL
- If you don't have time to send snail-mail, you can email your message via
- jwarren@well.sf.ca.us.
- Write it exactly as you would snail-mail, but be SURE TO INCLUDE
- your name, address and phone #s for legislators' independent
- verification. Upon receipt by email, I will print and/or fax the
- entire message to Bowen and to the legislator(s) to whom you address
- it. (Please allow for that delay.)
-
- LEGI-TECH'S OLDER BROTHER DONE GOOD!
- The McClatchy organization is the owner of Legi-Tech, one of the two
- largest online distributors of California legislative information. They are
- also owner of a number of newspapers - their flagship being the powerful
- Sacramento Bee.
- On Jul 26th, the Bee ran an editorial *strongly* supportive of AB1624 -
- laudable, principled action by The Bee, McClatchy, and presumably by
- Legi-Tech in the face of a difficult trade-off between the public's
- interests versus their business interests.
- Applause! Applause!
-
-
- CALIFORNIA LEGISPEAK: "AUTHOR" VS. "SPONSOR" VS. "SUPPORTER"
- In California legislative circles:
- A bill's AUTHOR is a legislator who introduced the bill.
- A bill's SPONSOR(S) is a person or organization, if any, that requested that
- the bill be introduced by the bill's author.
- A bill's SUPPORTER(S) is a person or organization that is officially listed
- as being in favor of the bill, usually including its sponsor(s), if any.
- All bills have one or more authors. Some bills do NOT have sponsors.
- AB1624's author was Assembly Member Debra Bowen. It had no sponsors, but
- has a growing number of supporters.
-
-
- PROGRAMMERS: SAMPLE LEGISLATIVE DATA-FILES ALSO AVAILABLE AT CPSR.ORG
- AB1624 Update #19 detailed a set of sample data-files for review and
- test-programming, available from Tim Pozar's KUMR.LNS.COM by anonymous ftp.
- As of Jul 22nd, those Legislative Data Center sample files were/are also
- online at cpsr.org in /ftp/cpsr/states/california/ab1624/sample_data
- for binary ftp access. For questions about accessing them there, contact:
- Al Whaley al@sunnyside.com +1-415 322-5411(Tel), -6481 (Fax)
- Sunnyside Computing, Inc., PO Box 60, Palo Alto, CA 94302
-
- We have a voice. Use it or loose it.
-
- ------------------------------
-
- Date: Fri, 6 Aug 93 09:28:12 CDT
- From: anonymous@name.deleted
- Subject: File 7--Illinois BBS Sysop Busted for "porn-to-minors"
-
- "Kids, Computers, and Porn:
- For Many, Adult Material just a Keystroke away"
- Chicago Tribune, 6 Aug, 1993, p. 1, 16
- By Susan Kuczka
-
- Steven's mother described her 12-year old son as a "computer
- nerd," and she believed he spent all his time engaged in
- good, clean digital fun.
-
- .......
-
- What she didn't know was that her son also was using his
- computer to watch hard-core pornography delivered to his
- northwest suburban home by modem from a computer bulletin
- board service.
-
- .......
-
- The discovery led to the arrest of a Des Plaines bulletin
- board operator in the first prosecution of its kind in state
- history.
-
- .......
-
- Nancy Clausen, spokeswoman for the National Coalition Against
- Pornography, said, "Kids are getting this all the time, but
- it's hard for parents to know it's happening because it's
- easy for a child to hide. You think your kid's a computer
- genius when he's spending hours at a computer, but when he
- has a modem, he has access to a different world, and kids
- are very curious."
-
- <The story cites Lisa Palac, 29, editor of the quarterly magazine
- FUTURE SEX, who calls it "cybersex:porn of the next generation."
- According to the story, computer porn is becoming big business
- with users being charged $25 to $50 year for file access, and
- some of the larger services have toll-free 800 numbers.
- It indicates that 13 million computer users are connected to
- 55,000 commercial bulletin boards nationwide, although less than
- 5 percent, according to the author, are "adult bulletin boards.">
-
- There is nothing illegal about distributing most forms of
- pornography to adults. Transmission of pornographic
- materials to a minor--whether in print or by computer--is a
- crime, though.
-
- But the computer pornography industry is so new that law
- enforcement authorities are only now beginning to investigate
- it as more and more bulletin board services begin to operate
- throughout the country.
-
- <The story notes that Steven's mother spent weeks trying to interest
- law enforcement officials to pursue the case, including her local PD,
- the Illinois State Police, the Cook County sheriff, and the FBI.
- Finally, the Cook County state's attorney accepted her complaint,
- which resulted in a grant jury indictment. The BBS sysop is Raymond
- F. Netupski, 30, of 10106 Holly Lane, Des Plaines (Ill.), who began
- operating his board in 1987. Netupski's attorney is John J. Seno.
- Netupski was indicted for distributing harmful materials to a minor
- and obscenity, both misdemeanors. He was also charged with "unlawful
- use of sound or audio visual recordings," because some of the
- transmitted material was copyright-protected. The "piracy" charge, a
- felony, carries a potential sentence of up to 3 years imprisonment and
- a $100,000 fine.
-
- The remainder of the story cites a several law enforcement agents,
- sysops, and others, for their comments.
-
- ------------------------------
-
- Date: Mon, 2 Aug 1993 17:17:38 CST
- From: roy@SENDAI.CYBRSPC.MN.ORG(Roy M. Silvernail)
- Subject: File 8--In response to E-fingerprinting in Calif
-
- In comp.society.cu-digest, sfs0@PHPMTS1.EM.CDC.GOV writes:
-
- [in regard to e-fingerprinting as a condition of public assistance]
-
- > I fail to see this as a "Big Brother" issue. After all, isn't
- > the goal of social services in a majority of the cases to provide
- > assistance temporarily? Once the assistance is no longer needed, the
- > recipient is no longer tracked.
-
- Government and law enforcement agencies have shown a dismal track record
- in the area of civil liberties of late. I have a very hard time
- believing, even for a minute, that this vast amount of personal
- information will be discarded.
-
- Furthermore, once some kind of 'evidence of benefit' can be wrested from
- the selective interpretation of the program's operational record,
- pressure will be brought to expand the system to more and more areas.
- I've seen mention in this very forum that L.A. intends to expand to GA
- and Food Stamp recipients. California now has a magnetic stripe on
- their drivers' licenses. Will that soon contain your e-fingerprint, as
- well?
-
- Don't you agree that this is perhaps a bit too much information to be
- collecting on anyone?
-
- Or perhaps you don't see any reason to stop with fingerprints. Coded
- transponders carrying a unique identification number could easily be
- implanted, say, at the base of the right thumb. That would be even
- harder to spoof than e-fingerprints. So why not have all AFDC
- recipients implanted with serial numbers? Hey, we could even make that
- number tie in to your credit card numbers, so you'd be safe from fraud.
- Make it your ATM card number, and you'd be safe from the shoulder
- surfers at the ATM. And I'm sure you wouldn't mind the occasional
- doorknob noting the exact time of your passage. After all, you're an
- honest man with nothing to hide, so it doesn't matter that someone could
- effortlessly track your every move.
-
- You see, once this trend gets started, it will grow to envelop us all.
- Don't know about you, but I don't want that transponder. And I'd rather
- not be e-fingerprinted, either.
-
- ------------------------------
-
- Date: Wed, 11 Aug 93 18:27:00 -0300
- From: luiz.marques@BBS816.MANDIC.ONSP.BR(Luiz Marques)
- Subject: File 9--Re--NIRVANAnet (A View from Brazil)
-
- Dear CUD,
-
- I'd like to thank you for your wonderful journal,and
- tell you that it's enjoyed even in Brazil.
-
- Reading the Time article on CuD 5.59,I couldn't help but
- laugh after reading the following:
-
- >One bulletin board, Burn This Flag, requires callers to fill out an
- >application before gaining access to an adults-only section that
- >contains files describing "bizarre sexual behavior." But in a written
- >message, Burn This Flag's system operator, known as "Zardoz,"
- >acknowledges there is no foolproof way to ensure all users of the
- >adult section are at least 18.
-
- Does paper adults magazines have any way to "unsure that all
- users" of it will be at least 18?To the best of my knowledge,
- this magazines are sold openly without directly checking ages(this
- "checking" stops at appearance analysis).And that does not consider
- what will happen to the magazine AFTER it's sold...
-
- About this kind of assault on BBS reputation,I'd like to say that
- it's probably international.Recently,here in Brazil,one of the
- biggest newspapers of the country published a article with wild
- remarks like these:
- "BBS are little stores which sell pirated programs"
- "There are 120 pirate BBSs in Sao Paulo"(there aren't even
- 120 BBS in Sao Paulo!!!)
-
- These remarks are totally absurd,and most BBS around here
- are completely legal(there is a small amount of "underground
- BBS"here too),and hurt the BBS community as a whole.
-
- And the effect of such remarks are much worse here,since
- the computer community (and BBSs) are greatly underdeveloped
- (taking the USA as a standard).
-
- luiz.marques@bbs816.mandic.onsp.br
-
- ------------------------------
-
- Date: Wed, 11 Aug 1993 05:26:41 -0500
- From: CuD moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 10--Public Domain Internet Information for Teachers <fwd>
-
- From--"samizdat@world.std.com" "B.R. Samizdat Express"
-
- PLEASE COPY THIS DISK -- UPDATE 8/1/93
- The B&R Samizdat Express
- PO Box 161
- West Roxbury, MA 02132
- samizdat@world.std.com
-
- (Reminder -- We're the folks who are making public-domain Internet
- information available on disk, primarily for teachers who have no
- access or limited access to the Internet. We encourage you to make as
- many copies of these texts as you need to share with your colleagues
- and students. If you would like to receive a list of our current
- offerings, please send us email requesting it. If you didn't see our
- initial message, where we explain what we're doing and why, and who we
- are, just let us know and we'll send you a copy of that as well.)
-
- It's been a busy week:
- 1) All our offerings are now available for Macintosh as well as IBM
- PCs.
- 2) The United Nations Department of Public Information has given its
- support to Global Education Motivators (GEM) in our joint project
- to make on-line U.N. information available in our PLEASE COPY THIS
- DISK format.
- 3) Your suggestions and requests pointed us to the Educational
- Resources Information Center (ERIC) as a possible source for a whole
- series of disks about teaching techniques and educational issues, as
- well as lesson plans. 4) One of you let us know the importance of
- books on disks for the blind, many of whom have equipment which can
- "read" such material aloud to them.
- 5) We've added six new disks.
- 6) We've learned that in the summer, with people away, obtaining
- permissions from sources can take a while.
- 7) We've been delighted by the enthusiastic response we received.
- 8) We learned that there simply isn't enough time in the
- day to personally respond to everyone. (Please accept
- our apologies, and our thanks for your helpful suggestions.)
-
- We'd appreciate your help in finding sources of information to meet
- the particular needs of people who have responded to us. We are
- looking for public-domain on-line sources for: 1) Chaucer, 2) current
- information on Africa, and 3) history c. 1850 of importation into the
- U.S. of castorbean plants (source of the toxin Ricin, which is
- possibly linked to Lou Gehrig's disease) and its use in fertilizer.
-
- The information resources available on the Internet and from the
- United Nations are immense. We need to target our efforts to provide
- maximum benefit. For now, we're basing our decisions on the assumption
- that some of you would like to use these like textbooks (having
- students make their own copies), that others would like to assemble
- your own anthologies, and that still others are interested in
- government reference tools to encourage students to become informed
- and active citizens. Please let us know as specifically as you can
- what information would be most useful for you and your colleagues to
- have on disk.
-
- Please send your suggestions as well as your requests to be added to
- our distribution list to: samizdat@world.std.com
-
- ------------------------------
-
- Date: Fri, 6 Aug 1993 22:16:59 -0500 (CDT)
- From: vswr!bobi@SPSGATE.SPS.MOT.COM(Bob Izenberg)
- Subject: File 11--Gory details about texsun (breakin) (fwd)
-
- # Date--Fri, 6 Aug 93 11:55:45 CDT
- # From--William.Reeder@adhara.Central.Sun.COM (William Reeder)
- (Sun Central Area Network Support)
-
- # Subject--Gory details about texsun
-
- # Eric Schnoebelen (eric@cirr.com) writes:
- # > What I heard was that texsun got cracked, so SUN changed
- # > policies to require call back on all connections. This means that
- # > SUN/texsun has to originate all calls. I recently converted the UUCP
- # > link between convex and texsun to route mail via smtp, to get "around"
- # > this problem..
- # >
- # > Personal thought? texsun is now out of the news providing
- # > business. And quite likely out of the general UUCP providing business.
- # > Perhaps its time for another connectivity meeting. (just what _I_ need,
- # > another meeting!)
-
- # I think I can speak authoritatively about what happened to texsun :-(
-
- # Actually, we have no evidence that anyone broke in through any of the
- # modems in Sun's Dallas office (hosts texsun or dallas). What did
- # happen was that one or more people (most likely more) broke in via
- # modem to a number of Sun sites around the world (must've had a good
- # calling card). We think that the initial entries were due to the most
- # brain-dead of actions on our part: the intruders called us on the phone
- # and asked for accounts, and we provided them. The callers would
- # identify themselves as Sun employees on vacation near the local Sun
- # office (visiting parents or such) and say that they wanted to login to
- # read their email. They were able to provide enough credible
- # information to convince over-worked and under-brained part-time
- # sys-admins to create the accounts. Any one of you who reads USENET
- # news can probably gather enough such information from headers and
- # signatures (name, title, personal workstation, office phone number,
- # etc.) to make the same claims.
-
- # Anyway, once they were in we were totally compromised. We hadn't done
- # much to keep up with security patches. And we had lots of machines
- # with "+" in /etc/hosts.equiv. And lots of quickly crackable passwords
- # on accounts (and NIS accessible password files). In other words, no
- # internal security. The intruders almost instantly had bunches of other
- # accounts to use, and seemed able to find other modem numbers (can you
- # say, "directory assistance"? I thought you could.)
-
- # The next question is, did they damage anything? Yes. At the very
- # least they stole source code, which is a valuable product. They also
- # deleted stuff, but I don't know what, and may have modified some
- # things. They also crashed machines or in other ways denied service to
- # legitimate users. All of those things are illegal, and damaging. We
- # are doing our best to track the intruders, but it is very difficult, as
- # any of you who have tracked intruders knows.
-
- # What we can do is secure our network. That is why we are removing
- # modems from all sales offices and setting up a small number of regional
- # modem pools for employee dialup access (with three different and
- # non-crackable passwords and dialback).
-
- # I have spent the better part of the last week rebuilding texsun from
- # the ground up and doing everything possible to secure it (all security
- # patches applied, many services disabled, nothing trusted, security
- # monitoring programs running, dialback software installed, etc.). I
- # have finally convinced my management that there is no security risk in
- # restoring the UUCP accounts for a short time, allowing our connections
- # to make other arrangements and smoothly move over. The reason it is
- # only temporary is that management doesn't want my UUCP modems to be the
- # proverbial camel sticking its nose under the tent. They are very
- # serious about strictly limiting the number of entry points into the
- # company.
-
- # So there you have it. Another one bites the dust. I'm sorry to have
- # to pull out of the regional UUCP community, but I can understand Sun's
- # needs to maintain a secure environment. While I agree that a properly
- # configured machine running UUCP is not a security risk, Sun's employees
- # have repeatedly demonstrated that they will not always properly
- # configure machines or employ proper security procedures when creating
- # accounts. The only way for Sun to maintain security is to strictly
- # limit access, and that is what we are now doing. I have enjoyed being
- # able to provide what I hope has been a useful service to the community,
- # and will miss being a participant. I will show up to this Month's
- # lunch-bunch meeting in case anyone wants to verbally abuse Sun through
- # me.
- #
- # -- Wills
-
- ------------------------------
-
- End of Computer Underground Digest #5.61
- ************************************