home *** CD-ROM | disk | FTP | other *** search
-
-
- Computer underground Digest Tue Aug 24 1993 Volume 5 : Issue 65
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Ediot: Etaoin Shrdlu, III
-
- CONTENTS, #5.65 (Aug 24 1993)
-
- File 1--Report on Summer Hack-Tic Conference in the Netherlands
- File 2--Another View of the Hack-tic '93 Conference
- File 3--Computer Culture and Media Images
- File 4--Media Images of Cu Digest - CuD Response to SunWorld
- File 5--CORRECTION on Graduate Paper Competition for CFP-'94
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
- etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Wed, Aug 11, '93 04:28:01 PDT
- From: Robert David Steele <steeler@well.sf.ca.us>
- Subject: File 1--Report on Summer Hack-Tic Conference in the Netherlands
-
- ((MODERATORS' NOTE: Newsweek (July 26, 1993: 58) billed
- the Hack-tic conference in Lelystad, the Netherlands,
- on August 3-6 as "Woodstock for the Nintendo generation."
-
- There's no guarantee of a large turn-out, but if
- thousands show up, it may help demonstrate just how far
- hacking has moved out of the bedrooms of smelly
- adolescents. If so, there's likely to be less geeking
- and more dancing in the Dutch summer night. Programmers
- may one day be able to lean back from their terminals,
- pat their pocket protectors and say, "I was there."
-
- The following two reports by attendees Robert D. Steeler and Emmanuel
- Goldstein, editor of 2600 Maazine, {suggest that the techno-phreak
- gathering was a success)).
-
- ++++
-
- Here is a brief report (on the Hack-tic conference:
-
- Roughly 150 people endured the rigors of camping out in a damp
- environment with no showers and minimal toilet facilities. The food
- provided and cooked by volunteers was wholesome but plain (lots of
- rice and beans). The Hack-tic organizers did a great job of setting
- up a main tent and two smaller workshop tents, as well as a full local
- net (which may not have hooked up to INTERNET as intended). Some sexy
- products and literature, but on the whole it was a mind-link event.
- (I had bronchitis and stayed in a local hotel on advice of doctor, so
- I missed most of the late night workshops.
-
- Here are a few highlights, mostly an outline of what took place with
- some follow-up contacts and one or two editorial comments:
-
- "Networking for the Masses". Main tent, 75 or so in audience. Talked
- about obstacles to free flow of information, main being that "the
- masses" aren't even close to understanding the technologies and the
- obscure mediocre user interfaces and complex unintegratable
- applications. For more info:
- ted@nluug.nl (Ted Lindgreen, Manager of nlnet)
- peter@hacktic.nl (Peter von der Pouw Kraan, involved in
- squat movement newsletters Blurf and NN)
- maja@agenda.hacktic.nl (Maja van der Velden, Agenda
- Foundation)
- nonsenso@utopia.hacktic.nl (Felipe Rodriguez from Hack-Tic
- Network which spun out of Dutch computer underground)
- zabkar@roana.hacktic.nl (Andre Blum, expert in wireless
- communications).
-
- A few others:
-
- "Phreaking the Phone" I missel uhis one, which was surely very
- interesting. Emmanuel can comment. For more info:
- bill@tech.hacktic.nl (Billsf, one of the world's best...
-
- "Hacking and the Law" Very important discussion of whether the laws
- are out-dated or retarded (to which I would also add my standard
- comment that law is not a good substitute for engineering oversights).
- More info: fridge@cri.hacktic.nl (Harry Onderwater, technical EDP
- auditor at Dutch National Criminal Intelligence Service)
- herschbe@dutiws.twi.tudelft.nl (Professor Bob Herschberg, lectures on
- computer insecurity and unprivacy) rgb@tracer.hacktic.nl (Ronald RGB
- O., the only Dutch hacker arrested both before and after new law in
- effect, self-taught writer and author for Hack-tic Magazine)
- andy@cccbln.ccc.de (andy Mueller-Maguhn, from German Chaos Computer
- Club) emmanuel@eff.org (our ((The Well's)) own)
-
- kaplan@bpa.arizona.edu (Ray Kaplan, computer security consultants,
- hosts "meet the enemy" sessions" rop@hacktic.nl (Rop Gonggrijp, was
- involved in some of the first computer break-ins om 80's, editor of
- Hacktic Magazine, and a VERY hard worker and leader of the team that
- put this conference together. I have guaranteed his expenses and am
- hosting his participation, and emmanuels, in my symposium in November
- whose secret title is "hacking the intelligence community".
-
- A number of technical workshops, modest participation.
-
- The most impressive workshop, which drew a lot of people and had
- continuous spin-off conversations the next day, was led by David
- Chaum of DigiCash, address Kruislaan 419, 1098 VA Amsterdam, The
- Netherlands, phone +31 20 665-2611 fax +31 20 668-5486 email
- david@digicash.nl. This guy, either English or England trained, is a
- heavy duty dude who appears to be on the bleeding edge (actually he's
- holding the knife) in the areas of smart cash, undeniable signatures,
- untraceable electronic mail, zero-knowledge signatures and zero
- information circuits, privacy protected payments, and so on. I was
- very impressed.--not my thing, but a class act. My next (separate
- response) contains my outline for the workshop, "Hacking the
- Intelligence Community: Increasing Citizens' Access to Intelligence in
- the Age of Information Warfare".
-
- ++++++++++++++++++++++++
-
- Outline of Hack-tic Workshop 6 August, Holland "Hacking the
- Intelligence Community: Increasing Citizens' Access to Intelligence in
- the Age of Information Warfare"
-
- - What IS intelligence? Data, Info, Intel
- - Why Hack the Intelligence Community?
- - Age of Info, InfoWar, InfoEcon
- - Empower CITIZENS, the "troops"
- - Move $1-5 billion from U.S. Intel Budget (per year, there is a draft
- bill I wrote circulating for comment, to create a National Knowledge
- Foundation)
- - Salute to Hackers--The Trail Blazers
- - Mile in My Shoes
- - Intel Experience
- -$10M mistake (USMC Intel Ctr built Top Secret system to get into CIA
- data, etc., only to find database empty of useful Third World
- info--and the system isn't allowed to go into open source databases by
- security regulations)
- - Explode the Myth of Intelligence
- - Collection failures (less than 10%)
- - Production failures (90% or more of what a policy maker reads/listens
- to is UNCLASSIFIED and UNANALYZED)
- - Production types & limits (too much, too late, too secret)
- Dinosaur/Cadilac Analogy (We've spent billions building a superhighway
- between Mosco and Washington, and a single Cadillac, when what we
- really need now is many many off-road vehicles--five jeeps, 100
- motorcycles, 1000 bikes)
- - BENCHMARKING (Get consumers of intelligence to give same question to
- library as to intel--one general got an answer from library in 45
- minutes and it was of course unclassified; intel community came back
- in two days, SAME answer, classified)
- - Power in the Age of Information
- - Information Continuum (K-12, univ, lib, businesses, private
- investigators-info brokers, media, government, defense-intel)
- - Barriers--Iron Curtains between sectors, Bamboo Curtains between
- institutions within sectors, plastic curtains between individuals
- within institutions.
- - Hackers helping poke holes in the curtains.
-
- INFORMATION COMMONS
-
- Need to break down curtains SHARED collection responsibilities
- DISTRIBUTED analysis & production Age of "central" intelligence is
- OVER!! Direct "mind-links" in real time between consumer w/question
- and expert w/answer Old linear paradigm dead (consumer to analyst to
- collector to source and back) New diamond paradigm (all four all ways)
- Must empower the citizen with intelligence
- -- as a voter
- -- as an investor
- -- as an entrepreneur
- -- as scientist
- -- as social thinker
- New Security Concepts: Focus on connectivity and speed, NOT on
- restricting dissem or even bothering to decrypt Need a NATIONAL
- KNOWLEDGE STRATEGY God Bless Al Gore BUT he is "all connectivity and
- no content" Need to free up unclassified information wrapped in the
- "cement overcoat" of peripheral classified information Need a national
- program to break down curtains and increase sharing of original
- unclassified source material Need a national cooperative R&D effort to
- avoid waste (I believe the intelligence community wastes $100 million
- a year at least, from having at least ten different "black" programs
- each trying to build the ultimate all source analysts workstation in
- isolation--and this is just one small example of waste from
- compartmentation)
- Intelligence for the Masses
-
- Lots of good Q&A.
-
- ------------------------------
-
- Date: Wed, 11 Aug 1993 18:21:43 PDT
- From: Emmanuel Goldstein, 2600 Magazine <emmanuel@well.sf.ca.us>
- Subject: File 2--Another View of the Hack-tic '93 Conference
-
- Actually, attendance was estimated by the organizers at around 1,000.
- It was bigger than the Galactic Hacker Party and, in my opinion, more
- interesting. Too bad so few Americans showed up - tons of media
- though. Some of the highlights for me: the "stone" keyboard -
- somebody set up a computer on the grass with a keyboard made of stones
- and, yes, it worked; the room filled with computers from all over the
- world tied into a giant ethernet and then further tied to all of the
- computers in tents on the field; the social engineering workshop where
- people from all corners of the globe shared stories; and the overall
- Woodstock atmosphere of the whole thing. It's incredible how you can
- just pull things like this off over there with a minimum of hassle. In
- the States there are literally dozens of reasons why such an event
- wouldn't work. Despite that, we're going to try to do something next
- summer for the tenth anniversary of 2600. We need two things: a
- warehouse and some network experts to be creative. Plus a whole lot of
- good karma.
-
- P.S. United States Customs took one look at my passport and pulled me
- aside yet again. The usual: bags searched, interrogation as to what
- kind of magazine I write for, and a 25 minute wait while they "check"
- my name. This has happened to me so many times now that I can hardly
- consider it coincidence anymore. It's pure harassment and it's
- garbage like this that makes it an embarrassment to be an American
- these days.
-
- I guess I can expect to disappear now having spoken against the state.
-
- ------------------------------
-
- Date: 20 Aug 93 19:28:52 EDT
- From: george c smith <70743.1711@COMPUSERVE.COM>
- Subject: File 3--Computer Culture and Media Images
-
- Computer Culture and Media Images
- (By George C. Smith)
-
- "I've had enough of that crummy stuff. Crummy stuff, crummy
- stuff, crummy, crummy, crummy, crummy, crummy stuff." (from
- "Crummy Stuff," by The Ramones)
-
- After reviewing numerous stories on the computer underground dating
- back to 1990, Mike Liedtke's Contra Costa Times piece on the
- NIRVANAnet BBS's comes off as another example of the genre:
- paint-by-numbers journalism, so predictable it's a cliche. The locales
- shift, the names change, the breathless "maybe something shady's going
- on here" tone stays the same.
-
- Unfortunately, so does the expertise of the reporters. Seemingly
- locked into some kind of "computer neophyte from Hell" never-never
- land, there never seems to be a lack of writers who turn in stories
- which are painfully unsophisticated, sensational and . . . crummy.
- It's damnable, because the picture which emerges is one of mainstream
- journalists who ought to be starting to get the lay of the land, but
- aren't.
-
- By contrast, this lack of know-how hasn't stopped reporters, or even
- slowed them down, in generation of countless fluffy, trend stories on
- the information superhighway, this year's bright and shiny cliche.
-
- So, that the users of the NIRVANAnet systems think the news media
- arrogant is not a scream of wounded pride or the surprised squeak of
- slimy characters exposed when their rock is turned over. It's
- justified.
-
- Why?
-
- Take for example a news piece which appeared in 1990 in The Morning
- Call newspaper of Allentown, PA, a continent and three years away.
-
- The Call had discovered a now long gone "underground" bulletin board
- in nearby Easton, PA. I lived in the area at the time and Liedtke's
- Contra Costa Times piece was uncannily similar to the one Morning Call
- reporter Carol Cleaveland delivered for the Call's readership. The
- same ingredients were in the mix: a couple of textfiles on how to
- make bombf a regional lawman explaining about how hard it is to nail
- people for computer crime and a tut-tutting sysop of another local
- "public domain" system acting as a tipster, warning concerned readers
- that he sure as Hell wouldn't want such a system in his backyard.
- Just like Liedtke's Contra Costa Times piece, there was not a shred of
- comment from the sysop whose system was being profiled. Nothing ever
- came of the nonsense. The system continued online for a couple of
- more years, no criminal charges were filed, and the local businesses
- appeared not to go up in flames at the hands of unknown hackers or
- bomb-throwing, masked anarchists. So, this was news?
-
- Now, fast forward to The New York Times on January 25 of this year. In
- an 'A' section article, reporter Ralph Blumenthal profiled "Phrakr
- Trakr," a federal undercover man keeping our electronic streets safe
- from cybernetic hoodlums too numerous to mention singly.
-
- A quick read shows the reporter another investigator from the
- mainstream who hadn't gotten anything from underground BBS's
- first-hand, relying instead on the Phrakr Trakr's tales of nameless
- computer criminals trafficking in "stolen information, poison recipes
- and _bomb-making_ [emphasis MINE] instructions."
-
- While not dwelling on or minimizing the issue of phone-related phraud
- and the abuse of credit card numbers on underground BBS's (which has
- been established), Blumenthal's continued attention to text files for
- "turning household chemicals into deadly poisons, [or] how to build an
- 'Assassin Box' to supposedly send a lethal surge through a telephone
- line" was more of the same. It was the kind of news which furthers the
- perception on the nets that reporters are rubes, reluctant to use
- their mental faculties to analyze material of dubious nature.
-
- Most anyone from teenagers to the college educated on-line seem to
- recognize text files on a BBS as usually menacingly written trivial
- crap or bowdlerized, error-filled reprints from engineering, biology
- and chemistry books. In either case, hardly noteworthy unless you're
- one who can't tell the difference between comic books and real news.
- So why can't we, make that why SHOULDN'T we, expect the same critical
- ability from mainstream journalists? Of course, we should.
-
- And it's not only the on-line community which is getting mugged. Just
- about every sentient, reading mammal in North America was fed a
- continuous line on the Michelangelo virus for the first three months
- of 1992 courtesy of the mainstream press. In the aftermath, the
- perception seeped in that inadvertently or not, most reporters had
- been played for suckers by software developers. However, there was no
- informed skepticism when it counted.
-
- Recall, newspapers around the country ran headlines warning of
- imminent disaster. "Thousands of PC's could crash Friday," said USA
- Today. "Deadly Virus Set to Wreak Havoc Tomorrow," said the
- Washington Post. "Paint It Scary," said the Los Angeles Times.
-
- Weeks after the grand viral no-show on March 6th, reporters still
- insisted the hysterical coverage prevented thousands of computers from
- losing data. John Schneidawind of USA Today claimed "everyone's PC's
- would have crashed" in interview for the American Journalism Review
- but was unable to provide any evidence to back it up.
-
- Even The San Jose Mercury News credited the publicity with saving the
- day. There was, however, little mention that corporate wallets were
- swollen with payouts from worried consumers or that most of the
- experts used as sources came from the same circle of businessmen
- benefiting from the panic.
-
- In the aftermath everyone blamed John McAfee, the nation's leading
- antiviral software manufacturer. After all, it was McAfee who told
- many reporters that as many as 5 million computers were at risk,
- wasn't it?
-
- However, a look back at some of his comments to American Journalism
- Review in May 1992 expands the limelight a little. "I told reporters
- all along that estimates ranged from 50,000 to 5 million," he said. "I
- said, '50,000 to 5 million, take your pick,' and they did."
-
- "I never contacted a single reporter, I never sent out a press
- release, I never wrote any articles," he continued. "I was just
- sitting here doing my job and people started calling."
-
- "Before the media starts to crucify the antivirus community," he
- continued, "they should look in the mirror and see how much [of the
- coverage] came from their desire to make it a good story. Not that I'm
- a press-basher."
-
- Why does this happen? What drives one of these "good stories"?
-
- John Schneidawind of USA Today, when interviewed shortly after
- Michelangelo said John McAfee was always available to explain things
- from the early days of the Silicon Valley. There was a sense, said
- Schneidawind, that "we owed him." That's even-handed reporting!
-
- Obviously, a great many news stories are hung on a sexy hook, too.
- Often this has little to do with reality. Put yourself in a
- reporter's shoes, fire-balling these leads past an editor.
- Techno-kids running amok in cyberspace, crashing the accounts of
- hapless businessmen, playing fast and loose with the law, fostering
- the dissolution of community in the suburbs! Or, computer virus
- plague set to incinerate data world wide! Or, government BBS flouts
- public interest, aids computer vandals in high-tech predation of
- nation's information superhighways! Whoosh! Bang! Who wouldn't bite?
-
- Now imagine trying to sell an on-going series dealing with the warp
- and weave of the networks, touching on everything from dating BBS's to
- encryption to virus distribution to electronic publishing, copyright
- law and free speech. Frequently, you'll need more than 40 column
- inches per topic to do it right.
-
- If you're a reporter you might hear these responses as reasons NOT to
- get into such a project.
-
- 1. We don't have the space. (There will, however, always be 40 inches
- of space for the latest equivalent of "Jurassic Park.")
-
- 2. We can get that off the wire. We can't afford to get involved in
- specialty journalism.
-
- 3. No more long stories - our readership won't follow them. (Policy
- at USA Today.)
-
- 4. No one is interested in computers. (Believe it or not, this was a
- popular one in 1992 at The Morning Call in Allentown, PA.)
-
- 5. I don't understand all that, our readers won't either.
-
- 6. Where's the hook?
-
- So, proactive news stories, particularly on computers, are a hard sell
- many reporters aren't up to. Conversely, most have no trouble selling
- what Carl Jensen, journalism prof at Sonoma State in California, calls
- "junk food news."
-
- Junk food news is, he writes, "sensationalized, personalized,
- homogenized trivia . . . generic to [some] of the following
- categories: Madonna's latest sexscapades . . . the newest diet craze,
- fashion craze, dance craze, sports craze, video game craze . . . the
- routine freeway pile-up . . . the torrents of rhetoric pouring from
- the mouths of candidates, pledging to solve unemployment, reduce the
- deficit, lower prices, [and] defy foreign invaders . . ."
-
- Junk food news soaks up a lot of effort on the part of reporters. And
- there is no shortage of junk food computer news, either.
-
- Take, for instance, almost anything using the word "cyber." The August
- 15th issue of The L.A. Times Sunday Magazine devoted three-quarters of
- a page to "Hack Attack - Cybersex." "Cybersex," in the finest
- gosh-oh-jeekers style, went on about yet another budding entrepreneur
- who's puzzled out there's a market in putting $70 worth of sex
- animation on CD-ROM. Only such a junk food news piece _could_ close
- with a quote from the businessman so ludicrous it would be laughed off
- the table in any self-respecting barroom. "This is a powerful
- medium," said the computer sex movie-maker. "The potential is there
- for people prone to become alienated to become alienated. But we also
- envision virtual reality sex as a vehicle for people to interact with
- others in a way they might not feel comfortable in reality."
-
- The week before, the same magazine ran a story on cyberpunk Billy Idol
- and how callers to The Well were dissing him for being a phony.
- That's news!
-
- Other computer junk food news stories include, but are by no means
- limited to:
-
- --Just about anything on Jaron Lanier and data gloves.
-
- --Tittering, voyeuristic "human interest" pieces on local
- lonely-hearts BBS's that DON'T mention that 50 percent of the data
- storage is devoted to color photos of hideously obese men and women
- screwing, young models licking each other's private parts and other
- similar stuff which, if warehoused as magazines in a windowless,
- beige-colored building on the publisher's block, would be the target
- of a picketing team from the metro section of the same newspaper.
-
- --Flogging the latest Steven Spielberg project which involves using
- 50-gazillion megabytes of computer power and more cash than the gross
- national product of the Ukraine to make a TV show on some kind of
- virtual reality living submarine with tentacular arms and talking
- porpoise sidekicks.
-
- --Anything on the information superhighway with the usual pro forma
- hey-even-I-could-think-of-that quotes from Ed Markey and Mitch Kapor.
-
- --Gadget stories - actually, unpaid advertisements - on the newest
- computer-chip controlled stun gun, the newest computer-driven home
- studio, the newest useless morphing software for amusing and cowing
- your friends, the newest wallet-sized computer which doesn't exist,
- the newest whatever-press-release-selling-it-came-in
- -through-the-fax-machine-today device.
-
- Ah, but these are easy shots to take, being mostly the handiwork of
- features and entertainment reporters, long regarded as the:Slft white
- underbelly of the news media.
-
- What about front page news? Take a look back at Joel Garreau's
- Washington Post expose of Kim Clancy and the AIS system.
-
- It's reliance on the usual he said/she said reporting resulted in the
- trotting out of source Paul Ferguson who was able to pose as two
- people at once. This, perhaps, would not have happened had Garreau
- been more familiar with the complexities of computer security. As it
- was, the pursuit of the news from a human interest angle resulted in a
- set-up, or "official scandal" as its called by Martin Lee and Norman
- Solomon in a devastating criticism of journalistic methods,
- "Unreliable Sources: A Guide To Detecting Bias in Newsmedia" (1990,
- Lyle Stuart).
-
- According to Lee and Solomon, "official" scandals as reported by the
- press, have certain hallmarks.
-
- 1. "The 'scandal' [came] to light much later than it could have." So
- it was with AIS: The hacker files were removed from the BBS
- weeks before the story was retold by The Washington Post.
-
- 2. "The focus is on scapegoats, fallguys, as though remedial action
- amounts to handing the public a few heads on a platter." Kim
- Clancy, the administrator of AIS, was the fallguy, er, fall-lady,
- here.
-
- 3. "Damage control keeps the media barking but at bay. The press is
- so busy chewing on scraps near the outer perimeter that it stays
- away from the chicken house." While the news media was chewing on
- AIS, it neglected to discover Paul Ferguson doing double-duty,
- anti-virus researchers helping themselves to dangerous code on
- AIS while complaining about it to others, and the ugly truth
- that much of the virus code and live viruses on amateur BBS's
- throughout the U.S. can be traced to AIS's opponents, a few of
- the same complaining researchers.
-
- 4. "Sources on the inside supply tidbits of information to steer
- reporters in certain directions -- and away from others."
-
- 5. "The spotlight is on outraged officials." In this case,
- "anonymous", Paul Ferguson, Ed Markey, etc., -- asking tough,
- but not TOO tough, questions.
-
- Because it ran in The Washington Post, Garreau's story immediately
- touched off a wave of pack journalism. The Associated Press digested
- all the wrong, flashy aspects of Garreau's work. Specialty
- publications catering to corporate computer users published weird,
- warped tales on AIS, culminating in Laura Didio's August 9th feature
- in LAN Times which called Computer underground Digest "a BBS" and had
- the ubiquitous Ed Markey claiming that the AIS system had infected
- itself with a virus, a serious falsehood. This from a reporter, no,
- make that a _bureau chief_, who works for a computer publication!
-
- So if the NIRVANAnet BBS operators are angry with Mike Liedtke for
- blind-siding them in the pages of The Contra Costa Times, good for
- them. If they think mainstream journalists have been doing a rotten
- job on computer stories, they have the ammunition to prove it.
-
- It is right for them to expect more from journalists than the passing
- on of whatever received wisdom is currently circulating about the
- computer underground. It's perfectly legitimate to expect more from
- reporters than junk food computer news or dressed-up press releases.
- They're right if they think they're being patronized by news
- organizations which assign reporters who don't know what a modem is,
- have only been Prodigy members or who believe that being a "people"
- person is sufficient qualification to report in this beat.
-
- Good journalists are obliged to be responsive and receptive to the
- beats and communities they cover. So it should be with the computer
- underground. It is not considered cool to use ignorance or
- inexperience as an excuse for slipshod work, to take the path of least
- resistance, to rely only upon sources who are mainstream professional
- acquaintances or whose names are right near the telephone. Those who
- think otherwise are jerks.
-
- ------------------------------
-
- Date: Tue, 17 Aug 1993 13:39:27 CDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 4--Media Images of Cu I^est - CuD Response to SunWorld
-
- ((MODERATORS' NOTE: Media misrepresentations directly affect CuD. We
- are periodically depicted as a "BBS" or a "system." When a reporter
- from New Jersey writing on computer crime called me in early August, I
- found it impossible to explain an electronic journal to
- her--incredibly, she not only did NOT know about Internet or BBSes,
- but DID NOT KNOW WHAT A MODEM WAS!
-
- The problem grows more serious when CuD is misrepresented in a way
- that depicts us as advocating illegal activity, abetting computer
- intrusion, or suggesting that we advocate chaos or disorder. Because
- such articles generally do not appear in national media, we don't see
- them unless readers send us a copy. The following SunWorld article is
- such an example. Although CuD was referenced just once in a single
- sentence, the phrasing carried discomforting implications. We could
- not let this one go without a response. We reproduce this material as
- an example of the difficulties we all continue to confront in
- "educating" the media, and to illustrate the generally unintended
- genesis of twists of phrase that become self-perpetuating in the game
- of "catch-up to the facts." What follows is, first, our letter to the
- author of the SunWorld piece, Phillip Moyer. Second, we summarize our
- e-mail responses to him. Finally, because we do not how our final
- response to SunWorld will appear after editing, we include the entire
- letter.
-
- CuD has continually argued that most editors and reporters are quite
- amenable to receiving criticisms. Phillip Moyer's response was civil
- and cooperative. We were especially impressed with SunWorld editor
- Mark Cappel's attitude, which was cordial, cooperative, and--while he
- deferred judgment until "the facts were in"--he was fully amendable to
- listening without defensiveness and to consider our complaint.
- However, such courtesy is what we'd expect from one originally from
- our University town of DeKalb, Ill.
-
- ++++ (Original letter to the author) ++++
-
- Date--Fri, 9 Jul 93 1:26 CDT
- To--PRM@ECN.PURDUE.EDU
- From--Cu-Digest (tk0jut2@mvs.cso.niu.edu) <TK0JUT2>
- Subject--Response to your SunWorld (July '93) piece
-
-
- Dear Phillip Moyer:
-
- I am stunned by your description of Cu Digest in the July,
- '93, issue of SunWorld. Among other things, you write:
-
- "If you have reason to look in a novice's account, you
- will probably find copies of Phrack, the Computer
- Underground Digest, and the Legion of Doom's Technical
- Journals, all of which have information novices (and
- more advanced crackers) find useful (p. 101).
-
-
- My complaint centers on your CuD comments. CuD does not
- cater to "crackers," and if you had bothered to read CuD you
- would note the editorial philosophy in the header. We have
- *never*, not once, published cracking material or any
- material that could even remotely be described as "helpful
- to 'crackers'". If you believe I am mistaken, please cite a
- specific article. If not, I request an explicit correction
- and an apology for your misrepresentation.
-
- CuD is a legitimate electronic newsletter/journal.
- Relatively few of our 80,000+ readers are students, let
- alone "crackers." Most are academics, computer specialists,
- journalists, attorneys, and others interested in a variety
- of legal, ethical, social, political, and scholarly issues
- surrounding computer culture. Had you looked at past
- issues, you would see book reviews, debates, news, legal
- documents, legislative information, conference announcements
- and summaries, and a broad range of other information that
- covers "cyberspace." Further, had you bothered to examine
- the CuD ftp sites, you would note that we maintain
- directories of a variety of Electronic newsletters, academic
- papers, state and federal computer laws, and other archival
- invaluable.
-
- We have worked hard to establish a reputation as a forum for
- debate that allows diversity of views. To have our
- reputation tarnished with public claims insinuating
- collusion in illegal or unethical conduct is intolerable. We
- have consistently gone on record publicly and privately to
- oppose all forms of predatory behavior, including
- unauthorized computer intrusion. For those unfamiliar with
- CuD, your article both misrepresents our purpose and impugns
- our integrity. As a criminal justice professor, I'm not
- inclined let such a reckless disregard for truth pass
- lightly.
-
- I trust that we can resolve your misrepresentation amicably,
- and an apology and retraction in a forthcoming issue of
- SunWorld would suffice.
-
- <jt sig>
-
- +++
-
- Phillip Moyer replied with an explanation. He also identified several
- articles that he thought would be helpful to hackers. Because CuD has
- never published "hacking" information, we were compelled to respond.
- This issue strikes is as critical, because when other read the
- article, such as law enforcement agents or our University personnel,
- the CuD editors are placed in jeapordy. The following are excerpts
- from our correspondence to him. We summarize his comments, to which we
- are responding:
-
- ((In his response, Mr. Moyer indicated that his CuD description was
- based on personal experience of network intruders into his site, where
- his "investigations" reveal multiple copies of CuD, Phrack, and
- LOD/TJ. The CuD response:
-
- Connecting CuD to "hackers" in this manner is quite a leap
- of logic. You could also make the same statement about CuD
- being carried and read by law enforcement. From our estimate,
- thousands of BBSes, public access systems, ftp, and other
- sites carry CuD. Finding CuD amongst "hackers" is no more
- surprising than finding O'Reilly's books (eg, "Practical
- Unix Security" or "The Whole Internet") in "hacker"
- libraries. Your twist of phrase is neither innocent nor
- neutral, and the implications are quite clear. I'm pleased
- that "hackers" read CuD just as I am that law enforcement
- reads it. Perhaps the former will learn from it that
- computer intrusion and predatory behavior are uncool, just
- as we hope the latter will learn that civil liberties and
- common sense extend to "cyberspace."
-
- You identify several categories of information "useful" to
- "hackers."
-
- 1. "Cult" information about famous cracking groups.
- 2. Technical cracking information.
- 3. Information about networks in general, and how to move around...
- 4. Information about cracker activities/clubs/busts.
- 5. Cyberpunk related articles.
-
- Guilty as charged, with the exception of #2, which we have
- *never* published. We publish news. So what? So does the New
- York Times, SunWorld, and other sources. The list you
- identify is a miniscule fraction of our contents. EFFector
- publishes similar, but more narrow, material. I find your
- list quite disingenuous. Please re-read your own article:
- You write about hackers and where they obtain their skills.
- In that context, you list CuD along with two other E-'Zines
- specifically devoted to developing skills. You falsely
- categorize us, tarnish us by "guilt by association," and in
- the context of your article you paint us as a "hacker"
- source. You made a mistake, and I would think it more
- honorable that you acknowledge it rather than glibly try to
- engage in word games and further insult me with sloppy
- logic.
-
- ((Mr. Moyer suggests that "hackers" are interested in more than "how
- to" documents, which may be why they "insist" on keeping copies of CuD
- in their "stolen accounts."))
-
- You continue with your "guilt by association" rationale.
- Your wording is curious: I'm not sure why you use the term
- "insist," and perhaps it reflects more about your own
- attempts to impute motives to others as you have attributed
- false meaning to CuD. From my experience, few "hackers"
- keep things in "stolen accounts," but that's a trivial
- issue. More to the point is your continued insistence on
- linking CuD with "stolen accounts" and other illegal
- behavior. Please remember that your article made no mention
- of "other" information, but in context focused on the "how
- to" aspect. And, the fact that CuDs may be "of interest"
- does not lead to the conclusion that they are helpful for
- "hacking," as you strongly suggest.
-
- I challenged you to list an article that is "helpful" for
- "hackers" or "hacking," and you identify the following:
-
- > CuD #2.14, file 7: Don't Talk to Cops
- >
- >This one lists security problems that novice crackers may
- >not have thought about, and therefore gives them avenues of
- >attack which they may otherwise have overlooked:
-
- ((MODERATORS' NOTE: Because of ambiguity of wording, it appeared that
- the reporter's description of file the "Security on the Net" File
- referred to the "Don't Talk to Cops" article. The CuD letter
- describes the following, not the previous issue. There was no
- explanation given for why "Don't Talk" was used as an example)).
-
- Astounding! This file says no such thing. It was written in
- response to abuses by law enforcement in overstepping their
- bounds in investigations. The Phrack and Steve Jackson
- cases, of which I assume you're aware, typify such excesses.
- You'll recall that in many of the so-called "Bill Cook" and
- "Sun Devil" cases of early 1990, at which time that file was
- written, investigators were rather zealous in their
- techniques. This file was written by an attorney for *all*
- readers. Even CuD editors were concerned about the "knock on
- the door." I'm stunned that you saw in that article anything
- related to "security problems that novice crackers may not
- have thought about, and therefore gives them avenues of
- attack which they may otherwise have overlooked." The
- article says no such thing and casts serious credibility on
- your claim to have read CuD, let alone this article. The
- article is simply not about what you claim. Period!
-
- > CuD #3.00, file 5: Security on the Net
-
- Again, I'm appalled at your interpretation. This article was
- written by a system administrator who was once active on the
- nets and whose name you might recognize. It is essentially
- a summary of survey responses, which strikes me as fully
- legitimate. If you see in that something "of interest" to
- hackers that would aid them in intrusion (and that was,
- after all, my query to you), then your own SunWorld piece
- must surely be classified as a primer for novice hackers.
- This is another article which it seems you have not read.
-
- >For true novices who haven't figured out how to forge
- >mail yet, there's:
- > CuD #1.06, file 5: SMPT (sic)
-
- Sorry, but mail forging is hardly a "hacking" tactic and is
- of no use in system intrusion. Even for those who would
- attempt to use that file to forge mail, they would find that
- it wouldn't work. Even if I were to concede (which I don't)
- that such an article is of technical interest to hackers, it
- is of such inconsequential value and was (even at that time)
- so well-known that it's odd that you would consider it in
- your list. I should also add that (if my recollection is
- correct) it was written by a computer professional as a bit
- of a prank because of it's useless value, and we ran it as a
- bit of a spoof. Sorry, but you get no points for this one.
-
- >For a number of system-level penetration ideas, mostly to do
- >with poor memory protection, check out
- > Cud #1.07, file 4: article forwarded from alt.security
-
- Again, there is nothing technical in this post. An "old
- time" hacker reflects on the past and, if anything, bemoans
- the direction of irresponsible newcomers. We've posted many
- such pieces, pro and con. That you adduce this as evidence
- of a hacking aid, which was what I asked you to produce,
- suggests that my original claim was correct: You can find no
- articles to substantiate the inference in your article.
-
- We have published about 200 issues of Cu Digest, which comes
- to over 1,000 articles, almost 8 megs of text files, and
- many reams of printouts. You have failed to substantiate
- your claim other than with some vague allusion to "of
- interest" to hackers, which by you definition, includes a
- range of articles so diverse as to defy credibility.
-
- ((Are CuD editors merely bickering over terminology??))
-
- I don't see this as mere bickering. Your claims in the
- SunWorld article were clear and tarnished our professional
- reputations. Your words in the article were not
- conditional, were not qualified, and explicitly linked CuD
- with other media that were targeted to a teenage hacker
- audience and included considerable, although generally
- publicly available, technical "how to" information. Your
- inability to make your case, your "guilt by association"
- approach, and your apparent inability to see that as
- anything more than mere "bickering" of words is shocking.
-
- ((The following is the public letter we finally submitted to SunWorld)):
-
- +++++
-
- Date: Tue, 20 Jul 93 2:24 CDT
- To: mark.cappel@sunworld.com
- From: Jim Thomas (tk0jut1@mvs.cso.niu.edu) <TK0JUT1>
- Subject--Response to SunWorld article of July 23, '93 from Cu Digest
- CC: PRM@ECN.PURDUE.EDU,GRMEYER@GENIE.GEIS.COM
-
- 18 July, 1993
-
-
- To: Mark Cappel, Editor
- SunWorld
-
- In the July, 1993, issue of SunWorld, Phillip Moyer's piece on
- computer "hackers" ("Defending the Realm") referred to Computer
- underground Digest (CuD) with an unfortunate choice of words:
-
- "If you have reason to look in a novice's account, you will
- probably find copies of Phrack, the Computer Underground
- (sic) Digest, and the Legion of Doom's Technical Journals,
- all of which have information novices (and more advanced
- crackers) find useful (p. 101).
-
- Although probably unintended, the phrasing might lead those
- unfamiliar with CuD to mistakenly infer that it is a "hacker"
- journal that encourages "hacking" and publishes "how to
- 'crack'" information. Although we're pleased that hackers are
- among those who find CuD of interest, the usefulness of our
- articles does not include any technical or other "how to"
- information, and CuD is not aimed at a "hacker" audience.
-
- CuD is an electronic journal/newsletter available at no cost to
- anybody with an internet mailing address. We have at least
- 80,000 readers world-wide. The audience is primarily computer
- professionals, academics, attorneys, journalists, students, and
- others who are interested in computer culture. Articles include
- research papers, legal and legislative summaries, conferences
- news and excerpts, book reviews, interviews, news, debates of
- current issues related to "cyberspace" and "virtual reality,"
- and other information aimed at a diverse readership. We have
- never published technical information helpful for
- "hacking/cracking" and have consistently criticized all forms
- of computer abuse. The emphasis on a "hacker" culture and
- related articles derives in part from the editors' criminal
- justice background, and in part from CuD's original goal, begun
- in March, 1990, as what at the time was conceived as a
- temporary service to publish overflow pieces from Telecom
- Digest related to the 1990 "hacker crackdown."
-
- We recognize any writer's difficulty in choosing words that will
- please everybody, and we sympathize with what may seem to the
- SunWorld author (and others) as simply bickering over phrasing.
- However, given the power of labels and the potential harm that
- might result from being construed as a medium that abets
- criminal activity, we assure SunWorld readers that, although
- we're pleased that CuDs can be found in the files of "hackers"
- (as well as law enforcement, thousands of BBSes and public
- access systems, ftp sites, and elsewhere), CuD is of no more of
- use to "hackers/crackers" than a SunWorld article describing
- specific techniques that curious potential intruders might try.
-
- ((Final comment: We reproduce this not out of self-indulgence, but to
- show how easily articles might be misconstrued. There is also an
- apparent double-standard operating: An obscure CuD piece can be given
- a "helpful to hacker's" gloss while explicitly technical details found
- in security manuals, technical volumes, or even classbooks, are not.
- Even though reporters see their comments as innocent, and even though
- they may judge our comments as excessively thin-skinned, we can
- envision a reader of such articles writing an irate letter to an
- employer, university administrator, congressional rep, or law
- enforcement agent, wondering "why taxpayer dollars are being used to
- fund 'hacking' at a public university." We're obligated to stifle such
- misinformation when it's brought to our attention. If CuD readers
- come across similar articles in trade journals or other media, let us
- know. For media folk wanting to know what a "CuD" is, we suggest the
- "Frequently Asked Questions" list that we include with new
- subscriptions.
-
- ------------------------------
-
- Date: Fri, 20 Aug 1993 18;21:43 EDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu)
- Subject: File 5--CORRECTION on Graduate Paper Competition for CFP-'94
-
- ((MODERATORS' NOTE: The address listed in CuD 5.64 for the CFP-'94
- grad student paper competition should be corrected as listed below. If
- you know of grad students doing work in an area related to
- computers/technology/privacy, pass this information along to them. WE
- REQUEST THAT FACULTY ALSO POST THE INFORMATION ON THEIR DEPT BULLETIN
- BOARDS AND SLIP THE INFORMATION INTO GRAD STUDENT MAIL BOXES.
-
- CFP-'94 will be held in Chicago in March, 1984, and brings together an
- exciting multi-disciplinary mix of academics, professionals, and
- others, to discuss the issues between technology, freedom, and
- privacy. For further details, see CuD 5.60, File 2)).
-
- +++
-
- STUDENT PAPER COMPETITION
-
- Full time college or graduate students are invited to enter the
- ((CFP-'904)) student paper competition. Papers must not exceed 2500
- words and should address the impact of computer and telecommunications
- technologies on freedom and privacy in society. Winners will receive
- a scholarship to attend the conference and present their papers. All
- papers should be submitted by November 1, 1993 (either as straight
- text via e-mail or 6 printed copies) to:
-
- Professor Eugene Spafford
- Department of Computer Sciences
- 1398 Computer Science Building
- Purdue University
- West Lafayette, IN 47907-1398
- E-Mail: spaf@cs.purdue.edu; Voice: 317-494-7825
-
-
- REGISTRATION
-
- Registration information and fee schedules will be announced by
- September 1, 1993. Inquiries regarding registration should be
- directed to RoseMarie Knight, Registration Chair, at the JMLS
- address above; her voice number is 312-987-1420.
-
- ------------------------------
-
- End of Computer Underground Digest #5.65
- ************************************
-
-