home *** CD-ROM | disk | FTP | other *** search
-
- Computer Underground Digest--Fri, Oct 4, 1991 (Vol #3.35)
-
- Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
-
- CONTENTS, #3.35 ( October 4, 1991)
- Subject: File 1--Moderators' Corner
- Subject: File 2--Cyperpunk Author Responds to Mitnick Charges
- Subject: File 3--Computer Security Basics review
- Subject: File 4--Steam age cyberpunk
- Subject: File 5--Errata to "Practical Unix Security"
- Subject: File 6--Living with the Law -- A view from Finland
- Subject: File 7--Let's Get It Right.
- Subject: File 8--"Phone Gall" (AT&T sues users)(Infoworld reprint)
- Subject: File 9--Announcement
- Subject: File 10--Cyberspace Conference in Montreal
- Subject: File 11--Conference Info and Press Releases
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
- 789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
- chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
- Chicago email server, send mail with the subject "help" (without the
- quotes) to archive-server@chsun1.spc.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to the
- Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: 4 Oct 91 11:21:19 CDT
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--Moderators' Corner
-
- ++++++++++++++++++++++
- WIDENER FTP SITE ADDRESS INFO
- ++++++++++++++++++++++
-
- The latest change for the WIDENER FTP SITE: The IP for
- ftp.cs.widener.edu will continue to be the address 147.31.254.132 (not
- 147.31.254.20). Since it probably wasn't mentioned, the official
- transition is now 192.55.239.132 -> 147.31.254.132.
-
- ++++++++++++++++++
- 'ZINE ALERT
- ++++++++++++++++++
-
- 2600: THE HACKER QUARTERLY (summer, '91) is out and contains the the
- usual collection of excellent articles. Two of them are especially
- worth the sub price. "Where Have all the Hackers Gone," an editorial,
- argues that there are as many hackers around as ever, but are becoming
- invisible because of the abuse of law enforcement hysteria. A second
- piece, a letter by Kevin Mitnick, complains that Hafner and Markoff's
- _Cyberpunk_ was slanted against Mitnick because of his "refusal" to
- cooperate (see NEWSBYTE reprint this issue). Information on 2600 can
- be obtained from emmanuel@well.sf.ca.us or by writing to: 2600
- Magazine; PO Box 752; Middle Island, NY 11953.
-
- +++++++++++
- BOARDWATCH
- +++++++++++
-
- We continue to be impressed with BOARDWATCH. Although not CU, it is
- the best BBS 'zine out, and the current issue (Sept '91) includes some
- first-rate articles on the international BBS scene, featuring boards
- in Mexico and an interview with Pete Perkins of JANUS BBS in Tokyo.
- There's also a nice piece on how to run a BBS for profit, along with
- the usual general news and blurbs of the "straight" BBS scene
- nationwide. $36 a year brings 12 issues, and you can sub by writing:
- Boardwatch Magazine; 5970 S. Vivian Street; Littleton, CO 80127. Or,
- drop a note to the editor, Jack Rickard at jack.rickard@csn.org
-
- +++++++++++++++++++
- GERALDO AND THE CU
- +++++++++++++++++++
-
- We've received a number of blurbs about the Geraldo schtick last week.
- Guests included Craig Neidorf, Emmanuel Goldsten (2600), Don Ingraham
- (Marin County, Calif, prosecutor), and, of course, Geraldo himself.
- CuD will run a special issue in a few weeks, but it sounds, from the
- reports we've received, like the usual Jerry Rivers sensationalism.
- We're told that Jerry/Geraldo referred to Craig as the "most notorious
- hacker in America," that Ingraham made remarks bordering on slander
- (of Craig), and that Craig's primary flaw was that he tried to be
- reasonable and display some class in what some described as a "swine
- pit of muck and lies." We'll try to extract the transcripts in CuD
- 3.36.
-
- ------------------------------
-
- Date: Tue, 1 Oct 91 23:09 EST
- From: "NEWSBYTES" <mcmullen@well.sf.ca.us>
- Subject: File 2--Cyperpunk Author Responds to Mitnick Charges
-
- JEFFERSON VALLEY, NEW YORK, U.S.A., 1991 OCT 1 (NB) -- Cyberpunk
- co-author Katie Hafner, in an interview with Newsbytes, has responded
- to allegations of fabrication raised by Kevin Mitnick, one of the main
- subjects of the book.
-
- Cyberpunk: Outlaws and Hackers on the Computer Frontier (Katie Hafner
- and John Markoff; Simon & Schuster, 1991 - $22.95) devotes the first
- section of the book called "Kevin: The Dark Side Hacker" to the
- activities of Mitnick and his associates, Lenny DiCicco, "Susan
- Thunder" and "Roscoe" (the last two names are pseudonyms; the persons
- would be interviewed only under the protection of anonymity). Mitnick,
- who served a prison term related to his intrusions into Digital
- Equipment Corporation's systems, says in a letter to the Summer 1991
- issue of 2600: The Hacker Quarterly that the section concerning him
- "is 20% fabricated and libelous."
-
- Mitnick, in the letter, suggests that the authors had motivation for
- the alleged unfairness. He said "It seems that the authors acted with
- malice to cause me harm after my refusal to cooperate. Interestingly,
- I did offer to participate as a factual information source if I was
- compensated for my time, but the authors refused, claiming it would
- taint my objectivity. So, consequently, I declined to cooperate."
-
- Hafner confirmed that Mitnick had refused cooperation after his offer
- to meet for pay was rejected but denied that his action caused any
- malicious or unfair behavior. She said "I feel that the payment of
- interview subjects is completely unethical and I have never been
- involved in such a thing and did not intend to start then. We
- mentioned in the book that Kevin had refused to cooperate but did not
- reveal that he had asked for payment. Since he has not brought the
- subject up, both in a call to the Tom Snyder radio show when I was on
- and in the 2600 letter, I will confirm the fact that his
- non-cooperation was due to our refusal to pay."
-
- Hafner continued "Mitnick's lack of cooperation certainly did not lead
- to any malice or bias directed toward him. Everything in the book is,
- to the best of my knowledge, factual and we did everything possible to
- insure its accuracy. We attempted to get a confirming source for
- everything we were told and interviewed dozens of persons for the Dark
- Hacker section alone."
-
- 'Kevin's lack of cooperation did make the job more difficult and, may
- have possibly hurt him. If he had been willing to talk, he would have
- had an opportunity to respond to other people's statements about him
- but, even though we sent him numerous "return receipt" and overnight
- letters asking him to meet with us, he refused. Two cases in point: in
- the 2600 letter, he says that we described him as always eating in a
- computer room while talking on the telephone to Bonnie, his future
- wife. He denies this and says that I was trying to 'paint an unsavory
- picture'. It was Bonnie who told us that he was always eating while he
- was talking -- we didn't make it up -- and without the ability to
- speak to him, we had to choose to go on."
-
- Hafner went on: "The second example is his statement that we said that
- he taunted USC's Mark Brown when, in fact, he 'never spoke with Mark
- Brown'. Brown says that he has definitely spoken to Mitnick and that he
- remembers the calls well and can call to mind details from them. If we
- had spoken to Mitnick, he would have had a chance to dispute such
- statements.
-
- In response to Mitnick's object to the authors' changing of items that
- would possibly identify DiCicco as an unemployment cheat, Hafner said
- "That was my call. We tried to protect identities wherever it was
- desired. Lenny asked us to change the name and we did just as we
- also used public aliases for 'Roscoe' and 'Susan Thunder' at their
- request. Contrary to Kevin's statement, Lenny has not been travelling
- around with us promoting the book and has received no benefit from it
- other than the ability to tell his story as he understands it."
-
- (Barbara E. McMullen & John F. McMullen/19911001)
-
- ------------------------------
-
- Date: Tue, 17 Sep 91 11:24:04 CDT
- From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
- Subject: File 3--Computer Security Basics --Review
-
- Just looking at the cover of Computer Security Basics (by Deborah
- Russell and G.T. Gangemi, Sr., published by O'Reilly & Associates,
- Inc.) tells you that something has changed at the publisher of the
- former Nutshell Handbook series. The traditional ORA mascot on the
- cover is replaced by an antique key. While such obvious symbolism can
- be forgiven, a book about security needs an animal on the cover...
- Something ferocious or watchful. Maybe a Doberman. Alas, this book
- should only get Spuds McKenzie. Spuds, as you recall, had even less
- claim to being a party animal humping a Budweiser Babe's leg. Spuds
- was in drag, a female dog labeled as a frat rat. Quel scandal!
-
- O'Reilly has become known for its how-to books for Unix programmers
- and programmer wannabees. Their choice of topics has been aimed at
- beginning to intermediate Unix users, with occasional surprises such
- as the book on Larry Wall's perl language. It's the past grounding in
- the practical workings of Unix's many moving parts that makes Computer
- Security Basics seem like such a leap into the troposphere. The
- intended audience seems to be not the user of small-to-medium Unix
- systems, but novices interested in a primer on U.S. Government
- security standards. It is a good enough buzzword lexicon to get
- somebody started on finding out more if the subject interests them.
-
- There are some things that should be taken with a grain of salt in the
- book, however. In the book's discussion of DES, for example, the
- authors downplay the concern over the NSA's limiting of the algorithm
- to 56 bit encoding by assuring us that no less august a scientific
- body than the U.S. Senate has "upheld the integrity of the DES." I
- don't mean to come down on one side of the DES standard issue or the
- other, and neither do the authors, apparently. The ambiguity that the
- reader might sense, in reading of the Senate's approval on one page
- and the NSA and ISO failure to adopt the standard on the next, will
- hopefully be a spur to do more reading on the subject. It skips
- lightly over the RSA algorithm, which is perhaps understandable if the
- patent-holders were in court when the book went to press. It also
- advocates use of Halon as a fire extinguishing gas, mentioning its
- toxicity to people but not its environmental effects. In short, it
- reads like a book written after a week spent at a security trade show.
- Hey, I've been there... After too many hospitality suites and
- pheromone-laced glossy brochures, a pencil sharpener driven by a
- Briggs and Stratton engine seems like it might just save the world.
- To those whose breathing becomes heavy just at the sight of numbered
- paragraphs or RFPs, these will seem to be empty quibbles.
-
- In sum, the book is a start for someone who needs to get the mindset
- of government-compliant security standards. For the faithful reader
- of other O'Reilly books, it may be akin to a Boston Marathon t-shirt
- on a flounder.
-
- ------------------------------
-
- Date: Tue, 28 May 91 23:09 EST
- From: "Michael E. Marotta" <MERCURY@LCC.EDU>
- Subject: File 4--Steam age cyberpunk
-
- DIFFERENCE ENGINE, the May 1991 "steam punk" novel by William Gibson
- and Bruce Sterling, is a humorous and chilling historical fantasy. In
- this Britain of 1855 Charles Babbage's successful invention has made
- him a lord. Industries and individuals are controlled by ubiquitous
- engines. The best programmers call themselves "clackers" and the best
- clackers do graphics.
-
- Accelerated into explosive decline by exponential industrialization,
- London's ecology collapses in the Great Stink. There are subtler
- problems, too, and Lady Ada's mania for gambling is only one of them.
-
- The paleontologist spars with a copper: "If I model a phenomenon, does
- that mean I understand it? Or might it be simple coincidence, or an
- artifact of the technique? Of course, as an ardent simulationist, I
- put much faith in Engine-modeling. But the doctrine can be questioned,
- no doubt of it. Deep waters, Fraser! The sort of thing that Hume and
- Bishop Berkeley used to thrive on." Sterling and Gibson have modeled
- a cybernetic revolution.
-
- The steam-driven engines of Criminal Anthropometry, a section of the
- Bureau of Central Statistics, tag everyone in Britain --except for
- those people whose records have been expunged on secret orders,
- perhaps from Prime Minister Byron himself. More, clackers can, of
- course, be bribed, though it is far easier to _get_ information than
- to erase it.
-
- And yet, informatics and paleontology are not the whole of science.
- One character suffers from tertiary syphilis while his chiropractor
- treats him for "railway spine." Parents buy microscopes that allow
- clever children to see animicules even though this is considered of no
- practical use. While some newer lodgings have crappers, most people
- use chamber pots.
-
- The story's commoners wear fabrics with patterns created by engines --
- complex, perhaps proto-fractal, some tagged with Lady Ada's name. Like
- those weaves, DIFFERENCE ENGINE, provides a woof and warp about life
- as it might have been. And yet, all stories are about Today.
- (Shakespeare's Julius Caesar was about his England and it will remain
- a popular story as long as there is government.) DIFFERENCE ENGINE
- reflects the sensibilities of our time. The patterns that evolve from
- this story include dark threads and bright. Criminals act as agents
- of the legislature and arcane programs crash mighty computers and
- radicals become the establishment.
-
- ------------------------------
-
- Date: Sat, 28 Sep 91 20:52:41 EST
- From: Gene Spafford <spaf@CS.PURDUE.EDU>
- Subject: File 5--Errata to "Practical Unix Security"
-
- (See CUD 3.30 and 3.33 for reviews of this book, and comments.)
-
- O'Reilly & Associates has discovered that in the first printing of
- _Practical_UNIX_Security_ by Simson Garfinkel and Gene Spafford (June,
- 1991) a formatting error caused the grave quotes (`) in the shell
- scripts in our final PostScript files to be printed as forward quotes
- ('). Of course, this breaks the scripts and is certainly not what the
- authors, editor, or publisher intended.
-
- An errata sheet is available from the publisher that corrects the
- shell script examples and other minor technical errors found in the
- first printing. Please call O'Reilly & Associates at 1-800-338-6887
- to obtain a copy of this sheet. Alternatively, you may send email to
- steph@ora.com, to request a copy of the errata sheet -- be sure to
- include your surface mail address.
-
- We apologize for any difficulties these errors may have caused.
-
- ------------------------------
-
- Date: Sat, 14 Sep 1991 09:11:06 +0300
- From: Jyrki Kuoppala <jkp@CS.HUT.FI>
- Subject: File 6--Living with the Law -- A view from Finland
-
- We live in a crazy society - every citizen is required to know the law
- and do nothing against the law, and simultaneously it's illegal for
- all practical purposes for citizens to copy the law without paying
- royalties to some organizations. This makes it very difficult to make
- free dissemination of the law via electronic media possible.
-
- In Finland, the law is published as collections of new laws given out
- by the government. I think this is the only official version of the
- law. The publications are printed by a company called The State
- Printing Center, which is a normal business-oriented company although
- owned by the government. The text of the law holds no copyright at
- this phase; I'm not sure if the Printing Center claims copyright to
- the format of the text.
-
- The trouble with these collections (Suomen S{{d|skokoelma), varying
- from a few pages to perhaps dozens of pages is that they're often
- `patches' to existing laws which state which paragraphs and sentences
- to be changed in a previous version of the law and so it's very
- difficult in practice to read the current law based on these. For
- example, to get the current patent law you need something like eight
- of these collections.
-
- The State Printing Center also publishes other documents. For
- example, to get the Finnish copyright law you can buy a book
- containing the current copyright law (and IC circuit model protection
- law). This book has all the patches collected into one document. But
- now, as the Printing Center is a business and the Finnish law has a
- `collection copyright', it is not legal to copy this book without the
- permission of the Printing Center. They claim copyright for the
- collection and perhaps also the layout/appearance of the book. From
- their point of view, this is understandable because they don't want
- anyone else to begin copying and selling the book - this would deprive
- them of some of their income.
-
- There's also another organization publishing the Finnish Law, `Suomen
- Lakimiesliitto', Finnish Lawyers' Union. Every two years, they
- publish a collection of all the laws. Now, they also want to make
- money and so claim copyright for their publication.
-
- I've been doing some investigations on getting the law on-line (for
- example to put it available via anonymous ftp) so everyone would get
- easy access to it. Now, the State Printing Center has the source for
- their publications on-line, and they are even willing to distribute
- the source, costing something like $15 / 1000 characters (just an
- estimate), covering the costs of processing of the text or something
- like that, with extra charges if extra work needs to be done (like for
- the patent law, for which they don't have a collection readily done
- but several different documents which need to be combined).
-
- The problem with this is that even if I buy the machine-readable text
- to the law, I'm not allowed to distribute it without permission from
- the Printing Center as they claim collection copyright (also copyright
- to the indices and such, but those are not essential). It's possible
- that I could get a permission for non-commercial distribution, but
- that's problematic - for example, is it then allowed to be put on a
- BBS which charges $10 / year as a membership fee? Or a BBS which
- charges $1/hour for connect time?
-
- As for the Finnish Lawyers Union, I inquired them about the
- availability of all of the law. This was my first phone call to them,
- and the person said that they will take appropriate action (I
- interpreted that to mean they will sue me ;-) if I distribute the
- publication (I talked about OCRing the book and taking only the
- portions that contain the law, not any others possibly written by the
- Union).
-
- Now, in principle there's no problem with this - all legal and clear,
- and I can of course OCR the official version of the law and apply the
- patches myself and put it up for anonymous ftp, but that'd be a hell
- of a lot of work. I suppose I could even get the text
- machine-readable for the processing fees from the Printing Center.
- But in practice, this would require a lot of work and then I could
- claim copyright for the collection and require licenses for everyone
- who uses this - one could argue I'd need to do that in order to get
- the money needed for all the work.
-
- The situation also raises some responsibility issues - as the official
- law is pretty much unusable, the law enforcement and the government
- probably uses the other publications from the State Printing Center
- and the Layers' Union. What if there's a misprint in one of these?
- What if someone deliberately changes something in the unofficial
- versions?
-
- Perhaps we should start lobbying a law to make the copyright for the
- law to be something like the GNU copyleft.
-
- ------------------------------
-
- Date: Sun, 29 Sep 91 22:21:38 PDT
- From: halcyon!walter@SUMAX.SEATTLEU.EDU
- Subject: File 7--Let's Get It Right.
-
- ((Moderators' Note--Walter Scott is SysOp of a small semi-public BBS
- in Seattle called Writers Happy Hours. Writers Happy Hours is
- dedicated to serving literary writers and others with related
- interests)).
-
- Now that the dust has settled [just a bit] in the infamous "download
- tax" controversy coming out of New York state, it's time to take stock
- -- to analyze where we're at and what has happened. This is important
- for at least a couple of reasons. (1) Mistakes were made in this
- episode of telecomputing history. We must learn from them and not make
- them again. (2) We must sort out the real dangers from paranoia.
-
- In 1987, the telecomputing community rose up in an unprecedented
- manner to fight a proposed rulemaking which would remove a
- communications surcharge exemption for certain electronic data
- services. This would have ultimately made it more expensive for people
- to access ESP [ENHANCED SERVICE PROVIDER] electronic data services, of
- certain types, available by modem. At the time, CompuServe was at the
- center of activism -- mostly because CompuServe had a serious stake in
- the outcome of the NPRM [NOTICE FOR PROPOSED RULEMAKING] from the FCC.
- The NPRM would have implemented a surcharge on various ESPs (including
- CompuServe) if the rulemaking went unchallenged.
-
- Modem enthusiasts rallied in opposition to the surcharge from across
- the country. Their comments and actions played an important role in
- the eventual tabling of the NPRM by the FCC. After the surcharge
- incident, people who operate and/or use electronic bulletin board
- systems have become hyper-sensitive to any and all references made to
- modem-based telecommunications by government infrastructures or
- telephone companies. Unfortunately, that hyper-sensitivity has a
- disastrous downside.
-
- In the past 3 years, there have been recurring instances where the old
- surcharge case is somehow resurrected as though the FCC was "at it
- again". The same messages and references appear repeatedly. People
- like Jim Eason (cited as a source of information at KGO radio in San
- Francisco in many bogus alert files) are likely to be sick of the
- constant phone calls asking about a surcharge which Eason or his staff
- must explain is a matter of PAST history as looming threats go. Even
- the FCC has found it necessary to run ads in major daily newspapers to
- dispel rumor and/or innuendo. Also, some members of Congress probably
- receive mail on the surcharge in the present, and may receive mail on
- it in the future.
-
- As was in evidence through material appearing in CuD 3.34, it seems
- the New York state sales tax on prewritten software is yet another
- case where the fight/flight syndrome kicks in too easily. There is
- clear indication that many ASSUMPTIONS were made as opposed to very
- little careful verification of the facts. What makes this worse is
- that an ostensibly reputable SysOps organization in New York brought
- this matter into prominent exposure without properly investigating the
- facts. People panicked, and bureaucrats were besieged with phone calls
- from modemers and SsyOps who launched into tirades over a tax on
- things that were not and are not taxed in New York state. Legislators
- received the same kind of phone calls and mail. Their staff went to
- the trouble of contacting bureaucrats and verifying information passed
- on to them by irate modem users. Such activity will continue while
- messages and text files containing inaccurate information continue to
- proliferate.
-
- All this turns out to be as embarrassing as, if not more than, the
- recurring surcharge rumors. These incidents generate credibility
- issues. It was pointed out to me, by James Morris at the New York
- state Department of Taxation & Finance, that we, who use modems and
- run bulletin board systems, have a tremendous information network by
- which we keep each other informed and initiate action. No greater
- compliment can be paid to us as modem users and SysOps.
-
- We, as modem users and SysOps, have tremendous power due to the nature
- of the very medium we work and play in. Along with that power comes
- an equally awesome responsibility. Responsibility, thy name is
- "CREDIBILITY". We *MUST* be credible. We can collectively cry wolf so
- many times before those in the position to change things
- --politicians, judges, and bureaucrats -- will ignore us. If we're
- gonna do it, let's do it right.
-
- Let's be certain we have the FACTS before we sound the battle claxons.
- Let's empower each other with information that allows us to easily
- contact key sources of information to verify that information. Let's
- make certain that provided information is as accurate as possible when
- WE are the providers -- straight "from the horse's mouth", as it were.
- When it comes to empowering your fellow modem user with critical
- information requiring a pointed response in venues not limited to but
- generally separate from cyberspace itself, you should put on your
- JOURNALIST'S cap and wear it well. Ask and ask again? Verify and
- REverify. Whether our tremendous ability to network will be of any
- use to us depends on how credible we're assessed to be by those who
- generally don't hangout in cyberspace.
-
- Now, on to the second point. The same material in CuD gives us some
- gems in-the-rough. They're difficult to see since they're mixed in
- with misinformation and associated emotionally oriented calls for
- action. One of the dangers in situations, such as the software sales
- tax debacle, are tendencies to glide past issues that may be core
- issues but require CAREFUL THOUGHT AND ANALYSIS before one can
- conceptualize the importance of the issue. This seems to be happening
- in the New York state software sales tax debacle. Even though several
- people have pointed out a significant truth, which begs for action
- every bit as much as the purported "download tax", the BBS community
- of New York and the U.S. is not reacting with the tenacity it invoked
- over the possibility of taxation on systems supporting upload/download
- ratios. Thus, if this had been an attempt to use smoke and mirrors to
- deflect people from the REAL issues, it would have worked very nicely.
-
- As you may recall, the New York state Department of Taxation & Finance
- has asserted, without contradiction, that there is a longstanding
- sales tax on information services. This tax can be, has been, and
- probably will be, applied to electronic bulletin board systems in New
- York state. NYS T&F also does not claim that upload/download ratios
- won't be considered a taxable event IN THE FUTURE. NYS T&F
- Regulations Specialist James Morris went to greats pains in
- illustrating to me that standing tax codes certainly support such a
- FUTURE interpretation. Ergo, the sword precariously swings. Until
- modem users and SysOps of New York went into action, NYS T&F knew
- little or nothing of the BBS community. They are now ACUTELY aware of
- the BBS community and how it functions.
-
- NYS T&F can be likened to the giant in "Jack & The Beanstalk". For a
- time, the giant went unaware of Jack's presence. But when he finally
- became aware.... Well, we must remember that New York state is
- desperate for revenue. Will bulletin board systems become a means to
- help fill in financial gaps? To what extent? Should protective
- legislation be initiated? Should tax codes be more specific about who
- can be taxed and under what circumstances? What about the relationship
- of free speech via the various functions of bulletin board systems --
- including file exchange of newsletters containing important
- information? [Note that CuD makes its way into a lot of download
- directories on bulletin board systems across the U.S.] Has anyone
- checked statutes in their own state to see if there might be a
- sleeping giant about to wake?
-
- ------------------------------
-
- Date: Tue, 27 Aug 91 21:36 EDT
- From: "Silicon Surfer" <unixville@news.group.com>
- Subject: File 8--"Phone Gall" (AT&T sues users)(Infoworld reprint)
-
- Phone Gall
- InformationWeek, Aug. 26, 1991, pp.12-13
- (By Mary E. Thyfault with Diane Medina and Bob Violino)
-
- AT&T has sued nearly 20 of its large business users for refusing to pay
- for calls made by hackers through their corporate telephone In recent
- months, the question of whether businesses victimized by phone hackers
- should be forced to pay for such calls has stirred acrimonious debate
- and prompted numerous actions before the Federal Communications
- Commission. Estimates of the corporate monies lost annually to phone
- hackers begin at $500 million and go into the billions.
-
- Now an InformationWeek investigation reveals a broad effort by AT&T to
- shift this debate to the courts. Among the corporations AT&T has quietly
- sued are Avis Rent-A-Car System Inc., FMC Corp., Citgo Petroleum Corp.,
- Procter & Gamble Co., and Perkin-Elmer Corp. (see below). In the largest
- such lawsuit uncovered by IW, the United Nations was the victim of
- nearly $1 million in unauthorized calls.
-
- While the existence of these lawsuits remains unknown to most large
- users, AT&T has been playing legal hardball with corporate customers for
- at least a year, in most cases collecting fees in confidential,
- out-of-court settlements. It appears no case has yet reached the trial
- stage.
-
- The fact that users back down is no surprise; AT&T is a $36.11 billion
- behemoth with a crack legal staff. The mere threat of a lawsuit is
- enough to force most firms to pull out their checkbooks.
-
- "Who can afford to go to court with the phone company?" asks Roger
- Longtin, counsel for electronics component distributor Avnet Inc. in
- Great Neck, N.Y. , which is currently negotiating with AT&T over nearly
- $1 million in disputed charges.
-
- AT&T's long-distance rivals MCI Communications Corp. and US Sprint
- Communications Co. say they have not sued any users over this issue, and
- IW could find no evidence of any legal actions. Such a suit, explains a
- spokesman for MCI, "is a good way to lose a customer".
-
- One analyst argues, however, that MCI and Sprint can't afford to be nice
- guys much longer. "I'd be surprised if MCI and Sprint didn't file suits
- - uncollectibles have been a horrendous problem in the long-distance
- business," says John Bain, senior VP at Raymond James & Associates Inc.
- in St. Petersburg, Fla. One lawyer who has represented corporate victims
- of toll fraud says the out-of-court settlements always involve some
- payments by customers. AT&T typically starts negotiations by knocking
- 15% off the user's bill, he says; that's about the break-even point for
- AT&T's profit on long-distance calls, according to analysts. AT&T does
- not discuss litigation, a spokesman says.
-
- Some customers are enraged at AT&T and the telecom industry over this
- issue. They argue that the carriers and PBX vendors are not providing
- enough warning, training, or support. "The carriers should do away with
- the attitude of 'The customer should've known,'" charges Tim Honaker CFO
- for Dearborn Financial Publishing lnc. in Chicago, which has been hacked
- for $65,000. The telcom suppliers "come in with these great technologies
- and then say, 'By the way, you gotta figure out how to manage this thing
- on your own.' Well, we're not in that business." Suppliers should at
- least share in the responsibility and liability for phone fraud charges,
- according to victims.
-
- Vendors respond that telecom managers can virtually end fraud by
- properly managing their phone systems, particularly remote access
- features. Some users agree. Says Jay Silverberg, president of the
- National Rolm Users Group, "Although from a technical perspective the
- vendor has the responsibility to provide the ability to make a system
- secure, it's the user's responsibility to manage it."
-
- The software to monitor such systems isn't cheap, however-about $120,000
- on average-and "it can only cut down the hemorrhaging, not eliminate
- hacking," says James Ross of Ross Engineering Inc., a software
- engineering firm in Sterling, Va. Most victims argue that carriers have
- the technology to detect hacking at their fingertips.
-
- While the victims' attorneys say AT&T hasn't improved its security
- measures, all the carriers and the major PBX vendors-Northern Telecom,
- Rolm Co., and the business telephone unit of AT&T-say they are putting
- increasing emphasis on helping users fight phone hacking. AT&T offers
- seminars at every user group meeting, for example, and Rolm announced in
- April it would begin assigning a security coordinator in each of its 31
- branch locations.
-
- Currently, AT&T has seven fulltime staffers charged with educating
- customers and investigating fraud cases. Users claim that number is
- woefully low. (Meanwhile, the number of AT&T lawyers pursuing litigation
- in this area is, an AT&T spokesman admits, "probably in the tens.") AT&T
- has 40,000 PBX installations and 4 million business long-distance
- customers. "If they really want to protect the public, they need to hire
- more like 700 people," says Charles Helein, a Washington attorney who
- has represented several toll fraud victims. AT&T says it will add three
- more staffers next month. Some users even claim AT&T is not devoting
- more resources to ending toll fraud because it is making too much money
- on such calls-a charge AT&T vehemently denies.
-
- "If you significantly cut phone fraud, you have to wonder what kind of
- impact it would have on their revenue," says Thomas Crowe, attorney for
- Chartways Technologies Inc. in Rockville, Md., which suffered $81,789 in
- unauthorized calls.
-
- "That's ludicrous," says an AT&T spokesman. "AT&T devotes enormous
- resources to this." The company argues that it is doing more than
- required. On a weekly basis, AT&T monitors the three area codes in South
- America and Central America that receive the most illegal calls. When a
- sudden increase in volume is noted, AT&T tries to notify customers,
- reaching about 25%, of them before they themselves notice the break-in.
-
- "I can't tell you that every week we get to everyone, but we attempt to
- based on our resources," says Robert Carman, head of AT&T's corporate
- security division. Still, the FCC says all complaints filed to date by
- users over this issue have involved AT&T.
-
- Frank Chrz, VP of office services at ITT Consumer Financial Corp. in
- Minneapolis, says AT&T "was very responsive" in helping him detect and
- stop the hackers that penetrated his company's Rolm PBX, racking up
- $100,000 in charges. But that cooperation ended when the bill came due
- and ITT refused to pay. AT&T sued ITT, which promptly sued both Rolm and
- Rolm's PBX distributor. All four settled out of court. At least two
- other users have sued their PBX vendors after being sued by AT&T: New
- York City Human Resources Administration sued Northern Telecom Inc., and
- Western Diversified Life Insurance Co. in Deerfield, Ill., countersued
- AT&T as both its PBX supplier and long-distance carrier.
-
- In another twist, two corporations sued AT&T before AT&T could sue them:
- Mitsubishi International Corp. in New York (IW, June 24,p.14) and John
- D. Hollingsworth On Wheels Inc. in Greenville, S.C.
-
- Despite all the complex legal maneuvering, every case eventually comes
- down to finger-pointing. No one wants to accept responsibility for toll
- fraud. Until now, the FCC has typically ruled against users, but
- mounting corporate anger may mean the commission will impose some sort
- of liability ceiling. What is clear is that users and vendors will have
- to work together to solve the problem.
-
- "In no way are we inferring we can catch everything," says Bob Fox,
- Sprint's assistant VP of corporate security. "The majority of the time
- we're getting to the customer before he knows what's going on. But we're
- not going to catch everything every time. It takes teamwork.
-
- "The customer is going to get hurt if we do our thing but he doesn't do
- his, or vice versa." -Mary E. Thyfault with Diane Medina and Bob Violino
-
- ------------------------------
-
- Date: Thu, 3 Oct 91 11:10:04 EDT
- From: server@STORMKING.COM(Storm King ListServ Account)
- Subject: File 9--Announcement
-
- NIA & Phrack Inc present:
-
- "It is useless to resist us."
-
- The second annual,
- X M A S C O N '91
-
- Where: Houston, TX
- When: December 27th-29th 1991
-
- Who: All Hackers, Journalists, Security Personnel and Federal Agents
-
- Well, it's getting closer.. HoHoCon is coming up and we plan on having
- the biggest gathering of Hackers ever!
-
- This event is going to be public. Sponsors include members of NIA
- Magazine, Phrack Inc, dFx/Neon Knights and cDc.
-
- Hotel and reservation information will be announced at a later date.
- Anyone is welcome to attend, and we encourage you to be there.
-
- Keep the Faith & cya' at HoHoCon!
-
- ------------------------------
-
- Date: Sat, 21 Sep 91 18:52:56 EDT
- From: "Anonymous" <anonymous@noaddress.etc>
- Subject: File 10--Cyberspace Conference in Montreal
-
- THE THIRD INTERNATIONAL CONFERENCE ON CYBERSPACE
- MONTREAL, QUEBEC
- MAY 22-23, 1992
-
- Sponsored and hosted by
- DEPARTMENT OF COMPARATIVE LITERATURE, UNIVERSITY OF MONTREAL and
- GROUP FOR THE STUDY OF VIRTUAL SYSTEMS, U.California, Santa Cruz
-
- ANNOUNCEMENT AND CALL FOR PAPERS
-
- The Third International Conference on Cyberspace will be held May
- 22--23 1992 at the University of Montreal. This is a call for
- abstracts, approximately fifteen of which will be selected for
- development and presentation at the Conference. All papers, and a
- number of selected abstracts, will be published in Proceedings,
- available late 1992.
-
- Abstracts should be between 600 and 1000 words, and are due by
- December 15, 1991. Submission of an abstract indicates the
- submitter's intention and capability to write and present the
- corresponding, full length paper, if chosen.
-
- Participation in the Conference is limited to 140 people in the
- following categories:
-
- 1. Participants who have been invited to present papers based on
- their abstracts. (Limit 15)
-
- 2. Participants who have submitted abstracts judged by the Program
- Committee to be of particular interest. (Limit 35)
-
- 3. Participants with creative and clearly stated interests in the
- topic who are involved with work on cyberspace in any capacity.
- (Limit 60)
-
- 4. Visitors & observers, who are not actively working in the field at
- this time but who have expressed interest in the subject. (Limit 30)
-
- Like the First Conference at Austin in 1990, and the Second
- International Conference in Santa Cruz in 1991, the Third
- International Conference on Cyberspace is not only about the enabling
- technology of virtual reality, 3-D user interfaces, networking, data
- visualization, or high speed computer graphics, but also the nature
- of cyberspace as such, conceived of as an independent realm, a shared
- virtual environment whose inhabitants, objects and spaces are data,
- but data which is visualized, heard and (perhaps) touched. It seeks
- to reach an understanding of how the components of cyberspace already
- "under construction" in the development and design of graphic user
- interfaces, scientific visualization techniques, video games, CAD,
- abstract architecture and architectural design theory, knowledge
- navigation, "cyberpunk" discourse, cultural studies, film and
- narrative theory, virtual and artificial reality systems, MUDs,
- INTERNET, USENET and other networks, groupware, and hypermedia might
- someday function together to create a true, public cyberspace, as
- well as private, special-purpose cyberspaces.
-
- ------------------------------
-
- Date: Thu, 26 Sep 91 00:25:50 MDT
- From: mbarry@ISIS.CS.DU.EDU(Marshall Barry)
- Subject: File 11--Conference Info and Press Releases
-
- Contact: Terry Travis or Michelle Weisblat
- Telephone: (303) 426-1847
-
- IBECC, a non-profit educational, literary and scientific society,
- is sponsoring the 1992 International BBSing and Electronic Commu-
- nications Conference to be held August 13-16, 1992 in Denver,
- Colorado. The theme of IBECC '92 will be "Socially Responsible
- Computing."
-
- There will be panels on such diverse topics as "Safe Computing" [How
- to Prevent the Spread of Computer Infection], "Why Kelly CAN Read"
- [Exploring Computers, BBSing, and Education], and "Staying Alive"
- [Computing and the Physically Challenged and Homebound].
-
- Membership in IBECC, including the 1992 annual conference, is $80.00
- (US) through September, 1991 and $125.00 from October 1, 1991 through
- May, 1992. Membership also includes the IBECC Newsletter, access to
- the IBECC Electronic Bulletin Board, and discounts on several
- services.
-
- The conference will be held at the Sheraton Denver West Hotel and
- Conference Center, Lakewood, Colorado. Room rates start at $62.00
- (US + tax) per night; contact the hotel at 1-800-LAKEWOOD, or (303)
- 987-2000, for reservations.
-
- ------------------------------
-
- End of Computer Underground Digest #3.35
- ************************************
-