home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun, Oct 27, 1991 Volume 3 : Issue 38
-
- Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
-
- CONTENTS, #3.38 ( October 27, 1991)
- File 1: Geraldo's _Now it can be Told_ Revisited
- File 2: Comment on the Geraldo Show
- File 3: A Guest's-eye view of the Geraldo Show
- File 4: Second Thoughts about the "Ingraham Massacre"
- File 5: Response to CuD #3.37's "Mad Hacker" Issue
- File 6: Release of Informatik #1
- File 7: Second Annual XMASCON
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
- 789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
- chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
- Chicago email server, send mail with the subject "help" (without the
- quotes) to archive-server@chsun1.spc.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to the
- Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: 25 Oct 91 12:19:22 CDT
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--Geraldo's _Now it can be Told_ Revisited
-
- The fallout from the Geraldo show (see CuD #3.37) that we've received
- has focused on Alameda County (Calif) Assistant District Attorney Don
- Ingraham for the reckless manner in which he treated "truth" and Craig
- Neidorf. Craig provides an insider's view, and the moderators offer a
- review of Ingraham's made-for-tv performance below.
-
- Krista Bradford, Senior Reporter for NICBT, provides a helpful glimpse
- into production of the show that explains some of the dynamics behind
- framing topics. Krista also adds a thoughtful commentary on educating
- the media to the issues of cyberspace. Her lesson is: There is no
- "media," but rather reporters who do media work. These workers don't
- "get educated" by some mystical process. Instead, those of us who
- complain about media misrepresentation have to obligation to find
- constructive ways to deliver our message to individuals writing on the
- topic. It is our obligation, she argues, to contact individual
- reporters, to sign them up on various systems, and to bring the
- message to them rather than assume they can, on their own, go out and
- find it.
-
- For those interested, Craig is still in debt to Katten, Muchin, &
- Zavis for close to $50,000.00. Any contributions to his defense fund
- would be greatly appreciated. Please send a check or money order to:
-
- Sheldon Zenner
- Katten, Muchin, & Zavis
- 525 West Monroe Street
- Suite 1600
- Chicago, Illinois 60606-3693
-
- The checks must be made out to Katten, Muchin, and Zavis and you must
- put his name on the memo section somewhere or else they will not
- credit the money to his account.
-
- ------------------------------
-
- Date: 19 Oct 91 20:42:40 CDT (Sat)
- From: peter@TARONGA.COM(Peter da Silva)
- Subject: File 2--Comment on the Geraldo Show
-
- My reaction to Rivera's show was simply that it glorified all the
- negative connotations of the word "Hacker". It put an obvious bozo up
- against Neidorf who simply made the government look bad. It also made
- Neidorf look bad by linking him to things he never did, nor that any
- other "hacker" ever did (the 911 paper in question was public
- information, for heavens' sake, and they didn't say that once!). It
- was a complete loss for everyone except Rivera and the foreign hackers
- out of reach of Sun-Devil hysteria.
-
- No matter what side of the subject you're on... if you live in the
- U.S. this show hurt you whether you know it or not.
-
- Which is typical of Geraldo's flaming. The best part was Cliff Stoll,
- but of course he never got a chance to refute Goldstein's dismissal of
- his point about breaking and entering... which is quite valid. If you
- want to be pedantic, phreak-style crackers are like joy-riding kids.
- Joy-riding is, rightly, illegal. And so it should be. Of course, you
- don't get thousands of dollars worth of equipment confiscated and jail
- terms for joy-riding. The government *and* the apologists for these
- soi-disant hackers are *both* wrong, and attempting to trivialize
- *either* side's grievances is counterproductive.
-
- ------------------------------
-
- Date: Tue, 22 Oct 1991 01:05:07 -0400
- From: Craig Neidorf <knight@stormking.com>
- Subject: File 3--A Guest's-eye view of the Geraldo Show
-
- Same Story, New Court Room
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- "I guess they figured I needed to be tried twice."
-
- Now It Can Really Be Told...
-
- It was Monday, March 25, 1991 and I was sitting in a conference room
- at the SFO Marriott Hotel in Burlingame, California. I was attending
- a tutorial session called "How Computer Crime is Investigated" hosted
- by Don Ingraham at the First Conference on Computers, Freedom, and
- Privacy.
-
- Don Ingraham, an Assistant District Attorney in Alameda County,
- California was already a nationally-known computer crime prosecutor
- and I was Craig Neidorf, political science/pre-law student from St.
- Louis, already nationally-known for being Knight Lightning, editor of
- Phrack... the guy who published the 911 text file and more.
-
- What began as a tutorial and learning session about the use of search
- warrants on electronically stored evidence changed into a heated
- debate with Ingraham on one side with some supporters and me on the
- other side allied with Sheldon Zenner, Mike Godwin, and Sharon
- Beckman. It was interesting and quite a few constitutional and ethical
- issues were raised. However, when it was all over, I left with a
- feeling of respect for Mr. Ingraham even if I disagreed with his
- views.
-
- As the conference continued over the next few days, I found that where
- I had expected clashes I found conversations. The law enforcement
- officers and prosecutors were not bad people when you got them in a
- small group away from the reporters. As odd as this may sound, a
- whole bunch of them (joined by people like Bruce Sterling and John
- Perry Barlow) were seated in the lounge when I showed up late one
- evening and they had been speaking about my future. They had decided
- that should I choose a career path in law enforcement after I finished
- law school, they would all be out of work as I became the most feared
- prosecutor among the entire hacker community and many others. In one
- sense it was very flattering. Among these prosecutors was Don
- Ingraham and he was very supportive of the idea of me becoming a
- prosecutor.
-
- In late July 1991, I was just finishing up my last semester at the
- University of Missouri-Columbia. I had been forced to take a full
- 12-hour summer school load of classes in order to make the August
- commencement. I was running a litte behind after William Cook made
- sure that I could not complete the Spring semester of 1990. As it
- turns out, the CFP folks had predicted my future rather accurately, I
- was working for law enforcement. As part of my undergraduate
- requirements I had to take an internship with some branch of state
- government. A strong grade point average and critical writing skills
- had earned me a prestigious position with the Missouri Attorney
- General's Office in their Public Protection Division (the department
- that handles consumer fraud).
-
- One evening I received a call from Phyllis Zimmerman who represented
- "Now It Can Be Told." She explained who she was and what their
- program was all about. "We're going to show how the hackers are
- really the good guys who are exposing the flaws so the criminals can't
- exploit them." It sounded like she had been brainwashed by Emmanuel
- Goldstein of 2600 Magazine to me, but what the hell. I told her that
- I might be interested, but I could not do anything with her until
- after August 3rd since I had to finish school and I had some finals
- coming up for my remaining classes.
-
- I didn't hear from the NOW people again until the second week of
- September. This time I was contacted by Cindy Frei. They didn't want
- to interview me in a segment anymore, instead they wanted me to take
- part in sort of a discussion after the main part of the show. She
- told me that William Cook might be there, as well as Donald Delaney,
- Wynn Schwartaw[sic], and Chris Goggans. I knew Cook would never show
- up and hanging out in New York with Bloodaxe (Goggans) sounded like it
- might be cool since we had so much fun the previous summer at
- CyberView in St. Louis. So we made plans for me to fly up to New York
- on Wednesday, September 25th. On Tuesday, I learned that Chris
- Goggans and Donald Delaney had been cancelled and Don Ingraham had
- been substituted in as a replacement. I also began to learn a little
- more about the show.
-
- Scenes of Dutch hackers breaking into systems and more. I was
- concerned that instead of the viewers getting impressions of good guy
- hackers, the Department of Defense would go on alert and press
- Congress for stronger legislation against computer hackers. Frei said
- I was supposed to sort of give my impressions of what I saw, a
- hacker's viewpoint. I explained that I wasn't a hacker in the sense
- she was looking for, but this did not present a problem for her. She
- didn't want me to get into a discussion about the difference of
- opinion on the use of the word hacker. I began to have second
- thoughts about doing the show, but I decided that I was probably best
- suited to try and dispel some of the hacker hysteria that might
- arise. I was wrong.
-
- I arrived in a cold, rainy, unfamiliar and unfriendly metropolis --
- New York City. No car waiting or anything special like that. Frei
- said I should take a cab and just save all the receipts, they would
- reimburse me. It took seemingly forever, but I arrived at the hotel
- Empire (Radison). It was a dump. The hallways and rooms looked like
- they hadn't been remodeled in at least a decade and to make matters
- worse, there was a mouse loose in my room.
-
- The next morning I took a cab to CBS Studios on West 57th street where
- Now It Can Be Told is shot. They ran me through a little preping and
- a little makeup. They wanted me to be confrontational with Don
- Ingraham. This was not on my agenda. I expected we would talk about
- electronic search and seizure and the dilemmas that computer crime
- investigation presents to law enforcement. I was not looking for a
- fight with this man, I thought he was a friend.
-
- The studio for Geraldo is actually very tiny despite how the cameras
- make it look like a large room. I met Geraldo who found it
- interesting that I was a political science major in school and not
- computer science. I was told that Geraldo wanted to use my scrapbook
- in the show to flip to a few of the headlines in the articles...
- instead he used it to sensationalize.
-
- We had to shoot the intro segment at least eight times before there
- was one they finally liked. Each time Geraldo threw a different
- question at me. It was funny in a way when they would screw up and
- Geraldo started cursing a little. Everything was going fine until Don
- Ingraham came on camera.
-
- Ingraham's comparison of hackers to rapists almost made me physically
- ill. How can a reasonable person draw an analogy between these two
- types of activity? Ok, sure, if a person's computer is accessed
- without authorization, there very well might be a feeling of being
- violated, of vulnerability, but the physical and emotional damage of a
- rape is almost immeasurable. Although I'm not an expert on
- psychology, I do know a little about the long-term psychological
- damage a rape can do to a woman, the fear of ever being intimate
- again, of going outside, the inability to have a relationship with a
- man, the constant questions; "Is it my fault?" "Did I encourage
- this?" How can a man as intelligent as Don Ingraham stoop to such
- blatant disregard for a true representation of the facts? Of course,
- I was not given a chance to respond to those remarks. We cut right to
- a commercial and when we came back, I was busy trying to find a way to
- respond to Ingraham's other uncalled for remarks.
-
- Ingraham called me lucky to have not gotten convicted and he is right.
- I am lucky that I had a brilliant attorney and a decent judge who made
- the justice system work despite the efforts of a malicious
- media-hungry prosecutor. However, he neglected to point out that the
- government voluntarily dropped the case because there was no case. I
- hadn't done anything wrong. Furthermore, it was unknown to him that
- Federal District Court Judge Bua issued a court order to the Secret
- Service, FBI, and U.S. Marshalls several months ago to expunge all of
- my arrest records and have them destroyed. And there is a lot more to
- it than the fact that BellCore published 911 documents.
-
- As for the 911 information being public, there have been indepth
- articles on 911 in magazines like CO, Teleconnect, and Telephone
- Engineering & Management. Not to mention the fact that the 911
- information itself was just a bunch of bureaucratic nonsense. Scott
- Ticer of BellSouth doesn't know what he's talking about.
-
- Ingraham also claims that the Federal Court said that the Pentagon
- Papers (New York Times Co. v. United States, 403 U.S. 713, 1971) case
- did not apply to me. This is not exactly true. The Court decided
- that if someone is committing a fraud and using a publication to
- commit that fraud, then that activity is not protected by the First
- Amendment. At the time, the U.S. Attorney's office was alleging that
- Phrack Newsletter in and of itself from day one was a fraud to begin
- with. Because of that allegation (which fell completely apart at
- trial), the Court could not dismiss based on the First Amendment.
-
- The main problem here is that I was taken completely by surprise.
- Frei had promised that this show was not about my case and more than
- that, I thought I knew Ingraham. I never even considered the
- possibility of such an attack from him. It was clear that they had
- set me up for an ambush. Why was Ingraham discussing my case anyway?
- The case has been over for a long time and he never had anything to do
- with it. Perhaps if he did have something to do with it, he would
- have known that the government did not charge me with a conspiracy,
- did not prove a conspiracy, and in fact my co-defendant Robert Riggs
- had testified that I had never asked him to break into any computer or
- copy any document, let alone a Bell South computer or a 911 document.
- No, Ingraham did not know much about my case and this ignorance was
- used to my disadvantage.
-
- I haven't complained too much about Geraldo here and basically it
- isn't that Geraldo isn't deserving of a lot of criticism, but unlike
- Ingraham, he didn't know any better or at least I would not have
- expected him to know any better.
-
- Before I knew what had happened, the show was over. I never had the
- opportunity to raise ANY civil liberties concerns and I felt like I
- had just gotten the stuffing beaten out of me on national television.
- My friends told me not to feel too bad, after all I'm just a guy
- barely out of college and Ingraham is a prosecutor with over a dozen
- years of experience. How could I have hoped to prevail against him in
- this type of confrontation, especially with Geraldo feeding on the
- allegations like a blood-sucking leech. I didn't come to New York to
- fight with Don Ingraham, I guess he had a different idea.
-
- I didn't feel like hanging out in New York any longer, so I got to the
- airport and a flight home as soon as possible.
-
- Frei and the other staff at NOW did not even have the decency to send
- me a copy of the show on a videotape and to this day, I have not been
- reimbursed for the cab fare money that they promised me. This amounts
- to about $45.00.
-
- And that is my story...
-
- ------------------------------
-
- Date: 27 Oct 91 7:43:01 CDT
- From: Jim Thomas <jthomas@well.sf.ca.us>
- Subject: File 4--Second Thoughts about the "Ingraham Massacre"
-
- Craig Neidorf has yet to receive an apology from Bill Cook. Or Tim
- Foley. Or the BellSouth crowd. They had no case, yet they nearly
- ruined his life. Even though the case was dropped, prosecutors still
- seem intent on prosecuting--and convicting--him in the media on the
- same half-truths and fabrications.
-
- This time, Don Ingraham owes Craig Neidorf an apology.
-
- But, Don Ingraham, Alameda County Ass't DA, apparently feels no need
- to apologize to Craig Neidorf. At least, he hasn't to date. But,
- then, why should the powerful worry about such trivia, even when they
- distort facts, betray trust, and act unethically in their hatchet job?
- Ingraham betrayed Craig's trust that no cheap-shots would be taken; He
- betrayed Craig's trust by bringing in an agenda of his own when Craig
- expected a legitimate discusion; and he betrayed the public's trust by
- playing fast and loose with facts.
-
- The transcript of the Sept 30 Geraldo show makes Don Ingraham seem
- less than honorable in the shameless way he exploited Craig for his
- own ends.
-
- >Geraldo: . . . .Don, do you think Craig's lucky that he's
- >not behind bars right now?
- >
- >Don: Yes, I think he's extraordinarily lucky. He was part
- >of a conspiracy, in my opinion, to take property that wasn't
- >his and share it with others. They charged him with
- >interstate transport of stolen property - couldn't make the
- >threshold -and it came out that it had been compromised by,
- >unfortunately, released by another BellCore subsidiary. But
- >was certainly not through any doing of HIS that he is a free
- >man.
-
- Normally, the courts--not publicity-seeking Assistant DAs trying to
- make a splash on national television--try suspects. There was no
- evidence that Craig was involved in a conspiracy to "take property
- that wasn't his." The evidence showed that the E911 documents in
- question were stolen long before being published in PHRACK, and that
- Craig had no role in their acquisition. Ingraham used his skills as
- a glib rhetorician to distort reality in ways that may make good
- theater, but lousy justice.
-
- Ingraham is right about one thing: It wasn't Craig's doing that forced
- the government to drop the charges. It was a six-figure attorney fee
- and the volunteer help of John Nagel, Dorothy Denning, the EFF, and
- others who devastated the government's case. However, it was not on
- some "threshold" technicality that the case was dropped, as Ingraham
- implies. The case against Craig was dropped because the government had
- no case.
-
- Craig suggested an analogy between the issues the PHRACK case raised
- and Daniel Ellsberg and the Pentagon Papers. Rather than accept the
- analogy as a departure point for discussion, Prosecutor Ingraham
- preferred to hurl a few sleaze-balls:
-
- >Geraldo: Do you figure it that way Don? Is he like Daniel
- >Ellsberg?
- >
- >Don: No, Ellsberg went to court to deal with it. Daniel
- >Ellsberg's release of the Pentagon Papers is the subject of
- >a published court decision to point out it was a matter of
- >national security and national interest. The E911 codes,
- >which is the citizen's link to the police department are not
- >a matter of national security. They're a matter of the
- >central service to the community.......
- >
- >Geraldo: You broke into the 911 system? He broke into the
- >911 system!
- >
- >KL: No, that's not correct. I never entered any 911
- >telephone system.
- >
- >Don: I didn't say he entered into it. What I said was that
- >he and Riggs conspired together to take a code that they
- >knew was necessary to 911 and to take it apart to see how it
- >worked. They never had the owner's permission, they never
- >asked for it.
-
- Ingraham first implies that Craig broke into the E911 system, then we
- waffles back and claims he merely conspired to take code. He is
- fabricating a role for Craig despite evidence to the contrary, he
- grossly misrepresents the E911 documents in question, which were text
- files rather than a "program," and he imputes to Craig motives (taking
- apart the code) which are not true.
-
- Sitting in the presumably quiet confines of his office, Ingraham
- apparently judges it fully acceptable to besmirch the reputation and
- feelings of a victim of malicious prosecution. Why? What would
- possess a normal adult to play the bully-role on national television?
- And, what would he do with hackers given the chance? Why, what
- else? Toss 'em in jail--"HARD TIME!"
-
- >Don: I don't think they're being punished very much at all.
- >We're having trouble even taking away their gear. I don't
- >know one of them has done hard time in a prison. The book,
- >Hafner's book on _Cyberpunk_, points out that even Mitnick
- >who is a real electronic Hannibal Lecter ... did not get
- >near any of the punishment that what he was doing entitled
- >him to.
-
- Isn't Ingraham aware of the hackers who've been sent to prison? What
- does he mean by "hard time?" Doesn't he think that the devastating
- consequences of separation of family that Len Rose is experiencing is
- "hard time?" Nah, better we lop of a hand for the first offense, pluck
- out the eyes for a second. And, as a commentator observed last issue,
- it's really a drag that due process gets in the way when Ingraham and
- his brownshirts try to grab suspects' equipment. Damn! They even had
- to give Steve Jackson's back. Too bad Doc Ripco and others haven't
- been as lucky.
-
- It is apparent that Ingraham is not on the show to discuss issues,
- but to perform. Craig is a convenient prop for an anti-hacker
- soliloquy:
-
- >Don: If they stopped at voyeurism they would be basically
- >sociopathic, but not doing near the harm they do now. But
- >they don't stop at looking, that's the point. They take
- >things out and share them with others, and they are not
- >being accountable and being responsible as to whom they are
- >sharing this information. That is the risk.
-
- (. . .)
-
- >Don: What do I think of Craig? I have a lot of respect for
- >Craig, I think he's probably going to be an outstanding
- >lawyer someday. But he is contributing to a disease, and a
- >lack of understanding ethically, that is causing a lot of
- >trouble.
-
- Craig Neidorf, for better or worse, believed he was walking into a
- discussion of issues. Don Ingraham had a somewhat different agenda,
- and used his experience to promote it, and allowed "truth" to fall
- where it may.
-
- Don Ingraham may be an adept prosecutor, he may feed the pigeons, and
- some claim that, on occasion, he even displays concern for civil
- liberties. But, Don Ingraham's comments do not reflect his own
- accountability to truth, and he seemed to make up facts to fit his
- claims. Actually, it is *he* who "is contributing to a disease, and a lack
- of understanding ethically, that is causing a lot of trouble."
-
- Ingraham did a number on Craig that served no purpose. Unfortunately,
- Ingraham may be one of those who fails to recognize that brutality
- comes in many forms, and his own sanctimonious bullying of a
- near-defenseless youth is inexcusable. If Geraldo had been thinking
- more quickly, he might have toyed with Ingraham's hyperbolic analogy
- to rape by alluding to a few other examples of older men who've done
- hatchet jobs on young males. Like John Gacy and Jeffrey Dahmer. They,
- too, felt no need to apologize to their victims.
-
- ------------------------------
-
- Date: 21 Oct 91 22:15:15 EDT
- From: Krista Bradford <76436.3200@COMPUSERVE.COM>
- Subject: File 5--Response to CuD #3.37's "Mad Hacker" Issue
-
- I briefly will address a few points discussed by critics of the show,
- and then will address what may ultimately be more helpful and
- productive.
-
- <In response to the moderators criticism of>:
- >"Skillfully juxtaposed film images of terrorism and military
- >violence with discussions and images of hackers".
-
- The first story was dedicated to the hackers in Amsterdam making their
- way into a US army computer. We aired video of the hackers which
- Emmanuel Goldstein was so kind to provide, and attempted to explain in
- layman's terms exactly how they made their way in. I felt that was
- necessarily to lay to rest any misconceptions about what it is that
- hackers do. In addition, one of the documents found in the Army
- computer related to the war with Iraq, and so we used footage from the
- war.
-
- I then intentionally separated the first story from the second with a
- commercial break...so their would be no confusing hackers with
- terrorists. The second piece related to computer terrorism. In it we
- showed footage of Die Hard 2, which was viewed at a congressional
- hearing as an example of how vulnerable we are, and how what happened
- in that movie could happen in real life.
-
- In both pieces I attempted to show a balance of viewpoints.
-
- I strenuously objected to the use of the term Mad Hacker, and to the
- title "Mad Hackers' Key Party" - which I found out about after the
- stories aired. (They weren't mad, but are now - and it wasn't a
- "party" but rather a breech of security.) I'm afraid that was not of
- my doing, but rather of one of our show's producers. I find the term
- objectionable and offensive and insulting. I do not believe in name
- calling, yet that is what occurred, and for that I offer my apologies
- to Emmanuel Goldstein and to anyone else who took offense. You can be
- assured that I have addressed the issue internally.
-
- As for the comment that we put at least one military computer at risk.
- We didn't. The military has known of its bug for years, but hasn't
- fixed it. In addition, we volunteered to show the videotape to the
- Army for further explanation and protection, but it didn't take us up
- on the offer. It was well aware of the problem, you can be sure by
- the number of calls we made to attempt to get an interview. Also, I
- checked and was told that that particular army computer no longer
- resides at that address. I realized I might be criticized for
- actually showing how to hack. We did not show each and every step, but
- we wanted to show just how easy it was. And I think it was valuable
- to demystify hacking.
-
- As for the alleged hatchet job on Craig - I believe it was less of
- Geraldo's doing and more of an imbalance between a prosecutor
- well-versed in expressing himself, and someone who was not as capable.
- That is what happens when interviews are taped as live - one cannot
- insert a balance (a little less of the prosecutor, a little more of
- Craig).
-
- While you can criticize Geraldo for his heavy-handedness and
- sensational style - some credit is due him for giving me the freedom
- to pursue this story, the funding to produce the pieces and the
- extraordinary amount of airtime. We spent several months researching
- and taping the stories. Also, while it is may be hard to imagine -
- there are many shows that would shy away from such a topic because it
- was "technical" or "boring" or because the shows didn't understand or
- don't want to understand computers. The latter still tends to be the
- norm. While most newsrooms are computerized - most reporters have not
- turned to computer assisted journalism. But this is a growing area of
- interest. You can easily tap into computer-literate journalists
- through the Center for Computer-Assisted Reporting at the University
- of Missouri Columbia (Professor Elliot Jaspin-reachable on CIS) and
- the National Institute for Advanced Reporting at the University of
- Indiana (Scott Abel).
-
- How can the media be made more aware of the nuances of the topics? By
- using computers themselves. Sign your favorite reporter up to
- Compuserve, and then leave them flattering E-mail. Invite them to
- call a local BBS. Have sources leave them tips for stories on the
- BBS, instead of calling. Having running threads giving them feedback
- on their stories. A reporter really won't understand the nuances
- unless he gives virtual space a try...sort of like the difference
- between being a passenger and being in the driver's seat.
-
- As for media distortions. They are inevitable. I guess I would go for
- quantity as well as quality - establish relationships with reporters
- who will become more educated about hackers/computer issues the more
- stories they do. Realize the media does uses headlines to capture the
- rather short attention spans of viewers and readers, so a headline may
- distort, but the story which follows may clarify.
-
- As for an informed public dialog emerging...I believe that Operation
- Sun Devil is old news. What I care about is what is happening today
- and tomorrow to hackers and their civil rights, to their computer
- equipment. What is happening to computer security? Just how safe are
- we? Find the most compelling examples of your point of view (i.e- a
- teenage hacker who just had all of his computer equipment, clock radio
- and VCR seized with no charges filed.) Let me know. Let other
- reporters know. Let us meet new people, new sources to report on the
- evolving history of this issue. We can discuss the ethics within the
- context of each additional story. And as the stories are told,
- perhaps legislators will hear and think and be more inclined to draft
- more constructive legislation.
-
- And one special note of interest...I am looking for government
- databases I can obtain by asking or by using the Freedom of
- Information Act. I then crunch the databases myself and determine
- whether said Department is enforcing its own laws or regulations...and
- whether it is misrepresenting its data, cooking the books. If anyone
- knows of any gov't databases out there that would be worthy of
- consideration - drop me a line via E-Mail. In addition, story
- suggestions and tips are always welcome.
-
- Cordially, Krista Bradford, Senior Reporter, Now It Can Be Told, CIS
- 76436,3200 or call (212) 373-6200.
-
- ------------------------------
-
- Date: Sun, 6 Oct 91 17:58:45 CDT
- From: duane@SHAKE.TAMU.EDU(Duane)
- Subject: File 6--Release of Informatik #1
-
- I would like to announce the release of the first issue of 'Informatik'.
- Informatik #1 is available by anonymous ftp at uunet.uu.net under:
- tmp/inform1.Z
- tmp/inform1.txt
-
- Below is an excerpt from the issue's header:
-
-
- ** Introduction **
- By the Informatik staff
-
- Welcome to the inaugural issue of Informatik, an electronic
- periodical devoted to the distribution of information not readily
- available to the public, with a particular emphasis on technology and
- the computing world. First and foremost, this publication is
- dedicated to the freedom of information. This journal is made
- possible by The First Amendment of the U.S. Constitution which states:
-
- Congress shall make no law respecting an establishment of
- religion, or prohibiting the free exercise thereof; OR ABRIDGING
- THE FREEDOM OF SPEECH OR OF THE PRESS; or the right of the
- people peaceably to assemble, and to petition the Government for
- redress of grievances.
-
- In this and coming issues, we plan to exercise our First Amendment
- rights to the best of our ability. We will print feature articles on
- hacking, phreaking, and various other illicit activities. We also
- plan on bringing you recent news and gossip from the underground,
- anything news of interest to hackers, phreakers, grifters,
- cyber-punks, and the like. Informatik will also provide a plethora of
- information on the inner workings of corporate America and the U.S.
- Government.
-
- DO distribute this freely! Remember this is not illegal, this is
- information.
-
- *Please send submissions and comments to duane@shake.tamu.edu. (for
- now)*
-
- ------------------------------
-
- Date: Sun, 13 Oct 91 18:50 CDT
- From: ulowell!nuchat.sccsi.com!samp%harvard@HARVUNXW.BITNET
- Subject: File 7--Second Annual XMASCON
-
- NIA & Phrack Magazine, & dFx International Digest Are Proud To Present:
-
-
- The Second Annual
-
- X M A S C O N
-
-
- Who: All Hackers, Journalists, Security Personnel, Federal Agents, Lawyers,
- Authors and Other Interested Parties.
-
- Where: Houston Airport Hilton Inn
- 500 North Belt East
- Houston, Texas 77060
- U.S.A.
- Tel: (713) 931-0101
- Fax: (713) 931-3523
-
- When: Friday December 27 through Sunday December 29, 1991
-
-
- Yes, ladies and gentlemen, you read it right... Xmascon has returned!
- This will undoubtedly be the telecom event of the year. Unlike certain
- conferences in the past, Xmascon 91 has a devoted and dedicated staff
- who are putting in an unmentionable amount of time to ensure a large,
- vast and organized collection of some of the most diversified people
- in the telecommunications world. The event will be open to the public
- so that anyone may attend and learn more about the different aspects
- of computer security.
-
-
- Hotel Information
- -----------------
-
- The Houston Airport Hilton Inn is located about 6 miles from
- Intercontinental Airport. The Xmascon group room rates are $49.00 plus
- tax (15%) per night, your choice of either single or double. There are
- also 7 suites available, the prices of which vary from $140 to $250.
- You can call the hotel to find out the differences and availability of
- the suites, and you will also NEED to tell them you are with the
- Xmascon Conference to receive the reduced room rate, otherwise, you
- will be paying $69.00. There is no charge for children, regardless of
- age, when they occupy the same room as their parents. Specially
- designed rooms for the handicapped are available. The hotel provides
- free transportation to and from the airport, as well as neighbouring
- Greenspoint Mall, every 30 minutes on the hour, and on call, if
- needed. There are 2 restaurants in the hotel. The Wicker Works is open
- until 11:00 pm, and The Forty Love is open 24 Hours. There will also
- be breakfast, lunch and dinner buffets each day. There is a piano bar,
- The Cycle Club, as well as a sports bar, Chaps, which features
- numerous table games, large screen tv, and a disco with a DJ. Within
- the hotel compound, there are 3 pools, 2 of which are indoors, a
- jacuzzi, a miniature golf course, and a fully equipped health club
- which features universal weights, a whirlpool and sauna. A car rental
- agency is located in the hotel lobby, and you can arrange to pick your
- car up at either the airport or the hotel. Xmascon attendees are
- entitled to a discounted rate. Contact the hotel for more information.
-
- Xmascon will last 3 days, with the main conference being held on
- Saturday, December 28, in the Osage meeting room, starting at 12:00
- p.m. and continuing on throughout the evening. This year, we have our
- own complete wing of the hotel, which is housed around a 3,000 square
- foot atrium ballroom. The wing is completely separated from the rest
- of the hotel, so we are strongly encouraging people to make their
- reservations as far in advance as possible to ensure themselves a room
- within our area.
-
- We are hoping to have a number of people speak on a varied assortment
- of topics. If you would like to speak, please contact us as soon as
- possible and let us know who you are, who you represent (if anyone),
- the topic you wish to speak on, a rough estimate of how long you will
- need, and whether or not you will be needing any audio-visual aids.
-
- There will be a display case inside the meeting room which will hold
- items of telecom interest. Specific items that will be available, or
- that we hope to have, include the first issues of 2600, Tap, Mondo
- 2000, and other magazines, non-computer related magazines that feature
- articles of interest, a wide array of boxes, the Quaker Oats 2600 mhz
- whistle, The Metal AE, etc. We will also have a VCR and monitor set
- up, so if you have any interesting videos (such as the Unsolved
- Mysteries show featuring Kevin Poulsen), or if you have anything you
- think people would enjoy having the chance to see, please let us know
- ahead of time, and tell us if you will need any help getting it to the
- conference. If all else fails, just bring it to the con and give it to
- us when you arrive.
-
- Media support has been very strong so far. Publications that have
- agreed to print pre-conference announcements and stories include
- Computer World, Info World, New York Times, San Francisco Chronicle,
- Austin Chronicle, Houston Chronicle, Independent Journal, Mondo 2000,
- CuD, Informatik, a leading Japanese computer magazine, NME,
- Regeneration (Germany), and a few other European based magazines. PBS
- stations WHNY, WNET, and KQED, as well as the stations that carry
- their syndicated shows, will be mentioning the conference also. If you
- are a journalist and would like to do a story on Xmascon 91, or know
- someone who would, contact us with any questions you may have, or feel
- free to use and reprint any information in this file.
-
- If anyone requires any additional information, needs to ask any
- questions, wants to RSVP, or would like to be added to the mailing
- list to receive the Xmascon updates, you may write to either myself
- (Drunkfux), Judge Dredd, or Lord Macduff via Internet at:
-
- nia@nuchat.sccsi.com
-
- Or via US Mail at:
-
- Hard Data Corporation
- ATTN: HoHo
- P.O. Box 60695
- Houston, Texas
- 77205-9998
- U.S.A.
-
-
- We will hopefully have an 800 mailbox before the next update is sent
- out. If someone cares to donate a decent one, that will stay up
- throughout the end of the year, please let us know. We should also be
- listing a few systems as an alternative form of reaching us.
-
-
- Xmascon 91 will be a priceless learning experience for professionals,
- and gives journalists a chance to gather information and ideas direct
- >from the source. It is also one of the very few times when all the
- members of the computer underground can come together for a realistic
- purpose. We urge people not to miss out on an event of this caliber,
- which doesn't happen very often. If you've ever wanted to meet some of
- the most famous people from the hacking community, this may be your
- one and only chance. Don't wait to read about it in all the magazines,
- and then wish you had attended, make your plans to be there now! Be a
- part of our largest and greatest conference ever.
-
- Remember, to make your reservations, call (713) 931-0101 and tell them
- you're with Xmascon.
-
- In closing... if you miss this one, you're only cheating yourself.
-
- ------------------------------
-
- End of Computer Underground Digest #3.38
- ************************************
-