home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Tue July 21, 1992 Volume 4 : Issue 32
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Copy Editor: Etaion Shrdlu, Jr.
- Archivist: Brendan Kehoe
- Archivist in spirit: Bob Kusumoto
- Shadow-Archivist: Dan Carosone
-
- CONTENTS, #4.32 (July 21, 1992)
- File 1--The NSA Papers
- File 2--CPSR Challenges Virginia SS
- File 3--EFF hires Cliff Figallo as director of Cambridge office
- File 4--New York Hackers Plead Not Guilty (NEWSBYTES REPRINT)
- File 5--Time Magazine Computer Analyst Arrested for Alleged Faud
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost at tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail to:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
- Issues of CuD can also be found in the Usenet alt.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
- libraries; from American Online in the PC Telecom forum under
- "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
- anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
- European distributor: ComNet in Luxembourg BBS (++352) 466893.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to
- computer culture and communication. Articles are preferred to short
- responses. Please avoid quoting previous posts unless absolutely
- necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Wed, 24 Jun 92 18:10:02 CDT
- From: Joe.Abernathy@HOUSTON.CHRON.COM(Joe Abernathy)
- Subject: File 1--The NSA Papers
-
- The following is the written response to my request for an intereview
- with the NSA. To the best of my knowledge, and according to their
- claims, it is the government's first complete answer to the many
- questions and allegations that have been made in regards to the matter
- of cryptography.
-
- I would like to invite reaction from any qualified readers who care
- to address any of the issues raised herein. Please mail to
- edtjda@chron.com (713) 220-6845.
-
-
-
- NATIONAL SECURITY AGENCY
- CENTRAL SECURITY SERVICE
- Serial: Q43-11-92 9
-
-
- 10 June 1992
- Mr. Joe Abernathy
- Houston Chronicle
- P.O. Box 4260
- Houston, TX 77210
-
-
- Dear Mr. Abernathy:
-
-
- Thank you for your inquiry of 3 June 1992 on the
-
- subject of cryptography. Attached please find answers
-
- to the questions that you provided our Agency. If
-
- any further assistance is needed, please feel free
-
- to contact me or Mr. Jerry Volker of my staff on (xxx)
-
- xxx-xxxx.
-
-
- Sincerely,
-
-
- MICHAEL S.CONN
-
- Chief
- Information Policy
-
- ENCL:
-
-
- 1. Has the NSA ever imposed or attempted to impose
- a weakness on any cryptographic code to see if it
- can thus be broken?
-
- One of NSA's missions is to provide the means for
- protecting U.S. government and military communications
- and information systems related to national security.
- In fulfilling this mission we design cryptologic codes
- based on an exhaustive evaluation process to ensure
- to the maximum extent possible that information systems
- security products that we endorse are free from any
- weaknesses. Were we to intentionally impose weaknesses
- on cryptologic codes for use by the U.S. government,
- we would not be fulfilling our mission to provide
- the means to protect sensitive U.S. government and
- military communications and our professional integrity
- would be at risk.
-
- 2. Has the NSA ever imposed or attempted
- to impose a weakness on the DES or DSS?
-
- Regarding the Data Encryption Standard (DES), we
- believe that the public record from the Senate Committee
- for Intelligence's investigation in 1978 into NSA's
- role in the development of the DES is responsive to
- your question. That committee report indicated that
- NSA did not tamper with the design of the algorithm
- in any way and that the security afforded by the
- DES was more than adequate for at least a 5-10 year
- time span for the unclassified data for which it was
- intended. In short, NSA did not impose or attempt
- to impose any weakness on the DES.
-
- Regarding the draft Digital Signature Standard
- (DSS), NSA never imposed any weakness or attempted
- to impose any weakness on the DSS.
-
- 3. Is the NSA aware of any weaknesses in the
- DES or the DSS? The RSA?
-
- We are unaware of any weaknesses in the DES or
- the DSS when properly implemented and used for the
- purposes for which they both are designed. We do not
- comment on nongovernment systems.
-
- Regarding the alleged trapdoor in the DSS. We
- find the term trapdoor somewhat misleading since
- it implies that the messages sent by the DSS are encrypted
- and with access via a trapdoor one could somehow decrypt
- (read) the message without the sender's knowledge.
- The DSS does not encrypt any data. The real issue
- is whether the DSS is susceptible to someone forging
- a signature and therefore discrediting the entire
- system. We state categorically that the chances of
- anyone - including NSA - forging a signature with
- the DSS when it is properly used and implemented is
- infinitesimally small.
-
- Furthermore, the alleged trapdoor vulnerability
- is true for ANY public key-based authentication system,
- including RSA. To imply somehow that this only affects
- the DSS (a popular argument in the press) is totally
- misleading. The issue is one of implementation and
- how one goes about selecting prime numbers. We call
- your attention to a recent EUROCRYPT conference which
- had a panel discussion on the issue of trapdoors in
- the DSS. Included on the panel was one of the Bellcore
- researchers who initially raised the trapdoor allegation,
- and our understanding is that the panel - including
- the person from Bellcore - concluded that the alleged
- trapdoor was not an issue for the DSS. Furthermore,
- the general consensus appeared to be that the trapdoor
- issue was trivial and had been overblown in the press.
- However, to try to respond to the trapdoor allegation,
- at NIST's request, we have designed a prime generation
- process which will ensure that one can avoid selection
- of the relatively few weak primes which could lead
- to weakness in using the DSS. Additionally, NIST intends
- to allow for larger modulus sizes up to 1024 which
- effectively negates the need to even use the prime
- generation process to avoid weak primes. An additional
- very important point that is often overlooked is that
- with the DSS the primes are PUBLIC and therefore can
- be subject to public examination. Not all public key
- systems provide for this same type of examination.
-
- The integrity of any information security system
- requires attention to proper implementation. With
- the myriad of vulnerabilities possible given the differences
- among users, NSA has traditionally insisted on centralized
- trusted centers as a way to minimize risk to the system.
- While we have designed technical modifications to
- the DSS to meet NIST's requests for a more decentralized
- approach, we still would emphasize that portion of
- the Federal Register notice for the DSS which states:
- While it is the intent of this standard to specify
- general security requirements for generating digital
- signatures, conformance to this standard does not assure
- that a particular implementation is secure. The responsible
- authority in each agency or department shall assure
- that an overall implementation provides an acceptable
- level of security. NIST will be working with government
- users to ensure appropriate implementations.
-
- Finally, we have read all the arguments purporting
- insecurities with the DSS, and we remain unconvinced
- of their validity. The DSS has been subjected to intense
- evaluation within NSA which led to its being endorsed
- by our Director of Information Systems Security for
- use in signing unclassified data processed in certain
- intelligence systems and even for signing classified
- data in selected systems. We believe that this approval
- speaks to the lack of any credible attack on the
- integrity provided by the DSS given proper use and
- implementation. Based on the technical and security
- requirements of the U.S. government for digital signatures,
- we believe the DSS is the best choice. In fact, the
- DSS is being used in a pilot project for the Defense
- Message System to assure the authenticity of electronic
- messages of vital command and control information.
- This initial demonstration includes participation from
- the Joint Chiefs of Staff, the military services,
- and Defense Agencies and is being done in cooperation
- with NIST.
-
- 4. Has the NSA ever taken advantage of
- any weaknesses in the DES or the DSS?
-
- We are unaware of any weaknesses in the DSS or
- in the DES when properly implemented and used for the
- purposes for which they both are designed.
-
- 5. Did the NSA play a role in designing the DSS? Why, in the
- NSA's analysis, was it seen as desirable to create
- the DSS when the apparently more robust RSA already
- stood as a de facto standard?
-
- Under the Computer Security Act of 1987, NIST is
- to draw upon computer systems technical security guidelines
- of NSA where appropriate and to coordinate closely
- with other agencies, including NSA, to assure:
-
- a. maximum use of all existing and planned programs,
- materials, and reports relating to computer systems
- security and privacy, in order to avoid unnecessary
- and costly duplication of effort; and
-
- b. that standards developed by NIST are consistent
- and compatible with standards and procedures developed
- for the protection of classified systems.
-
- Consistent with that law and based on a subsequent
- Memorandum of Understanding (MOU) between NSA and NIST,
- NSA's role is to be responsive to NIST's requests
- for assistance in developing, evaluating, or researching
- cryptographic algorithms and techniques. (See note
- at end). In 19??, NIST requested that NSA evaluate
- candidate algorithms proposed by NIST for a digital
- signature standard and that NSA provide new algorithms
- when existing algorithms did not meet U.S. government
- requirements. In the two-year process of developing
- a digital signature for U.S. government use, NIST
- and NSA examined various publicly-known algorithms
- and their variants, including RSA. A number of techniques
- were deemed to provide appropriate protection for
- Federal systems. The one selected by NIST as the draft
- Digital Signature Standard was determined to be the
- most suitable for reasons that were set forth in the
- Federal Register announcement. One such reason was
- to avoid issuance of a DSS that would result in users
- outside the government having to pay royalties. Even
- though the DSS is targeted for government use, eliminating
- potential barriers for commercial applications is
- useful to achieve economies of scale. Additionally,
- there are features of the DSS which make it more attractive
- for federal systems that need to have a digital signature
- capability for large numbers of users. Chief mong
- them are the number of trusted operation points and
- system management overhead that are minimized with
- the NIST proposed technique.
-
- 6. What national interests are served by limiting the
- power of cyptographic schemes used by the public?
-
- We call your attention to the House Judiciary committee
- hearing of 29 April 1992. The Director of the FBI
- expressed his concerns that law enforcement interests
- in meeting responsibilities given to them by Congress
- could be affected unless they had access to communications,
- as was given to them by statute in 1968 (court monitored,
- court sponsored, court reviewed and subject to Congressional
- oversight).
-
- The National Security Agency has no role in limiting
- the power of cryptographic schemes used by the public
- within the U.S. We have always been in favor of the
- use of information security technologies by U.S. businesses
- to protect their proprietary information, and when
- we had an information security role with private industry
- (prior to the Computer Security Act of 1987), we actively
- advocated use of such technologies.
-
- 7. What national interests are served by limiting the
- export of cryptographic technology?
-
- Cryptographic technology is deemed vital to national
- security interests. This includes economic, military,
- and foreign policy interests.
-
- We do not agree with the implications from the
- House Judiciary Committee hearing of 7 May 1992 and
- recent news articles that allege that U.S. export
- laws prevent U.S. firms' manufacture and use of top
- encryption equipment. We are unaware of any case where
- a U.S. firm has been prevented from manufacturing
- and using encryption equipment within this country
- or for use by the U.S. firm or its subsidiaries in
- locations outside the U.S. because of U.S. export restrictions.
- In fact, NSA has always supported the use of encryption
- by U.S. businesses operating domestically and overseas
- to protect sensitive information.
-
- For export to foreign countries, NSA as a component
- of the Department of Defense (along with the Department
- of State and the Department of Commerce) reviews export
- licenses for information security technologies controlled
- by the Export Administration Regulations or the international
- Traffic in Arms Regulations. Similar export control
- systems are in effect in all the Coordinating Committee
- for Multilateral Export Controls (CoCom) countries
- as well as many non-CoCom countries as these technologies
- are universally considered as sensitive. Such technologies
- are not banned from export and are reviewed on a case-by-case
- basis. As part of the export review process, licenses
- may be required for these systems and are reviewed
- to determine the effect such export could have on
- national security interests - including economic,
- military, and political security interests. Export
- licenses are approved or denied based upon the type
- of equipment involved, the proposed end-use and the
- end-user.
-
- Our analysis indicates that the U.S. leads the
- world in the manufacture and export of information
- security technologies. Of those cryptologic products
- referred to NSA by the Department of State for export
- licenses, we consistently approve over 90%. Export
- licenses for information security products under the
- jurisdiction of the Department of Commerce are processed
- and approved without referral to NSA or DoD. This includes
- products using such techniques as the DSS and RSA
- which provide authentication and access control to
- computers or networks. In fact, in the past NSA has
- played a major role in successfully advocating the
- relaxation of export controls on RSA and related technologies
- for authentication purposes. Such techniques are extremely
- valuable against the hacker problem and unauthorized
- use of resources.
-
- 8. What national interests are at
- risk, if any, if secure cryptography is widely available?
-
- Secure cryptography widely available outside the
- United States clearly has an impact on national security
- interests including economic, military, and political.
-
- Secure cryptography within the United States may
- impact law enforcement interests.
-
- 9. What does the NSA see as its legitimate interests in
- the area of cryptography? Public cryptography?
-
- Clearly one of our interests is to protect U.S.
- government and military communications and information systems
- related to national security. As part of that mission,
- we stay abreast of activities in public cryptography.
-
- 10. How did NSA enter into negotiations with the Software
- Publishers Association regarding the export of products
- utilizing cryptographic techniques? How was this group
- chosen, and to what purpose? What statute or elected
- representative authorized the NSA to engage in the
- discussions?
-
- The Software Publishers Association (SPA) went
- to the National Security Advisor to the President
- to seek help from the Administration to bring predictability,
- clarity, and speed to the process for exporting mass
- market software with encryption. The National Security
- Advisor directed NSA to work wth the mass market software
- representatives on their request.
-
- ii. What is the status of these negotiations?
-
- These negotiations are ongoing.
-
- 12. What is the status of export controls on products using
- cryptographic techniques? How would you respond to those who
- point to the fact that the expot of RSA from the U.S. is
- controlled, but that its import into the U.S. is not?
-
- To the best of our knowledge, most countries who
- manufacture cryptographic products regulate the export
- of such products from their countries by procedures
- similar to those existing within the U.S. Some even
- control the import into their countries. The U.S.
- complies with the guidelines established by CoCom
- for these products.
-
- Regarding the export of RSA from the U.S., we are
- unaware of any restrictions that have been placed
- on the export of RSA for authentication purposes.
-
- 13. What issues would you like to discuss that I have
- not addressed?
-
- None.
-
- 14. What question or questions would you
- like to pose of your critics?
-
- None.
-
- NOTE: To clarify misunderstandings regarding
- this Memorandum of Understanding (MOU); this MOU does
- not provide NSA any veto power over NIST proposals.
- As was discussed publicly in 1989, the MOU provides
- that if there is an issue that can not be resolved
- between the two agencies, then such an issue may be
- referred to the President for resolution. Enclosed
- please find a copy of subject MOU which has been made
- freely available in the past by both NSA and NIST
- to all requestors. At the House Judiciary Committee
- hearings on 7 May 1992, the Director of NIST responded
- that he had never referred an issue to the White House
- since his assumption of Directorship in 1990.
-
- MEMORANDUM OF UNDERSTANDING
-
- BETWEEN
-
- THE DIRECTOR OF THE NATIONAL INSTITUTE OF STANDARDS
- AND TECHNOLOGY
-
- AND
-
- THE DIRECTOR OF THE NATIONAL SECURITY AGENCY
-
- CONCERNING
-
- THE IMPLEMENTATION OF PUBLIC LAW 100-235 Recognizing
- that:
-
- A. Under Section 2 of the Computer Security Act
- of 1987 (Public Law 100-235), (the Act), the National
- Institute of Standards and Technology (NIST) has the
- responsibility within the Federal Government for:
-
- 1. Developing technical, management, physical,
- and administrative standards and guidelines for the
- cost-effective security ad privacy of sensitive information
- in Federal computer systems as defined in the Act;
- and,
-
- 2. Drawing on the computer system technical security
- guidelines of the National Security Agency (NSA) in
- this regard where appropriate.
-
- B. Under Section 3 of the Act, the NIST is to coordinate
- closely with other agencies and offices, including
- the NSA, to assure:
-
- 1. Maximum use of all existing and planned programs,
- materials, studies, and reports relating to computer
- systems security and privacy, in order to avoid unnecessary
- and costly duplication of effort; and, - 2. To the
- maximum extent feasible, that standards developed
- by the NIST under the Act are consistent and compatible
- with standards and procedures developed for the protection
- of classified information in Federal computer systems.
-
- C. Under the Act, the Secretary of Commerce has
- the responsibility, which he has delegated to the
- Director of NIST, for appointing the members of the
- Computer System Security and Privacy Advisory Board,
- at least one of whom shall be from the NSA. Therefore,
- in furtherance of the purposes of this MOU, the Director
- of the NIST and the Director of the NSA hereby agree
- as follows:
-
- The NIST will:
-
- 1. Appoint to the Computer Security and Privacy
- Advisory Board at least one representative nominated by
- the Director of the NSA.
-
- 2. Draw upon computer system technical security
- guidelines developed by the NSA to the extent that the NIST
- determines that such guidelines are consistent with the requirements
- tor protecting sensitive information in Federal computer
- systems.
-
- 3. Recognize the NSA-certified rating of evaluated
- trusted systems under the Trusted Computer Security Evaluation
- Criteria Program without requiring additional evaluation.
-
- 4. Develop telecommunications security standards
- for protecting sensitive unclassified computer data, drawing
- upon the expertise and products of the National Security
- Agency, to the ratest extent possible, in meeting
- these responsibilities in a timely and cost effective manner
-
- 5. Avoid duplication where possible in entering
- into mutually agreeable arrangements with the NSA for
- the NSA support.
-
- 6. Request the NSA's assistance on all matters
- related to cryptographic algorithms and cryptographic techniques
- including but not limited to research, development valuation,
- or endorsement. . - I
-
- II. The NSA will:
-
- 1. Provide the NIST with technical guidelines in
- trusted technology, telecommunications security, and personal
- -identification that may be used in cost-effective
- systems for protecting sensitive computer data.
-
- 2. Conduct or initiate research and development
- programs in trusted technology, telecommunications security,
- cryptographic techniques and personal identification methods.
-
- 3. Be responsive to the NIST's requests for assistance
- in respect to all matters related to cryptographic
- algorithms and cryptographic techniques including but not limited
- to research, development, evaluation, or endorsement.
-
- 4. Establish the standards and endorse products
- for application to secure systems covered in 10 USC
- Section 2315 (the Warner Amendment).
-
- 5 Upon request by Federal agencies5 their contractors
- and other government-sponsored entities, conduct assessments
- of the hostile intelligence threat to federal information
- systems, and provide technical assistance and recommend endorsed
- products for application to secure systems against that threat.
-
- iii. The NIST and the NSA shall:
-
- 1. Jointly review agency plans for the security and
- -privacy of computer systems submitted to NIST and NSA pursuant
- to section 6(b) of the Act.'
-
- 2. Exchange technical standards and guidelines
- as necessary to achieve the purposes of the Act.
-
- 3. Work together to achieve the purposes of this
- memorandum with the greatest efficiency possible, avoiding
- unnecessary duplication of effort.
-
- 4. Maintain an ongoing, open dialogue to ensure
- that each organization remains abreast of emerging technologies
- and issues effecting automated information system security
- in computer-based systems.
-
- 5. Establish a Technical Working Group to review
- and analyze issues of mutual interes pertinent to protection
- of systems that process sensitive or other unclassified-information.
- The Group shall be composed of six federal employees, three
- each selected by NIST and NSA and to be augmented as necessary by
- representatives of other agencies. Issues may be referred to the
- group by either the NSA Deputy Director for Information Security
- or the NIST Deputy Director or may be generated -and addressed
- by the group upon approval by the NSA DDI or NIST Deputy Director.
- Within days of the referral of an issue to the Group by
- either the NSA Deputy Director for Information Security or the
- NIST Deputy .Director, the Group will respond with
- a progress report and pan for further analysis, if any.
-
- 6. Exchange work plans on an annual basis on all
- research and development projects pertinent to protection
- of systems that process sensitive or other unclassified information,
- including trusted technology, technology for protecting the
- integrity and availability of data, telecommunications security
- and personal identification methods. Project updates will be
- exchanged quarterly, and project reviews will be provided
- by either party upon request of he other party.
-
- 7. Ensure the Technical Working Group reviews prior
- to public disclosure all matters regarding technical_systems
- security techniques to be developed for use in protecting
- sensitive information in federal computer systems to ensure
- they are consistant with the national security of the
- United States. If NIST and NSA are unable to resolve
- such an issue within 60 days, either _ agency may elect
- to raise the issue to the Secretary of Defense and
- the Secretary of Commerce. It is recognized that such
- an issue may be referred to the President through
- the NSC for resolution. No action shall be taken on
- such an issue until it is resolved.
-
- 8. Specify additional operational agreements in
- annexes to this MOU as they. are agreed to by NSA
- and NIST.
-
- IV. Either party may elect to terminate this MOU
- upon six months written notice. This MO& is effective
- upon approval of both signatories.
-
- RAYMOND G. KAMMER W. 0. STUDEMAN
-
- Acting Director Vice Admiral, U.S. Navy National
- Institut of Director Standards and Technology National
- Security Agency
-
- ------------------------------
-
- From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
- Date: Tue, 30 Jun 1992 17:29:04 EDT
- Subject: File 2--CPSR Challenges Virginia SS
-
- June 30, 1992
-
- CPSR Challenges Virginia SSN Practice
- PRESS RELEASE
-
- WASHINGTON, DC -- A national public interest organization has filed a
- "friend of the court" brief in the federal court of appeals, calling
- into question the Commonwealth of Virginia's practice of requiring
- citizens to provide their Social Security numbers in order to vote.
- Computer Professionals for Social Responsibility (CPSR) alleges that
- Virginia is violating constitutional rights and creating an
- unnecessary privacy risk.
-
- The case arose when a Virginia resident refused to provide his Social
- Security number (SSN) to a county registrar and was denied the right
- to register to vote. Virginia is one of a handful of states that
- require voters to provide an SSN as a condition of registration.
- While most states that require the number impose some restrictions on
- its public dissemination, Virginia allows unrestricted public
- inspection of voter registration data -- including the SSN. Marc A.
- Greidinger, the plaintiff in the federal lawsuit, believes that the
- state's registration requirements violate his privacy and impose an
- unconstitutional burden on his exercise of the right to vote.
-
- The CPSR brief, filed in the Fourth Circuit Court of Appeals in
- Richmond, supports the claims made by Mr. Greidinger. CPSR notes the
- long-standing concern of the computing community to design safe
- information systems, and the particular effort of Congress to control
- the misuse of the SSN. The organization cites federal statistics
- showing that the widespread use of SSNs has led to a proliferation of
- fraud by criminals using the numbers to gain driver's licenses, credit
- and federal benefits. The CPSR brief further describes current
- efforts in other countries to control the misuse of national
- identifiers, like the Social Security number.
-
- Marc Rotenberg, the Director of the CPSR Washington Office said that
- "This is a privacy issue of constitutional dimension. The SSN
- requirement is not unlike the poll taxes that were struck down as
- unconstitutional in the 1960s. Instead of demanding the payment of
- money, Virginia is requiring citizens to relinquish their privacy
- rights before being allowed in the voting booth."
-
- CPSR argues in its brief that the privacy risk created by Virginia's
- collection and disclosure of Social Security numbers is unnecessary.
- The largest states in the nation, such as California, New York and
- Texas, do not require SSNs for voter registration. CPSR points out
- that California, with 14 million registered voters, does not need to
- use the SSN to administer its registration system, while Virginia,
- with less than 3 million voters, insists on its need to demand the
- number.
-
- David Sobel, CPSR Legal Counsel, said "Federal courts have generally
- recognized that there is a substantial privacy interest involved when
- Social Security numbers are disclosed. We are optimistic that the
- court of appeals will require the state to develop a safer method of
- maintaining voting records."
-
- CPSR has led a national campaign to control the misuse of the Social
- Security Number. Earlier this year the organization testified at a
- hearing in Congress on the use of the SSN as a National Identifier.
- CPSR urged lawmakers to respect the restriction on the SSN and to
- restrict its use in the private sector. The group also participated
- in a federal court challenge to the Internal Revenue Service's
- practice of displaying taxpayers' SSNs on mailing labels. CPSR is
- also undertaking a campaign to advise individuals not to disclose
- their Social Security numbers unless provided with the legal reason
- for the request.
-
- CPSR is a national membership organization, with 2,500 members, based
- in Palo Alto, CA. For membership information contact CPSR, P.O. Box
- 717, Palo Alto, CA 94303, (415) 322-3778, cpsr@csli. stanford.edu.
-
-
- For more information contact:
-
- Marc Rotenberg, Director
- David Sobel, Legal Counsel
- CPSR Washington Office
- (202) 544-9240
- rotenberg@washofc.cpsr.org
- sobel@washofc.cpsr.org
-
- Paul Wolfson, attorney for Marc A. Greidinger
- Public Citizen Litigation Group
- (202) 833-3000
-
- ------------------------------
-
- Date: Tue, 14 Jul 1992 21:05:54 -0400
- From: Christopher Davis <ckd@EFF.ORG>
- Subject: File 3--EFF hires Cliff Figallo as director of Cambridge office
-
- +=========+=================================================+===========+
- | F.Y.I. |Newsnote from the Electronic Frontier Foundation|July 14,1992|
- +=========+=================================================+===========+
-
- CLIFF FIGALLO OF THE WELL NAMED DIRECTOR OF EFF's CAMBRIDGE OFFICE
-
- Cambridge, Massachusetts July 14,1992
-
- Cliff Figallo, former director of the Whole Earth 'Lectronic Link (The
- WELL), has accepted the position of Director of the Electronic Frontier
- Foundation's Cambridge office. His duties will include developing that
- office's outreach programs, increasing active EFF membership, and
- expanding overall awareness of EFF's programs in the computer-
- conferencing community and the world at large.
-
- In announcing the appointment today, Mitchell Kapor, President of EFF,
- said: "I'm delighted that Cliff Figallo will be joining the EFF to head
- its Cambridge office. Cliff brings 20 years of experience in forming
- both intentional and virtual communities. We know he will put these
- skills to excellent use in helping EFF build its ties to the online
- community.We're all looking forward to working with him closely."
-
- Figallo is well-known in computer conferencing circles as the one who
- from 1986 to the present guided the WELL through its formative years.
- Working with a small staff, many volunteers and limited funding, he
- helped develop the WELL into one of the world's most influential
- computer conferencing systems. When EFF was founded it used the WELL as
- its primary means of online communication.
-
- Commenting on the appointment of Figallo, Stewart Brand, creator of The
- Whole Earth Catalogue, one of the founders of The WELL and a member of
- the EFF Board of Directors, said: "As an exemplary manager of EFF's
- initial habitat, the WELL, Cliff brings great contextual experience to
- his new job. Best of all for us on the WELL, he won't even be leaving,
- electronically speaking. Cambridge is only several keystrokes from
- Sausalito."
-
- Contacted at his home in Mill Valley today, Figallo stated: "I'm very
- thankful for the opportunity to take part one of the critical missions
- of our time -- the opening of new channels of person-to-person
- communication in the world, and the protection of existing channels from
- naive or excessive regulation and restriction.
-
- "Pioneers in electronic or telecommunications media are establishing new
- definitions and structures for education, community, and co-operation
- every day. They are developing tools and systems which may prove to be
- vital to the salvation of the planet. This work must go on.
-
- "I look forward to helping EFF communicate the importance of events on
- the Electronic Frontier to current and future settlers, and to those who
- would, through unwise use of power, stifle the continued exploration and
- settling of this new realm of the mind and the human spirit."
-
- Figallo will assume his duties in September of this year.
-
- For more information contact:
- Gerard Van der Leun
- Electronic Frontier Foundation
- 155 Second Street
- Cambridge, MA 02141
- Phone: +1 617 864 0665
- FAX: +1 617 864 0866
- Internet: van@eff.org
-
- +=====+===================================================+=============+
- | EFF |155 Second Street, Cambridge MA 02141 (617)864-0665| eff@eff.org |
- +=====+===================================================+=============+
-
- ------------------------------
-
- Date: 18 Jul 92 18:29:39 CDT
- From: mcmullen@well.sf.ca.us
- Subject: File 4--New York Hackers Plead Not Guilty (NEWSBYTES REPRINT)
-
- NEW YORK, N.Y., U.S.A., 1992 JULY 17 (NB) --At an arraignment in New
- York Federal Court on Thursday, July 16th, the five New York
- "hackers", recently indicted on charges relating to alleged computer
- intrusion, all entered pleas of not guilty and were released after
- each signed a personal recognizance (PRB) bond of $15,000 to guarantee
- continued appearances in court.
-
- The accused, Mark Abene also known as"Phiber Optik"; Julio Fernandez
- a/k/a "Outlaw"; Elias Ladopoulos a/k/a "Acid Phreak"; John Lee a/k/a
- "Corrupt"; and Paul Stira a/k/a "Scorpion", were indicted on July 8th
- on 11 counts alleging various computer and communications related
- crimes --although all five were indicted together, each in not named
- in all eleven counts and the maximum penalties possible under the
- charges vary from 5 years imprisonment and a $250,000 fine (Stira) to
- 40 years imprisonment and a $2 million fine (Lee).
-
- As part of the arraignment process, United States District Judge
- Richard Owen was assigned as the case's presiding judge and a
- pre-trial meeting between the judge and the parties involved.
-
- Charles Ross, attorney for John Lee, told Newsbytes "John Lee entered
- a not guilty plea and we intend to energetically and aggressively
- defend against the charges made against him."
-
- Ross also explained the procedures that will be in effect in the case,
- saying "We will meet with the judge and he will set a schedule for
- discovery and the filing of motions. The defense will have to review
- the evidence that the government has amassed before it can file
- intelligent motions and the first meeting is simply a scheduling one."
-
- Marjorie Peerce, attorney for Stira, told Newsbytes "Mr. Stira has
- pleaded not guilty and will continue to plead not guilty. I am sorry
- to see the government indict a 22 year old college student for acts
- that he allegedly committed as a 19 year old."
-
- The terms of the PRB signed by the accused require them to remain
- within the continental United States. In requesting the bond
- arrangement, Assistant United States Attorney Stephen Fishbein
- referred to the allegations as serious and requested the $15,000 bond
- with the stipulation that the accused have their bonds co-signed by
- parents. Abene, Fernandez and Lee, through their attorneys, agreed to
- the bond as stipulated while the attorneys for Ladopoulos and Stira
- requested no bail or bond for their clients, citing the fact that
- their clients have been available, when requested by authorities, for
- over a year. After consideration by the judge, the same $15,000 bond
- was set for Ladopoulos and Stira but no co-signature was required.
-
- (Barbara E. McMullen & John F. McMullen//19920717)
-
- ------------------------------
-
- Date: 21 Jul 92 19:21:06 EDT
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 5--Time Magazine Computer Analyst Arrested for Alleged Faud
-
- ((A little news tidbit to take in consideration next time we hear, a la
- operation SunDevil, of all the 'hackers' that are active in CC fraud)).
-
- Time Magazine Computer Analyst Arrested for Alleged Faud
-
- A computer analyst, Thomas Ferguson, 44, who worked at Time magazine's
- Tampa, Fla., customer service headquarters has been arrested after
- allegations he sold thousands of subscribers' credit card numbers for
- $1 apiece. Ferguson has been with the magazine for 18 months, faces
- four counts of trafficking in credit cards, authorities said.
-
- Police found computer disks containing the credit card numbers of
- about 80,000 subscribers at Ferguson's Clearwater, Fla., home.
- Authorities said they met Ferguson four times to buy about 3,000
- credit card numbers since being tipped off to the scheme in June.
-
- Time executives say that all credit card customers should examine
- their credit card bills closely. If unauthorized purchases show up,
- they should call the financial institution that issued the card.
- (Reprinted from STReport 8.29 with permission.)
-
- ------------------------------
-
- End of Computer Underground Digest #4.32
- ************************************
-