home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Dec 13, 1992 Volume 4 : Issue 65
- ISSN 1066-652X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Copy Editor: Etaion Shrdlu, Junior
-
- CONTENTS, #4.65 (Dec 13, 1992)
- File 1--DOJ Authorizes Keystroke Monitoring
- File 2--Teen "Computer Whiz" Strikes Store
- File 3--Enviro. Tech. Policy
- File 4--DELPHI Announces Full Access to the Internet
- File 5--Virus Destroyed Report on Drug Lord
- File 6--COM DAILY ON F.C.C. TRANSITION
- File 7--Virus Conference (ACMBUL) Call for Papers
- File 8--GRAY AREAS -- 'Zine Review
- File 9--Bibliography on codes and ciphers
- File 10--Comments on the Nov. 2600 Disruption in D.C.
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
- libraries; from America Online in the PC Telecom forum under
- "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
- Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
- anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
- /pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
- (192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
- in /pub/text/CuD.
- European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
- Back issues also may be obtained from the mail
- server at mailserv@batpad.lgb.ca.us.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Mon, 7 Dec 1992 22:48:06 +0000
- From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
- Subject: File 1--DOJ Authorizes Keystroke Monitoring
-
- CA-92:19 CERT Advisory
- December 7, 1992
- Keystroke Logging Banner
-
- The CERT Coordination Center has received information from the United
- States Department of Justice, General Litigation and Legal Advice
- Section, Criminal Division, regarding keystroke monitoring by
- computer systems administrators, as a method of protecting computer
- systems from unauthorized access.
-
- The information that follows is based on the Justice Department's
- advice to all federal agencies. CERT strongly suggests adding a
- notice banner such as the one included below to all systems. Sites
- not covered by U.S. law should consult their legal counsel.
-
- +++++++++++++++++++
-
- The legality of such monitoring is governed by 18 U.S.C. section
- 2510 et seq. That statute was last amended in 1986, years before
- the words "virus" and "worm" became part of our everyday
- vocabulary. Therefore, not surprisingly, the statute does not
- directly address the propriety of keystroke monitoring by system
- administrators.
-
- Attorneys for the Department have engaged in a review of the
- statute and its legislative history. We believe that such
- keystroke monitoring of intruders may be defensible under the
- statute. However, the statute does not expressly authorize such
- monitoring. Moreover, no court has yet had an opportunity to
- rule on this issue. If the courts were to decide that such
- monitoring is improper, it would potentially give rise to both
- criminal and civil liability for system administrators.
- Therefore, absent clear guidance from the courts, we believe it
- is advisable for system administrators who will be engaged in
- such monitoring to give notice to those who would be subject to
- monitoring that, by using the system, they are expressly
- consenting to such monitoring. Since it is important that
- unauthorized intruders be given notice, some form of banner
- notice at the time of signing on to the system is required.
- Simply providing written notice in advance to only authorized
- users will not be sufficient to place outside hackers on notice.
-
- An agency's banner should give clear and unequivocal notice to
- intruders that by signing onto the system they are expressly
- consenting to such monitoring. The banner should also indicate
- to authorized users that they may be monitored during the effort
- to monitor the intruder (e.g., if a hacker is downloading a
- user's file, keystroke monitoring will intercept both the
- hacker's download command and the authorized user's file). We
- also understand that system administrators may in some cases
- monitor authorized users in the course of routine system
- maintenance. If this is the case, the banner should indicate
- this fact. An example of an appropriate banner might be as
- follows:
-
- This system is for the use of authorized users only.
- Individuals using this computer system without authority,
- or in excess of their authority, are subject to having
- all of their activities on this system monitored and
- recorded by system personnel.
-
- In the course of monitoring individuals improperly using
- this system, or in the course of system maintenance, the
- activities of authorized users may also be monitored.
-
- Anyone using this system expressly consents to such
- monitoring and is advised that if such monitoring reveals
- possible evidence of criminal activity, system personnel
- may provide the evidence of such monitoring to law
- enforcement officials.
-
- ++++++++++++++++++++
- Each site using this suggested banner should tailor it to their
- precise needs. Any questions should be directed to your
- organization's legal counsel.
-
- ++++++++++++++++++++
- The CERT Coordination Center wishes to thank Robert S. Mueller, III,
- Scott Charney and Marty Stansell-Gamm from the United States
- Department of Justice for their help in preparing this Advisory.
-
- If you believe that your system has been compromised, contact the
- CERT Coordination Center or your representative in FIRST (Forum of
- Incident Response and Security Teams).
-
- Internet E-mail: cert@cert.org
- Telephone: 412-268-7090 (24-hour hotline)
- CERT personnel answer 7:30 a.m.-6:00 p.m. EST(GMT-5)/EDT(GMT-4),
- on call for emergencies during other hours.
-
- CERT Coordination Center
- Software Engineering Institute
- Carnegie Mellon University
- Pittsburgh, PA 15213-3890
-
- ------------------------------
-
- Date: Thu, 26 Nov 92 10:57:18 CST
- From: ICEMAN@CCU.UMANITOBA.CA
- Subject: File 2--Teen "Computer Whiz" Strikes Store
-
- From--Winnipeg Free Press (Winnipeg,Manitoba,Canada) on Nov 26,1992:
-
- STAFF THREATENED, FILES RUINED AS TEEN COMPUTER WHIZ STRIKES
-
- By George Nikides
- Staff Reporter
-
- A teen hacker uncovered a hole in a downtown software shop's
- computer system and went on a rampage, destroying every file and
- threatening employees.
-
- "It's an ego thing. 'Boy look what i've accomplished,' " said
- Sgt. Dennis Loupin of the Winnipeg police fraud unit. "He's very,
- very intelligent. He's got a tremendous future in the computer world."
-
- An 18 year-old, who can't be named because he's charged under the
- Young Offender's Act, faces fraud charges.
-
- Police say a hacker discovered a "hole" - an opening that allows
- a user to circumvent a computer system's passwords - in the bulletin
- board program at Adventure Software Ltd., a Hargrave Street software
- shop.
-
- The computer whiz unlocked the program several times, at one
- point destroying every file.
-
- Bulletin Board
-
- The hacking is believed to have been carried out with an
- IBM-style computer from a home.
-
- Adventure Software offers a computer bulletin board where
- customers can communicate, read about news products, or leave messages
- from their home systems. The system has about 400 users, police say.
-
- An Adventure Software employee, who asked not to be identified,
- said threatening messages were left in the system, some suggesting
- that selling software was immoral. Some messages attacked a store
- employee. The system was out of operation at one point for 3 1/2
- weeks, he said.
-
- But the employee said police are overstating the hacker's skills.
- "It doesn't take a genius to hear about a 'hole' in the program," said
- the man.
-
- The system was infiltrated four to six times, he said.
-
- "It's not crippling. It's just extremely annoying, " the employee
- said. By breaking into the system the computer bandit found home
- phone numbers and addresses, he said.
-
- Police say they are also investigating the teen in connection
- with break-ins at other systems across North America.
-
- Mischief
-
- "He's now going to have to face the consequences of something he
- thought was just a challenge but it's more than that - it's a crime, "
- said Loupin.
-
- A Victor Street teenager was arrested Tuesday night and charged
- with using a computer service to commit mischief, an offence that
- carries a maximum 10-year sentence.
-
- The teen is now 18, but police say he was 17 when the alleged
- crimes occured.
-
- ------------------------------
-
- Date: Fri, 4 Dec 1992 14:33:31 EDT
- From: Rick Crawford <crawford@CS.UCDAVIS.EDU>
- Subject: File 3--Enviro. Tech. Policy
-
- Saw this on the net and found much of it relevant to various
- efforts to develop an explicit national technology policy
- (vs. a default, pork-barrel-driven policy vacuum).
-
- -rick
- ++++++++++
-
- From--tgray@igc.apc.org (Tom Gray)
- Newsgroups--sci.environment
- Subject----Renewables Critical, Says WRI
- Date--2 Nov 92 15:49:00 GMT
-
- RENEWABLE ENERGY 'ENVIRONMENTALLY CRITICAL', SAYS NEW WRI REPORT
-
- Renewable energy technologies are part of a list of "environmentally
- critical" technologies that the federal government should support,
- according to a new report from the World Resources Institute, a
- Washington, DC, policy organization.
-
- The report, entitled Backs to the Future: U.S. Government Policy
- Toward Environmentally Critical Technology, was authored by George
- Heatton and Robert Repetto, and is billed by the Institute as "the
- first attempt in this country to define and identify areas of
- technological advance that would markedly reduce the environmental
- burdens of economic progress."
-
- The authors focus on government policy because it strongly influences
- the development of new technologies, "from research dollars and
- procurement decisions to infrastructure design and standard-setting,"
- an Institute news release added.
-
- "Among the most promising environmental R&D areas," it said, " . . .
- are methods of non-fossil fuel energy production and use ... and
- hydrogen and other storage methods. Many such technologies, now in
- early stages of development, would yield large social returns from
- technical advances ... "
-
- Backs to the Future's recommendations, the release said, include the
- creating of a national research and development (R&D) institute,
- altering the missions of the national laboratories, and changing
- criteria for funding environmental R&D.
-
- Copies of Backs to the Future can be obtained for $9.95 plus $3
- shipping and handling from WRI Publications, PO Box 4852, Hampden
- Station, Baltimore, MD 21211, USA, phone (800) 822-0504.
-
- ------------------------------
-
- Date: 09 Dec 1992 00:13:55 -0500 (EST)
- From: "WALT HOWE, DELPHI INTERNET SIG MANAGER" <WALTHOWE@DELPHI.COM>
- Subject: File 4--DELPHI Announces Full Access to the Internet
-
- FOR IMMEDIATE RELEASE:
-
- DELPHI Online Service Announces Full Access to the Internet
-
- Cambridge MA, December 9, 1992 -- DELPHI, an international online
- service, today announced full access to the Internet including
- real-time electronic mail, file transfers with "FTP," and remote
- log-ins to other Internet hosts using "Telnet." With this
- announcement, DELPHI becomes the only leading consumer online service
- to offer such a wide variety of Internet features.
-
- Russell Williams, DELPHI's general manager, explains the significance
- of this announcement. "Prior to now, anyone interested in accessing
- the Internet had a very limited number of options. In most cases you
- had to be connected directly through your company or school. DELPHI
- is now an important low-cost access option available to home computer
- users. Anyone can connect to DELPHI with a local call from over 600
- cities and towns throughout the US and in many other countries."
-
- The Internet is considered the world's largest computer network. It
- is comprised of thousands of companies, colleges, schools, government
- agencies, and other organizations. There are currently an estimated 4
- million users. "This incredible collection of resources will mean
- better and more specialized services for all users" adds Mr. Williams.
- "For example, users can take electronic courses conducted by leading
- universities, access databases and reports from government agencies,
- and get product information and support directly from companies. There
- are also mailing lists and discussion groups for almost every special
- interest imaginable. Electronic mail can be used to send private
- messages to anyone on the Internet and even many commercial networks
- like Compuserve and MCI Mail."
-
- DELPHI's connection to the Internet works both ways: In addition to
- offering access out to other networks, DELPHI provides value-added
- services to people already on the Internet. Any user of the Internet
- can access DELPHI to use services such as Grolier's Academic American
- Encyclopedia, the Dictionary of Cultural Literacy, Reuters and UPI
- newswires, stock quotes, computer support, travel reservations,
- special interest groups, real-time conferencing, downloadable
- programs, and multi-player games. All these services can be reached
- through the Internet simply by joining DELPHI and then telnetting to
- the address "delphi.com" via the commercial Internet.
-
- In order to help new users with questions related to the Internet,
- DELPHI has an area online to provide support. The Internet Special
- Interest Group (SIG) includes an active message forum where members
- and staff can exchange useful information. Comprehensive guide books,
- downloadable software, and information files are also available.
-
- DELPHI has two membership plans: the 10/4 Plan is $10 per month and
- includes the first 4 hours of use; additional use is $4 per hour. The
- 20/20 Advantage Plan is $20 per month, includes 20 hours of use, and
- is only $1.80 per hour for additional time. The Internet service
- option is an extra $3 per month and includes a generous transfer
- allocation of 10 megabytes (the equivalent of about 3,000 type-written
- pages). Access during business hours via Sprintnet or Tymnet carries
- a surcharge.
-
- Through a special trial membership offer, anyone interested in
- learning more about DELPHI and the Internet can receive 5 hours of
- access for free. To join, dial by modem, 1-800-365-4636 (current
- Internet users should telnet to "delphi.com" instead). After
- connecting, press return once or twice. At the Username prompt, enter
- JOINDELPHI and at the password prompt, type INTERNETSIG. DELPHI Member
- Service Representatives can also be reached by voice at
- 1-800-695-4005.
-
- DELPHI is a service of General Videotex Corporation, a leading
- developer of interactive and online services based in Cambridge,
- Massachusetts. For more information, call either of the above numbers
- or send email to Walt Howe, Internet SIG manager at
- walthowe@delphi.com.
-
- ------------------------------
-
- Date: 05 Dec 92 15:51:46 EST
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 5--Virus Destroyed Report on Drug Lord
-
- Virus Destroyed Report on Drug Lord Say Colombian Officials
-
- Colombian politicians allege a mysterious computer virus this week
- wiped out conclusions of a Senate investigation into the jailbreak of
- cocaine king Pablo Escobar just hours before the data was due to be
- presented.
-
- Reports from various committee members call the virus the "ghost of
- La Catedral," a reference to the prison from which Escobar and nine
- of his lieutenants escaped on July 22 during a bungled military
- operation to transfer them to another prison.
-
- "The committee's conclusions, reached after more than two months of
- investigation, supposedly held top military officials, ministers and
- former ministers responsible for the escape." REPRINTED FROM STREPORT
- #8.46 WITH PERMISSION
-
- ------------------------------
-
- Date: Tue, 8 Dec 1992 12:27:28 CST
- From: LOVE%TEMPLEVM@PSUVM.PSU.EDU
- Subject: File 6--COM DAILY ON F.C.C. TRANSITION
-
- >From Discussion of Government Document Issues <GOVDOC-L@PSUVM.BITNET>
-
- * Communications Daily article on Clinton transition
- appointment for Federal Communications Commission
- (F.C.C.)
-
- The following article, written by Art Brodsky (202/872-9202, x252), is
- reprinted from the December 7, 1992 issue of Communications Daily,
- with permission. Communications Daily is published by Warren
- Publishing, Inc., 2115 Ward Court, N.W. Washington, DC 20037.
-
- `Far End of Spectrum'
-
- PLESSER TRANSITION APPOINTMENT DRAWS FIRE
-
- Public interest groups friday criticized naming of Washington
- attorney Ronald Plesser to head up communications issues for Clinton
- transition effort (CD Dec4, p1). Groups said Plesser, partner in
- Washington office of Baltimore law firm Piper & Marbury, represents
- clients that characterize Washington special interests. As might be
- expected, Plesser's appointment was defended by Clinton confidants.
-
- Plesser will head one of 2 groups in science and technology
- transition section led by ex-astronaut Sally Ride. Other group in
- Ride's section will evaluate hard science agencies such as NASA and
- National Science Foundation. Those transition groups were established
- to assess policies and agencies, not to make appointment
- recommendations. Personnel matters for permanent jobs are to be
- handled by ex-S.C. Gov. Richard Riley (CD Nov 20 p1).
-
- Clinton confidants praised Plesser's designation. "He's the
- right guy," we were told. "He'll take a snapshot of the agency,"
- covering budget needs, personnel and similar matters. Transition team
- "will look to Ron for insights. He's the guy." Referring to much
- speculation in press about what Clinton has in mind and who his
- appointments might be, source said: "I wonder what on earth motivates
- some of this stuff...most of which is wildly inaccurate."
-
- Most criticism of Plesser centers on his advocacy on behalf of
- Direct Marketing Assn. (DMA) and Information Industry Assn. (IIA),
- particularly for advocating private sector control of databases
- constructed by public agencies. Taxpayer Assets Project Dir. James
- Love said Plesser "himself is the architect of the basic privatization
- policies that came about in the Reagan Administration." Plesser, he
- said, is "most ferocious opponent of librarians, citizen groups and
- the research community, who want to broaden public access to
- government, taxpayer-supported information systems. He's the devil
- himself when it comes to government information policy."
-
- Similarly, Marc Rotenberg, dir. of Washington office of Computer
- Professionals for Social Responsibility (CPSR), said that "while there
- is personal regard for Ron Plesser, there is not happiness about this
- decision." Rotenberg said that Plesser's clients have great deal at
- stake at FCC, including decisions on 800 number portability and
- automatic number identification (ANI) that affect direct marketers, as
- well as on video dial tone and access to networks. Plesser represents
- "a far end of the spectrum in the policy debates," Rotenberg said. He
- said CPSR's main concerns are in areas of privacy protection, public
- access to govt. information, communications infrastructure. In each
- of those areas, "Ron has been from our viewpoint on the opposite side
- of the issue."
-
- Rotenberg said that if transition effort is merely to be brief
- fact-finding exercise, Clinton team could have sought out "someone
- with less bias," perhaps in academic community. Jeff Chester, co-dir.
- of Center for Media Education, said his group is "very concerned"
- about Plesser because "of the special interest lobbying baggage he
- carries with him." Chester said his group believes that Plesser's
- appointment "places an extra burden, a double duty on the Clinton
- Administration, to find people for the FCC and other
- telecommunications policy positions who don't come with any kind of
- lobbying baggage and reflect the kind of public interest concerns the
- Commission definitely needs."
-
- Transition team still having difficulty deciding how to apply its
- proposed tough ethics requirements for Presidential appointees (CD Nov
- 5 p1). There's still been no decision as "to how deep the 5-year
- restriction will be applied," we're told. That means, according to
- sources, restrictions--when they finally come out--may not go below
- Cabinet level. As for FCC appointees and top staffers (such as bureau
- chiefs) brought in, it hasn't been decided whether attempt will be
- made to extend period they couldn't practice or lobby agency to 5
- years from one year. Proposal has been roundly criticized by
- Democrats who are know to be, or expect to be, in line for top jobs in
- Clinton Administration.
-
- ------------------------------
-
- Date: Thu, 10 Dec 92 17:28:07 EST
- From: sara@GATOR.USE.COM(Sara Gordon)
- Subject: File 7--Virus Conference (ACMBUL) Call for Papers
-
- C A L L F O R P A P E R S
-
- ACMBUL's 1st INTERNATIONAL COMPUTER VIRUS PROBLEMS AND
- ALTERNATIVES CONFERENCE
-
- April, 1993 - Varna, Bulgaria
-
- The purpose of the 1993 International Computer Virus Conference is to
- provide a forum for anti-virus product developers, researchers and
- academicians to exchange information among themselves, the students,
- the public and the industry. ICVC'93 will consist of open forums,
- distinguished keynote speakers, and the presentation of high-quality
- accepted papers. A high degree of interaction and discussion among
- Conference participants is expected, as a workshop-like setting is
- promoted.
-
- Because ICVC'93 is a not-for-profit activity funded primarily by
- registration fees, all participants are expected to have their
- organizations bear the costs of their expenses and registration.
- Accommodations will be available at reduced rates for conference
- participants.
-
- WHO SHOULD ATTEND
-
- The conference is intended for computer security researchers,
- managers, advisors, EDP auditors, network administrators, and help
- desk personnel from government and industry, as well as other
- information technology professionals interested in computer security.
-
- CONFERENCE THEME
-
- This Conference, devoted to advances in virus prevention, will
- encompass developments in both theory and practice. Papers are
- invited in the areas shown and may be theoretical, conceptual,
- tutorial or descriptive in nature. Submitted papers will be refereed,
- and those presented at the Conference will be included in the
- proceedings.
-
- Possible topics of submissions include, but are not restricted to:
-
- o Virus Detection o Virus Trends and Forecast
- o Virus Removal o Virus Prevention Policies
- o Recovering from Viruses o Incident Reporting
- o Viruses on various platforms o Emergency Response
- (Windows, Unix, LANs, WANs, etc.) o Viruses and the Law
- o Virus Genealogy o Education & Training
- o The "Virusology" as scientific o Costs of virus protection
- discipline o Communications and viruses
- o Psychological aspects of computer
- viruses
-
- THE REFEREEING PROCESS
-
- All papers and panel proposals received by the submission deadline and
- which meet submission requirements will be considered for presentation
- at the Conference.
-
- All papers presented at ICVC'93 will be included in the Conference
- proceedings, copies of which will be provided to Conference attendees.
- All papers presented, will also be included in proceedings to be published
- by the ACMBUL.
-
- INSTRUCTIONS TO AUTHORS
-
- [1] Two (2) copies of the full paper, consisting of up-to 20
- double-spaced, typewritten quality pages, including diagrams, must
- be received no later than 28 February 1993.
-
- [2] The language of the Conference is English.
-
- [3] The first page of the manuscript should include the title of
- the paper, full name of all authors, their complete addresses
- including affiliation, telephone numbers and e-mail addresses,
- as well as an abstract of the paper.
-
- [4] Authors willing to submit their manuscripts electronically
- should contact the Organizering Committee at the address below.
-
- IMPORTANT DATES
-
- o Full papers to be received in camera-ready form by the Organizing
- Committee by 28 February 1993.
-
- o Notification of accepted papers will be mailed to the author on
- or before 10 March 1993.
-
- o Conference: 5-11 April 1993, St. Konstantine Resort, Varna, Bulgaria
-
- WHOM TO CONTACT
-
- Questions or matters related to the Conference Program should be directed
- to the ACMBUL:
-
- ICVC'93
- Attn: Mr. Nickolay Lyutov
- ACMBUL Office
- Varna University of Economics
- 77 Boris I Blvd, 9002 P.O.Box 3
- Varna
- Bulgaria
-
- Telephone/Fax: +359-52-236213
-
- ICVC93@acmbul.bg
-
- +++++
- # "talk to me about computer viruses............"
- # fax/voice: 219-277-8599 sara@gator.use.com
- # data 219-273-2431 SGordon@Dockmaster.ncsc.mil
- # fidomail 1:227/190 vfr@netcom.com
-
- ------------------------------
-
- Date: Sun, 13 Dec 92 20:38:01 EST
- From: Moderators <Cudigest@mindvox.phantom.com>
- Subject: File 8--GRAY AREAS -- 'Zine Review
-
- We've come across another new periodical, GRAY AREAS, that promises to
- be a useful resource for anybody interested in counter-culture or
- alternative lifestyles. As the name implies, GRAY AREAS intends to
- focus on a broad range of topics that normally fall between the cracks
- of conventional magazines, especially in the realm of technology,
- music, video, art, and other snippets of (unconventional) culture.
- According to the editorial statement of purpose:
-
- GRAY AREAS exists to examine the gray areas of life. We hope
- to unite people involved in all sorts of alternative
- lifestyles and deviant subcultures. We are everywhere! We
- feel that the government has done a great job of splitting
- people up so that we do not identify with other minority
- groups anymore. There are so many causes now that we often
- do not talk to others not directly involved in our chosen
- causes. We believe that the methods used to catch criminals
- are the same regardless of the crime and that much can be
- learned by studying how crimes in general are prosecuted and
- how people's morals are judged. It is our mission to educate
- people so they begin to care more about the world around
- them. Please join our efforts by subscribing, advertising
- your business with us and by spreading the word about what
- we're up to.
-
- The first issue (Fall, 1992) includes snippets of news, reviews of
- books, alternative magazines, music, and videos, and other nifty
- esoteria. Two feature-interviews captivated us. The first, with John
- Barlow (by editor and publisher Netta Gilboa), is incisive and ranges
- from The Grateful Dead to the EFF. The second, also by Gilboa, is
- with former "X-rated" movie queen Kay Parker. The latter is a
- sensitive look at the changes she has gone through in the past 20
- years. The tenor of both interviews, as with much of the magazine
- itself, is about personal and social transformation as we, and
- society, move through a succession of phases as we age and change.
-
- Upcoming features include an article on Howard Stern (New York
- "shock-DJ"), audio sampling, law enforcement search & seizure,
- interviews with John Trubee about prank phone calls, Jefferson
- Airplane/Hot Tuna guitarist Jorma Kaukonen, porn director Candida
- Royalle, criminal attorney and professional musician Barry Melton (an
- original member of Country Joe & The Fish), and an interview with Bob
- Dobbs. Some of the items reviewed in issue 2 will include a tape sold
- to police departments on how to seize computers, and Bruce Sterling's
- _Speaking_ _For_ _The_ _Unspeakable_, Mystic Fire's _Cyberpunk_.
-
- The editors also plan to include an on-going series on viruses
- and offer anonymity to virus writers and software crackers willing to
- discuss their views of the issues.
-
- The type of topics--rock music, films, off-beat cultural
- interests--are the type that easily encourage fluff pieces and
- superficial treatment. But, if the first issue of GRAY AREAS is
- representative of what's to follow, there will be no fluff here. The
- 'Zine seems targeted to BBWBs (baby-boomers with brains) and appears
- intended to reflect changing times with commentary and analysis by
- those making the changes.
-
- A one-year (four issue) subscription is available for $18 (US) or $24
- (foreign), and a twelve-issue sub is $50 (US) or $75 (foreign). The
- editors, Netta Gilboa and Alan Sheckter, can be contacted through
- e-mail at GRAYAREA@WELL.SF.CA.US
-
- For subscriptions, submissions, or other information, write:
- GRAY AREAS
- PO Box 808
- Broomall, PA 19008-0808
-
- ------------------------------
-
- Date: Sun, 6 Dec 92 07:47 EST
- From: "Michael E. Marotta" <MERCURY@LCC.EDU>
- Subject: File 9--Bibliography on codes and ciphers
-
- number 006 CLACKER'S DIGEST December 6, 1992.
- philosophy and applications for analytical engines
- +++++++++++++++++++++++++
- A Cryptography Bibliography by mercury@well.sf.ca.us
-
- (Technically, cryptography is MAKING codes while cryptanalysis is
- BREAKING them. Both are subsumed under cryptology. A CIPHER is a
- regular transposition such as A=Z, B=Y, etc., while a CODE is a table
- of arbitrary symbols.)
-
- Kahn, David, THE CODEBREAKERS, MacMillan, 1967. The MOST complete
- history with specific examples. Written before public keys, RSA,
- etc., but still THE place to start.
-
- Marotta, Michael, THE CODE BOOK, Loompanics, 1987, Overview of history
- and post-1967 developments.
-
- Sinkov, Abraham, ELEMENTARY CRYPTANALYSIS: A MATHEMATICAL APPROACH,
- Random House, 1968. Sinkov worked for Friedman on the breaking of
- Purple. First rate.
-
- Gaines, Helen Fouche, CRYPTANALYSIS, Dover, 1956. A classic work. The
- first step to breaking codes and ciphers.
-
- Lysing, Henry, SECRET WRITING, Dover, 1974. Another reprint of
- another classic.
-
- Smith, Laurence Dwight, CRYPTOGRAPHY, Dover, 1955. Ditto.
-
- Konheim, Alan G., CRYPTOGRAPHY: A PRIMER, John Wiley, 1981. Textbook
- for mathematicians from IBM's Watson Center. Includes public keys,
- digital signatures.
-
- Meyer, Carl H., and Matyas Stephen M., CRYPTOGRAPHY, John Wiley, 1982.
- From IBM Cryptography Competency Center. For computers, includes
- public keys, digital signatures.
-
- Weber, Ralph E., UNITED STATES DIPLOMATIC CODES AND CIPHERS 1775-1938,
- Precedent, 1979. Not just a history! The appendix contains the
- all the keys!!
-
- Chadwick, THE DECIPHERMENT OF LINEAR B, Vintage, 1958. Worked with
- Michael Ventris on unraveling Minoan script.
-
- Yardley, Herbert O., THE AMERICAN BLACK CHAMBER, Ballantine 1981,
- Random House, 1931. Yardley broke German ciphers in WWI and then
- Japanese ciphers of 1920, and was fired in 1931 because "Gentlemen
- don't read each other's mail."
-
- (anonymous), THE DATA ENCRYPTION STANDARD, National Bureau of
- Standards, January 1977, NTIS NBS-FIPS PUB 46.
-
- (anonymous), DATA SECURITY AND THE DATA ENCRYPTION STANDARD,
-
- National Bureau of Standards, 1978, Pub 500-27; CODEN: XNBSAV.
-
- Rivest, Ronald L., Shamir, A., and Adleman, L., "A Method for
- Obtaining Digital Signatures and Public-key Cryptosystems,"
- COMMUNICATIONS OF THE ACM, February, 1979. The last word.
-
- ------------------------------
-
- Date: 13 Dec 92 14:00:21 EST
- From: Emmanuel Goldstein <emmanuel@well.sf.ca.us>
- Subject: File 10--Comments on the Nov. 2600 Disruption in D.C.
-
- ((MODERATORS' NOTE: Following is a letter to the editor of the
- Washington Post that they chose not to print as a "Viewpoint."
- The author, Emmanuel Goldstein, is editor of the magazine 2600,
- which can be contacted at 2600 Magazine - PO Box 752 -
- Middle Island, NY 11953. A yearly subscription is only $21 (US)).
-
- While managing to convey some of the facts concerning the Pentagon
- City Mall hacker incident on November 6, "Hackers Allege Harassment at
- Mall" (November 13, page A1) fails to focus on the startling
- revelation of federal government involvement and the ominous
- implications of such an action. The article also does little to lessen
- the near hysteria that is pumped into the general public every time
- the word "hacker" is mentioned. Let us take a good look at what has
- been confirmed so far. A group of computer hackers gathered at a local
- mall as they do once a month. Similar meetings have been going on in
- other cities for years without incident. This gathering was not for
- the purposes of causing trouble and nobody has accused the hackers of
- doing anything wrong. Rather, the gathering was simply a place to meet
- and socialize. This is what people seem to do in food courts and it
- was the hackers' intention to do nothing more.
-
- When mall security personnel surrounded the group and demanded that
- they all submit to a search, it became very clear that something
- bizarre was happening. Those who resisted were threatened with arrest.
- Everyone's names were written down, everyone's bags gone through. One
- person attempted to write down the badge numbers of the people doing
- this. The list was snatched out of his hand and ripped to pieces.
- Another hacker attempted to catch the episode on film. He was
- apprehended and the film was ripped from his camera. School books,
- notepads, and personal property were seized. Much of it has still not
- been returned. The group was held for close to an hour and then told
- to stay out of the mall or be arrested.
-
- This kind of treatment is enough to shock most people, particularly
- when coupled with the overwhelming evidence and eyewitness accounts
- confirming no unusual or disruptive behavior on the part of the group.
- It is against everything that our society stands for to subject people
- to random searches and official intimidation, simply because of their
- interests, lifestyles, or the way they look. This occurrence alone
- would warrant condemnation of a blatant abuse of power. But the story
- doesn't end there.
-
- The harassment of the hackers by the mall police was only the most
- obvious element. Where the most attention should be focused at this
- point is on the United States Secret Service which, according to Al
- Johnson, head of mall security, "ramrodded" the whole thing. Other
- media sources, such as the industry newsletter Communications Daily,
- were told by Johnson that the Secret Service was all over the mall
- that day and that they had, in effect, ordered the harassment.
- Arlington police confirm that the Secret Service was at the mall that
- day.
-
- It is understood that the Secret Service, as a branch of the Treasury
- Department, investigates credit card fraud. Credit card fraud, in
- turn, can be accomplished through computer crime. Some computer
- hackers could conceivably use their talents to accomplish computer
- crime. Thus we arrive at the current Secret Service policy, which
- appears to treat everybody in the hacker world as if they were a
- proven counterfeiter. This feeling is grounded in misperceptions and
- an apprehension that borders on panic. Not helping the situation any
- is the everpresent generation gap - most hackers are young and most
- government officials are not.
-
- Apart from being disturbed by the gross generalizations that comprise
- their policy, it seems a tremendous waste of resources to use our
- Secret Service to spy on public gatherings in shopping malls. It seems
- certain to be a violation of our rights to allow them to disrupt these
- meetings and intimidate the participants, albeit indirectly. Like any
- other governmental agency, it is expected that the Secret Service
- follow the rules and not violate the constitutional rights of
- citizens.
-
- If such actions are not publicly condemned, we will in effect be
- granting a license for their continuance and expansion. The incident
- above sounds like something from the darkest days of the Soviet Union
- when human rights activists were intimidated by government agents and
- their subordinates. True, these are technology enthusiasts, not
- activists. But who they are is not the issue. We cannot permit
- governmental abuse of any person or group simply because they may be
- controversial.
-
- Why do hackers evoke such controversy? Their mere presence is an
- inconvenience to those who want so desperately to believe the emperor
- is wearing clothes. Hackers have a tendency of pointing out the
- obvious inadequacies of the computer systems we entrust with such a
- large and growing part of our lives. Many people don't want to be told
- how flimsily these various systems are held together and how so much
- personal data is readily available to so many. Because hackers manage
- to demonstrate how simple it is to get and manipulate this
- information, they are held fully responsible for the security holes
- themselves. But, contrary to most media perceptions, hackers have very
- little interest in looking at other people's personal files.
- Ironically, they tend to value privacy more than the rest of us
- because they know firsthand how vulnerable it is. Over the years,
- hackers have gone to the media to expose weaknesses in our credit
- reporting agencies, the grading system for New York City public
- schools, military computer systems, voice mail systems, and even
- commonly used pushbutton locks that give a false sense of security.
- Not one of these examples resulted in significant media attention and,
- consequently, adequate security was either delayed or not implemented
- at all. Conversely, whenever the government chooses to prosecute a
- hacker, most media attention focuses on what the hacker "could have
- done" had he been malicious. This reinforces the inaccurate depiction
- of hackers as the major threat to our privacy and completely ignores
- the failure of the system itself.
-
- By coming out publicly and meeting with other hackers and non-hackers
- in an open atmosphere, we have dispelled many of the myths and helped
- foster an environment conducive to learning. But the message we
- received at the Pentagon City Mall tells us to hide, be secretive, and
- not trust anybody. Perhaps that's how the Secret Service wants hackers
- to behave. But we are not criminals and we refuse to act as such
- simply because we are perceived that way by uninformed bureaucrats.
-
- Regardless of our individual outlooks on the hacker issue, we should
- be outraged and extremely frightened to see the Secret Service act as
- they did. Whether or not we believe that hackers are decent people, we
- must agree that they are entitled to the same constitutional freedoms
- the rest of us take for granted. Any less is tantamount to a very
- dangerous and ill-advised precedent.
-
- ------------------------------
-
- End of Computer Underground Digest #4.65
- ************************************
-