home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Wed Dec 16, 1992 Volume 4 : Issue 66
- ISSN 1066-662X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Copy Editor: Etaion Shrdlu, Junior
-
- CONTENTS, #4.66 (Dec 16, 1992)
- File 1-- CPSR and the Transition
- File 2--Cellular Phone Fraud Techniques & Countermeasures (CU News)
- File 3--Police Hackers / Computer Privacy Survey (Cu News)
- File 4--EFF Nominations for PIONEER AWARDS
- File 5--Organizational Changes at the EFF
- File 6--Response to CERT advisory (Re: CuD 4.65)
- File 7--CuD's 1992 MEDIA HYPE award to FORBES MAGAZINE
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
- libraries; from America Online in the PC Telecom forum under
- "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
- Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
- anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
- /pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
- (192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
- in /pub/text/CuD.
- European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
- Back issues also may be obtained from the mail
- server at mailserv@batpad.lgb.ca.us.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Tue, 15 Dec 1992 13:13:39 EDT
- From: Marc Rotenberg <Marc_Rotenberg@WASHOFC.CPSR.ORG>
- Subject: File 1-- CPSR and the Transition
-
- Over the last several years CPSR has worked extensively on access to
- government information, the Freedom of Information Act, computer
- security policy, and privacy protection.
-
- We have now sent the following recommendations to several transition
- team groups. (The "(b)(1) exemption" in the first recommendation
- refers to the national security exemption in the Freedom of
- Information Act.)
-
- We hope that the new administration will give our proposals full
- consideration.
-
- Marc Rotenberg, Director
- CPSR Washington Office
- rotenberg@washofc.cpsr.org
-
- =============================================
-
- FROM--Marc Rotenberg, CPSR
- RE--Classification, Computer Security, Privacy
- CC--Policy Group, Justice Cluster
- DATE--December 10, 1992
-
- Three issues that the Executive Order Project should
- address:
-
- 1) Rescind E.O. 12356 (1982 Reagan Order on classification)
-
- The Reagan Order on classification is the bane of the FOIA and
- science communities. It has led to enormous overclassification,
- frustrated government accountability, and skewed national priorities.
- It should be rescinded.
-
- A new E.O. should narrow the scope of classification
- authority. It should reduce the classification bureaucracy. And it
- should reflect the economic cost of classifying scientific and
- technical information, i.e. such information should be presumptively
- available. In the FOIA context, the new E.O. should also require
- agencies to identify "an ascertainable harm" before invoking the
- (b)(1) exemption.
-
- 2) Rescind NSD-42 (1991 Bush Directive on computer security
- authority)
-
- This directive undermined a fairly good 1987 law (the Computer
- Security Act) and transferred authority for computer security from the
- civilian sector to the intelligence community. It led to several bad
- decisions in the area of technical standard setting (e.g. network
- standards that facilitate surveillance rather than promoting security)
- and has made it more difficult to ensure agency accountability. It
- should be rescinded.
-
- The President could either leave the 1987 Act in place and
- issue no new E.O. or he could revise the E.O. consistent with the aims
- of the 1987 law, recognizing the recent problems with technical
- standard setting by the intelligence community.
-
- 3) Establish a task force on privacy protection
-
- The new administration should move quickly on the privacy
- front, particularly in the telecommunications arena. The United
- States currently lags behind Canada, Japan, and the EC on telecomm
- privacy policy. These policies are necessary for the development of
- new services and the protection of consumer interests.
-
- An Executive Order on privacy should include the following
- elements: (1) the creation of an intra-agency task force with public
- participation, (2) a report to the President within 180 days with
- legislative recommendations, (3) a procedure for ongoing review and
- coordination with Justice, Commerce, State, and OSTP.
-
- ------------------------------
-
- Date: 13 Dec 92 14:00:21 EST
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 2--Cellular Phone Fraud & Countermeasures (CU News)
-
- Industry sponsored studies on the amount of money lost to fraudulent
- calls vary, as they do with estimates of computer crime and software
- piracy, but one figure from the Cellular Telecommunications Industry
- Association (CTIA) places the cost at somewhere between 100 and $300
- million annually. Other estimates are as high at $600 million.
-
- Typical methods used to obtain service for free include paying off
- company employees to provide the all-essential ESN (Electronic Serial
- Number, a unique identifier transmitted with each call that identifies
- who is placing the call.), to 'cloning' ESN's from existing phones,
- sometimes using radio receivers to evesdrop on cellular traffic and
- copy the ESN from other calls.
-
- Earlier this year the Secret Service raided homes in Phoenix and
- confiscated 35 phones, 10,000 microchips, and other equipment used to
- steal cellular service.
-
- The El Segundo based Computer Sciences Corp has recently released an
- Artificial Intelligence based device that attempts to thwart
- fraudulent activity by maintaining a data base of calling patterns for
- a particular ESN. When the pattern of activity changes, the cellular
- company is notified that the ESN may have been compromised.
-
- The CTIA has set up a fraud task force, with an annual budget of $4
- million dollars, to help fight the problem. Individual cellular
- companies have also established their own fraud investigation units.
- Unlike the long-distance industry, cellular companies do not have a
- policy of holding the customer responsible for fraudulent calls.
-
- For more information read "Stop, Thief!", Information Week,
- November 30, 1992. pg. 32
-
- ------------------------------
-
- Date: 13 Dec 92 14:00:21 EST
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 3--Police Hackers / Computer Privacy Survey (Cu News)
-
- According to news reports, up to 45 members (since 1989) of the Los
- Angeles Police Department have been disciplined for using for
- unauthorized use of police databases. They have been freely digging
- up information on everyone from potential baby sitters to local
- celebrities. There are reportedly some cases of using the databases
- to file false insurance claims as well.
-
- For more information see Karen M. Carriol's "Was Police Search
- Warranted? Information Week. Nov 23 1992 pg 79
-
- =============
-
- Privacy vs Computers Survey.
-
- Equifax's June '92 update to their "Consumers in the Information Age"
- study shows some interesting survey results. Of the 1200+ people
- surveyed, 80% said that computers improved the overall quality of
- life, but nearly 70% agree that present uses of computers threaten
- their personal privacy.
-
- Other results include:
- - Just over 75% worry that consumers have lost
- all control over how businesses use and circulate personal
- information.
-
- - About half see no signs of improving this, saying that
- protection of individual consumer data will weaken over the next ten
- years.
-
- - Almost 70% agree that if privacy is to be preserved, the use
- of computers must be sharply restricted in the future.
-
- For more information refer to: "The Databases That Knew Too Much",
- Information Week. 12/7/92 pg 22
-
- ------------------------------
-
- Date: Fri, 11 Dec 92 15:01:26 EST
- From: Rita Marie Rouvalis <rita@EFF.ORG>
- Subject: File 4--EFF Nominations for PIONEER AWARDS
-
-
- THE SECOND ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
- CALL FOR NOMINATIONS
- Deadline: December 31,1992
-
- In every field of human endeavor,there are those dedicated to
- expanding knowledge, freedom, efficiency and utility. Along the
- electronic frontier, this is especially true. To recognize this,the
- Electronic Frontier Foundation has established the Pioneer Awards for
- deserving individuals and organizations.
-
- The Pioneer Awards are international and nominations are open to all.
-
- In March of 1992, the first EFF Pioneer Awards were given in
- Washington D.C. The winners were: Douglas C. Engelbart of Fremont,
- California; Robert Kahn of Reston, Virginia; Jim Warren of Woodside,
- California; Tom Jennings of San Francisco, California; and Andrzej
- Smereczynski of Warsaw, Poland.
-
- The Second Annual Pioneer Awards will be given in San Francisco,
- California at the 3rd Conference on Computers, Freedom, and Privacy in
- March of 1993.
-
- All valid nominations will be reviewed by a panel of impartial judges
- chosen for their knowledge of computer-based communications and the
- technical, legal, and social issues involved in networking.
-
- There are no specific categories for the Pioneer Awards, but the
- following guidelines apply:
-
- 1) The nominees must have made a substantial contribution to the
- health, growth, accessibility, or freedom of computer-based
- communications.
-
- 2) The contribution may be technical, social, economic or cultural.
-
- 3) Nominations may be of individuals, systems, or organizations in
- the private or public sectors.
-
- 4) Nominations are open to all, and you may nominate more than one
- recipient. You may nominate yourself or your organization.
-
- 5) All nominations, to be valid, must contain your reasons, however
- brief, on why you are nominating the individual or organization,
- along with a means of contacting the nominee, and your own
- contact number. No anonymous nominations will be allowed.
-
- 6) Every person or organization, with the single exception of EFF
- staff members, are eligible for Pioneer Awards.
-
- 7) Persons or representatives of organizations receiving a Pioneer
- Award will be invited to attend the ceremony at the Foundation's
- expense.
-
- You may nominate as many as you wish, but please use one form per
- nomination. You may return the forms to us via email to
-
- pioneer@eff.org
-
- You may mail them to us at:
- Pioneer Awards, EFF,
- 155 Second Street
- Cambridge MA 02141.
-
- You may FAX them to us at:
- +1 617 864 0866
-
- Just tell us the name of the nominee, the phone number or email
- address at which the nominee can be reached, and, most important, why
- you feel the nominee deserves the award. You may attach supporting
- documentation. Please include your own name, address, and phone
- number.
-
- We're looking for the Pioneers of the Electronic Frontier that have
- made and are making a difference. Thanks for helping us find them,
-
- The Electronic Frontier Foundation
-
- -------EFF Pioneer Awards Nomination Form------
-
- Please return to the Electronic Frontier Foundation
- via email to: pioneer@eff.org
- via surface mail to EFF 155 Second Street, Cambridge, MA 02141 USA;
- via FAX to +1 617 864 0866
-
-
- Nominee:
-
- Title:
-
- Company/Organization:
-
- Contact number or email address:
-
- Reason for nomination:
-
- Your name and contact information:
-
- Extra documentation attached:
-
- DEADLINE: ALL NOMINATIONS MUST BE RECEIVE BY THE ELECTRONIC FRONTIER
- FOUNDATION BY MIDNIGHT, EASTERN STANDARD TIME U.S., DECEMBER 31,1992.
-
- ------------------------------
-
- Date: Mon, 14 Dec 92 14:47:43 EST
- From: Rita Marie Rouvalis <rita@EFF.ORG>
- Subject: File 5--Organizational Changes at the EFF
-
- EFF EXPLAINS ORGANIZATIONAL CHANGES
-
- Mitchell Kapor, Chairman and President of the Electronic Frontier
- Foundation (EFF), today explained several organizational moves and
- initiatives approved by the EFF Board at its November 10, 1992
- meeting in San Francisco. According to Kapor, "they are designed to
- increase our effectiveness in making EFF into a national public
- education, advocacy, membership, and chapters organization that
- represents and serves our growing constituency on the electronic
- frontier."
-
- Berman Becomes Acting Executive Director
-
- Kapor stated that "Jerry Berman, who currently heads our Washington
- Office, has been designated by the EFF board to serve as the interim
- Executive Director of EFF with present overall responsibility for
- managing the activities of our Cambridge and Washington, D.C. offices.
- In this capacity, he will oversee EFF's public policy, membership, and
- chapter building activities."
-
- Berman said: "I am delighted to be working with Cliff Figallo, our
- Cambridge Office Director and the entire EFF staff and Board. In the
- next two months we will be making a concerted effort to develop a plan
- to make EFF into a more effective and powerful public interest
- organization."
-
- Chapters Summit
-
- On January, 23 and 24, 1993, EFF will hold a "chapters summit" in
- Atlanta, Georgia. Dave Farber, EFF Board Member, stated that the
- meeting would be "an open, candid sharing of views about chapter
- relations with EFF and EFF's relations with chapters with the goal of
- making the chapters an integral part of the EFF mission." The meeting
- is being organized by a steering committee made up of Cliff Figallo,
- Jerry Berman, Dave Farber and representatives from chapters and
- potential chapters including Mitch Ratcliffe and Jon Lebkowsky .
-
- Mitchell Kapor to Chair EFF Board and Oversee Critical Policy Studies
- and Initiatives
-
- Mitchell Kapor, who serves as Chairman of the EFF Board, has turned
- over management functions to Berman and Figallo to devote his energy
- and talents to developing EFF strategy and public policy initiatives,
- such as a pragmatic program for achieving an open broadband
- communications network and an exploration of the potential role of the
- cable television network in serving as a interactive, multimedia
- electronic communications highway. Kapor will also continue to lead
- EFF's current public policy initiative to develop a near term digital
- path to the home designed to maximize free speech, innovation, and
- privacy.
-
- Permanent Executive Director
-
- The EFF Board, once it has developed and approved an overall strategic
- plan in January, will proceed with an open search for a permanent
- Executive Director for the organization.
-
- ------------------------------
-
- Date: 15 Dec 92 15:11:24
- From: Louis Giliberto <magus@DRKTOWR.CHI.IL.US>
- Subject: File 6--Response to CERT advisory (Re: CuD 4.65)
-
- In CuD #4.65 this CERT advisory appeared:
-
- > CA-92:19 CERT Advisory
- > December 7, 1992
- > Keystroke Logging Banner
-
- There are several issues that need to be considered before
- implementing a system such as this, the last of which should be
- defensibility. Killing in self-defense is defensible, but there are
- other considerations involved. The point? Just because someone *can*
- do something does not mean someone *should* do something.
-
- Who should/could be monitored?
- +++++++++++++++
- This advisory seems to give free license to the system administrator to
- monitor as he/she sees fit. What if you own a company, and your
- administrator logs and monitors all activity as outlined? Then he
- leaves your company and joins your competitor. He has read over every
- piece of information typed into your system. Obviously this causes
- problems if the computer is used for proprietary information.
-
- However, let us assume the administrator can be trusted. Who does he
- decide to log? The fairest way would be to log everyone. However,
- this is near impossible since the resources required would be
- overwhelming. More resources would be spent on logging than on
- computation. One might suggest that he log only those accounts that
- have had illegal logon attempts or suspicious activity. But this
- brings up two points: 1) If the logs are catching the activity, is
- keystroke monitoring needed to secure the system? 2) In the cases
- where keystroke monitoring would be most effective (i.e., determining
- the method of intrustion) the logs are most likely doctored in some
- way, so the determination of which account to monitor could not even
- be made.
-
- Therefore the most effective use of keystroke logging would be 1)
- monitor those accounts with suspicious activity and 2) monitor at
- random. In this manner, illegal entries not caught in the logs or
- other security measures may be picked up in the keystroke loggings.
-
- But this brings up even more questions:
-
- What type of notification should there be? +++++++++++++++++++++ Is
- the banner enough? Is more notification needed? Way back when, it
- was determined system administrators should give notice (in the form
- of a banner or some such publicly visible medium) that e-mail and
- files are not secure on the system and are open to incidental
- inspection by the system administrator in the course of system
- maintenance. Most people expect this and trust the system
- administrator enough to feel that he is not reading their mail for
- kicks. The banner is enough of a notification in this instance since
- monitoring does not take place in real-time. Unlike monitoring on the
- phone system where it happens as the voice is transmitted, e-mail and
- file monitoring takes place often when the user is not on so that
- instant notification is not possible (or even warranted in most cases
- when it happens in the course of system maintenance).
-
- Keystroke logging differs in that it takes place in real-time while
- the user is logged on. Is a banner enough notification?
-
- I would argue no. While using the phone system, if an operator comes
- into your call, his/her presence is announced with several tones and
- the name of the company. The law requires that any taping of
- conversations to be accompanied by a tone every so often of a specific
- duration. The logging of keystrokes is the same type of monitoring,
- and should be subject to the same requirements. The user should be
- notified in real-time that he is being monitored in real-time. Any
- type of monitoring without such a warning is usually called
- "wiretapping," and such monitoring is illegal except by law
- enforcement agencies with a court order allowing the event after cause
- is shown.
-
- Many people would contend: "But this is a privately owned system, not
- a public utility." Yes, but there is reasonable expectation of
- privacy allowed even in the workplace. I'm too lazy to look up the
- court cases (and I'm not a lawyer, so I don't care either), but there
- are multiple instances where searches of employee desks and lockers
- and the like were determined to be a violation of privacy rights. A
- company could clearly not monitor the voice transmissions of an
- employee's telephone but could log the number he called. In the same
- way, a system administrator could log login attempts, but should not
- be given free license to monitor the actual keystrokes. It violates
- the reasonable rights of the employee. Even high school students are
- given reasonable rights in the expectation of privacy of the contents
- of their lockers and person. Well, unless you went to Catholic high
- school like I did + never tell a Jesuit he can't do something (unless
- you like corporal punishment).
-
- Extensions of keystroke monitoring
- +++++++++++++++++
- Given the fact that keystrokes are passed over the internet in the
- form of IP packets generated by telnet (and other comparable
- applications), does this allow keystroke monitoring at a remote site?
- In other words, can routing centers sniff packets at will if they
- inform the other sites they are going to? According to the
- interpretation given by the justice department, yes, they can. They
- can monitor keystrokes. The argument would be there is a reasonable
- expectation for keystrokes to appear in an IP packet, so all of them
- are open to examination if a banner is presented or prior notification
- given. Does apple.com want ibm.com to monitor its packets? Nope. Does
- a prof at Purdue want a prof at Champaign to monitor his? Nope.
- However, if a packet goes through someone's machine (possible since
- many machines are used for gatewaying and routing) he could argue that
- he had the right to sniff it.
-
- Can pay services monitor your keystrokes legally? Say CompuServe or
- America Online or Prodigy or another fine reputable <can you feel the
- sarcasm?> service put this measure in place. These services are
- comparable to a public service such as a bookstore (which was proven
- in litigation with CompuServe) or a phone company. Don't they then
- have the responsibility to respect the privacy of the customers? If
- you walk into K-Mart they can't strip search you at their whim. The
- phone company can't (legally) listen into your conversations. Is
- keystroke monitoring without real time notification to be allowed on
- these systems as well?
-
- An argument may be: "But security cameras are allowed to videotape
- customers" Ah, yes! But that is a different scenario: 1) The
- videotaping does not center on a specific individual. As stated
- before, to monitor the keystrokes of everyone would be
- near-impossible. 2) The store is a publically accessible place, and
- there is no reasonable expectation of privacy except to your person.
- Why is there a reasonable expectation of privacy on a computer system?
- Well, what are file permissions for? To keep one's files and stuff
- private. Just as a lock on a desk or a closed door intimates privacy,
- so do file permissions. If a system is truly public as a Sears or
- WalMart, there would be no file permissions. There would be no
- accounts with names on them giving ownership. Ownership implies a
- right to security from trespass and interference. There are many
- arguments to be made for privacy expectations on computer systems that
- I won't go into here. Let me just clarify "truly public" as I used it
- in describing Sears and WalMart. By "truly public" I mean that they
- may not turn away anyone entering their property without good reason.
- They may not discriminate, and being employed by them is not a
- criteria for entering their sales area. Customers are allowed to move
- unimpeded throughout the sales area, and customers do not get lockers
- to put stuff in on a daily basis which are provided by the store. In
- other words, their is no private ownership on the part of the customer
- within the store except for what he carries on his person. This is
- comparable to being in a public area. The comparison I am making
- believes that being inside a computer system is not comparable to
- being in a public area if ownership of files and accounts are given.
-
- Conclusion
- +++++
- While I realize that CERT was merely passing on the findings of the
- Justice Department, I have to question 1) the presentation of those
- findings including giving almost a "non-liability kit" in their
- advisory, and, 2) the findings themselves. Anything is defensible.
- Charles Manson had a defense. However, even if the act is defensible,
- it may still be illegal. Defensible merely means "there is a
- reasonable expectation that consideration will be given to your side."
- I think CERT went a bit too far in suggesting a banner and not
- bringing up possible consequences. I tried to "balance" the situation
- here. For any company, I would seriously advise you to consult an
- attorney before you implement this type of monitoring, and to think
- about what effects it could have. It may weaken security rather than
- improve it.
-
- As a system administrator (albeit a tiny system consisting of myself,
- 4 friends, my sister, and my girlfriend) I would not implement such a
- scheme since I feel that it would be illegal without real-time
- notification, and such real-time notification is, quite frankly, a
- pain to give to someone using an editor without disrupting their
- session or their train of thought.
-
- In a nutshell, the point is this: just because it's defensible does
- not mean it's legal, and in this case I feel that it just might be
- illegal.
-
- ------------------------------
-
- Date: 15 Dec 92 18:48:01 CST
- From: Jim Thomas <cudigest@mindvox.phantom.com>
- Subject: File 7--CuD's 1992 MEDIA HYPE award to FORBES MAGAZINE
-
- In recent years, media depiction of "hackers" has been criticized for
- inaccurate and slanted reporting that exaggerates the public dangers
- of the dread "hacker menace." As a result, CuD annually recogizes the
- year's most egregious example of media hype.
-
- The 1992 annual CuD GERALDO RIVERA MEDIA HYPE award goes to WILLIAM G.
- FLANAGAN AND BRIGID McMENAMIN for their article "The Playground
- Bullies are Learning how to Type" in the 21 December issue of Forbes
- (pp 184-189). The authors improved upon last year's winner, Geraldo
- himself, in inflammatory rhetoric and distorted narrative that seems
- more appropriate for a segment of "Inside Edition" during sweeps week
- than for a mainstream conservative periodical.
-
- The Forbes piece is the hands-down winner for two reasons.
- First, one reporter of the story, Brigid McMenamin, was exceptionally
- successful in creating for herself an image as clueless and obnoxious.
- Second, the story itself was based on faulty logic, rumors, and some
- impressive leaps of induction. Consider the following.
-
- The Reporter: Brigid McMenamin
-
- It's not only the story's gross errors, hyperbole, and irresponsible
- distortion that deserve commendation/condemnation, but the way that
- Forbes reporter Brigid McMenamin tried to sell herself to solicit
- information.
-
- One individual contacted by Brigid McM claimed she called him several
- times "bugging" him for information, asking for names, and complaining
- because "hackers" never called her back. He reports that she
- explicitly stated that her interest was limited to the "illegal stuff"
- and the "crime aspect" and was oblivious to facts or issues
- that did not bear upon hackers-as-criminals.
-
- Some persons present at the November 2600 meeting at Citicorp, which
- she attended, suggested the possibility that she used another reporter
- as a credibility prop, followed some of the participants to dinner
- after the meeting, and was interested in talking only about illegal
- activities. One observer indicated that those who were willing to talk
- to her might not be the most credible informants. Perhaps this is one
- reason for her curious language in describing the 2600 meeting.
-
- Another person she contacted indicated that she called him wanting
- names of people to talk to and indicated that because Forbes is a
- business magazine, it only publishes the "truth." Yet, she seemed not
- so much interested in "truth," but in finding "evidence" to fit a
- story. He reports that he attempted to explain that hackers generally
- are interested in Unix and she asked if she could make free phone
- calls if she knew Unix. Although the reporter stated to me several
- times that she had done her homework, my own conversation with her
- contradicted her claims, and if the reports of others are accurate,
- here claims of preparation seem disturbingly exaggerated.
-
- I also had a rather unpleasant exchange with Ms. McM. She was rude,
- abrasive, and was interested in obtaining the names of "hackers" who
- worked for or as "criminals." Her "angle" was clearly the
- hacker-as-demon. Her questions suggested that she did not understand
- the culture about which she was writing. She would ask questions and
- then argue about the answer, and was resistant to any "facts" or
- responses that failed to focus on "the hacker criminal." She dropped
- Emmanuel Goldstein's name in a way that I interpreted as indicating a
- closer relationship than she had--an incidental sentence, but one not
- without import--which I later discovered was either an inadvertently
- misleading choice of words or a deliberate attempt to deceptively
- establish credentials. She claimed she was an avowed civil
- libertarian. I asked why, then, she didn't incorporate some of those
- issues. She invoked publisher pressure. Forbes is a business magazine,
- she said, and the story should be of interest to readers. She
- indicated that civil liberties weren't related to "business." She
- struck me as exceptionally ill-informed and not particularly good at
- soliciting information. She also left a post on Mindvox inviting
- "hackers" who had been contacted by "criminals" for services to
- contact her.
-
- >Post: 150 of 161
- >Subject: Hacking for Profit?
- >From: forbes (Forbes Reporter)
- >Date: Tue, 17 Nov 92 13:17:34 EST
- >
- >Hacking for Profit? Has anyone ever offered to pay you (or
- >a friend) to get into a certain system and alter, destroy or
- >retrieve information? Can you earn money hacking credit
- >card numbers, access codes or other information? Do you know
- >where to sell it? Then I'd like to hear from you. I'm
- >doing research for a magazine article. We don't need you
- >name. But I do want to hear your story. Please contact me.
- >Forbes@mindvox.phantom.com.
-
- However, apparently she wasn't over-zealous about following up her
- post or reading the Mindvox conferences. When I finally agreed to
- send her some information about CuD, she insisted it be faxed rather
- than sent to Mindvox because she was rarely on it. Logs indicate that
- she made only six calls to the board, none of which occured after
- November 24.
-
- My own experience with the Forbes reporter was consistent with those
- of others. She emphasized "truth" and "fact-checkers," but the story
- seems short on both. She emphasized explicitly that her story would
- *not* be sensationalistic. She implied that she wanted to focus on
- criminals and that the story would have the effect of presenting the
- distinction between "hackers" and real criminals. Another of her
- contacts also appeared to have the same impression. After our
- less-than-cordial discussion, she reported it to the contact, and he
- attempted to intercede on her behalf in the belief that her intent was
- to dispel many of the media inaccuracies about "hacking." If his
- interpretation is correct, then she deceived him as well, because her
- portrayal of him in the story was unfavorably misleading.
-
- In CuD 4.45 (File #3), we ran Mike Godwin's article on "How to
- Talk to the Press," which should be required reading.
- His guidelines included:
-
- 1) TRY TO THINK LIKE THE REPORTER YOU'RE TALKING TO.
- 2) IF YOU'RE GOING TO MEET THE REPORTER IN PERSON, TRY TO
- BRING SOMETHING ON PAPER.
- 3) GIVE THE REPORTER OTHER PEOPLE TO TALK TO, IF POSSIBLE.
- 4) DON'T ASSUME THAT THE REPORTER WILL COVER THE STORY THE WAY
- YOU'D LIKE HER TO.
-
- Other experienced observers contend that discussing "hacking" with the
- press should be avoided unless one knows the reporter well or if the
- reporter has established sufficient credentials as accurate and
- non-sensationalist. Using these criteria, it will probably be a long
- while before any competent cybernaught again speaks to Brigid
- McMenamin.
-
- The Story
-
- Rather than present a coherent and factual story about the types of
- computer crime, the authors instead make "hackers" the focal point and
- use a narrative strategy that conflates all computer crime with
- "hackers."
-
- The story implies that Len Rose is part of the "hacker hood" crowd.
- The lead reports Rose's prison experience and relates his feeling that
- he was "made an example of" by federal prosecutors. But, asks the
- narrative, if this is so, then why is the government cracking down?
- Whatever else one might think of Len Rose, no one ever has implied
- that he as a "playground bully" or "hacker hood." The story also
- states that 2600 Magazine editor Emmanuel Goldstein "hands copies <of
- 2600> out free of charge to kids. Then they get arrested." (p. 188--a
- quote attributed to Don Delaney), and distorts (or fabricates) facts
- to fit the slant:
-
- According to one knowledgeable source, another hacker brags
- that he recently found a way to get into Citibank's
- computers. For three months he says he quietly skimmed off a
- penny or so from each account. Once he had $200,000, he quit.
- Citibank says it has no evidence of this incident and we
- cannot confirm the hacker's story. But, says computer crime
- expert Donn Parker of consultants SRI International: "Such a
- 'salami attack' is definitely possible, especially for an
- insider" (p. 186).
-
- Has anybody calculated how many accounts one would have to "skim" a
- few pennies from before obtaining $200,000? At a dime apiece, that's
- over 2 million. If I'm figuring correctly, at one minute per account,
- 60 accounts per minute non-stop for 24 hours a day all year, it would
- take nearly 4 straight years of on-line computer work for an
- out-sider. According to the story, it took only 3 months. At 20
- cents an account, that's over a million accounts.
-
- Although no names or evidence are given, the story quotes Donn Parker
- of SRI as saying that the story is a "definite possibility." Over the
- years, there have been cases of skimming, but as I remember the
- various incidents, all have been inside jobs and few, if any, involved
- hackers. The story is suspiciously reminiscent of the infamous "bank
- cracking" article published in Phrack as a spoof several years ago.
-
- The basis for the claim that "hacker hoods" (former "playground
- bullies") are now dangerous is based on a series of second and
- third-hand rumors and myths. The authors then list from "generally
- reliable press reports" a half-dozen or so non-hacker fraud cases
- that, in context, would seem to the casual reader to be part of the
- "hacker menace." I counted in the article at least 24 instances of
- half-truths, inaccuracies, distortions, questionable/spurious links,
- or misleading claims that are reminiscent of 80s media hype. For
- example, the article attributes to Phiber Optik counts in the MOD
- indictment that do not include him, misleads on the Len Rose
- indictment and guilty plea, uses second and third hand information
- as "fact" without checking the reliability, and presents facts out
- of context (such as attributing the Morris Internet worm to
- "hackers).
-
- Featured as a key "hacker hood" is "Kimble," a German hacker said by
- some to be sufficiently media-hungry and self-serving that he is
- ostracized by other German hackers. His major crime reported in the
- story is hacking into PBXes. While clearly wrong, his "crime" hardly
- qualifies him for the "hacker hood/organized crime" danger that's the
- focus of the story. Perhaps he is engaged in other activities
- unreported by the authors, but it appears he is simply a
- run-of-the-mill petty rip-off artist. In fact, the authors do not make
- much of his crimes. Instead, they leap to the conclusion that
- "hackers" do the same thing and sell the numbers "increasingly" to
- criminals without a shred of evidence for the leap. To be sure the
- reader understands the menace, the authors also invoke unsubstantiated
- images of a hacker/Turkish Mafia connection and suggest that during
- the Gulf war, one hacker was paid "millions" to invade a Pentagon
- computer and retrieve information from a spy satellite (p. 186).
-
- Criminals use computers for crime. Some criminals may purchase numbers
- from others. But the story paints a broader picture, and equates all
- computer crime with "hacking." The authors' logic seems to be that if
- a crime is committed with a computer, it's a hacking crime, and
- therefore computer crime and "hackers" are synonymous. The story
- ignores the fact that most computer crime is an "inside job" and it
- says nothing about the problem of security and how the greatest danger
- to computer systems is careless users.
-
- One short paragraph near the end mentions the concerns about civil
- liberties, and the next paragraph mentions that EFF was formed to
- address these concerns. However, nothing in the article articulates
- the bases for these concerns. Instead, the piece promotes the "hacker
- as demon" mystique quite creatively.
-
- The use of terms such as "new hoods on the block," "playground
- bullies," and "hacker hoods" suggests that the purpose of the story
- was to find facts to fit a slant.
-
- In one sense, the authors might be able to claim that some of their
- "facts" were accurate. For example, the "playground bullies" phrase is
- attributed to Chesire Catalyst. "Gee, *we* didn't say it!" But, they
- don't identify whether it's the original CC or not. The phrase sounds
- like a term used in recent internecine "hacker group" bickering, and
- if this was the context, it hardly describes any new "hacker culture."
- Even so, the use of the phrase would be akin to a critic of the Forbes
- article refering to it as the product of "media whores who are now
- getting paid for doing what they used to do for free," and then
- applying the term "whores" to the authors because, hey, I didn't
- make up the term, somebody else did, and I'm just reporting (and using
- it as my central metaphor) just the way it was told to me. However, I
- suspect that neither Forbes' author would take kindly to being called
- a whore because of the perception that they prostituted journalistic
- integrity for the pay-off of a sexy story. And this is what's wrong
- with the article: The authors take rumors and catch-phrases, "merely
- report" the phrases, but then construct premises around the phrases
- *as if* they were true with little (if any) evidence. They take an
- unconfirmed "truth" (where are fact checkers when you need them) or an
- unrelated "fact" (such as an example of insider fraud) and generalize
- from a discrete fact to a larger population. The article is an
- excellent bit of creative writing.
-
- Why Does It All Matter?
-
- Computer crime is serious, costly, and must not be tolerated.
- Rip-off is no joke. But, it helps to understand a problem before it
- can be solved, and lack of understanding can lead to policies and laws
- that are not only ineffective, but also a threat to civil liberties.
- The public should be accurately informed of the dangers of computer
- crime and how it can be prevented. However, little will be served by
- creating demons and falsely attributing to them the sins of others. It
- is bad enough that the meaning" of the term "hacker" has been used to
- apply both to both computer delinquents and creative explorers without
- also having the label extended to include all other forms of computer
- criminals as well.
-
- CPSR, the EFF, CuD, and many, many others have worked, with some
- success, to educate the media about both dangers of computer crime and
- the dangers of inaccurately reporting it and attributing it to
- "hackers." Some, perhaps most, reporters take their work seriously,
- let the facts speak to them, and at least make a good-faith effort not
- to fit their "facts" into a narrative that--by one authors' indication
- at least--seems to have been predetermined.
-
- Contrary to billing, there was no evidence in the story, other than
- questionable rumor, of "hacker" connection to organized crime. Yet,
- this type of article has been used by legislators and some law
- enforcement agents to justify a "crackdown" on conventional hackers as
- if they were the ultimate menace to society. Forbes, with a paid
- circulation of over 735,000 (compared to CuDs unpaid circulation of
- only 40,000), reaches a significant and influential population.
- Hysterical stories create hysterical images, and these create
- hysteria-based laws that threaten the rights of law-abiding users.
- When a problem is defined by irresponsibly produced images and then
- fed to the public, it becomes more difficult to overcome policies and
- laws that restrict rights in cyberspace.
-
- The issue is not whether "hackers" are or are not portrayed favorably.
- Rather, the issue is whether images re-inforce a witch-hunt mentality
- that leads to the excesses of Operation Sun Devil, the Steve Jackson
- Games fiasco, or excessive sentences for those who are either
- law-abiding or are set up as scapegoats. The danger of the Forbes
- article is that it contributes to the persecution of those who are
- stigmatized not so much for their acts, but rather for the signs they
- bear.
-
- ------------------------------
-
- End of Computer Underground Digest #4.66
- ************************************
-