home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Jan 10, 1992 Volume 5 : Issue 02
- ISSN 1002-022X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Copy Editor: Etaion Shrdlu, Junior
-
- CONTENTS, #5.02 (Jan 10, 1992)
- File 1--DoJ Has NOT "Authorized" Keystroke Monitoring
- File 2--Re: Dorm Room Raid (CuD #4.67)
- File 3--Reports on Ames Raid Available
- File 4--Hysteria from Forbes via NPR
- File 5--OECD Security Guidelines
- File 6--CU IN THE NEWS
- File 7--"Any one Who Owns a Scanner is a Hacker, or..."
- File 8--FYI: 3rd Computers, Freedom and Privacy Conference
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
- at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
- 466893; and using anonymous FTP on the Internet from ftp.eff.org
- (192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
- /cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
- ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
- Back issues also may be obtained from the mail
- server at mailserv@batpad.lgb.ca.us.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Fri, 18 Dec 1992 02:35:52 EDT
- From: Dorothy Denning <denning@CS.GEORGETOWN.EDU>
- Subject: DoJ Has NOT "Authorized" Keystroke Monitoring
-
- Dave Banisar posted a message a while back with the headline "DOJ
- Authorizes Keystroke Monitoring." The following article by Dennis
- Steinauer of NIST clarifies just what exactly the DOJ really said.
-
- Dorothy Denning
- denning@cs.georgetown.edu
- +++++++
- from PRIVACY Forum Digest, Vol. 01:Issue 28
-
- Date--Fri, 11 Dec 92 16:14:09 EST
- From--dds@csmes.ncsl.nist.gov (Dennis D. Steinauer)
- Subject--DoJ Has NOT "Authorized" Keystroke Monitoring
-
- The Subject line on the recent reposting by David Banisar of the 7 Dec
- 92 advisory from CERT/CC is highly misleading and inappropriate. As
- with some newspapers, it is important that people read more than just
- the headlines.
-
- The Department of Justice hasn't "authorized" anything. Rather, they
- are advising system administrators that certain activities, namely the
- monitoring or recording of user-to-computer session transmissions
- (hence "keystroke monitoring") MAY be found illegal in certain
- circumstances and that notice should be given to users.
-
- The CERT advisory was extracted from a letter to the National
- Institute of Standards and Technology (NIST) from DoJ. Justice asked
- NIST in its role of providing computer security guidance to Government
- to circulate the letter and provide appropriate guidance. We have
- made the letter available, without comment, through several government
- and other channels (including CERT, I4, etc.).
-
- The letter is intended to advise system administrators of an ambiguity
- in U.S. law that makes it unclear whether session monitoring, often
- conducted by system administrators who suspect unauthorized activity,
- is basically the same as an unauthorized telephone wiretap. I repeat,
- the law is *unclear* -- and the fact that one can argue either way on
- the issue does not clarify the law as currently written. DoJ advises,
- therefore, that if system adminstrators are conducting session
- monitoring or anticipate the need for such monitoring, they should
- ensure that all system users be notified that such monitoring may be
- undertaken.
-
- The DoJ advice, therefore, is not "authorizing" anything -- even
- implicitly. They have simply observed the types of activities that
- diligent system managers often undertake (a la Cliff Stoll in "The
- Cuckoo's Egg") in an attempt to protect their systems from
- unauthorized users, and they have rendered some prudent legal advice.
-
- Clearly, there are lots of issues here -- technical and otherwise --
- that will need to be discussed and sorted out. Indeed, changes in
- agency/organizational policies and even the law are probably needed.
- However, none of this changes the fact that system administrators need
- now to be aware of the potential impact of their activities, and the
- DoJ advice attempts to do this.
-
- We (NIST) are developing additional guidance for system administrators
- to assist them in implementing the DoJ recommendations. I expect that
- others will be doing likewise. We also hope to encourage discussion
- of the related technical and other issues. In the meantime, system
- adminstrators are well advised to read the basic DoJ advice and
- examine their systems and agency policies to determine if, where, and
- how notices should be provided to users. We welcome comments and
- suggestions, particularly regarding approaches that various
- organizations take in dealing with this issue.
-
- =====
- Dennis D. Steinauer
- National Institute of Standards and Technology
- A-216 Technology
- Gaithersburg, MD 20899 USA
- (301) 975-3359
- (301) 948-0279 Facsimile
- DSteinauer@nist.gov (e-mail)
- NIST Security BBS: 301-948-5717 (cs-bbs.nist.gov)
-
- ------------------------------
-
- Date: Tue, 29 Dec 92 12:32:09 CST
- From: rio!canary!chris@UUNET.UU.NET(Chris Johnson)
- Subject: Re: Dorm Room Raid (CuD #4.67)
-
- In a recent issue of CuD, an article described a raid on a dorm room
- to confiscate computer equipment which allegedly contained copies of
- copyrighted software. The claim was made that the software was
- obtained via Internet.
-
- This reminded me of a conversation I had with my brother over the
- Christmas holiday. He was recently a student at a university which
- has Internet access (I do not, or I'd verify the following). He
- mentioned that the White Sands Missile Range (an obvious DoD
- installation) had one of the largest collections of ftp accessible
- computer files. He said they had everything imaginable.
-
- Now, it's true I haven't looked myself, nor did I specifically ask him
- at the time if they had copies of copyrighted images, data or programs
- as the conversation was about other topics. But I have seen other ftp
- sites "libraries", and there's next to no doubt in my mind the White
- Sands site must have megabytes of copyrighted materials.
-
- Perhaps someone out there would like to take a look and see just how
- legal they are.
-
- Of course, the federal government seems more interested in busting
- college students and other individuals than say, cleaning up its own
- act.
-
- ------------------------------
-
- Date: Tue, 22 Dec 1992 13:47:06 EDT
- From: David Sobel <dsobel@WASHOFC.CPSR.ORG>
- Subject: Reports on Ames Raid Available
-
- Last month I posted a NASA statement concerning the unannounced
- "security review" conducted at the Ames Research Center this past
- summer. The CPSR Washington Office recently obtained electronic
- copies of two NASA reports on the incident, which are now available
- through the listserver. To obtain these files, send the following
- message to <listserv@gwuvm.gwu.edu>:
-
- GET <filename> <filetype>
-
- using the following filenames and filetypes:
-
- Filename Filetype Lines Description
- ++++++++ ++++++++ +++++ +++++++++++
- AMES-MR REPORT 861 MANAGEMENT REVIEW OF THE AMES RESEARCH
- CENTER - August, 1992
-
- AMES-MR ASSESSMT 565 ASSESSMENT PANEL REPORT ON THE NASA AMES
- MANAGEMENT REVIEW - November 6, 1992
-
- *******************************************************
-
- David Sobel
- Legal Counsel
- CPSR Washington Office
-
- ------------------------------
-
- Date: Mon, 21 Dec 92 09:08 EST
- From: "Michael E. Marotta" <MERCURY@LCC.EDU>
- Subject: Hysteria from Forbes via NPR
-
- GRID News. December 22, 1992.
- ISSN 1054-9315. vol 3 nu 9.
- ++++++++++++++++++++++++
- "Morning Edition and Hackers" by Michael E. Marotta
-
- On December 21, NPR's "Morning Edition" repeated the highlights of a
- cover story in FORBES Magazine about so-called "hackers." These
- computer criminals siphon money from the EFT networks and they steal
- telephone time. The NPR piece would have been silly except that it
- feeds the hysteria directed against people who love to work with
- computers. Stories like these validate the witch hunts carried out by
- the Secret Service and FBI against hackers.
-
- Instead of HACKERS, substitute AUTOMOBILE DRIVERS. Automobile drivers
- aid organized crime. The mafia learns to drive cars. Sometimes
- people rent cars to crime lords. And when there aren't enough cars,
- the underworld steals them. But isn't this silly? We are talking
- about DRIVING A CAR...
-
- Yes, some CRIMINALS can use a computer. Singing about Pretty Boy
- Floyd, Woody Guthrie said, "some men will rob you with a six gun, some
- with a fountain pen." That was the 1930s. This is the 1990s. There
- is a word for people who canNOT program a computer: the word is
- ILLITERATE.
-
- Perhaps these crooks are doing the electronic equivalent of making
- incorrect change and pocketing the difference. As the clericals of
- the multinationals, these workers have the best opportunity to siphon
- money. The Federal Reserve clearing house alone runs a TRILLION
- dollars EACH DAY. NPR and Forbes worried about "a quarter of a
- million" dollars. The ratio of 250,000 to one trillion is like an
- urchin coming upon two men pushing a skid down the street with $4
- million in loose bundles and plucking ONE DOLLAR for herself.
-
- There is a wider issue, however. EFT is supposed to be protected by
- the Data Encryption Algorithm created by IBM for the Department of
- Commerce. People who steal EFT money may be hacking the DEA. Back in
- 1984, a paperback novel, The Big Byte, told about just such an event.
- The entire banking system was shut down by a group of religious
- terrorists who cracked the DES. Only a small fraction of our money is
- in cash. Without checking and plastic, the economy would slam shut in
- a few hours.
-
- Fear of these possibilities drives the law enforcement community to
- dog hackers. However, the cops have a poor track record at
- technology. Fifty years ago, the Feds harassed J. Robert
- Oppenheimer because he was a communist. The plans for the atom bomb
- were stolen by Klaus Fuchs, a Briton working at Los Alamos. In
- retaliation, Julius and Ethel Rosenberg of New York were executed.
- Today the Feds harass "hackers" while the crooks like Senator Lloyd
- Bentsen line up on the Clinton gravy train and con men like Newt
- Gingrich get rich by complaining about not being there themselves.
-
- On December 19, CNN Headline News announced that new rules now require
- banks to have $2 in capital for every $100 in loans. The new
- regulations will limit bank failures to "only 23" in 1993.
-
- You don't need a computer to put two and two together.
-
- (GRID News is FREQable from 1:159/450, the Beam Rider BBS)
-
- ------------------------------
-
- Date: Tue, 22 Dec 1992 14:19:51 EDT
- From: Marc Rotenberg <Marc_Rotenberg@WASHOFC.CPSR.ORG>
- Subject: OECD Security Guidelines
-
- OECD SECURITY GUIDELINES
-
- The Organization for Economic Cooperation and Development
- (OECD) has adopted international Guidelines for the Security of
- Information Systems. The Guidelines are intended to raise awareness
- of the risks in the use of information systems and to establish a
- policy framework to address public concerns.
-
- A copy of the press release and an excerpt from the Guidelines
- follows. For additional information or for a copy of the guidelines,
- contact Ms. Deborah Hurley, OECD, 2, rue Andre-Pascal, 75775 Paris
- Cedex 16, 33-1-45-24-93-71 (fax) 33-1-45-24-93-32 (fax).
-
- Marc Rotenberg, Director
- CPSR Washington office and Member,
- OECD Expert Group on Information System Security
- rotenberg@washoc.cpsr.org
-
- =============================================================
-
- "OECD ADOPTS GUIDELINES FOR THE SECURITY OF INFORMATION SYSTEMS
-
- "The 24 OECD Member countries on 26th November 1992 adopted
- Guidelines for the Security of Information Systems, culminating almost
- two years' work by an OECD expert group composed of governmental
- delegates, scholars in the fields of law, mathematics and computer
- science, and representatives of the private sector, including computer
- and communication goods and services providers and users.
-
- "The term information systems includes computers,
- communication facilities, computer and communication networks and the
- information that they process. These systems play an increasingly
- significant and pervasive role in a multitude of activities, including
- national economies, international trade, government and business
- operation, health care, energy, transport, communications and
- education.
-
- "Security of information systems means the protection of the
- availability, integrity, and confidentiality of information systems.
- It is an international issue because information systems frequently
- cross national boundaries.
-
- "While growing use of information systems has generated many
- benefits, it has also shown up a widening gap between the need to
- protect systems and the degree of protection currently in place.
- Society has become very dependent on technologies that are not yet
- sufficiently dependable. All individuals and organizations have a
- need for proper information system operations (e.g. in hospitals, air
- traffic control and nuclear power plants).
-
- "Users must have confidence that information systems will be
- available and operate as expected without unanticipated failures or
- problems. Otherwise, the systems and their underlying technologies
- may not be used to their full potential and further growth and
- innovation may be prohibited.
-
- "The Guidelines for the Security of Information Systems will
- provide the required foundation on which to construct a framework for
- security of information systems. They are addressed to the public and
- private sectors and apply to all information systems. The framework
- will include policies, laws, codes of conduct, technical measures,
- management and user practices, ad public education and awareness
- activities at both national and international levels.
-
- "Several OECD Member countries have been forerunners in the
- field of security of information systems. Certain laws and
- organizational and technical rules are already in place. Most other
- countries are much farther behind in their efforts. The Guidelines
- will play a normative role and assist governments and the private
- sector in meeting the challenges of these worldwide systems. The
- Guidelines bring guidance and a real value-added to work in this
- area, from a national and international perspective."
-
- PRINCIPLES
-
- "1. Accountability Principle
-
- The responsibilities and accountability of owners, providers
- and users of information systems and other parties concerned with the
- security of information systems should be explicit.
-
- "2. Awareness Principle
-
- "In order to foster confidence in information systems, owners,
- providers and users of information systems and other parties should
- readily be able, consistent with maintaining security, to gain
- appropriate knowledge of and be informed about the existence and
- general extent of measures, practices and procedures for the security
- of information systems.
-
- "3. Ethics Principle
-
- "Information systems and the security of information systems
- should be provided and used in such a manner that the rights and
- legitimate interests of others are respected.
-
- "4. Multidisciplinary Principle
-
- "Measures practices and procedures for the security of
- information systems should take into account of and address all
- relevant consideration and viewpoints, including technical,
- administrative, organizational, operational, commercial, educational
- and legal.
-
- "5. Proportionality Principle
-
- "Security levels, costs, measures, practices and procedures
- should be appropriate and proportionate to the value of and degree of
- reliance on the information systems and to the severity, probability
- and extent of potential harm, as the requirements for security vary
- depending upon the particular information systems.
-
- "6. Integration Principle
-
- "Measures, practices and procedures for the security of
- information systems should be co-ordinated and integrated with each
- other and with other measures, practices and procedures of the
- organization so as to create a coherent system of security.
-
- "7. Timeliness Principle
-
- "Public and private parties, at both national and
- international levels, should act in a timely co-ordinated manner to
- prevent and to respond to breaches of information systems."
-
- "8. Reassessment Principle
-
- "The security information systems should be reassessed
- periodically, as information systems and the requirements for their
- security vary over time.
-
- "9. Democracy Principle
-
- "The security of information systems should be compatible with
- the legitimate use and flow of data ad information in a democratic
- society."
-
- [Source: OECD Guidelines for the Security of Information Systems
- (1992)]
-
- ------------------------------
-
- Date: 16 Dec 92 22:41:38 EST
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: CU IN THE NEWS
-
- The US Government has filed espionage charges against Kevin Poulsen,
- age 28, for entering Pacific Bell's computers and allegedly obtaining
- 'high-level' military secrets. Observers say the charge is overblown
- since damage to 'national security' has not been established and no
- secrets were passed to any foreign power. (As reported in Information
- Week, Dec 14, 1992. pg 10)
-
- ++++++
-
- The Business Software Alliance (BSA), an industry coalition against
- software piracy, has filed 37 lawsuits against firms in 10 European
- countries, Thirteen of the lawsuits are against BBS' in Germany. The
- BSA says this is only a preview of how aggressive it will be in 1993.
- (Information Week, Dec 14, 1992. pg 8)
-
- ++++++
-
- The September Inc. magazine Fax Poll shows some interesting numbers
- regarding business ethics, and a peek at software piracy as well. The
- results indicate that ethical business practices vary by the age of
- the businessman and the size and age of the firm. Over half the
- respondents said they would obey ethical rules, but felt free to
- bend them to their own advantage when possible. In response to
- another question, a quarter of the respondents felt the pirating
- computer software was an acceptable business practice, just a fraction
- more than those who wouldn't hesitate to violate the privacy rights
- of a job applicant.
-
- The non-scientific poll are conducted monthly. Readers fill out a
- one-page 'survey' and fax or mail it to Inc. for tabulation. See
- the December 1992 issue for the details on the September poll on
- business ethics. (page 16)
-
- The results include:
- Q. Which of the following statements most closely approximates your
- view of ethics in business?
- 52% - I play by the rules, but I'll bend them to my
- company's advantage whenever I can.
- 46% - I tell the whole truth, all the time.
- 2% - All's fair in love and business, as long as you
- don't get caught.
- When cross-tabulated with the age of the respondent, Inc. reports
- that 34% of respondents under 35 years old tell the whole truth,
- compared with 54% of those over 45 years old. When it comes to
- bending the rules, 62% of under 35s do so, but only 40% of those
- over 45 indicated that answer.
-
- Q. Which of the following would you consider to be an acceptable
- business practice?
- 43% - Paying suppliers net 60 days but expecting net 30
- on your accounts receivable.
- 37% - Pretending your company has divisions to make it look
- bigger to clients and suppliers.
- 35% - Stealing clients from your current employer when you
- break off on your own.
- 25% - Pirating software.
- 23% - Getting around privacy rights in job interviews.
- 17% - Using a copier machine on a 30-day trial basis without
- intending to purchase it.
-
- (other responses not included in CuD summary)
-
- ------------------------------
-
- Date: Thu, 24 Dec 92 23:46:31 -0500
- From: carterm@SPARTAN.AC.BROCKU.CA(Mark Carter)
- Subject: "Any one Who Owns a Scanner is a Hacker, or..."
-
- Canadian Paper Blames BBSes for Porn
-
- ((MODERATORS' NOTE: For those not familiar with Canadian geography, we
- asked a Canadian correspondent to provide some background for the
- following story. S/he wrote: "St. Catharines is a city of about
- 125,000 people in southern Ontario, Canada. It is about 1.5 (only 110
- kilometers, but traffic slows ya down) hours from Toronto, and about
- 30 minutes from Niagara Falls. The Standard is "St. Catharines' only
- local newspaper, with an (unofficially, but optimistically) estimated
- circulation of about 80,000 subscribers."
-
- Although these stories date back to July, the illustrate that Canadian
- media, like their U.S. counterparts, are prone to exaggerate a "hacker
- menace."))
-
- ++++++
-
- The following newspaper stories were featured on the front page of the
- St. Catharines Standard on July 25, 1992, and continued on the third
- page. They were aimed at a specific "slant" of local bulletin boards,
- that of pornographic Gifs, and consequently ended up portraying local
- BBS's as sinister distributors of hard-core pornography that
- "frightens" both parents and legislators, two groups who it is
- constantly pointed out do not understand even the most rudimentary
- basics of operating a computer. Yet these same people are encouraged
- to form legislation governing bulletin boards.
-
- These articles continually emphasized the "frighteningly" rampant
- availability of pornography through BBSs to young users. However, the
- young user angle exposes one of the article's greatest fallacies,
- which is the assumption that there are hordes of nine-year-olds
- downloading megabytes upon megabytes of extremely hard-core
- pornographic files. This is simply not the case.
-
- I personally know of no user of local boards under the age of 12, and
- think that such an occurance would be rare at best, since below 12,
- most kids simply don't know how to use their computers, or think of
- them along the same lines as dedicated game machines such as Nintendo
- and Sega. In fact, only a small minority of teenagers will possess
- the computer know-how to join the online community, and these
- teenagers are not the little children the Standard is so frightened
- for.
-
- Further, the Standard totally ignores the fact that only a small
- number of boards carry the hard-core material that they found, and
- those that carry gifs have the gifs as a small minority compared to
- the rest of the files they carry. Not to mention that in their
- portrayal of boards as sinister syndicates, the Standard ignores the
- existence of the Fidonet message network(in which nearly all local
- boards take part), which parents would no doubt like their teenagers
- to take part in. The Standard also ignores the availability of files
- which are not pornographic, let alone Gifs.
-
- It should be noted that all three articles were written by the same
- authors, presenting the same views. Neither of the authors is known
- in the local online community. Though five months old, these articles
- are relevant in relation to the recent Munroe Falls case, where a
- sysop was arrested for having pornographic material on his board.
-
- Below are verbatim transcripts of the three articles. The front page
- article comes first, and is followed by the two others that were on
- the third page.
-
- KIDS CAN SEE HARD-CORE PORN AT TOUCH OF A BUTTON
- ++++++++++++++++++++++++++++++++++++++++++++++++
- by Paul Forsyth and Andrew Lundy (Standard Staff)
-
-
- Computer wise kids in Canada may be getting an education their parents
- never dreamed of.
-
- At this moment, children are firing up their computers and using
- telephones to patch into a vast network of files available for free.
- What's at their fingertips would shock even hardened purveyors of
- pornography.
-
- Computer sex has arrived. Throughout Niagara dozens of public access
- bulletin boards are thriving. Across Canada there are thousands more.
- Anyone with a modem and phone line can connect with the boards and
- access files for their own use. Many of the boards, operated by
- hobbyists through their home computers, offer explicit photographs and
- stories ranging from topless women to bondage and bestiality.
-
- Most of it is easily accessible to kids who are as comfortable with
- computers as their parents are uneasy. The phenomenon has lawmakers,
- police and even Ma Bell feeling helpless.
-
- Tony Brandon, who runs Towne Crier-- of of St. Catharines' oldest
- bulletin boards dating back to 1984-- now bans porn on his system. He
- decided to restrict what users could send to his board when soft-core
- images of the mid-1980's became increasingly graphic.
-
- He said the number of adult files are "escalating in all the weird
- areas ... Some of them are pretty hard, heavy-duty stuff." After he
- banned the porn, the average age of his board users jumped several
- years, from 12-14 to 19-20. Brandon sees that as proof the main
- consumers are young teens.
-
- Some boards try to screen users accessing adult files, but Brandon
- found kids simply lied about their ages. Many system operators offer
- instant access to their programs with few age or identification
- checks.
-
- On a recent weekday, for example, two Standard reporters easily
- accessed a spate of adult files on local boards-- images ranging from
- soft-core centrefolds to hard-core images pushing the legal limits of
- obscenity. Police say it is difficult to lay charges because most of
- the files--other than bestiality, child porn or dehumanizing, violent
- or degrading material --- are legal under the Criminal Code. And
- federal law does not restrict kids' access to porn of any kind.
-
- St. Catharines has no bylaw covering availability of pornography, said
- city clerk Tom Derreck. Even if it did, local bylaws wouldn't apply
- to bulletin boards because telecommunications is a federal
- jurisdiction.
-
- Police are hesitant to charge the thousands of board operators across
- the country, despite the fact many carry material clearly obscene
- under the Criminal Code. That is because it is difficult to nail down
- where the files-- many originating in the U.S.-- come from, said
- Inspector Ray Johns, in charge of the vice unit of the Winnipeg police
- force.
-
- The rapid advancement of computer technology has caught police,
- lawmakers and anti-porn organizations off guard. Some women's groups
- which have taken hard-line stands against pornography are not even
- aware bulletin board porn exists.
-
- "I wouldn't even understand how this thing operates," St. Catharines,
- anti-porn crusader Diane Eby said of the bulletin boards. Project P,
- a joint Ontario Provincial Police/Metro Toronto Police unit which
- investigates pornography and hate literature, says there is nothing
- the unit can do about computer porn available to kids.
-
- "There's thousands of them, they're all over the place,"
- Detective-Sergeant Bob Matthews, head of the unit, said of the
- bulletin boards. "You can almost find anything you're looking for."
-
- That's what frightens St. Catharines resident Mark Jefferies, who was
- shocked recently to find a colour photo, depicting two women engaged
- in bestiality, on a local bulletin board his 15-year-old son connects
- with. "That's going too far," said Jeffries. "That's where it's got
- to be stopped. Nine-year-old boys will see that. It sickens me."
-
- Fearful parents can forget about complaining to Bell Canada. The
- phone company has been told by the Canadian Radio-Television and
- Telecommunications Commision that censorship won't be tolerated.
-
- A recent attempt by Bell to axe its 976 service-- after heat from
- parents over phone sex services-- was shot down by the CRTC. "We're
- the medium, not the message," said Bell spokeswoman Ruth Foster.
- "We're not supposed to influence that communication at all or control
- it in any way."
-
- Meantime, kids are using computers in ways their parents never
- imagined. For example, one St. Catharines board run by a high school
- student has photos of naked women among those of Goofy, Mickey Mouse
- and Roger Rabbit.
-
- The student, who operates Hogan's Alley, a three-year-old bulletin
- board, is trying to clear all the adult files from his computer after
- complaints from female users. But the teen, who didn't want his name
- used, can't keep pace with users who keep sending pornographic files.
-
- Hugh Mitchell, a St. Catharines physician who runs another board, is
- fed up with the trend to porn files. "There is a big demand(for
- porn)," he said. "Unfortunately, too much. I just went on my board
- last night and I couldn't believe what was going on."
-
- Problems like that prompt Towne Crier's Brandon to say legislation
- requiring boards to be licensed might be necessary to stem kids'
- access to porn. But Matthews of Project P said local computer owners
- could simply phone Texas or Australia or anywhere else in the world
- and download porn. "It can come from any place," he said. "This is
- getting to be a problem throughout North America and the world."
-
- It's the global nature of telecommunications which is causing
- headaches for Canadian universities wrestling with pornography on
- their computer systems. The University of Manitoba recently yanked
- offensive files from a computer network it is connected to after word
- got out about stories and photographs that included child pornography
- and women hanging from chains.
-
- Johns, of the Winnipeg police, said the stories were "how-to" manuals
- involving incest and torture for sexual gratification. Other
- universities across the country, including Brock University, still
- carry the files.
-
- "There's a whole lot of legal questions because of the computer. It's
- a grey area," said Johns, who is waiting for clarification on the
- issue in the courts. Don Adams, director of computing and information
- services at Brock, said universities are in a quandary about what to
- do with offensive files. "You can't really censor the damn network,
- but on the other hand you don't want to carry all this junk, either."
-
- Anti-porn activist and feminist Emilie Fowler, with the Social Justice
- Committee of Niagara Falls, fears young males have unlimited access to
- hard-core porn in Niagara. "This is out there, and most people are
- really not aware of it. Parents go merrily off to work and their
- young sons are accessing it. What kinds of opinion are they going to
- form about women?"
-
- She had few kind words for those creating the adult computer files.
- "It's a chilling thought that some of these guys would do this for a
- hobby. Sit around and think of rape scenes for a hobby? That really
- frightens me."
-
- Jefferies, the concerned father who bought a home computer nearly
- seven years ago, said his son has assured him he doesn't view the porn
- on local bulletin boards. Bt he admits that, when he was that age, he
- probably would have through sheer curiosity. An adult can see
- whatever they want, as long as it's not hurting anyone. It's the kids
- I'm worried about."
-
- Matthews and Forster at Bell say they've received virtually no
- complaints about porn on bulletin boards. Matthews figures that is
- because parents simply don't know it is out there. Kids are
- "certainly not going to complain."
-
-
- SEEING COMPUTER FILES EASY
- ++++++++++++++++++++++++++
- by Paul Forsyth and Andrew Lundy (Standard Staff)
-
- Phone lines aren't just for chatty humans any more. The computer
- revolution that transformed the world in the '80s has also changed Ma
- Bell. Today telephones buzz with digital chatter, gibberish to the
- human ear but the heart and soul of computer lingo.
-
- At this moment, probably hundreds of phone lines in St. Catharines are
- hooked to modems-- small electronic devices that are translators for
- computers. THey make it possible to transmit not only text, as fax
- machines do, but also programs like word processing, spreadsheets,
- games and high-quality graphics.
-
- For less than $100, computer owners can buy a modem and unlock the
- door to a little-known sub-culture of public access bulletin boards
- that has been growing throughout North America for more than a decade.
-
- By running a program which displays text and graphics from other
- computers on the screen, users can become members of bulletin boards
- anywhere in the world. The boards are electronic meeting places where
- users can talk to other computer enthusiasts, play games and exchange
- messages or files. They are usually set up on home computers by
- hobbyists who spend hours a day maintaining the boards, updating files
- and enforcing whatever rules they have established-- like no swearing,
- or racist jokes.
-
- Practically every board-- there are dozens in Niagara alone-- has an
- area for graphics files, often labelled GIFs. The photos find their
- way into computers by anonymous hackers using scanners, an electronic
- device similar to a photocopier. But instead of paper, what's
- produced is an on-screen image that's often as vivid as the real
- thing. Accessing these files is as easy as typing a few instructions:
- telling the board what file you want, the way you want to transmit
- it-- called downloading-- then simply hitting the return key.
-
- Once files are transferred, they can be viewed on-screen or printed
- out. They can be sent to other computer just as easily as they were
- received.
-
- That's how photo files that violate Canadian obscenity laws have ended
- up in the Garden City. Passed on from user to user via anonymous
- phone lines, they've wound their way from the original hacker, through
- many other bulletin boards, to computer screens of curious children
- throughout Niagara.
-
- IMAGES SHOCK JUSTICE ASSISTANT
- ++++++++++++++++++++++++++++++
- by Paul Forsyth and Andrew Lundy (Standard Staff)
-
- Rob Nicholson's face grew grim as the computer image flashed on the
- screen. Two words escaped from his mouth: "My God."
-
- The Niagara Falls MP and assistant to federal Justice Minister Kim
- Campbell was getting a crash course on computer pornography and its
- availability to children in Niagara. It scared him.
-
- "This is news to me," he admitted in his riding office, as a photo of
- bestiality appeared. "I have to believe this is news to most
- Canadians."
-
- Two reporters dropped by yesterday to show him a cross-section of
- hundreds of porn files easily available on local computer bulletin
- boards-- files even board operators admit are big draws for
- computer-literate young teens.
-
- Nicholson promised to make Campbell aware of the issue, but admitted
- the wheels of legislative change move slowly. As an example, as
- recently as two years ago a person would be charged if caught setting
- fire to someone's garden. But burning a car wasn't considered arson,
- because cars had not been invented when the Criminal Code was written.
-
- Nicholson pointed out that the combination of pornography-- a thorny
- political issue-- and rapidly changing computer technology makes
- drafting effective legislation a daunting task.
-
- "I don't know what the ... solution is to this. It bothers me that we
- don't have a magic bullet. This wonderful new technology is being
- perverted. It scares me as a parent."
-
- ------------------------------
-
- Date: Fri, 8 Jan 1993 17:34:58 -0500
- From: Gerard Van der Leun <van@EFF.ORG>
- Subject: FYI: 3rd Computers, Freedom and Privacy Conference
-
- CFP'93
- The Third Conference on Computers, Freedom and Privacy
- 9-12 March 1993
- San Francisco Airport Marriott Hotel, Burlingame, CA
-
- The CFP'93 will assemble experts, advocates and interested people from
- a broad spectrum of disciplines and backgrounds in a balanced public
- forum to address the impact of computer and telecommunications
- technologies on freedom and privacy in society.
-
- Participants will include people from the fields of computer science,
- law, business, research, information, library science, health, public
- policy, government, law enforcement, public advocacy and many others.
- Some of the topics in the wide-ranging CFP'93 program will include:
-
- ELECTRONIC DEMOCRACY - looking at how computers and networks are
- changing democratic institutions and processes.
-
- ELECTRONIC VOTING - addressing the security, reliability, practicality
- and legality of automated vote tallying systems and their increasing
- use.
-
- CENSORSHIP AND FREE SPEECH ON THE NET - discussing the problems of
- maintaining freedom of electronic speech across communities and
- cultures.
-
- PORTRAIT OF THE ARTIST ON THE NET - probing the problems and potential
- of new forms of artistic expression enabled by computers and networks.
-
- DIGITAL TELEPHONY AND CRYPTOGRAPHY - debating the ability of
- technology to protect the privacy of personal communications versus
- the needs of law enforcement and government agencies to tap in.
-
- HEALTH RECORDS AND CONFIDENTIALITY - examining the threats to the
- privacy of medical records as health care reform moves towards
- increasing automation.
-
- THE MANY FACES OF PRIVACY - evaluating the benefits and costs of the
- use of personal information by business and government.
-
- THE DIGITAL INDIVIDUAL - exploring the increasing capabilities of
- technology to track and profile us.
-
- GENDER ISSUES IN COMPUTING AND TELECOMMUNICATIONS - reviewing the
- issues surrounding gender and online interaction.
-
- THE HAND THAT WIELDS THE GAVEL - a moot court dealing with legal
- liability, responsibility, security and ethics of computer and network
- use.
-
- THE POWER, POLITICS AND PROMISE OF INTERNETWORKING - covering the
- development of networking infrastructures, domestically and worldwide.
-
- INTERNATIONAL DATA FLOW - analyzing the issues in the flow of
- information over the global matrix of computer networks and attempts
- to regulate it.
-
- The conference will also offer a number of in-depth tutorials on
- subjects
- including:
-
- * Information use in the private sector * Constitutional law and civil
- liberties * Investigating telecom fraud * Practical data inferencing *
- Privacy in the public and private workplace * Legal issues for sysops *
- Access to government information * Navigating the Internet
-
- INFORMATION For more information on the CFP'93 program and advance
- registration call, write or email to:
-
- CFP'93 INFORMATION 2210 SIXTH STREET BERKELEY, CA 94710 (510) 845-1350
- cfp93@well.sf.ca.us
-
- A complete electronic version of the conference brochure with more
- detailed descriptions of the sessions, tutorials, and registration
- information is also available via anonymous ftp from sail.stanford.edu in
- the file: pub/les/cfp-93
-
- ------------------------------
-
- End of Computer Underground Digest #5.02
- ************************************
-