home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Wed Feb 17, 1993 Volume 5 : Issue 14
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Copy Editor: Etaion Shrdlu, Seniur
-
- CONTENTS, #5.14 (Feb 17, 1993)
- File 1--Re: CuD, #5.11 - SPA's Piracy Estimates
- File 2--Cu News: Pirate Amnesty, Toll Fraud Decline, etc
- File 3--Re: EFF in Time's Cyberpunk Article
- File 4--Behar's Response to Godwin
- File 5--Censorship in Cyberspace
- File 6--Undercover Rambos?? (NYT Story on "Hakr Trakr")
- File 7--Social Engineering (Re: CuD #.13)
- File 8--Cybersmut is Good
- File 9--Suggestions For a Hi-tech Crime-investigators' Seminar?
- File 10--Re: Unemployed Programmers Turning Talents to Evil (#5.13)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
- contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
- Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS
- at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352)
- 466893; and using anonymous FTP on the Internet from ftp.eff.org
- (192.88.144.4) in /pub/cud, red.css.itd.umich.edu (141.211.182.91) in
- /cud, halcyon.com (192.135.191.2) in /pub/mirror/cud, and
- ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
- Back issues also may be obtained from the mail server at
- mailserv@batpad.lgb.ca.us.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Some authors do copyright their material, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Sat, 13 Feb 93 18:56 CST
- From: gordon@SNEAKY.LONESTAR.ORG(Gordon Burditt)
- Subject: File 1--Re: CuD, #5.11 - SPA's Piracy Estimates
-
- ((In CuD 5.11, tk0jut2@mvs.cso.niu.edu summarized the Software
- Publishing Association's methodology, and wrote:))
-
- > The third set of facts is the average number of applications that
- > users are estimated to have on their personal computers. This body of
- > data comes from member research that is sent back to the SPA. The >
- members obtain this information from several sources, including >
- surveys of their own customer base and from returned registration >
- cards. The SPA estimates that the typical DOS (or Intel-based) PC user
- > has three applications, and the typical MacIntosh user has five.
-
- How does the SPA calculate the effect of system hardware upgrades by
- replacing the whole system? Often a system is not worth repairing,
- and when it breaks or gets too obsolete, it's replaced with another
- new system, and the old one is thrown out or broken down for spare
- parts. Now, not all replaced systems will be discarded - they may get
- passed on to someone else - but eventually a system isn't worth
- repairing, isn't repairable, or it's just too slow or obsolete, and
- it's no longer used. This is the situation I'm talking about. Most
- of the 8086-based systems sold went out of service somehow.
-
- How does this affect the piracy estimate? Well, you get one
- current-year system sale. It's quite possible that the system owner
- transfers his old applications to the new system. This is allowed
- under most licenses. The owner might upgrade applications as well,
- but most of the speed improvement for going, say, from a 286 to a 486
- is in the hardware, not getting a [34]86-specific application. You
- get zero new applications purchased for the new system, implying,
- incorrectly, piracy of 3 applications. What about the old system?
- Nobody buys applications for a system no longer used as a system.
-
- The estimate correctly handles the case of passing the old system on
- to someone else, who uses it as a system. If the applications are
- erased from the old system, the new owner will buy some. If the
- applications are not erased AND transferred to the new system, this is
- piracy and counts as such. If the applications stay with the old
- system, the new system owner will buy new ones.
-
- Will a new owner of an already-obsolete system buy as many
- applications as a new owner of a new system? I suppose this depends
- on how business-use applications count vs. games and personal-use
- applications. But a survey of applications will look at the
- applications on the NEW hardware, not the newly-acquired obsolete
- hardware, making the applications-per-system number higher than it
- should be.
-
- I wonder also how the estimates count non-DOS applications. It's
- practically impossible to buy a whole system without getting DOS
- bundled into the price, whether you intend to run DOS or not (Yes, I
- realize operating systems don't count as applications). Now, if I buy
- a 486 system, UNIX, and 3 UNIX applications, do they count as
- applications sold? Or do the UNIX applications count at all? How
- about if one of the applications is in source form, so the vendor
- doesn't know that it's for a 386 system?
-
- Accuracy test: Take the formula for piracy, plug in a piracy amount
- of zero (unrealistic, I know), and calculate applications-per-system.
- Subtract the SPA estimate of applications-per-system, which, as I
- understand it from this article, is 3.000000000000000 for IBM-PC-based
- systems. How much of an error in applications-per-system do you need
- to bring the piracy estimate to 0? Using the 1991 estimate of 22%,
- this would come to an error of 0.66. I am very suspicious of 2
- applications-per-system estimates that come out even integers, if
- that's the actual number and it wasn't just rounded for reporting.
-
- ------------------------------
-
- Date: 04 Feb 93 18:28:52 EST
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 2--Cu News: Pirate Amnesty, Toll Fraud Decline, etc
-
- Computer Associates, based in Islandia, NY, estimates there are
- 150,000 illegal copies of its CPA-BPI II accounting software in use.
- In an attempt to legitimize these users they are offering a $209.
- upgrade to a full, and legal, package. CA's director of financial
- products, David Duplisea, is quoted as saying "You can't stop people
- from doing something like this {pirating software} unless you provide
- them with a reason not to do it. The responsible approach is to
- provide a better alternative to piracy." {Moderators Note - If just
- 1200 people take them up on this offer, or less than 10 percent of the
- estimated illegal users, it will result in a quarter million dollars
- in revenue.} (Information Week. Jan 11, 1993 page 14)
- +++++++++++++
-
- Toll Fraud Declines
-
- Every major long distance carrier is reporting a decrease in toll
- fraud losses in 1992, as compared to 1991. Sprint says fraud against
- business customers has fallen 96%. AT&T reports only 1/8 the number
- of toll fraud incidents it had previously, and MCI echoes they too are
- seeing fewer reported cases. (Information Week. Jan 25, 1993 page
- 16)
- +++++++++++++
-
- Hacking the Internet
-
- By using a dormant account at the University of California Davis, over
- 100 hackers from all over the world were able to "raid" systems
- belonging to NASA, CIA, and DoD contractors. John Crowell, manager of
- workstation support at UC Davis, says no arrests have been made
- pending a formal investigation. The hackers were detected in October
- of 1992, and range in age from 12 to 22 years of age. {Moderators'
- Note: The news blurb does not indicate how details about the suspects
- are known without the benefit of a formal investigation.} (Information
- Week Feb 1, 1993 pg. 16)
- +++++++++++++
-
- The New York Times (Jan 26, 1993 pg B1) features an article on
-
- an undercover agent working with authorities in 28 states. See "Going
- Undercover In The Computer Underworld" by Ralph Blumenthal for
- details.
-
- ------------------------------
-
- Date: Wed, 3 Feb 1993 23:22:02 GMT
- From: mnemonic@eff.org (Mike Godwin)
- Subject: File 3--Re: EFF in Time's Cyberpunk Article
-
- ((MODERATORS' COMMENT: The following was written to TIME magazine in
- response to their cover story on Cyberpunk (8 Feb., '93) that, in a
- sidebar, identified the EFF as being a "group that defends exploratory
- hacking)).
-
- February 3, 1993
-
-
- TIME Magazine Letters
- Time & Life Building 7 Rockefeller Center
- New York, NY 10020
- Fax number: 212-522-0601
-
- In his sidebar to your cover story on the cyberpunk phenomenon
- ["Surfing Off The Edge," Feb. 8], Richard Behar quotes me accurately,
- but he grossly misrepresents my organization, the Electronic Frontier
- Foundation, as "a group that defends exploratory hacking." In fact, we
- have always condemned even nonmalicious computer intrusion as
- ethically unacceptable, and we have always insisted that such
- intrusion should be illegal.
-
- What makes Behar's comment particularly odd is the fact that, just two
- weeks before this story, TIME correctly identified EFF as "a
- not-for-profit group devoted to protecting the civil liberties of
- people using electronic networks." ["Who's Reading Your Screen?" Jan.
- 18.] Even the most minimal research on TIME's part would have shown
- that we're no hacker defense fund; our efforts range from supporting
- appropriate computer-crime legislation to promoting the growth of, and
- public access to, our nation's emerging information
- infrastructure--including what Vice President Al Gore has called
- "high-speed data highways."
-
- Occasionally our civil-liberties mission requires us to be involved in
- computer-crime cases, much as the ACLU may involve itself in other
- kinds of criminal cases. But it's inexcusable of TIME to
- mischaracterize our organization's efforts to protect defendants'
- rights as a defense of computer crime itself. Your magazine seems to
- have forgotten that it is perfectly possible to oppose computer crime
- at the same time one supports civil liberties--as one of our founders,
- Mitchell Kapor, writes in the September 1991 issue of Scientific
- American, "It is certainly proper to hold hackers accountable for
- their offenses, but that accountability should never entail denying
- defendants the safeguards of the Bill of Rights, including the rights
- to free expression and association and to freedom from unreasonable
- searches and seizures."
-
- TIME's misrepresentation of EFF in Behar's article is likely to damage
- both our reputation and our effectiveness. TIME owes EFF an apology
- and its readers a correction.
-
-
- Mike Godwin Work: 617-864-0665
- Legal Services Counsel
- Electronic Frontier Foundation
- Cambridge, Massachusetts
-
- ------------------------------
-
- Date: Wed, 17 Feb 92 18:11:22 CST
- From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
- Subject: File 4--Behar's Response to Godwin
-
- Mike Godwin's response to Richard Behar refers to a single, but
- damaging, sentence in the TIME (8 Feb, '93) Cyberpunk article in which
- Behar writes:
-
- "Being arrogant and obnoxious is not a crime," argues
- attorney Michael Godwin of the Electronic Frontier
- Foundation, a group that defends exploratory hacking (p. 65).
-
- Even those minimally familiar with EFF's position know that EFF has
- never defended computer intrusion, and there is sufficient evidence
- from EFF personnel and the texts of EFFector, among other sources,
- that Behar's claim signifies another example incompetent journalism.
- It is one thing to distort a position. It is another to create a
- position contrary to what a subject holds. How does Behar respond when
- alerted to his error?
-
- Richard Behar responded to Mike Godwin's letter in the most curious
- way. We reprint it below. Although we agree with those who argue
- that public postings of private communications generally violate
- courtesy norms, we make an exception in this case for several reasons.
- First, because Behar made a demonstrably inaccurate and damaging claim
- against EFF, his response is relevant to placing Behar's offensive
- claims in context. Second, Behar's claim reflects insights into an
- individual reporter's mindset, and as suggested by the commets below,
- this mindset can reflect an abysmal disregard of facts. Third,
- Behar's response suggests a self-serving rationale and an
- unwillingness to assume responsibility for irresponsible reporting.
- Finally, as an issue of fairness, reprinting Behar's letter avoids any
- possibility of misrepresentation of a summarized condensation.
-
- +++++
-
- February 8, 1993
-
- Mr. Michael Godwin
- Electronic Frontier Foundation
- 155 Second Street
- Cambridge, MA 02141
-
- Dear Michael:
-
- After our conversation last week, I went back and reviewed the notes
- of our initial interview, as well as other materials in my file. I
- also gave the subject of EFF a great deal of thought and came away
- with the conclusion that you are trying to have it both ways.
-
- For example, Mitch Kapor has stated that while it's proper to hold
- hackers accountable for their offenses, we should view exploratory
- hacking as something akin to "non-criminal trespass." To me, this is
- not a sanction or a blessing, but it certainly barks and quacks and
- smells like a defense.
-
- Michael, you admitted that EFF has worked closely with hacker defense
- lawyers, although "not publicly." Well, could the reason for the
- secretiveness be that EFF is, as you put it, "an inch away" from
- gaining credibility on Capitol Hill as a mainstream group?
-
- You referred to the MODsters as "kids" whose alleged crimes are
- "pretty innocuous" (with the exception of the TRW and Learning Link
- incidents). You stated that one way America deals with its fears
- about computer power is to "attack post-adolescent computer explorers
- and paint them as thugs." If this doesn't amount to a defense of
- hackers, I don't know what does.
-
- In closing, if there is any murkiness about the work of EFF, let me
- suggest that the organization itself -- and not the press --is the
- source of the murk.
-
- Sincerely yours,
-
- Richard Behar
-
- cc/Mitch Kapor
-
- ++++
-
- As others have pointed out, Behar's defense of his inaccuracy draws
- from a conversation with Mike Godwin *after* the article was printed.
- Behar never alludes to any evidence in his possession prior to writing
- the article, but skirts the issue by alluding to the conversation with
- Godwin *after* publication. Behar appears to have written his
- commentary without possession of facts.
-
- Behar also accuses EFF of "wanting it both ways" because Mitch Kapor
- is uncomfortable with criminalizing generally juvenile exploration.
- Behar glibly asserts that "if it quacks like a duck...." it must be a
- defense. Can Behar not recognize that one can oppose computer
- trespass, as EFF's public statements have consistently done, and
- oppose draconian criminal sanctions, as EFF's public statements have
- consistently done, without advocacy? Does Behar not recognize that
- there is a long, visible, and explicit public record of EFF statements
- that explicitly disavow "exploratory hacking?" Does Behar not
- recognize that to oppose criminalization of some behaviors hardly
- means that one necessarily defends those behaviors?
-
- Behar suggests that EFF is disingenuous in its view of hackers because
- it is trying to establish credibility on "Capitol Hill" as a
- "mainstream group." Behar's evidence for this, according to his
- letter, is Godwin's claim that EFF has worked "not publicly" with
- defense lawyers. Using this logic, would Behar also claim that any
- attorney who gave advice to a defense team defending a murderer or an
- arsonist is therefore defending murder or arson? Is objection to law
- enforcement depiction of "hackers" as demons and threats to national
- security, as has demonstrably occured in the PHRACK trial (and others)
- tantamount to defending computer intrusion? If so, then paralogia
- must be a virtue for TIME reporters.
-
- Behar concludes with the claim that EFF, not he, is at fault for
- distorting EFF's position on "hackers." Despite ample and easily
- accessible evidence to the contrary, Behar just doesn't seem to
- understand that maybe he didn't get it right. Behar simply didn't do
- his homework. He was wrong. Flat out wrong. Worse, rather than
- apologize, his letter suggests he is blaming is victim for his own
- incompetency. Neither his article nor his letter produces any factual
- justification, and his attempt to rationalize an egregious error by
- adducing post-publication information (which is neither substantive
- nor convincing) resembles the defense of someone caught red-handed
- with their hand in the cookie jar.
-
- Behar's reporting and his subsequent response severely damage the
- credibility of TIME.
-
- ------------------------------
-
- Date: Thu, 11 Feb 93 20:17 EST
- From: "Michael E. Marotta" <MERCURY@LCC.EDU>
- Subject: File 5--Censorship in Cyberspace
-
- Excerpts from "Censorship in Cyberspace" (c) 1993 by Michael E.
- Marotta the complete text (2000 words) appears in the ($5) 1993 Retail
- Catalog of Loompanics, P. O. Box 1197, Port Townsend, WA 98368.
- Founded in 1974, Loompanics, publishers of unusual books, features
- about 300 titles on privacy, underground income, self-defense, etc.
-
- +++++
-
- As Ayn Rand noted, when people abandon money, their only alternative
- when dealing with each other is to use guns. Yet, the
- anti-capitalist mentality permeates cyberspace. Most public systems
- and networks actually forbid commercial messages. So, computer sysops
- and network moderators are reduced to cavalier enforcement of their
- personal quirks.
-
- When Tom Jennings created Fidonet, Omni magazine called him an "online
- anarchist." Since then, Fidonet has developed a governing council and
- lost Jennings. Over the last two years, I have been banished from
- these Fidonet echoes:
-
- * Stock Market for saying that Ivan Boesky is a political
- prisoner
- * Virus for saying that viruses could be useful
- * Communications for saying that telephone service
- should not be regulated by the government
- * International Chat for asking "How are you" in Hebrew
- and Japanese.
-
- Kennita Watson, whom I met on Libernet, told me this story:
-
- When I was at Pyramid, I came in one day and
- "fortune" had been disabled. I complained to
- Operations, and ended up in a personal meeting with
- the manager. He showed me a letter from the NAACP
- written to Pyramid threatening to sue if they
- didn't stop selling racist material on their
- machines. They cited a black woman who had found
- the "...there were those whose skins were black...
- and their portion was niggardly.... 'Let my people
- go to the front of the bus'..." fortune, and
- complained to the NAACP. I suspect that she (and
- the NAACP) were clueless as to the meaning of the
- term "niggardly". I (as a black woman) was
- embarrassed and outraged. Because of the stupidity
- of a bunch of paranoid people, I couldn't read my
- fortune when I logged out any more. "
-
- It is important to bear in mind that to the censor, censorship, like
- all evils, is always an unpleasant but necessary means to achieve a
- good result. Robert Warren is a sysop who replied to an article of
- mine on Computer Underground Digest. He said: ... People have a right
- to say what they want in public, but some don't care about the
- responsibility that comes with it. So you zap 'em." Now, there is no
- argument with his basic premise: Since he owns the equipment, he has
- the final say in its use. This is his right. Likewise, the
- administrators of publicly-funded university computers also engage in
- censorship under a mandate to serve the people who pay taxes. "All
- power tends to corrupt and absolute power corrupts absolutely," the
- historian John E. E. Acton said. It is no surprise that this applies
- in cyberspace.
-
- Political and social freedom have little to do with constitutions
- or elections. Congress could choose a new prime minister every day or
- the people could elect the secretary of state to a three year term.
- The details are unimportant. Some places are free and some places are
- controlled because the people in those places need freedom or accept
- oppression. It always comes back to the individual.
-
- Dehnbase Emerald BBS is home to libertarian and objectivist
- discussions and is a vital link in Libernet. The number is (303)
- 972-6575. Joseph Dehn is not interested in enforcing rules.
-
- Albert Gore and George Bush agreed on the need for a "data
- superhighway." The Electronic Frontier Foundation has recommended
- that this national network be open to commercial enterprises. This is
- good. An open market is the best protection against power and
- corruption.
-
- ------------------------------
-
- Date: Sat, 6 Feb 93 09:28:01 PST
- From: anonymous@by.request.com
- Subject: File 6--Undercover Rambos?? (NYT Story on "Hakr Trakr")
-
- >From the New York Times, Tues. Jan 26 (A-20 of the Midwest Edition)
- comes a piece by Ralph Blumenthal: "Officers Go Undercover to Battle
- Computer Underworld."
-
- The piece begins:
-
- >NEW YORK, Jan. 25 -- He patrols the back alleys of cyberspace at
- >the edge of the electronic frontier. Traveling on eams of
- >electrons, he is invisible, formless--the ultimate undercover
- >agent.
- >
- >He's "Phrakr Trakr" of the Hi-Tech Crime Network. But don't look
- >for him in comic books or the video store. He's real.
-
- The piece continues by explaining that his takes in "the thousands" of
- BBSes that are generally law-abiding but "increasingly....have become
- underground marketplaces for stolen telephone access codes and credit
- card numbers, along with child pornography and other contraband." The
- agent's network, says the piece, spans 28 states and he puts out a
- newsletter called "FBI" (for "Find um, Bust um, Incarcerate um." In
- June, he uploaded a taunt on BBSes from a Police song:
- Every move you make,
- Every brath you take,
- We'll be watching you.
-
- His goal, according to the article, was to sow "anarchy, chaos,
- mistrust and fear" in the "phracker community."
-
- The article indicates that the agent has spent around $4,000 of his
- on money on computer equipment and telephone bills.
-
- >Though his investigations have yet to yield arrests, he said
- >he is studying nilne boards and building cases with officers
- >in three other states.
-
- The agent is reported as claiming that PERHAPS 10 PERCENT OF
- THE NATION'S ESTIMATED 30,000 ELECTRONIC BULLETIN BOARDS
- TRAFFIC IN STOLEN INFORMATION, CHILD PORNOGRAPHY, POISON RECIPES,
- AND BOMB-MAKING INSTRUCTIONS.
-
- >To get onto a bulletin board, a computer users needs only a
- >communications program like Crosstalk and a modem that will send
- >and receive signals over a phone line....
-
- >But so-called underground boards offering illicit services
- >require secret passwords, usually granted only to those who
- >attend face-to-face meetings intended to weed out the police.....
-
- The article reports that the officer used a software program on an
- IBM clone and a modem to get on a board.
-
- >He did this byusing false identification and access
- >passwords he had acquired by satisfying a series of questions
- >testing is authenticity.
-
- >He was scanning the messages when the systems operator who
- >policed the board broke in: "What's up need any help?"
- >
- >"Yo dude," he typed out, "looking fer AT&Ts got any?"
- >
- >The operator provided the handle, or nickname, of someone who
- >might have credit-card calling numbers.
- >
- >Phrakr Trakr left a message for hilm and addressed the operator.
- >"thanks for the codez," he typed, ading: "You only one getting
- >any."
-
- A cop copping an attitude like 12 year old kids usually winds up
- chasing 12 year old kids. Here's one cop who sounds like he needs a
- long vacation, a stint in Kevin Mitnick's Hacker's Anonymous spa, or a
- strong does of reality pills. We have a Barney Fife with an identity
- crisis and too much free time on his hands. We have another clueless
- reporter who doesn't know what questions to ask or what's important to
- report. We have another plot and superhero for a resurrected "phrakr
- trakr chronicles." Mostly, we have another example of why the media
- needs remedial education on cyberspace issues. It's up-hill all the
- way, ain't it???
-
- ------------------------------
-
- Date: Mon, 15 Feb 93 17:23:33 EST
- From: Cal <PRYLUCK@VM.TEMPLE.EDU>
- Subject: File 7--Social Engineering (Re: CuD #.13)
-
- In reading again in CuD 5.13 of the exploits of Mitnick and DiCiccio
- described as social engineering I was reminded of an earlier
- generation of confidence men described in some books published perhaps
- fifty years ago. The only one that comes immediately to mind
- describes the exploits of Yellow Kid Weil in operating both what they
- called the "Big Store" or short cons. The Pigeon Drop is the classic
- short con that can be worked on a street corner by two knowledgeable
- cons (not always men; women are good at the scam). We have a woman in
- our neighborhood who comes around with a "tale" about being a neighbor
- (often using a real neighbor's name) who needs $9.75 for asthma
- medicine for her sick child. She promises to return the money when
- her husband comes home.
-
- People are being taken by this probable sounding tale; if you ask to
- see the child there is one in a stroller on the sidewalk.
-
- I was reminded further of a twelve year old of my acquaintance whose
- voice had changed early who called a small town bank and told them
- that he was laid up and would be sending his son down with a check
- that he needed to cash. Unfortunately for the boy his handwriting
- hadn't kept up with his voice and sophistication on the phone. If he
- had been able to write just a bit less like a child the bank would
- likely have cashed the check.
-
- I don't know how much direct relevance any of this has to do with
- computer security; just thought it might be useful to place the whole
- matter in a larger context.
-
- ------------------------------
-
- Date: Thu, 11 Feb 93 20:20 EST
- From: "Michael E. Marotta" <MERCURY@LCC.EDU>
- Subject: File 8--Cybersmut is Good
-
- GRID News. February 10, 1993.
- ISSN 1054-9315. vol 4 nu 1.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- (57 lines) "Cybersmut is Good" by Michael E. Marotta
-
- The 1993 Retail Catalog of Loompanics Unlimited is available for $5
- from Loompanics, P.O. Box 1197, Port Townsend, WA 98368. Loompanics,
- sellers of unusual books since 1974, offers about 300 titles on
- alternative ID, weaponry, warfare, healthcare, etc. The catalog also
- features original essays and fiction, including my article on
- "Censorship in Cyberspace" and Butler Schaffer's "The Anti-Sex League:
- The New Ruling Class." Schaffer's thesis is that sex is a profoundly
- personal pleasure and would-be rulers can't stand that. Schaffer's
- argumentation is closely-reasoned and draws from broad sources.
- Anyone who values their personal liberty will profit from reading this
- essay.
-
- Ayn Rand noted that when you compromise with someone who won't
- compromise, they win and you lose. Here in cyberspace, we have
- devoted gigabytes of storage to denouncing the Secret Service for
- raiding Steve Jackson or for persecuting so-called "hackers" and so
- on. Yet, time and again, we also allocate storage to the idea that
- sexual material is evil. "Children should not access adult GIFs." If
- you accept that premise, there is no way to reasonably draw the line.
- On Michigan Echo, libertarians and conservatives are in the majority
- and disrespect for "poli-crooks and congress-critters" is the norm.
- Isn't this DISRESPECT FOR AUTHORITY also DAMAGING TO YOUNG MINDS?
- Should children be allowed to access adult politics? Once you make
- exceptions to freedom, the list grows to include everyone.
-
- Now, you may say that you don't want YOUR CHILDREN accessing adult
- GIFs. That is your choice, to be handled in your home, just as you
- might insist that your children dry the dishes to earn their allowance
- as means of building character. You can't reasonably insist that no
- BBS carry information about other children who get their allowance
- without working for it. Likewise, you can be embarrassed by sex.
- That is your right. You have no right to demand that other people be
- equally embarrassed.
-
- If you allow in your mind that the police have the right to stop BBSes
- from providing sexually explicit material, where do you draw the line?
- If you stop pictures, can you also stop text? Anyone who fears
- sexually-explicit reading material had better avoid the writings of
- Solomon.
-
- Without sex, there is no life at the human scale. In fact, without
- sex, life might not have evolved past the single cell. Those who hate
- and fear sex, actually hate and fear life. The atrocities we witness
- on the news are not committed by self-indulgent hedonists.
-
- Cybersmut, adult GIFs, sexually explicit material, is good. You may
- not agree. You have no right to stop those who do.
-
- (GRID News is FREQable from 1:159/450, the Beam Rider BBS)
-
- ------------------------------
-
- Date: Thu, 4 Feb 93 14:05:08 PST
- From: jwarren@AUTODESK.COM(Jim Warren)
- Subject: File 9--Suggestions For a Hi-tech Crime-investigators' Seminar?
-
- I have been invited to give (or organize) a 4-hour seminar
- presenting civil liberties perspectives and concerns to a group of
- 40-60 high-tech criminal investigators on the first day of the HTCIA
- Northern California 3-day workshop in April (High Tech Criminal
- Investigators Association). They are expecting attendees from Nor Cal
- and from beyond. My understanding is that most of the members are
- sworn peace officers who are specializing in investigating high-tech
- crime; a minority are corporate and agency computer security officers.
- Most will attend the seminar (only one seminar per time-period).
- I see it as an *outstanding* opportunity to
- (a) open [more] communication channels between in-the-trenches law
- enforcement officials and civlibbies,
- (b) learn more of their concerns and problems,
- (c) enhance the chances of additional similar and expanded exchanges
- at future law-enforcement meetings through *nonconfrontational*,
- well-informed, candid discourse, and
- (d) better inform law enforcement folks of the complexities, styles
- and trade-offs in "cyberspace," and their ramifications for law
- enforcement's legitimate and significant concerns.
-
- [And -- heh! -- it will give "them" a chance to harangue "us" civlib
- types; equitable role-reversal for those cops who have entered the
- lion's den by attending any of the Computers, Freedom & Privacy
- conferences of the last several years.]
-
- I have invited an attorney who is specializing in these issues to
- join me in organizing and presenting this seminar, and am in hopes
- that her organization will support her participation. She has been
- closely monitoring related legislation in Washington, DC, and has also
- been directly involved in a major computer-search case currently being
- litigated in Texas.
-
- Query/request:
-
- I have a number of ideas for topics and perspectives to
- present/cover, and have several documents I plan to provide as
- handouts. But, I am very-much interested in receiving suggestions
- and/or papers/handouts that might be appropriate for
- presentation/distribution at a regional meeting of high tech criminal
- investigators [long on meat; short on emotion and opinion, please].
-
- Please forward comments, suggestions and copies (ideally e-copies
- for reformatting and printing in a combined handout, including a note
- permitting reproduction for this purpose). [Confidentiality of
- sources and suggesters will be protected, upon request.]
-
- --jim [forward or post elsewhere, as desired]
- Jim Warren, 345 Swett Rd., Woodside CA 94062; 415-851-7075
- jwarren@well.sf.ca.us -or- jwarren@autodesk.com
- [for identification purposes only: founder and Chair, 1991 First
- Conference on Computers, Freedom & Privacy; a recipient, 1992
- Electronic Frontier Foundation Pioneer Awards; "futures" columnist,
- MicroTimes; member, Autodesk Bd.of Dirs.]
-
- ------------------------------
-
- Date: Tue, 16 Feb 1993 23:58:42 -0700
- From: martin@CS.UALBERTA.CA(Tim Martin; FSO; Soil Sciences)
- Subject: File 10--Re: Unemployed Programmers Turning Talents to Evil (#5.13)
-
- Anyone who has been following the comp.virus (VIRUS-L) network news
- group over the past two years will recognize that Mungo and Clough's
- article on East-European computer virus writers, in the February
- issue of Discover, is shamefully out of date. I was quite surprised
- to see it's most obvious errors summarized in comp.society.cu-digest,
- as if they were both true and news.
-
- Gordon Meyer (tk0jut2@mvs.cso.niu.edu) writes:
-
- > Computer hackers in former communist countries are creating
- > mischievous and sometimes costly viruses that threaten computers
- > around the world.
- > ....
- > Investigators say Bulgaria is the source of more than 200 viruses
- > that threaten Western computers
- > ....
- > The Bulgarian virus industry developed, Pierce says, because
- > programmers there have a lot of knowledge and skill but no market
- > for their services in the economically depressed country.
-
- These ideas were published by Vesselin Bontchev about two years ago,
- His paper on "The Bulgarian Virus Factory" is available from many
- ftp servers, and has been for some time. Bulgaria has not been a
- significant source of viruses in over half a year, as far as I know.
- I'm sure Vesselin will correct me if I am wrong.
-
- > Paul Mungo and Bryan Clough, in the February issue of Discover
- > magazine, say an unidentified East Coast company lost $1 million
- > because of a virus created by a Bulgarian known as the Dark Avenger.
- >
- > The article, excerpted from an upcoming book, describes the
- > electronic exploits of the Avenger, whose work is known to Western
- > police agencies.
- >
- > The authors call 1 of his latest creations, Mutating Engine, "the
- > most dangerous virus ever" because it can disguise itself 4 billion
- > ways and has no constant characteristic that would let anti-virus
- > scanners detect it.
-
- The Mutating Engine (MtE) is a year old now, has been thoroughly
- analyzed by virus experts, and discussed almost ad-nauseam on the
- comp.virus newsgroup. The MtE is not a virus at all, but a subroutine
- that can be linked to a virus to make the virus polymorphic. While
- it cannot be detected by scan strings, algorithmic methods can detect
- all viruses that use the MtE. Most anti-virus software packages
- worth consideration have been able to detect MtE-based viruses
- for some months. Few virus writers are using it. In part this
- might be because it takes a skilled programmer to use, and partially
- because it is so readily detected by modern scanners.
-
- Four concerns have superceded the MtE, in DOS anti-virus circles.
- One is the emergence of MtE clones, such as the TridenT Polymorphic
- Engine (TPE), by one who calls himself Masud Khafir. Here the concern is
- that it takes several months to develop effective algorithmic analysis
- techniques to identify each new polymorphic engine.
-
- Second is the emergence of "User-friendly" virus development environments.
- The Virus Creation Laboratory, by Nowhere Man, of [NuKE] WaReZ, is
- a menu-driven virus-writing environment that requires no virus writing
- ability on the part of the user. Fortunately it doesn't work. But
- the more recent PS-MPC, from the Phalcon/Skism virus writing club,
- is only slightly less user-friendly, but much more effective.
-
- Third, several months ago the Dark Avenger released the bomber virus, which
- demonstrates that a single virus might be distributed randomly throughout
- an infected program, rather than prepended or appended to it. This means
- that scanners must scan the entire program, to look for the characteristic
- virus code.
-
- The fourth major problem is the overwhelming number of new viruses
- discovered, dozens per week, written by dark-avenger-wannabes. Almost
- all of these are trivial modifications of already existant viruses,
- but for each one, authors of virus scanning software must disassemble
- the code to find an effective scan string.
-
- These problems have led most researchers to the conclusion that, for
- DOS computers at least, a scanner-based defense is rapidly becoming
- unmanageable. Unfortunately it is still the most popular form of
- defense.
-
- > Little is known of the Avenger, the authors say, except that he
- > probably graduated from Sofia University in math or science, needs
- > money and is infatuated with Diana, princess of Wales, whose name
- > pops up in some of his viruses.
-
- Interviews with the Dark Avenger, by Sara Gordon, are currently
- being published in Virus News International, and have been the
- topic of much discussion over the past month, in the newsgroup
- alt.security. A lot is known about the man, including the fact
- that the Diana P. he is (or was once) somewhat taken by is not
- the Princess of Wales.
-
- > Mungo and Clough chronicle the Dark Avenger's appearances on
- > international computer bulletin boards. One Bulgarian-based
- > board, they say, has been set up just to exchange viruses.
-
- The Bulgarian-based Virus-Exchange BBS has been out of operation for
- over a year. Today the most active virus exchange Bulletin Boards are
- in The United States, Canada, and throughout the Western World. They
- are interconnected through what Sara Gordon has called the vXnet, a
- FidoNet-like virus exchange system.
-
- > Pierce says most viruses written in Bulgaria and Russia are not
- > actually "out in the wild," where they can get into foreign
- > computers.
-
- Most of them are on the above mentioned electronic bulletin boards.
- This means these viruses can show up in the wild anywhere in the
- world, at any time.
-
- It is understandable that a book might be one to two years out of
- date, by the time it is published, but I would have thought Discover
- Magazine could do better. I know comp.society.cu-digest can.
-
- ------------------------------
-
- End of Computer Underground Digest #5.14
- ************************************
-
-