home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun July 11 1993 Volume 5 : Issue 51
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Editor: Etaoin Shrdlu, Seniur
-
- CONTENTS, #5.51 (July 11 1993)
- File 1--Introduction to the AIS BBS Controversy
- File 2--Response to RISKS' Anonymous Post attacking AIS BBS
- File 3--Response to Anonymous: AIS BBS
- File 4--A User's View of AIS BBS
- File 5--Fear and Loathing: On the Virus Code Trail at AIS
- File 6--Media, Anti-virus personnel, Ethics, and AIS
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-6430), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
- uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 8 July 1993 21:39:01 CDT
- From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--Introduction to the AIS BBS Controversy
-
- A recent (Vol 14, #58) issue of Risks Digest contained an anonymous
- post that attacked AIS BBS and it's sysop, Kim Clancy. The AIS board
- is a service of the U.S. Department of Treasury's Bureau of Public
- Debt. "AIS' is an acronym for "Automated Information System," and the
- board provides security-related information to its users.
-
- AIS downloadable files included a broad range of texts files related
- to computer security, "hacker" culture, and computer technology, along
- with other files readily available on any public access system. A few
- anti-virus folk complained about the virus source code that was
- available on the board. According to CuD sources, at least one British
- anti-virus specialist publicly condemned the board and urged
- colleagues to voice complaints.
-
- An "anonymous" poster, later revealed to be Paul Ferguson, an
- anti-virus specialist, wrote the anonymous Risks post. The story was
- picked up by Joel Garreau of the Washington Post a few weeks later,
- and on July 6 prompted Edward J. Markey, Chair of the House
- Subcommittee on Telecommunications and Finance, to contact Lloyd
- Bentsen, Secretary of the Department of the Treasury, to voice
- concerns (see forthcoming CuD 5.52 for comments from Rep. Markey's
- office) about the AIS BBS.
-
- In my view, this incident has been blown out of proportion by some of
- the anti-virus crowd and their supporters, by the media, and
- especially by Rep. Markey. In this issue, we examine the background
- of the incident as it began in Risks, and include some commentary.
-
- ------------------------------
-
- Date: Mon, 21 Jun 93 22:54:12 CDT
- From: Jim Thomas <cudigest@mindvox.phantom.com>
- Subject: File 2--Response to RISKS' Anonymous Post attacking AIS BBS
-
- ((The following appeared in Risks Digest, #14.68, ten issues after
- the original post appeared)).
-
- In Risks (Vol 14 #58) appeared a post, part of which is reprinted
- below, that makes us appreciate freedom of speech and information
- exchange we enjoy in the U.S. The primary risk I've learned after
- reading the post is that anonymous posters with an axe to grind are
- potential threats to freedom of expression.
-
- Two anonymous posters falsely depict AIS BBS, a bulletin board run by
- Dept of Treasury/Office of Public Debt personnel as a public
- information service, as a board engaged in "unethical, immoral, and
- possibly illegal activities:"
-
- >Date: Fri, 7 May 93 11:18:17 -0500
- >From: Anonymous <nowhere@bsu-cs.bsu.edu>
- >X-Notice: This message was forwarded by a software-
- > automated anonymous remailing service.
- >
- >This text was forwarded to me by a friend and professional colleague
- >in the UK. I am dismayed that this type of activity is being condoned
- >by an American Governmental Agency. I can only hope that this
- >operation is shut down and the responsible parties are reprimanded. I
- >am extremely disturbed by the thought that my tax money is being used
- >for, what I consider, unethical, immoral and possibly illegal
- >activities.
- >
- > ---- begin forwarded message -------------
- >
- >AIS BBS Capture log.
- >
- >To: all interested parties, especially Americans who may wish to ask
- >relevant questions of relevant people.
- >
- >Capture log from a BBS that claims to be run by the US Treasury
- >Department, Bureau of the Public Debt. Notice - I have not verified
- >that the US government is actually running this BBS, only that the BBS
- >claims that it is.
-
- The remainder of the anonymous post presents screen captures of
- directories and files to which the poster objects. Especially
- troublesome for the anonymous accusers are virus-oriented files.
-
- AIS is a reputable and professionally run open-access BBS.
- It has one of most extensive collections of text and other files
- related to all aspects of security in the country. Some may object
- to some of the materials, just as some might object to RISKS DIGEST or
- CuD being "funded" with taxpayers money. It strikes me as
- reprehensible to take selected material out of context and piece
- together an image of immorality or worse by presenting a misleading
- image of the materials on the BBS and the purposes for which those
- materials are intended. That the accusers make their claims while
- hiding behind the cloak of anonymity strikes me as the type of
- cowardice associated with witch hunts.
-
- The anonymous posters seem to be bothered by the existence of virus
- source code on the board. I wager one would learn far more about virus
- writing and distribution tactics from VIRUS-L than from the AIS files,
- but the two anonymous posters seem to be part of a handful of strident
- pseudo-moral entrepreneurs who feel that only the information they
- judge as appropriate for public consumption should be made available.
- I'm surprised that the anonymous critics did not also include a demand
- that public libraries also be closed.
-
- It is one thing to disagree with the position of another and raise the
- contentious issues as a matter of public debate. It is quite another
- to engage in the cowardly act of anonymously distorting the function
- of a legitimate and widely-used BBS by insinuating "unethical,
- immoral, and possibly illegal activities."
-
- CuD ran an interview with the AIS BBS personnel (CuD 4.37, 1992), and
- a few excerpts may put the purposes of AIS BBS in perspective:
-
- *** begin excerpts ***
-
- Q: What is this Board? (name, number, who runs it (dept & sysop).
- What kind of software are you using? When did the Board go
- on-line?
-
- A: The Bulletin Board System (BBS) is run by the Bureau of the
- Public Debt's, Office of Automated Information System's Security
- Branch. The mission of the Bureau is to administer Treasury's
- debt finance operations and account for the resulting debt. The
- OAIS security branch is responsible for managing Public Debt's
- computer systems security. The AIS BBS is open to the public and
- the phone number for the Board is (304) 420-6083. There are
- three sysops, who manage the Remote Access software. The BBS
- operates on a stand-alone pc and is not connected to any of other
- Public Debt systems. The Board is not used to disseminate
- sensitive information, and has been up operating for the past 15
- months. <<This interview was as of mid-1992 - jt>>
-
- Q: What are the goals and purposes of the Board?
-
- A: The BBS was established to help manage Public Debt's security
- program. Security managers are located throughout Public Debt's
- offices in Parkersburg, WV and Washington DC. The security
- programmers saw a need to disseminate large amounts of
- information and provide for communication between program
- participants in different locations. Because the Board was
- established for internal purposes, the phone number was not
- published. However, the number was provided to others in the
- computer security community who could provide information and
- make suggestions to help improve the bureau's security program.
- Gradually, others became aware of the Board's existence.
-
- Q: What kinds of files and/or programs do you have on the Board?
- Why/how do you choose the files you have on-line?
-
- A: There is a wide variety of files posted. In the beginning, we
- posted policy documents, newsletter articles from our internal
- security newsletter, bulletins issued by CERT, such as virus
- warnings, and others for internal use. I located some
- "underground" files that described techniques for circumventing
- security on one of the systems we manage. The information, from
- Phrack magazine, was posted for our security managers to use to
- strengthen security. When we were called by others with the same
- systems, we would direct them to those files as well.
- Unexpectedly, the "hacker" that had written the file contacted me
- through our BBS. In his article he mentioned several automated
- tools that had helped him take advantage of the system. I
- requested that he pass on copies of the programs for our use. He
- agreed. This is how our "hacker file areas" came to be. Other
- hackers have done the same, and have we also received many files
- that may be useful. It is, indeed, an unusual situation when
- hackers and security professionals work together to help secure
- systems. However, this communication has been beneficial in
- strengthening an already secure system.
-
- Q: How did you get the idea to set it up?
-
- A: The security branch accesses many BBSs on a daily basis for
- research purposes, information retrieval and to communicate with
- others. Since our security program is decentralized, the BBS
- seemed to be an effective way of communicating with program
- participants in diverse locations.
-
- <end excerpts>
-
- Perhaps the anonymous accusers are correct: Some types of information
- may pose a risk if abused. But, in an open democracy, the potential
- for abuse has been neither a necessary nor a sufficient justification
- to silence those with whom we disagree. If potential for abuse were a
- primary criterion for suppressing the flow of information and freedom
- of expression, we would live in a rather silent world, and there would
- likely be no RISKS digest (which arguably subverts the national
- interest by undermining faith in computers and in government, all of
- which is largely done with public funding).
-
- Hiding behind anonymity to reduce the risks of accounting for their
- accusations, the anonymous posters call not only for silencing, but
- for sanctions against the sysops.
- This suggests several risks:
-
- 1) Posters who are unwilling to accept responsibility for their
- claims are more able to distort information in ways that
- leave the target vulnerable and unable to face their accusers.
-
- 2) Anonymous posters who call for silencing and sanctions on the
- basis of unexamined and questionable claims create a chilling
- effect on freedom of expression.
-
- 3) Anonymous posters with an apparent axe to grind contribute to
- poisoning the well of free information and reduce the opportunity to
- openly discuss and debate issues.
-
- Our society can far more readily tolerate the existence of information
- that some may find inappropriate than we can risk the censorship of
- information because it offends a few zealots engaged in a form of
- cyber-guerilla warfare by making anonymous claims.
-
- Jim Thomas
- Cu-Digest
- Sociology/Criminal Justice
- Northern Illinois University
- DeKalb, IL 60115
-
- ------------------------------
-
- Date: Thu, 13 May 93 12:46:19 EDT
- From: Frank Tirado <SYSADMIN@ERS.BITNET>
- Subject: File 3--Response to Anonymous: AIS BBS
-
- I'm concerned about the implications of message contributed by
- "Anonymous" on the AIS BBS. The message implies that surely any
- "right-thinking" person would agree with the statements presented. So
- sorry! I have a totally different opinion as regards the conclusions
- presented by "Anonymous".
-
- First, lets get a few things out in the open:
-
- a. The AIS BBS is a real BBS run by the Bureau of Public Debt.
- b. Its phone number is (304)420-6083
- c. While the BBS does post virus source code, these comprise at most
- about 40 files, a minute fraction of the files available on the
- board. (In fact, I have several HUNDRED virus sources in my
- collection, none of them acquired from the AIS BBS)
-
- Both "Anonymous" and his/her UK colleague decry the fact that virus
- source code is available from the BBS and label it a virus exchange
- board. The truth is that the board provides these and other files to
- individuals who are for the most part security professionals who have
- a very real interest in the workings of viruses and other types of
- underground activities.
-
- "But", you say, "there's no security! Anyone could get on the board
- and get access to all that nasty source code!" Well, its possible but
- so what? What about all those underground boards where it is possible
- to leech entire file bases of virus source code AND live viruses?! By
- comparison, attacking a board which serves mainly security
- professionals is a purely picayune endeavor. Besides, almost to a one
- those who frequent virus exchange boards are leery of the AIS BBS
- because its a FEDERAL BOARD! It just HAS to be a sting!
-
- "Anonymous" expresses concern about what he/she considers "unethical,
- immoral and possibly illegal activities". This is simply an opinion;
- obviously, my opinion is diametrically opposite, and just as strongly
- held as that of "Anonymous". Who's to say who's right, who's wrong?
- Besides, the law that says viruses are illegal has yet to be passed,
- not to mention formulated, here in the US. In addition, "Anonymous"
- neglects to point out in what way virus source code is immoral and
- unethical. I imagine that falls under the category of what every
- right-thinking person "knows".
-
- "Anonymous" and his/her colleague pretend to remain anonymous for
- reasons of privacy and fear of reprisals. Let's be real here! Is the
- Bureau of Public Debt going to send the BBS police to their homes to
- rip out their PC's?; hire a squad of Palestinian hitmen to shoot them
- full of holes? For having simply expressed their opinions? Not at
- all. The only possible reason for anonymity is that they have some
- kind of vested interest in shutting down this BBS. The original
- message was forwarded to "Anonymous" by his/her colleague in the UK.
- The UK? Gee, that's odd. At a recent conference in New York, Alan
- Solomon specifically targeted the AIS BBS. Could it be these two
- individuals are one and the same?....... Perhaps if "Anonymous" and
- colleague reveal their real names we'll have a better idea of their
- true motives.
-
- Then again, maybe I'm the one who's wrong. I should join them and
- after we shut down the AIS BBS we can shut down the boards which carry
- hacker files. We can follow that up by shutting down the ones which
- provide information on how to build explosive devices. We can
- continue with the libraries, because they're bound to have something
- offensive, too.
-
- Knowledge is not going to go away just because we don't like it or
- because we don't want it in someone else's hands. Shutting down a BBS
- simply because it carries source code is, in this case, at best petty.
- Shutting down the AIS BBS for this reason will deny security
- professionals a valuable resource. Most importantly, shutting down the
- AIS BBS will do nothing to stop the proliferation of virus source and
- live viruses. "Anonymous" and his/her colleague will have achieved
- nothing, no one will have benefited.
-
- ------------------------------
-
- Date: Thu, 20 May 93 11:52:18 EDT
- From: Paul Melka <no.net@address>
- Subject: File 4--A User's View of AIS BBS
-
- After reading the Risks 14.58 issue concerning the US Treasury
- Department's Bureau of Public Debt BBS, AIS BBS, I feel like I must
- respond to some of the claims of the anonymous writer. First, as a
- security professional, I have found the information on the AIS BBS
- extremely helpful to me in the performance of my job. This
- information is provided primarily for the use of the BPD, and is made
- available upon request to other interested parties. This board is not
- the only security-related board in the country. There are a number of
- other boards, such as ComSec, that provide similar information to
- security professionals.
-
- Second, although the board does provide virus disassemblies and hacker
- files, this information is for the use of security professionals to
- help in their understanding of the inner workings of viruses, or to
- see possible security holes in their systems that are common knowledge
- to crackers and phreakers. This information is of little or no use to
- budding virus writers or hackers because there already are a plethora
- of virus exchange boards or hacking boards that are very easy to get
- access to. In fact you can go to your local book store and order a
- copy of Mark Ludwig's Little Black Book of Computer Viruses. This
- book would be much more helpful in learning about how to write a
- computer virus, than any disassembly could possibly be. Maybe we
- should go back to book burnings too!
-
- Third, the board provides a neutral area for security professionals
- and "hackers" to have the opportunity to exchange view points. All
- someone has to do is scan the user list to see the number of security
- professionals and anti-virus professionals that have been on the
- board. If this board is so tainted, what are all these respected
- professionals doing on the board?
-
- Finally, the anonymous writer's fear of reprisal is ridiculous. The
- last thing that the FBI or Secret Service or anyone else is going to
- worry about is a board that is legitimately helping to increase the
- level of security awareness among professionals. What is the Treasury
- Department going to do to this individual - raise his taxes?
-
- This board is very professionally run and is one of the most positive
- benefits of my tax dollars that I have seen. The anonymous sender
- ends by asking, "Who watches the watchers?" and I can only respond,
- each and every one of us. If this board were as evil as we are led to
- believe, there would be such an outcry from security professionals all
- over the country to shut it down. But when hundreds of people are
- getting positive benefits from it and only a handful of people have a
- problem with it, I say leave it alone. The AIS BSS was designed to be
- used by security professionals and security professionals are
- benefiting from it. Certainly the anonymous sender is entitled to his
- opinion and feelings, but so are the rest of us.
-
- ------------------------------
-
- Date: Mon, 21 Jun 93 21:18:31 EDT
- From: Urnst Kouch <70743.1711@COMPUSERVE.COM>
- Subject: File 5--Fear and Loathing: On the Virus Code Trail at AIS
-
- ((Urnst Kouch is editor of CRYPT NEWSLETTER. Additional details on the
- background of the incident and those involved can be found
- in CRYPT NEWSLETTER #16)).
-
- FEAR AND LOATHING: ON THE VIRUS CODE TRAIL AT AIS
-
- On Saturday, June 19, the national press suddenly reared up and
- without warning, mangled the reputation of one of the finest, most
- professional security experts I know, Kim Clancy of the Bureau of
- Public Debt's Security Branch.
-
- I rolled out of bed Saturday morning, plugged into Compuserve's
- Today's News and was promptly crushed by the brazen stupidity of
- reporter Charles Bowen's newspiece, "GOVERNMENT BBS SAID TO HAVE AIDED
- COMPUTER INTRUDERS AND VANDALS".
-
- Bowen plagiarized the lead, "A government spokesman says an obscure
- bulletin board system run by a federal agency apparently helped
- computer vandals commit electronic sabotage," directly from a same-day
- Associated Press story called "Dial-A-Virus".
-
- But neither Bowen nor the AP offered a solitary shred of proof, other
- than this outrageously leading statement, loosely attributed to Public
- Debt spokesman Peter Hollenbach, that Kim Clancy's AIS BBS has ever
- been responsible for abetting documented cases of hacker intrusion or
- computer vandalism by virus.
-
- Further, Bowen reported, "The [Washington] Post says that among the
- visitors to the system were computerists using handles such as 'The
- Internet Worm,' 'Satan's Little Helper' and 'Dark Avenger's Mutation
- Engine.'" The Washington Post story, reported by Joel Garreau, said
- nothing of the kind, leading me to believe Bowen is either a
- functional illiterate or willfully slack. Indeed, anyone who has
- visited AIS knows beyond a shadow of a doubt that the system NEVER
- supported handles of such nature. [Of course, Bowen can respond by
- blaming it on a copy editor and/or tight deadline, the last, best
- defense of lazy, inaccurate newsmen the country over.]
-
- These vague insinuations, however, were as nothing compared to the
- wellspring of the controversy, Garreau's "Treasury Exposed Computer
- Virus Info; Whistleblowers Halted Display Available To Anyone With A
- Modem" which brought into the public glare the chain of events that
- resulted in the removal of hacker tools, text files and commented
- virus source code from AIS.
-
- Although Garreau's story attempted to present a number of sides it was
- packaged so that a general reader would get a picture of a mad-dog
- government agency, finally "muzzled" after distributing dangerous code
- to "every maladjusted sociopath with Coke-bottle-bottom glasses." More
- savagely irresponsible was the sideborn statement that treasury
- officials had neglected to "discipline" Clancy, instead merely
- removing the dangerous information from her system.
-
- It was a real rabbit punch; a cheapjack, ham-handed slam on Kim
- Clancy, successful in portraying her as someone who spends her
- worktime beta-testing intrusion software against her own department so
- that hackers might optimize their methods for computer subversion and
- vandalism. This is hair-raising stuff, to be sure, for a general
- readership, but not the real truth. It is my understanding, and
- something I've seen Kim Clancy make clear in lectures to many computer
- workers, that the whole point of working with hackers on the
- development of "Tone-Loc" software was so that it COULD and WOULD be
- supplied to interested security personnel who would use it to gain an
- understanding of how to harden their systems against tools employing
- similar technology.
-
- This is emphatically not the handiwork of someone who should be
- disciplined or professionally tarred, but the work of someone who
- Bruce Sterling, not me, says is "probably THE BEST THERE IS [emphasis
- mine] in the federal government who's not military or NSA. Probably
- better than most CIA."
-
- Unfortunately, Sterling's appraisal was buried near the end of the
- story, after all the cracked shouting about aiding hackers and
- computer criminals.
-
- But I've walked away from the real nut of the matter: the presence of
- commented virus source code at AIS. The significance of this is, in
- my opinion, beyond the current ability of mainstream journalists to
- evaluate simply because the vast majority of them have little
- technical grasp of the byzantine reality of computer security, what
- viruses are, how they work and don't work and where you find virus
- source code. Certainly, The Washington Post story did nothing to
- convince otherwise.
-
- Consider these statements from The Post and some stony facts:
-
- >>According to software writers, with the AIS information
- "relative amateurs, could create new viruses."
-
- This is dangerously misleading. As point of fact, relative amateurs
- DO, not could, create new viruses from source code and they've done so
- for a long time before the advent of AIS. That AIS would be
- responsible for such a development, which is already fact, is frankly
- idiotic.
-
- >>Virus source code at AIS "is worse than making live
- viruses available. A person without the skill to write
- a brand new virus could nonetheless produce a variation
- on an existing one . . . If sufficiently mutated, the
- virus might slip past anti-virus programs designed to
- look for known products."
-
- This presumes that most virus-writers, would-be virus-writers and
- "Coke-bottle glasses-variety sociopaths" have little access to source
- code. This is not even close to being true. Virus source code is now
- commonplace on professional, semi-professional and amateur BBS's run
- by every stripe of user across the country. In fact, it is almost as
- common as pirated software and pornography in some locales.
- Surprisingly, the higher quality virus disassemblies stocked on such
- BBS's are often the handiwork of anti-virus researchers and software
- developers. Strangely, this has never been reported by a mainstream
- newsman, perhaps because "designated experts" often come from the same
- pool of researchers and developers.
-
- ". . . some computer professionals minimize the risk, saying
- the software on [AIS] was acquired through the computer
- underground in the first place, and thus has always been
- available to miscreants with sufficient contacts, tenacity and
- skill."
-
- This is a particularly nasty one because its presented as
- justification by those attacked and seems true. It's not. It
- requires NO tenacity or particular skill to get hundreds of viruses
- and assorted source code listings. Unlike the stunt of hacking a
- mainframe from a dial-up, which often requires great patience, a
- brute-force approach or some technical skill as substitute, from
- teenagers to middle-age men, anyone with a PC and a modem can dig up a
- BBS devoted to virus code in almost no time. Yes, they are that
- common.
-
- Why should this be? Where have all those live viruses come from?
- Paradoxically, many of the virus files on these BBS's bear the
- electronic mark of software developers like Certus International, S&S
- International and security organizations such as the National Computer
- Security Association. Damn. How DO "relative amateurs" get ahold of
- those samples? Of course, they could all be forgeries, the work of
- some dangerous psychopath. Yeah, right.
-
- In any case, the only people who can't access the hacker files anymore
- are the security people. And the real story may boil down to what I
- call the "You dunno this information, it's too dangerous and and you
- don't have any business knowing about viruses and hacker files so
- leave it to us anonymous security experts and anti-virus researchers
- because we're here to serve and protect and we'll take care of all
- that stuff, thank you" explanation. It is the very essence of
- professional arrogance and hubris, in my estimation.
-
- There is, obviously, much more which should have been addressed by the
- mainstream media. Why hasn't it, then? Because it's not as sexy a
- story as the visceral blurt of noble civil servant whistleblowers
- bringing down a renegade government security BBS pursuing new ways to
- pervert the public trust out on the rim of cyberspace. And it would
- take time; it's a story that couldn't be researched and rushed into
- print in a week. It's complex, you see, and would be a great deal
- longer than the piece which ran in America's finest newspaper, The
- Washington Post. So maybe we should all forget about fairness,
- because if it can't get into print at The Post, where will it?
-
- I hope Kim can continue her fine work and I'm angry at the stupid
- treatment this controversy has received at the hands of the newsmedia,
- so I'm writing to you about it because if I don't, I just might have
- to scream.
-
- ------------------------------
-
- Date: Thu, 9 July 1993 23:11:17 CDT
- From: Jim Thomas <tk0jut2@mvs.cso.niu.edu>
- Subject: File 6--Media, Anti-virus personnel, Ethics, and AIS
-
- There are no winners in the AIS BBS incident. The sysop, considered an
- exceptionally professional and helpful security specialist, is known
- for attempting to bridge barriers between competing groups, such as
- law enforcement and "hackers," in the belief that one way to reduce
- abuses by all sides is through education. The anonymous poster(s) won
- a short-term victory in that the "underground" files were removed from
- the board. Peter Hollenbeck, Department of Treasury spokesperson for
- the incident, indicated that there were no plans to take the board
- down. However, he explained that after a review of the board's
- mission, it was decided that "underground" files, which included Cu
- Digest, would be removed. As of 11 July, AIS was still functioning,
- and the following log-in screen appeared:
-
- +++ begin login screen +++
-
-
- immmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm<
- > U.S. Department of the Treasury >
- mmmmmmmmmm9 Bureau of the Public Debt lmmmmmmmmmm
- > Office of Automated Information Systems >
- mmmmmmmmmm9 A.I.S. Security Branch lmmmmmmmmmm
- > On-Line Information System >
- mmmmmmmmmm9 (call 304-480-6083 after 6/21/93) lmmmmmmmmmm
- hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm#
-
- We recently reviewed the information posted on this bulletin board. As a
- result of this review we have decided to remove the "underground" files and
- will not post similar information in the future.
-
- We concluded that making this type of information available through this
- facility is not in the best interest of the Bureau of the Public Debt.
-
- +++ end login screen +++
-
- Should the AIS BBS have made available to the public so-called
- "underground" files that included virus source code? Persuasive
- arguments can be made on both sides. My intent here isn't to recreate
- those arguments, but to briefly examine the process by which the
- incident evolved. Here are a few points overlooked by the media and
- others.
-
- First, according to CuD sources, attacks on the AIS BBS began as early
- as March, 1993, at the IEEE Computer Security seminar in New York
- City. One vocal participant, believed by many to be one of the
- anonymous Risks Digest posters, encouraged his listeners to "do
- something" about AIS BBS. The tandem "anonymous" posts were less than
- honest to the extent that, according to one AIS BBS user who did
- periodic log captures, the name of at least one of the posters, Paul
- Ferguson, had been listed in user files well before the anonymous
- post. Assuming that the "Paul Ferguson" on AIS BBS and the Paul
- Ferguson of the anonymous post are the same, the cryptic posturing of
- the anonymous Risks posts would seem dramatically deceptive. The
- feigned ignorance about aspects of the BBS, the professed fear of
- "retaliation," and the vengeful (and anonymous) call for punitive
- sanctions against the sysop seem more in line with an intentionally
- planned assault than with an ethical attempt to raise issues and
- generate debate.
-
- No doubt that Paul Ferguson is sincere in his concerns about the
- "ethics" of making certain types of files available on a government
- BBS. However, it should also be noted that Paul Ferguson may stretch
- the ethical boundaries of truth when it suits him. For example, CuD
- has been informed that a letter over the sig of "Paul Ferguson" in
- which "reply" reached the same Paul Ferguson who acknowledged writing
- the anonymous Risks post, appeared to misrepresent himself in
- attempting to solicit information from a government employee. To
- establish credibility, he allegedly claimed to be working with the EFF
- and CPSR on issues that affect the computer and networking public at
- large. CuD contacted officials in both organizations, and the
- responses ranged form "we don't know him" to "it's news to us."
- Anonymous postings calling for retributive sanctions and seemingly false
- misrepresentation of affiliations do not generally give one
- credibility.
-
- A Fidonet reader forwarded a post that we find interesting. In a FIDO
- Virus_Info post under Paul Ferguson's header, the following appeared
- in response to a CRYPT NEWSLETTER article:
-
- Date: 12:38 pm Sun Jun 27, 1993 Number : 408 of 418 From:
- Paul Ferguson Base : FIDO - VIRUS_INFO To :
- All Refer #: None Subj: AIS debate
- (part 1) Replies: None Stat: Sent
- Origin : 26 Jun 93 00:45:00
-
- Mr. Corey Tucker sent an "advance" copy article written by George
- Smith (aka Urnst Kouch) which implied several items which were
- conjectured and seemingly allusions. I posted a prior response,
- but additionally, I'd like to post an article also written by
- Kouch which outlines Clancy in the CRYPT newsletter #13, in which
- more altruistic mentalities are discussed. I believe this is
- valid; it reflects the entirety in which this whole fiasco
- existed.
-
- Additionally, I am also posting the Washington Post article, in
- its entirety, for information purposes.
-
- If the truth be known, Mr. Smith did the most damage to Kim
- Clancy's underground organiztion (and BBS) than anyone who maay
- have followed, by the publication of this very article.
-
- No need to call this number, it ain't there anymore. Not only did
- Mr. Smith (Kouch) nail Clancy's coffin, he enabled others to do
- so on his behalf.
-
- Several questions arise, including the following:
-
- First, what is the "underground organization" that Kim Clancy
- allegedly "has"? From law enforcement indictments, search/seizure
- affidavits and warrants, and press releases that we have seen in the
- past, such a phrase could, for the clueless, constitute felonious
- conspiracy. This is neither neutral nor innocent wording. It is the
- type of irresponsible accusation that (as we've seen from media
- accounts such as the Washington Post or Rep. Markey's letter to
- Secretary Bentsen) assumes a reality of its own. Is Paul Ferguson
- suggesting, as the post implies, that Kim Clancy runs an "underground"
- organization? Does Paul Ferguson actually believe that Kim Clancy is
- involved with illegal activity? Judging from his anonymous post, he
- actually so-believes. If so, perhaps he could present evidence of
- illegal activity or "underground" leadership as he implies. If he
- cannot, then he owes Kim Clancy a public apology for subjecting her to
- the type of innuendo that has tarnished the reputation and threatened
- the career of a dedicated civil servant.
-
- Second, Paul Ferguson strongly suggests that the board is no longer in
- service. Consider this wording:
-
- No need to call this number, it ain't there anymore. Not only did
- Mr. Smith (Kouch) nail Clancy's coffin, he enabled others to do
- so on his behalf.
-
- Let's keep some facts straight. "Mr. Smith (Kouch)" did *not* "nail
- Clancy's coffin." Paul Ferguson and his friends did with anonymous
- inflammatory posts and with other posts that irresponsibly suggest
- illegal and "underground" activity. Contrary to Paul Ferguson's
- claim, the board remains operative. Notices, announcements, and other
- information sources over the past few months alerted callers to the
- Parkersburg Bureau of Public Debt offices that the old prefix would
- be changed to "480." One CuD informant indicated that Ferguson knew of
- this change prior to the date listed on the above post. If so, the
- wording of the passage cited above is duplicitous. If Paul Ferguson
- did not know of the change, then his professed knowledge of AIS BBS is
- less than credible.
-
- Now, let's examine the Washington Post article (June 19, P. 1) that
- covered the story. Joel Garreau, the author, is reputable and has
- established his credentials as a fair journalist. We have no doubt
- that he tried to present a balanced view of what he considered a
- newsworthy story. However, there are several troubling aspects of the
- story.
-
- The story begins:
-
- *Treasury* Told Computer Virus Secrets Whistleblowers Halted
- Display Available to Anyone With a Modem.
-
- The Washington Post, June 19, 1993, FINAL Edition
- By: Joel Garreau, Washington Post Staff Writer
- Section: A SECTION, p. a01
-
- For more than a year, computer virus programs that can
- wreak havoc with computer systems throughout the world
- were made available by a U.S. government agency to
- anyone with a home computer and a modem, officials
- acknowledged this week.
-
- At least 1,000 computer users called a Treasury
- Department telephone number, spokesmen said, and had
- access to the virus codes by tapping into the department's
- Automated Information System bulletin board before it was
- muzzled last month.
-
- The bulletin board, run by a security branch of the
- Bureau of Public Debt in Parkersburg, W.Va., is aimed at
- professionals whose job it is to combat such malicious
- destroyers of computer files as "The Internet Worm,"
- "Satan's Little Helper" and "Dark Avenger's Mutation
- Engine." But nothing blocked anyone else from gaining access
- to the information.
-
- Let's look at just a few issues. First, there is considerable room for
- legitimate disagreement over whether this is a newsworthy story.
- However, if it is deemed newsworthy that one government agency
- provides information that some see as "dangerous," then the same
- standards of newsworthyness ought be applied to all other government
- agencies that release "sensitive" information in a variety of
- documents that is equally "dangerous." In fact, what the reporter
- completely ignored in the story is the issue of accessibility to all
- types of information. If we are going to "muzzle" a single information
- source, then why not "muzzle" government-funded libraries as well?
- Where does the "muzzling" line end? Who makes the decisions and by
- what criteria?
-
- Second, the story emphasizes the concerns of AIS critics and
- despite interviews with persons who minimized the dangers and
- significance of the AIS BBS files, the counter interpretation was
- considerably downplayed.
-
- Third, this was not a "whistleblowing" incident any more than would be
- a similar incident when an irate member of the public complains
- anonymously about the local public library carrying Playboy.
- Framing it as such distorts events.
-
- Fourth, and although minor but not insignificant, the wording of the
- article is less than neutral. Exaggerating the "virus" dangers,
- framing the incident as "whistleblowing," referring to "hacker tools"
- without also explaining their relatively innocuous nature and public
- availability of these specific "tools," and other rhetorical ploys
- seemed to pander to public virus hysteria. Further, although a small
- point, it is not insignificant that a major quote was wrong. The
- anonymous post in the Post article was reprinted as follows:
-
- "I am dismayed that this type of activity
- is being condoned by an American governmental
- agency. I am extremely disturbed by the thought that
- my tax money is being used for what I consider
- unethical, immoral and possibly illegal
- activities...."
-
- The original post read:
-
- I am dismayed that this type of activity is being condoned
- by an American Governmental Agency. I can only hope that
- this operation is shut down and the responsible parties are
- reprimanded. I am extremely disturbed by the thought that
- my tax money is being used for, what I consider, unethical,
- immoral and possibly illegal activities.
-
- A seemingly minor alteration, but the elimination of the second
- sentence (without an elide or other indication) that calls for
- silencing and sanctions against the sysop omits a crucial bit of
- information.
-
- It's also worth noting that the story refers to CuD as The magazine
-
- "...followed by those interested in the murky world of
- "hackers, crackers and phone phreaks. It is edited by Jim
- Thomas, of the sociology and criminal justice department of
- Northern Illinois University."
-
- This would be akin to saying that The Washington Post is the preferred
- paper of drug kingpins interested in following the predatory exploits
- of their competition....while perhaps true in some vague sense, it
- conveys a grossly inaccurate image of both publications. CuD, as I
- carefully explained to the reporter, is read by a conservatively
- estimated readership of 80,000, most of whom are computer
- professionals, journalists, attorneys, academics, law enforcement, and
- others who are primarily interested in computer culture. CuD is read,
- as near as I can determine, by those looking for news, book reviews,
- conference information, research articles, debates, computer-related
- legislation, and information on virtually *all* aspects of computer
- culture. And, "Jim Thomas" and not simply "of" the sociology/criminal
- justice department at NIU, but a full professor with a credible list
- of books and articles on his vita, which I explicitly told the
- reporter. I'm normally quite modest about such things. However, the
- wording of the Post article is deceptively glib and irresponsibly
- distorts both the editorial purpose and content of CuD and the
- editor's status. This might sound picky. Sadly, we've seen the Post
- article cited in Rep. Markey's letter to Treasury Secretary Bentsen,
- and I'd hate to have some "whistleblower" come unglued thinking that
- NIU is making hacker information (or worse) available to the public.
- The story also errs (despite information the reporter was given) in
- claiming that the AIS BBS revealed its number in CuD last November.
- This is simply wrong. CuD possessed the number and contacted board
- personnel for an interview. The interview was cleared through the
- appropriate supervisors and spokespersons prior to publishing, and it
- was *NOT* revealed at the initiative of AIS personnel as the story
- claims. The reporter presumably had this information.
- Another small error, but one recreated in Rep. Markey's letter to
- Treasury Secretary Bentsen with a demand for accountability for the
- act, which in fact did not occur.
-
- These are not the only errors or problems with the story.
- Individually, they are relatively minor faux pas. But, in the
- aggregate, they create an inaccurate image of events and exaggerate
- the significance of the "story." Because of the visibility of the
- Post, the story became national news and was carried on, among other
- outlets, CNN and the Associated Press wires. For some, appearance of
- "facts" in national media are sufficient to verify accuracy, and
- little attempt is made to dig below the surface. Although the Post
- reporter was far more conscientious than most media folk, and although
- he was sincere in his attempt to present a balanced story, the final
- product was questionable. To my mind, this may say more about the
- nature of media and the emphasis on a "sexy" slant and the appropriate
- discourse for such a slant than on the abilities of the reporter, Joel
- Garreau, for whom I have considerable personal and professional
- respect.
-
- A final point is worth noting. The Post article quotes the anonymous
- risk poster (Paul Ferguson) early in the story. Then, in the paragraph
- immediately following, it quotes Paul Ferguson to give credibility to
- and elaborate on the anonymous post without mentioning that Paul
- Ferguson was the anonymous poster. The reporter was told by voice and
- by e-mail *prior* to the story that Ferguson and the anonymous poster
- were the same. Yet, no mention was made, and the two quotes were
- sequenced as if they were separate voices. Others can judge the
- ethical implications of this for themselves.
-
- Because of the Risks post and the Post story, the AIS BBS incident
- has assumed a significance beyond any reasonable reality.
- One writer of "cyberspace" fiction and non-fiction reportedly called
- Kim Clancy the "Cyber Joan of Arc." It fits. Ms. Clancy is not a
- politician, not a political activist, and not a trouble-making
- bureaucrat. She is a sensitive, dedicated government official who
- believes that sharing legal information and engaging in dialogue is
- the best way to curtail computer abuse. Her "crime" was in
- over-estimating the good-will of others and in assuming that her
- critics preferred dialogue to mean-spirited action. This incident is
- not one of a "victimized" class resisting the tyrany of a powerful
- government official. Instead, it reflects a sad situation in which
- some persons, both intentionally and inadvertently, combined to create
- a nasty situation based on innuendo and misinformation to create a
- drama in which there are only losers.
-
- Sadly, I must make one final comment. It's said that some people,
- angered at this affair, are planning to retaliate against those judged
- responsible. This would be an ethically bankrupt response. Predatory
- behavior decivilizes cyberspace just as it does the "real world." The
- best response to cyber-conflict usually is to air disputes in public
- and debate them aggressively and honestly. We need fewer, not more,
- razorblades in the sand if we're to create a civilized environment.
-
- ------------------------------
-
- End of Computer Underground Digest #5.51
-