home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Sep 26 1993 Volume 5 : Issue 75
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copie Editor: Etaoin Shrdlu, III
-
- CONTENTS, #5.75 (Sep 26 1993)
- File 1--THE ANARCHISTS AMONGST US: Is PBS One of *THEM?*
- File 2--Elansky/Hartford BBS Update, 25 Sept '93
- File 3--Raising the Issue of Copyright on the Nets
- File 4--Ethics of reposting
- File 5--Number of CuD Articles
- File 6--CuD Posting Policies and Processes (A Response)
- File 7--September 29 BBLISA meeting]
- File 8--The State of Security of Cyberspace (SRI Research Summary)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- UNITED STATES:
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
- ftp.eff.org (192.88.144.4) in /pub/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 23 Sep 1993 14:18:00 -0400 (EDT)
- From: soneill@NETAXS.COM
- Subject: File 1--THE ANARCHISTS AMONGST US: Is PBS One of *THEM?*
-
- Since, as far as anyone can tell, the crux of the Elansky case lies in
- the "anarchy" file found on his BBS, the following information may be
- of interest to the West Hartford prosecutor and judge in the case, and
- may be of special interest to Elansky's defense lawyer.
-
- Last week, on Sept. 15, to be exact, the local PBS outlet here in
- Philadelphia showed a program called "Your Toxic Trash", narrated by
- Ed Begley, Jr, and produced by station KERA of Dallas/Ft. Worth. The
- theme of this program was how much of our trash is composed of
- dangerous chemicals and how we should properly dispose of them. To
- demonstrate how dangerous the accidental combination of substances
- could be, the producers had a Professor of Chemistry at U.C. Berkeley,
- Prof. William Lester, show what happens when you mix powdered pool
- chlorine and brake fluid. The combination resulted in an immediate and
- intense flame which reduced the pool chlorine to a charred black lump
- in seconds. He also showed that when pool chlorine is mixed with an
- ordinary soda, like Coca-Cola, free chlorine is released in great
- quantity.
-
- As I sat watching this, it occurred to me that anyone with an interest
- in setting fire to things, or in poisoning people had just been given
- the necessary information to do either or both. And this was done by
- highly reputable people working for equally reputable organizations.
-
- Therefore, if the law in West Hartford thinks that such information as
- was found on Elansky's board is dangerous and should never be publicly
- disseminated, what in the world are they going to make of "Your Toxic
- Trash"? More important, this perfectly makes the point that whatever
- was in the file is public knowledge, easily obtainable, in some cases,
- from as unexpected a source as Public Television
-
- ------------------------------
-
- Date: Sat, 25 Sep 93 15:58:21 CDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 2--Elansky/Hartford BBS Update, 25 Sept '93
-
- There is little change on the status of Michael Elansky, the sysop of
- a Hartford BBS arrested in August because of the contents of two
- "Anarchy files" on his system (See CuD 5.69, 5.71). We are told that
- nothing of substance occurred at his hearing on Thursday, Sept. 24:
-
- 1) As of Friday, Sept. 25, Elansky remained in jail, unable to
- post $500,000 bond.
- 2) The hearing was postponed until early October
- 3) We have been told, but have NOT YET confirmed, that no motions
- were filed by the defense at the hearing. This, we are told,
- includes no motions for bail reduction.
-
- In short, Elansky seems to be languishing in jail and little seems to
- be done about. The case gets odder and odder.....
-
- ------------------------------
-
- Date: Thu, 9 Sep 93 14:19:16 EDT
- From: gray@ANTAIRE.COM(Gray Watson)
- Subject: File 3--Raising the Issue of Copyright on the Nets
-
- In CuD #5.70, File 2 ("Big time hacker from the small town"),
- an article began:
-
- >"POLICE NAB OBSCENE CALLER" by Bill Latimer (reprinted without asking)
- ^^^^^^^^^^^^^^^^^^^^^^^^
-
- I don't think CUD should have allowed this. I send out a standard
- message when I see such posts and it is applicable here:
-
- >For your information, including a significant amount of text
- >from copyright publications in posts is a breach of
- >copyright law. The publishing industry will *never* adopt
- >digital distribution if the net does not honor the copyright
- >laws.
- >
- >If possible in the future, please try to contact the author
- >and ask for a limited release of the document. If this is
- >not unavailable, please consider posting a summary of the
- >work instead.
-
- If the legalities of an electronic issue are ill-defined then we must
- look to the physical world as our guide. No publication, commercial,
- non-profit, nor educational, republishes copyrighted works without
- first gaining permission.
-
- I believe that if we in cyberspace are ever going to achieve the same
- rights as physical publishers, broadcasters, and speakers, we must
- consider our electronic actions to actually _be_ the same as their
- physical equivalents -- in terms of the legalities. If we don't think
- twice about duplicated works that are copyrighted, then we are asking
- for special treatment -- and with the obvious benefits come serious
- detriments.
-
- ------------------------------
-
- Date: Tue, 24 Aug 1993 23:39:05 CDT
- From: Eric Schnoebelen <eric@cirr.com>
- Subject: File 4--Ethics of reposting
-
- CuD #5.61, file 11, contained a message by William Reeder of Sun
- Microsystems which was in reply to a message of mine, describing a
- successful breaking and entering of the Sun internal network.
-
- These messages were originally posted to a private list for system
- managers in the Dallas/Ft Worth area, with the expectation of
- confidentiality. Neither William Reeder or myself were consulted
- before the message was sent to CuD by a third party.
-
- Mr Reeder's message was posted in response to a comment of mine about
- the happenings with texsun, a major UUCP hub in the Dallas/Ft Worth
- region. texsun was/is operated by the SUN Central region as a
- community service. The message was not intended to be distributed
- outside the scope of the list. It was certainly not intended for
- general distribution.
-
- This reposting does bring to the foreground the ethics and issues of
- reposting messages. I believe, and many on the list in question do as
- well, that the list was private, or semi-private at worst, and that
- the information on it is generally considered confidential. Most also
- believe it was impolite to repost the message to another list, or
- any other forum with out the consent of the author(s), William Reeder
- and myself in this case.
-
- The expectation of privacy on mailing lists is another issue that
- arises from this. There are several forms of mailing lists on the
- internet today. There are lists that can be joined by invitation
- only, usually sponsored by an existing list member.
-
- There are lists that are can only be joined by folks meeting a certain
- set of criteria, such as being a female computer
- scientist/researcher/developer, or being gay/bisexual.
-
- There are lists which are well known in an (geographic or technical)
- area, but are not well know out side of that area. Prospective new
- list members are usually told about the list by current members, but
- it up to the new folks to actually do something about subscribing.
- Lists like this are frequently used for discussion and dissemination of
- information amongst system managers, etc.
-
- Then there are lists that are well know, and there are no restrictions
- on membership. CuD is an example of such a list.
-
- And beyond that, there are USENET newsgroups.
-
- Of course, there are other types of lists as well.
-
- The last two types, wide open lists, and USENET groups are pretty much
- broadcast mediums, with corresponding expectations upon readership and
- privacy.
-
- The first three types of lists have a higher expectation of privacy
- and confidentiality. People on these lists believe that what they say
- will not be taken out of context, where perhaps it may cause problems
- for the poster, or others. Reposting something from such a list,
- without permission of the original poster is somewhat analogous to
- submitting a personal letter from a third party to a news paper for
- publication in the letters to the editor column.
-
- It boils down to this: Just because something is easy to
- re-distribute does not mean that it is ethical to do so. If we of
- cyberspace cannot handle this responsibility with our own intellectual
- property, it will be impossible to convince (non-cyber) institutions
- that we can respect their copyrights and other intellectual property.
-
- Another issue is that of copyright violation. Since the United States
- adopted the Bern Convention Copyright Treaty in 1986 (I believe),
- everything written is copyrighted from the moment it looks like text.
- (aka, this message is implicitly copyright, 1993, Eric Schnoebelen)
- Most of the rest of the developed nations have been a signer of the
- Bern Convention longer than the US, so the same rules apply.
-
- Solutions? Courtesy. Before reposting anything, it is polite to ask
- the original author(s) if reposting is acceptable. The original author
- may wish that his words not be redistributed, or at least may wish the
- chance to edit them.
-
- ------------------------------
-
- Date: Sun, 5 Sep 1993 06:59:57 -0800 (PDT)
- From: ygoland@HURRICANE.SEAS.UCLA.EDU
- Subject: File 5--Number of CuD Articles
-
- I like CuD very much and have contributed to the overloading of your
- mail programs by turning many people on to it. I'v even submitted
- several news pieces that you later included in CuD. So please
- understand my comments in context:I LIKE CuD.
-
- When I first started reading CuD it was basically a 'news magazine' which
- included many short articles on a variety of topics, occasional
- 'theme' issues, and some good editorial content. Lately I've noticed
- that it's character is changing. It has gone from a pre-processed
- information source to a news clipping service. Every time something of
- interest happens it is immediately sent out to CuD (usually the
- original document announcing the occurrence is just re-posted). This is
- not necessarily bad, I never liked anyone volunteering their opinion
- anyway. =) However I think if this is the trend that CuD is going to
- follow that you might want to consider a different format for your
- articles. Instead of sending them out why not put them on a gopher (or
- better yet) WWW server? That way one can not only quickly get to
- useful information but that information will stick around after the
- article is autodeleted (I read CuD through usenet) a week or so after
- it's posted. Using gopher or WWW formats is also much easier to deal
- with than ftp.
-
- I hope CuD decides to develop a split personality. I like having a
- 'human' going through the net and pulling out interesting information
- but I also liked the articles, commentary, etc. that used to the
- mainstay of CuD. And of course, being a big believer in putting your
- money where your mouth is, I would be willing to help set up (i.e.
- learn how to) and maintain (i.e. donate time) a gopher or WWW server.
-
- Never the less CuD is doing a great job and is a definite must read
- for anyone who wants to understand the legal aspects of the computer
- world.
-
- ------------------------------
-
- Date: Thu, 23 Sep 1993 17:31:01 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 6--CuD Posting Policies and Processes (A Response)
-
- Eric Schnoebelen, Yaron Goland, and Gray Watson provide us with the
- opportunity to address several issues with which we constantly
- grapple, often without successful resolution. Their concerns raise
- issues of the rights, responsibilities, and other problems facing
- electronic media. We have tried to frame our answers in three ways.
- First, we attempt to address the concerns raised by Eric, Gray, and
- Yaron. Second, we attempt to place them in a context that provides
- insights into putting out CuD. Finally, we expand our responses to
- include similar questions and concerns expressed by readers.
-
- What follows may be excessively self indulgent for some, but we feel
- it necessary in part to address some of the concerns raised, but also
- to provide a clearer sense of the backstage CuD region.
-
- RESPONSE TO GRAY
-
- Gray observes that we re-published a lengthy news article without
- permission and even included the original line indicating that
- permission was not obtained. He finds this troubling. So do we.
-
- We assume that readers have obtained permission to reprint articles
- UNLESS OTHERWISE STATED. If it's clear that permission has not been
- obtained, if the article warrants publishing, we will edit down to
- fair-use limitations. Sometimes we judge it necessary to reprint an
- entire article because either editing would distort the meaning,
- or--when doing a media critique--the entire article is necessary to
- avoid risk of seeming to take isolated quotes out of context.
- Although "fair-use" remains ambiguously broad, CuD is in that category
- of publications in which fair-use is flexible: We are non-profit and
- educational. Despite the latitude, we do our best to err on the side
- of caution.
-
- In the case of the article that Gray cites, we simply goofed. The
- article was in the "to-edit" pile, and somehow it simply slipped into
- the "go" pile when the posts for the issue were assembled. Although
- time and other constraints do not excuse us, we hope they at least
- explain it, as we indicate below in our response to Yaron. Sometimes
- mistakes happen, and while we're pleased that they seem to happen
- relatively infrequently, we remain red-faced when they occur. For
- this reason, we continually urge readers to do one of three things
- when sending reprints: 1) Obtain permission for long articles (fair
- use applies for short articles); or 2) Edit the article with a series
- of quotes and summaries; or 3) Indicate that permission was *not*
- obtained, and we will try to edit. Unfortunately, time is scarce, so
- especially long pieces may not be printed. Nonetheless, all articles
- are appreciated, because they keep us abreast of the news, and we add
- them to our own files.
-
- RESPONSE TO ERIC
-
- Eric raises a few serious issues that, despite passionate debate on
- all sides, remains unresolved. He notes that we ran a post from a
- semi-private discussion list without first obtaining permission. We
- resolved the case to which Eric alludes in private e-mail. The
- persons directly affected were reasonable, understanding, and helpful.
- We apologized privately, and we apologize again for any inconvenience
- we may have caused them. We did not understand the context of the post
- and assumed it was a public announcement. This was our
- misunderstanding and *not* the fault of the person who sent the
- original post to us or anybody else. But, this raises other issues.
-
- 1) CuD POLICY ON RE-PRINTING POSTS
-
- When we intend to reprint a piece posted elsewhere, we try to assure
- in writing that we have permission. Some frequent contributors provide
- blanket permission. Others we write to obtain permission. Sometimes
- we receive posts that are for our information and not to be reprinted.
- However, we assume that any article that is obviously not personal
- mail that does not indicate NOT FOR PUBLICATION is sent for
- consideration. Generally, there are few slips, either by CuD or by
- contributors. Sometimes there is a gray area. Sometimes what we or a
- contributor find acceptable is not deemed so by original authors.
-
- 2) MAY PUBLIC POSTS BE REPRINTED WITHOUT PERMISSION?
-
- Eric's concerns raise a fundamental question for electronic
- communication. The status of public electronic posts remains unclear.
- In our view, a public e-post is fair game in the same sense as a
- public speech or other public behavior. We often receive relevant
- informational posts cross-posted on Usenet newsgroups. In these cases,
- we assume that wide distribution was intended by the original poster
- and that reprint permission is assumed. If we receive articles that
- include one or more posts from elsewhere, we assume that publication
- of the enclosed comments are acceptable. It is simply impossible to
- track down every poster or check every fact in articles. Nor do we
- avoid publishing a piece that we judge to be proper simply because
- somebody may criticize us for running it. But, we do our best to
- follow Internet norms, and those norms generally hold that permissions
- to reprint ought be obtained when possible.
-
- There is another issue, however, one relevant especially for
- researchers. Should PUBLIC posting areas be a research ground for
- graduate students and others? Is it proper to use public posts in
- research? Is it proper to do statistical analyses of public posts
- without obtaining permission from those on the list? In our own view,
- the nature of most research and the pre/proscriptions of professional
- codes of ethics cover this: Research in public places is fully
- permissible without notifying those being observed. Therefore,
- counting flames on alt.feminism, or using snippets from a given
- newsgroup to display social processes of, for example,
- computer-mediated communication, is neither illegal nor unethical if
- done in accordance with existing professional standards of conduct.
-
- We take Eric's concerns sufficiently seriously that we intend to
- address them soon in a future conference paper. We do not see any
- easy answers, and certainly none likely to generate consensus. But, a
- healthy debate helps clarify what's at stake and hopefully minimizes
- abuse and increases responsibility, and Eric's comments are helpful
- for this.
-
- RESPONSE TO YARON
-
- Yaron Goland is probably correct in noting the changes in CuD over
- the years. We think there are several reasons for this:
-
- 1) The "cyberworld" has changed from our early days, and we reflect
- the climate.
-
- 2) the basic issues that we addressed (eg, Sundevil, Bill Cook, etc)
- have receded into the background, and the conflicts have generally
- taken more genteel forms low on drama but high on import, such as
- legislative lobbying for California's electronic access bill,
- lobbying efforts opposing encryption control, or the backstage efforts
- of groups such as CPSR or EFF that quietly file FOIA requests and
- adapt slow-moving legal tactics.
-
- 3) Our readership has grown dramatically---our first issue had less
- than 200 readers in March, 1990--all on a mailing list. Today, we
- have over 80,000 from usenet, the mailing list, BBSes, public access
- systems, ftp/etc, and the diversity means we try to match our articles
- to the broader-based interests. We are not sure that this is good,
- but on the other hand, we decided to let things just take their
- course;
-
- 4) The readers themselves change---and their interests follow.
-
- 5) There are simply more issues and much more information available.
-
- THE GENESIS OF CuD -- Maturity or Senility?
-
- At the heart of Yaron's comment lies a broader issue: What are the
- crucial issues affecting cyberspace and what is the best way to
- disseminate information and encourage discussion amongst those who do
- not have easy access to a forum to express their views? What is the
- role of Cu Digest, RISKS, TELECOM Digest, and others in providing such
- a forum? What obligations do such digests have to readers, and how can
- editors or moderators assure that they reflect crucial issues and
- diverse points of view without becoming a self-indulgent platform for
- idiosyncratic opinions?
-
- CuD has changed: Some have complimented (or criticized) us for
- "mellowing out" and refining (or dulling) the gadfly edge. The
- observation does have some merit. CuD originated as a temporary
- mailing list to handle posts related to the Phrack and Len Rose cases
- and to generate related discussion that TELECOM Digest could not
- publish. As a consequence, the CuD editors had no long-range goals
- or unifying vision. The early style of posters and editors reflected
- passion and urgency--not always wisely expressed in the immediacy and
- heat of the moment--to rectify perceived injustice. We saw little
- reason at the time for caution, because we did not believe we would be
- pursuing the issues for very long. Then came Sun Devil and a new
- round of discussions. Chip Rosenthal's initiative in making CuD a
- Usenet group expanded the readership, Bob Krause set up a mail
- archive, Brendan Kehoe set up the ftp archives, and we became
- "establishment." With the expanded sites and growing readership, we
- were no longer speaking to a small audience, but to a group with
- dramatic diversity in perspectives, interests, and background. The
- posters comments and articles reflected this diversity, and we try to
- reflect it in the posts we publish.
-
- Both CuD editors are academics at heart, so the tenor of the posts
- perhaps over-represents conferences, reviews, research, and other
- material of fairly specialized interest. On the other hand, the
- overwhelming bulk of CuDs Net readers come from academia as scholars,
- programmers, or students, or from an areas sharing similar interests
- (media personnel, attorneys). BBS readers, by contrast, are more
- varied, and from them we often receive suggestions to expand the range
- of articles even further to cover the BBS world more thoroughly.
-
- Unfortunately, putting out CuD is time consuming. We say this without
- complaint, and note it as a simple fact of life that significantly
- shapes what we do. Managing the mailing list, writing our own
- comments, formatting posts, responding to considerable mail, digging
- up any information for news notes that we ourselves write, trying to
- edit news stories to fit within "fair use" restrictions, and other
- small tasks take, in the aggregate, on average of 25-30 hours a week.
- Both editors have "real jobs" unrelated to CuD that require at least
- 50 hours a week. With no resources, no staff, and no other incentive
- than a naive passion for information, we often cannot put the effort
- into obtaining, writing, or editing news that we would like.
- Sometimes we goof, as Gray and Eric noted above. On the other hand,
- the initiative of readers in sending us information, of posters who
- provide not-for-publication thought-provoking comments, and the
- networking aspect of putting out a 'Zine is rewarding because of the
- people we meet face-to-face and electronically and the intellectual
- rewards that accrue.
-
- Our intent here is not simply self-indulgence. Rather, by laying out
- the genesis and structure of what happens behind the scenes, we hope
- that readers will have a better understanding of the editorial
- processes and, if they have suggestions for changes in direction or
- content, make them within the context of these processes.
-
- How are CuDs Put Out?
-
- We're periodically asked how we put out an issue. It's rather simple:
- 1) posts arrive in our mailbox or by disk and we sort through them. We
- do not run "Usenet" type posts in which a poster simply responds with
- a few lines, but we do try to present any reasonable post that raises
- issues or presents new information. We do not censor content, and we
- occasionally ask posters to revise to clarify or elaborate on their
- points. We're occasionally asked why we run a particular piece,
- because it may seem offensive, unrelated to readers' interests, or
- otherwise inappropriate. The answer is simple: We try to give
- everybody a chance to speak, and diversity of ideas and perspectives
- beats the opposite. 2) We select about 800 lines (40 K), give or take
- 10 percent. As a consequence, some posts might be delayed because of
- space constraints and "fit." 3) We usually format to 70 characters per
- line and edit the subject headers to try about 50 characters, and
- remove sigs and control characters. 4) We assemble the articles, run a
- spell check, and then add the "Administrivia" and index. 5) We sent
- out three separate files: One to Usenet, one to the Central Michigan
- U. listserv, and one to the bad addresses that the listserv can't
- read. 6) We wait for the bounces, usually about 15 each issue, of
- which about half are "anomalies" (full mailboxes, down systems) and
- the rest are "user not known" or "unknown domain." After three
- consecutive bounces, a user is notified of deletion from the mailing
- list with an explanation and instructions for resubbing (assuming the
- notification does not bounce, which they usually do).
-
- We've tried the various suggestions and mini-programs that readers
- have send over as a way of automating each issue, but the system from
- which we work can't accommodate most of them, so we rely on primitive
- batch files when possible. Deletions, subscriptions, and other tasks
- are done semi-manually.
-
- Gordon lives and works in the Chicago suburbs, and Jim lives about 60
- miles west in DeKalb. They try to coordinate as much as possible by
- e-mail and telephone. Imperfect, but it works.
-
- So, for those who've asked in the past, now ya probably know more than
- you ever wanted.
-
- SOME SUGGESTIONS
-
- Readers have suggested a variety of things CuD could do.
-
- In an unpublished section of his post, Yaron urged that we set up a
- gopher site. An interesting idea, and we're open to suggestions.
- Yaron also suggested recruiting readers to perform certain tasks
- on a regular basis. For example, we could add a book review editor,
- a media commentator, somebody willing to conduct an interview
- with newsworthy cyberfolk once every few months, or other tasks.
- The suggestion of periodic special issues by guest editors is also
- a possibility.
-
- Other readers have suggested that we focus more on specific issues
- (e.g., law, BBSes, research papers, interviews with newsworthy
- cyberpersonalities). We like all of these ideas, but they are
- time-consuming. We especially like the idea of interviews, but a
- one-issue interview would require at least an hour of the interview
- itself, about 3 hours for transcribing, and another hour of editing,
- plus incidental time of set-up and other tasks. That's a day's work,
- and time is scarce. Perhaps readers could conduct interviews on
- occasion and send them over.
-
- The suggestion of assembling issues into themes so they could be
- discarded more easily if readers weren't interested in the theme is
- tempting. For example, conference notices could be placed in one
- issue, bibliographies in one issue, news blurbs in a single
- issue--we'll consider it.
-
- Expanding CuDs to three issues a week? Probably not wise. Two issues
- seems about the limit of tolerance for most readers.
-
- Then there are the mixed/contradictory suggestions: More writing by
- CuD editors/Less writing by CuD editors; Some fiction and creative
- writing/No fiction or fluff stuff; Don't stray so far from explicitly
- cyber-issues/More straying; Don't be so leftist/Move to the right; Set
- an example/challenge convention; Be more serious/Lighten up a
- bit.......the list goes on. While we may appear unresponsive to
- suggestions/criticisms, we actually do take most of them seriously.
-
- All of this is a terribly verbose way of saying that, given the growth
- of CuD, it's time to reassess what a CuD is. If you have ideas for
- guidance in the coming year(s), let us know.
-
- For those who have read this far and haven't been hit by the MEGO ("my
- eyes glazeth over") effect, our intent has been to explain, *not*
- justify, how and why errors occur, and to give a sense of what goes on
- at this end of the screen. Hopefully, it will reduce some of the
- misunderstandings that some media and law enforcement folk have about
- CuD. It might also provide a few paragraphs for the occasional student
- paper inquiry we receive. Most responses to "whither CuD" are "keep
- up what you're doing," but we're open to suggestions and especially
- receptive to articles of relevance.
-
- Jim and Gordon
-
- ------------------------------
-
- Date: Fri, 24 Sep 1993 15:18:56 -0700
- From: Brendan Kehoe <brendan@LISA.CYGNUS.COM>
- Subject: File 7--September 29 BBLISA meeting]
-
- +------ Forwarded Message
- From--etnibsd!vsh@uunet.uu.net
- Message-Id--<9309242000.AA02698@grumpy>
- Subject--September 29 BBLISA meeting
- To--sage-announce@usenix.org, nneuug@coos.dartmouth.edu
- Date--Fri, 24 Sep 93 16:00:56 EDT
-
- [ apologies if this is a duplicate posting -- vsh ]
-
- ANNOUNCEMENT
-
- September 29 BBLISA meeting
-
- Topic: Computer Crime
-
- Jim Powers of the FBI and a prosecutor from the Attorney General's
- office will be the speakers next Wednesday's Back Bay LISA meeting.
- They will be addressing what you should be aware of when administering
- your site, what we can do to protect ourselves, and what steps you
- should take when you suspect your system is being wrongly used.
-
- Date: Wed., Sept. 29, 7:30pm *[note the changed time]*
-
- Where: MIT
- Room 329
- Building E51
- 70 Memorial Drive (entrance at corner of Wadworth and Amherst)
- Cambridge, MA
-
- Directions:
-
- Car: For folks driving, follow Memorial Drive to Wadsworth St. which
- will take you to the rear of the building. Entrance and parking are
- at the rear.
-
- T: Red Line Kendall Square stop. Head over to Au Bon Pain, take
- a right onto Wadsworth St. E51 is at the corner of Wadsworth and
- Amherst.
-
- Back Bay LISA (BBLISA) holds monthly meetings, on the last Wednesday
- of each month, except November and December. Meetings are usually at
- a Boston-Metro location. Meetings feature a speaker, or a panel of
- speakers, and time for announcements and group discussion. Topics
- include all aspects of system administration (both large and small),
- networking, security, privacy, etc.
-
- Membership in the group is FREE. To become a member, join one of the
- following mailing lists. You'll receive full details of forthcoming
- meetings, locations, precise dates, etc.
-
- BLISA information is distributed by email, only. To join the
- announcement mailing list, send email to the list server at
- `bblisa-announce-request@cs.umb.edu' with a text line of `subscribe'.
-
- There is also a BBLISA discussion list. To join this list, send a
- subscribe message to `bblisa-request@cs.umb.edu'. All announcement
- messages are automatically relayed to this list, so you don't need to
- join both.
-
- + --
- Steve Harris - Eaton Corp. - Beverly, MA - etnibsd!vsh@uunet.uu.net
-
- ++++++- End of Forwarded Message
-
- ------------------------------
-
-
- NEW HAVEN (AP)--A federal grand jury indicated a Redding (Conn)
- man Wednesday, charging him with conspiring with others to import
- child pornography into the United States, authorities said.
-
- The four-count indictment charging John Looney, 51, is part of
- "Operation Longarm," a U.S. Department of Justice and Customs Service
- effort focusing on the use of computers to import pornographic
- materials from Denmark. Search warrants have been issued in 15 states.
-
- ------------------------------
-
- Date: 24 Sep 1993 11:26:49 -0800
- From: "AJ Bate" <AJ_Bate@QM.SRI.COM>
- Subject: File 8--The State of Security of Cyberspace (SRI Research Summary)
-
- THE STATE OF SECURITY OF CYBERSPACE
-
- A Summary of Recent Research
-
- by
-
- SRI International
-
- June 1993
-
- SRI International (SRI) conducted a worldwide study in 1992 of a
- broad range of security issues in "cyberspace." In brief, cyberspace
- comprises all public and private communications networks in the United
- States and elsewhere, including telephone or public switched telephone
- networks (PSTNs), packet data networks (PDNs) of various kinds, pure
- computer networks, including the Internet, and wireless communications
- systems, such as the cellular telephone system. We did not address
- security vulnerabilities associated with classified, secure
- communications networks used by and for governments, nor did we
- explore toll fraud issues.
-
- The study was conducted as part of our ongoing research into the
- vulnerabilities of various software components of cyberspace. Our
- approach was to conduct research through field interviews with a broad
- range of experts, including people we characterize as "good hackers,"
- into security issues and vulnerabilities of cyberspace and the
- activities of the international "malicious hacker" community.
-
- While the specific results of the study are proprietary to SRI, this
- brief report summarizes our general conclusions for the many
- individuals who kindly participated in our field interviews. As we
- indicated during the interviews, the original research for this
- project was not part of any other kind of investigation, and we have
- not revealed the identity of any of our respondents.
-
- The study aimed to understand "malicious hackers"-that is, people
- who have and use the technical knowledge, capability, and motivation
- to gain unauthorized access, for various reasons, to systems in
- cyberspace. It is important to understand that by no means all
- hackers are malicious, nor does most hacking involve unauthorized
- access to cyberspace systems; indeed, only a small fraction of
- computer hacking involves such activities but this fraction gives
- hacking an otherwise undeserved bad reputation. While we intended to
- focus on technical (software) vulnerabilities, our interviews led us
- to look more at the broader motivations for, and different approaches
- to, cracking into various networks and networked systems.
-
- MAIN CONCLUSIONS
-
- Our main conclusion is that social, organizational, and technological
- factors still combine in ways that make much of cyberspace relatively
- vulnerable to unauthorized access. The degree of vulnerability varies
- from one type of communications system to another. In general, the
- PSTN is the least vulnerable system, the PDNs are somewhat more
- vulnerable than the PSTN, the Internet is relatively insecure, and as
- is widely known, the cellular phone system is the most vulnerable of
- the four major areas we addressed.
-
- The main vulnerabilities in most communications networks involve
- procedural, administrative, and human weaknesses, rather than purely
- technical vulnerabilities of network management, control systems,
- hardware, and software.
- There are technical vulnerabilities-poor system design and specific
- security flaws in software-but they are exploitable mainly because of
- the above-cited problems.
-
- Highlights of the study's conclusions include:
-
- o Malicious attacks on most networks and networked systems cannot be
- completely prevented, now or in the future. More than enough
- information is publicly available to hackers and other technically
- literate people to preclude attempts at prevention of intrusions.
-
- o It is possible that individuals or groups could bring down
- individual systems or related groups of systems, on purpose or by
- accident. However, security is generally improving as a result of
- dealing with past threats and challenges to system security. For
- instance, responses to the most recent serious threat to the Internet,
- the so-called Internet Worm in 1989, included improved security at
- sites vulnerable to this type of worm.
-
- o We found no evidence that the current generation of U.S. hackers is
- attempting to sabotage entire networks. On the contrary, doing so is
- inconsistent with the stated ethics and values of the hacker
- community, which are to explore cyberspace as a purely intellectual
- exercise without malicious intent or behavior. Some individuals who
- operate outside this informal ethical framework, however, can and do
- damage specific systems and occasionally use systems for personal gain
- or vindictive activities.
-
- o There is some evidence that the newest generations of hackers may be
- motivated more by personal gain than by the traditional motive of
- sheer curiosity. This development could mean that networks and
- networked systems could become more likely targets for attacks by
- hardened criminals or governments' intelligence services or their
- contractors (i.e., employing malicious hackers). This threat does not
- appear to be significant today but is a possible future scenario.
-
- o The four major areas of vulnerability uncovered in our research have
- little or nothing to do with specific software vulnerabilities per se.
- They relate more to the ways in which hackers can gain critical
- information they need in order to exploit vulnerabilities that exist
- because of poor systems administration and maintenance, unpatched
- "holes" in networks and systems, and so on.
-
- - The susceptibility of employees of businesses, public organizations,
- schools, and other institutions to "social engineering" techniques
-
- - Lax physical and procedural controls
-
- - The widespread availability of nonproprietary and of sensitive and
- proprietary information on paper about networks and computer systems
-
- - The existence of "moles," employees of communications and computer
- firms and their suppliers who knowingly provide proprietary
- information to hackers.
-
- o The vulnerabilities caused by shortcomings in software-based access
- controls and in hardware-related issues constitute significantly lower
- levels of risk than do the four areas discussed above on more secure
- networks such as the PSTN and PDNs. However, on the Internet and
- similar systems, software-based access controls (for instance,
- password systems) constitute significant problems because of often
- poor system maintenance and other procedural flaws.
-
- RECOMMENDATIONS
-
- On the basis of our research, we recommend the following:
-
- 1. Protection of organizational information and communications assets
- should be improved. Issues here range from those involving overall
- security systems to training employees in, and informing customers of
- the importance of, maintenance of security on individual systems,
- handling and disposition of sensitive printed information, and dealing
- with social engineering.
-
- 2. Techniques used to protect physical assets should be improved.
- For example, doors and gates should be locked properly and sensitive
- documents and equipment guarded appropriately.
-
- 3. Organizations and their employees should be made aware of the
- existence of moles and their role in facilitating and enabling hacker
- intrusions, and care should be taken in hiring and motivating
- employees with the mole problem in mind.
-
- 4. Software- and hardware-based vulnerabilities should also be
- addressed as a matter of course in systems design, installation, and
- maintenance.
-
- 5. Organizations concerned with information and communications
- security should proactively promote educational programs for students
- and parents about appropriate computer and communications use,
- personal integrity and ethics, and legitimate career opportunities in
- the information industry; and they should reward exemplary skills,
- proficiency, and achievements in programming and ethical hacking.
-
- 6. Laws against malicious hacking should be fairly and justly
- enforced. SRI's believes that the results of this study will provide
- useful information to both the operators and users of cyberspace,
- including the hacker community. We plan to continue our research in
- this area during 1993 within the same framework and conditions (i.e.,
- anonymity of all individuals and organizations) as those that governed
- the 1992 research. We invite hackers and others who are interested in
- participating in this work through face-to-face, telephone, or e-mail
- interviews to contact the following member of the SRI project team:
-
- A. J. Bate SRI International
- Phone:415 859 2206
- Fax:415 859 3154
- E-mail:aj@sri.com
-
- ------------------------------
-
- End of Computer Underground Digest #5.75
-