home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sun Oct 17 1993 Volume 5 : Issue 81
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Eidtor: Etaoin Shrdlu, III
-
- CONTENTS, #5.81 (Oct 17 1993)
- File 1--Another BBS/Bombing Connection (Ill.)
- File 2--BBS "Porn" Bust in Oklahoma - Another LE Misstep?
- File 3--A Few Biblio Items (Paulsen, Encryption, & P. Zimmerman)
- File 4--Fourth Annual HOHOCON
- File 5--"Hacker" Documentary Proposed
- File 6--CuNews
- File 7--Student Pugwash Conference
- File 8--Response to CuD 5.80 - Itar article
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
- editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
- WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
- CuD is also available via Fidonet File Request from 1:11/70; unlisted
- nodes and points welcome.
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- ANONYMOUS FTP SITES:
- AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
- EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
- UNITED STATES:
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud
- etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
- ftp.eff.org (192.88.144.4) in /pub/cud
- halcyon.com( 202.135.191.2) in /pub/mirror/cud
- ftp.warwick.ac.uk in pub/cud (United Kingdom)
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 14 Oct 1993 21:18:43 CDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 1--Another BBS/Bombing Connection (Ill.)
-
- Another incident of an alleged BBS/bombing connection has occurred,
- this time in Cook County (Illinois). WILLIAM PRESECKY, "6 Youth's
- Hobby was Bombs, Police Say," (Chicago Tribute, 8 October, 1993:
- Section 2,pp1, 4) summarizes six 15 and 16 year-old highschool
- students' escapades in blowing up over 70 mailboxes in Lyons Township,
- Ill., in Cook County near Chicago. The story begins:
-
- Armed with potentially deadly materials and some
- computer-generated know-how, six west suburban teenagers
- allegedly formed the nucleus of a bomb-making club broken up
- by authorities this week.
-
- ....
-
- At least two of the suspected teens could be charged as
- adults, pending a review of the juvenile petitions next week
- by the Cook County state's attorney's office, authorities
- said.
-
- ....
-
- "These are A and students, honor roll students. They come
- from well-to-do families," but appear to have no other
- activities to keep themselves busy, according to ((a police
- spokesperson)).
-
- As many as 10 more teenagers from the same area are
- suspected of being involved in the manufacture and
- detonation of assorted homemade bombs that police said may
- have damaged or destroyed as many as 70 mailboxes in the
- west and southwest suburbs over the past several months,
- according to ((a police spokesperson)).
-
- ....
-
- A search of two of the teens' homes yielded a large cache of
- bomb-making material, including pipes, chemicals, black
- powder and detonating devices as well as eight to 10
- partially made bombs. Also found were several ready-to-use
- bombs that were rendered harmless by members of the Cook
- County Bomb Squad and sent for analysis to the federal ATF's
- laboratory in Maryland.
-
- Also confiscated from one of the homes were three computer
- didks containing recorded information that, despite its
- disclaimers, ((the police spokesperson)) said could be used
- to create an assortment of mayhem, with titles such as "22
- Ways to Kill a Human Being With your Bare Hands." The disks
- contained information on advanced bomb-making technology,
- including the use of remote-control and time delay
- detonation, ((the spokesperson)said.
-
- Whether the teens accused of making and using the bombs
- actually used the computer-generated information to
- manfacture the devices isn't certain.
-
- ....
-
- "It's a frightening thing that kids have this kind ov
- access, that anyone with access to this kind of material
- would be this irresponsible," said Burr Ridge Police Chief
- Herbert Timm.
-
- Chicago's Channel 2 tv, a CBS affiliate, also covered the story on
- it's evening news. "The SHOCKING part of it is where they learned" the
- information, intoned the story (original emphasis). In a substantial
- (by news standards) segment, Channel 2 reporters interviewed what
- appeared to be a computer store owner who claimed that most BBS sysops
- are "kids from 8 to 14" and that there are even a few adults who run
- BBSes. The reporters informed the audience that most "hackers" are
- under 14, and that there are "thousands of BBSes in the Chicago area
- and elsewhere." Although the intent to inform parents of their
- responsibility in monitoring juveniles and instilling a social ethic
- is laudable, the factual errors and superficial hyperbole are not.
-
- ------------------------------
-
- Date: Thu, 14 Oct 1993 18:22:21 CDT
- From: CuD Moderators <jthomas@well.sf.ca.us>
- Subject: File 2--BBS "Porn" Bust in Oklahoma - Another LE Misstep?
-
- ((MODERATORS' NOTE: A number of posters forwarded the following,
- apparently originally posted on Usenet, to us. We have edited the
- stories down to conform to "fair use."
-
- ++++
-
- >From The Dialy Oklahoman Newspaper, September 27, 1993, Page 1:
-
- COMPUTER PORN CASE TRIGGERS LEGAL QUESTIONS
- By David Zizzo, Staff Writer
-
- Is talking to Anthony Davis hazardous to your health?
-
- In a manner of speaking, that's what numerous people with computers and
- modems apparently have been worrying about since late July. That's
- when Oklahoma City police raided Davis' software publishing firm and
- confiscated his sophisticated commercial computer bulletin board
- system. Authorities allege Davis was selling pornographic computerized
- materials on CD-ROM and through files downloaded over phone lines.
-
- Names of everyone who signed onto Davis' bulletin board service, those
- who downloaded or uploaded graphic files depicting sexual acts and
- those who didn't are in the hands of investigators.
-
- .....
-
- The Davis bust sent a chill throughout the national computer community,
- said Jack Rickard, editor and publisher of Boardwatch magazine, a
- bulletin board newsletter published in Littleton, Colo. "It's causing
- chaos," he said. Rickard said Oklahoma City is being viewed "a little
- bit like clown city" in computer circles, since the explicit material
- Davis offered can be purchased in nearly every computer magazine and is
- carried by numerous bulletin boards. "This is off the shelf," he said.
- "It's considered pretty mundane stuff."
-
- .....
-
- The bust will test Oklahoma laws on "community standards" regarding
- pornography, said Mike Godwin, attorney for the Electronic Frontier
- Foundation. The Washington, D.C., advocacy group is funded by donors
- that include large software companies. "When you talk about community
- standards, who's the real community?" Godwin wonders. "Is it the city
- or ... the community of people on-line?"
-
- Holmes, a former Cleveland County prosecutor, calls Oklahoma's
- pornography law "an extremely broad statute." "I'm not sure it wouldn't
- include Playboy or Penthouse type publications," he said.
-
- .....
-
- Critics also say police over reached in grabbing Davis' entire system,
- shutting down his pay-for-play computer service, because of four CDs.
- Prosecutors are seeking forfeiture of the system, which includes a 13
- gigabyte memory unit and 10 high speed modems. "They don't have to
- seize it any more than they have to seize the building when they
- confiscate a bookstore," said Godwin of the Electronic Frontier
- Foundation.
-
- ================================================
- >From Boardwatch Magazine / September, 1993. Under the byline of
- Lance Rose:"BBS BURNINGS" in the Legally Online column, p. 62
- ================================================
-
- OKLAHOMA BBS RAIDED ON PORNOGRAPHY CHARGES
-
- The legal assault on bulletin boards continues this month with a raid
- by Oklahoma City Police Department Vice Division on Tony Davis's
- OKLAHOMA INFORMATION EXCHANGE BBS and his associated Mid-America
- Digital Publishing Company.
-
- About 4:00 PM on July 20, four officers of the Oklahoma City Police
- Department arrived at the offices of Mid-America Digital Publishing
- with a search warrant for "pornographic CD-ROMs." Davis was arrested
- on suspicion of the sale and distribution of pornographic CD-ROM
- disks. Of the 2000 CD ROM disks available on site, they confiscated
- about 50 disks, and an estimated $75,000 worth of equipment Davis runs
- his 10-line OKLAHOMA INFORMATION EXCHANGE BBS on. The equipment
- including two computers with gigabyte hard drives, two Pioneer 6-disk
- drives, four single CD ROM drives, 10 High Speed Hayes modems, Novell
- network software and associated hardware, etc.
-
- Apparently, an undercover agent had contacted Mid-America Digital
- Publishing on two occasions and purchased CD-ROM disks containing
- adult material from the company. At the raid, Davis cooperated with
- the police showing them whatever they wanted to see, and even removing
- four disks from CD-ROMS on the BBS machine and showing them to the
- police. Curiously, these were standard off-the-shelf CD ROM
- collections NOT published by Davis, including "Busty Babes", "For
- Adults Only #2," "For Adults Only #3", and "Storm II". More
- curiously, the police themselves put the disks BACK into the BBS in
- order to video tape callers accessing the files on the disks.
-
- ......
-
- Despite Davis' notification, none of the specific procedures required
- by federal law (Privacy Protection Act) when serving search warrants
- on publishers was followed, and no acknowledgement or even apparent
- cognizance of the Electronic Communications Privacy Act made when
- notified of the electronic mail for some 2000 BBS users available on
- the system. OKLAHOMA INFORMATION EXCHANGE carries some 750 FidoNet
- conferences, an additional 750 Usenet Newsgroups, and offers callers
- private FidoNet mail and Internet mail and actually hubs mail for
- other bulletin board systems as well.
-
- ......
-
- All possible charges relate to Oklahoma State statutes against
- obscenity. Located in the heart of the Bible Belt, this could be
- serious. A penalty of up to $5000 and 5 years in prison per infraction
- is possible. If you count each file on a CD-ROM as an infraction, Mr.
- Davis could in theory be facing over a 100,000 years in jail and
- nearly a $100 million in fines - another contrast between
- technological reality and our legal system. From what we understand,
- in Oklahoma, it is technically illegal to actually BE naked at any
- time when not actually getting wet somehow, and some legal theorists
- posit that HBO and Showtime cable television channels are actually
- infractions under the state laws as written.
-
- ((MODERATORS' NOTE: BOARDWATCH Magazine, chalked full of information
- and news, can be obtained for $36/year (12 issues) from:
- Boardwatch Magazine / 8500 W. Bowles Ave. / Suite 210 / Littleton,
- CO 80123)).
-
- ------------------------------
-
- Date: Sun, 17 Oct 1993 17:22:11 CDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 3--A Few Biblio Items (Paulsen, Encryption, & P. Zimmerman)
-
- --JULIAN DIBBELL'S "Code Warriors: Battling for the Keys to Privacy in
- the Info Age," (The Village Voice, 28 July, 1993: pp 33-37) summarizes
- the debates in encryption and privacy. It includes snippets from John
- Gilmore, Tim May, and Eric Hughes, and cleanly and concisely explains
- in simple (but not simplistic) lay terms the nature of the debates
- underlying Clipper, Moby Crypto, and other issues in the encryption
- wars.
-
- --ERIC DEXHEIMER, in Denver Westord (Vol.17, #6, 29 Sept '93), "Secrets
- gend: The Government wants to Breakhim,but Boulder's Prince of Privacy
- remains Cryptic" summarizes the issues in the Phil Zimmerman/PGP
- encryption controversy. The story inludes an indepth analysis and a
- strong profile of Zimmerman (in CuD archives).
-
- --JONATHAN LITTMAN, "The Last Hacker," in Los Angeles Times Magazine (p
- 18), 12 September, '93, focuses on Kevin Poulsen and his recent legal
- problems.
- While not unsympathetic to Paulsen, the story concludes:
-
- Born in a time when hacking was an innocent rite of
- boyhood, when laws were as unclear as the boundaries of the
- Arpanet, Kevin Poulsen had outlived his era.
-
- ------------------------------
-
- Date: Tue, 12 Oct 93 2:46:47 CDT
- From: Drunkfux <drunkfux@CYPHER.COM>
- Subject: File 4--Fourth Annual HOHOCON
-
- [Official Announcement / Call For Participation - October 11, 1993]
- (Distribute Freely)
-
-
-
- dFx, Phrack Magazine and cDc - Cult Of The Dead Cow proudly present :
-
- The Fourth Annual
-
-
- H O H O C O N
-
-
- "Cliff Stoll My K0DEZ!@$#!"
-
-
- Who: All Hackers, Journalists, Security Personnel, Federal Agents,
- Lawyers, Authors, Cypherpunks, Virtual Realists, Modem Geeks,
- Telco Employees, and Other Interested Parties.
-
-
- Where: Austin North Hilton & Towers and Super 8 Motel
- 6000 Middle Fiskville Road
- Austin, Texas 78752
- U.S.A.
- Hilton : (800) 347-0330 / (512) 451-5757
- Super 8: (800) 800-8000 / (512) 467-8163
-
-
- When: Friday December 17 through Sunday December 19, 1993
-
-
-
- What is HoHoCon?
- ----------------
-
- HoHoCon is the largest annual gathering of those in, related to, or
- wishing to know more about the computer underground. Attendees
- generally include some of the most notable members of the "hacking"
- and "telecom" community, journalists, authors, security professionals,
- lawyers, and a host of others. Previous speakers include John Draper
- (Cap'n Crunch), Ray Kaplan, Chris Goggans (Erik Bloodaxe), Bruce
- Sterling, and many more. The conference is also one of the very few
- that is completely open to the public and we encourage anyone who is
- interested to attend.
-
-
- Hotel Information -----------------
-
- The Austin North Hilton recently split its complex into two separate
- hotels; the Hilton and the newly added Super 8. HoHoCon guests have
- the choice of staying in either hotel. Group rates are as followed :
-
- Super 8: Single - $46.50, Double - $49.50, Triple - $52.50, Quad -
- $55.50 Hilton : Single - $69.00, Double - $79.00, Triple - $89.00,
- Quad - $99.00
-
- Once again, the hotel has set aside a block of rooms for the
- conference and we recommend making your reservations as early as
- possible to guarantee a room within the block, if not to just
- guarantee a room period. Rooms for the handicapped are available upon
- request. To make your reservations, call the the number listed above
- that corresponds with where you are and where you want to stay and
- make sure you tell them you are with the HoHoCon conference or else
- you'll end up throwing more money away. The hotel accepts American
- Express, Visa, Master Card, Discover, Diner's Club, and Carte Blanche
- credit cards.
-
- Check-in is 3:00 p.m. and check-out is 12:00 noon. Earlier check-in is
- available if there are unoccupied rooms available. Please note that in
- order for the hotel to hold a room past 6:00 p.m. on the date of
- arrival, the individual reservation must be secured by a deposit or
- guaranteed with one of the credit cards listed above. Also, any
- cancellations of guaranteed reservations must be made prior to 6:00
- p.m. on the date of arrival. You will be responsible for full payment
- of any guaranteed reservations which are not cancelled by this time.
-
- The hotel provides transportation to and from the airport and will give
- you full information when you make your reservations.
-
-
- Directions ----------
-
- For those of you who will be driving to the conference, the following
- is a list of directions provided by the hotel (so, if they're wrong,
- don't blame me):
-
- Dallas : Take IH 35 south to exit 238-B, the Houston exit. At the
- first stop light, turn right on to 2222. Turn off of 2222
- onto Clayton Lane (by the Greyhound Station). At the stop
- sign, turn right onto Middle Fiskville, the hotel is on the
- left.
-
- San Antonio : Take IH 35 north to exit 238-B, the Houston exit. At the
- second stop light, turn left onto 2222. Turn off 2222 onto
- Clayton Lane (by the Greyhound Station). At the stop sign,
- turn right onto Middle Fiskville, the hotel is on the left.
-
- Houston (on 290) : Take 290 west into Austin. Exit off of 290 at the IH35
- exit (do not get on 35). Stay on the access road
- heading west, you will pass two stop lights. Turn off
- the access road onto Clayton Lane (by the Greyhound
- Station). At the stop sign, turn right onto Middle
- Fiskville, the hotel is on the left.
-
- Houston (on 71) : Take 71 west into Austin. Exit onto 183 north. Take
- 183 north to 290 west. Take 290 west to the IH 35 exit.
- Exit off of 290 at the IH 35 exit (do not get on 35).
- Stay on the access road heading west, you will pass two
- stop lights. Turn off the access road onto Clayton Lane
- (by the Greyhound Station). At the stop sign, turn
- right onto Middle Fiskville, the hotel in on the left.
-
- Airport : Exit the airport parking lot and turn right onto Manor Road.
- Take Manor Road to Airport Boulevard and turn right. Take
- Airport Boulevard to IH 35 north. Take IH 35 to exit 238-B. At
- the second stop light, turn left onto 2222. Turn off of 2222
- onto Clayton Lane (by the Greyhound Station). At the stop sign,
- turn right onto Middle Fiskville, the hotel is on the left.
-
- Call the hotel if these directions aren't complete enough or if you need
- additional information.
-
-
- Conference Details
- __________________
-
- HoHoCon will last 3 days, with the actual conference being held on
- Saturday, December 18 starting at 11:00 a.m. and continuing until 5 p.m.
- or earlier depending on the number of speakers. Although a few speakers
- have confirmed their attendance, we are still in the planning stages and
- will wait until the next update to release a speaking schedule. We welcome
- any speaker or topic recommendations you might have (except for, say, "Why
- I Luv Baked Potatoes On A Stik!"), or, if you would like to speak yourself,
- please contact us as soon as possible and let us know who you are, who you
- represent (if anyone), the topic you wish to speak on, a rough estimate of
- how long you will need, and whether or not you will be needing any
- audio-visual aids.
-
- We would like to have people bring interesting items and videos again this
- year. If you have anything you think people would enjoy having the chance
- to see, please let us know ahead of time, and tell us if you will need any
- help getting it to the conference. If all else fails, just bring it to the
- con and give it to us when you arrive. Any organization or individual that
- wants to bring flyers to distribute during the conference may do so. You
- may also send your flyers to us ahead of time if you can not make it to
- the conference and we will distribute them for you. Left over flyers are
- included with information packets and orders that we send out, so if you
- want to send extras, go ahead.
-
-
- Cost
- ----
-
- Unlike smaller, less informative conferences, we do not ask you to shell
- out hundreds of dollars just to get in the door, nor do we take your money
- and then make you sleep in a tent. We are maintaining the motto of "give
- $5 if you can", but due to the incredibly high conference room rate this
- year, we may step up to "$5 minimum required donation" or "give us $5 or
- we'll smash your head in". Five dollars is an outrageously low price
- compared to the suit infested industry conferences or even the new "Cons
- are k00l and trendy, I gotta do one too!" conferences that are charging
- up to $50 for admission alone.
-
- To encourage people to donate, we will once again be having our wonderless
- "Raffle For The Elite" during the conference. We will issue a prize list
- in a future update, but we can guarantee that this year there will be a
- lot more (and better) prizes than last year, including a full system (and,
- no, it's not a c64 or 286). Anyone who wishes to donate worthwhile items
- to the raffle, please let us know ahead of time, or if it's a last minute
- acquirement, just bring it to the conference.
-
-
- Miscellaneous Notes
- -------------------
-
- To save myself some time by mailing responses to a lot of the same
- questions I expect to get, I'll answer a few of them here.
-
- Although I have not talked to him myself yet, Steve Ryan has told me that
- Bruce Sterling will indeed be in attendance and may say a few words.
-
- As far as I know, there will not be any visitors from any other planets
- at the conference. Scot Chasin is still on Earth and will be making an
- appearance.
-
- Video cameras will *not* be allowed inside the conference room without
- prior consent due to previous agreements made with speakers who do not
- wish for certain parts of their speech to be rebroadcast. Still cameras
- and Etch-A-Sketch's are fine and tape recorders are too easily hidden
- for us to be able to control.
-
- Videos and T-Shirts from last year's conference are still available, and
- will also be on hand during the conference. We do not handle the LoD World
- Tour shirts, but I can tell you that that the old ones are gone and a
- *new* LoD shirt will be unveiled at the conference. The HoHoCon shirts are
- $15 plus $3 shipping ($4.00 for two shirts). At this time, they only come
- in extra large. We may add additional sizes if there is a demand for them.
- The front of the shirt has the following in a white strip across the
- chest:
-
- I LOVE FEDS
-
- (Where LOVE = a red heart, very similar to the I LOVE NY logo)
-
-
- And this on the back:
-
- dFx & cDc Present
-
- HOHOCON '92
-
- December 18-20
- Allen Park Inn
- Houston, Texas
-
-
- There is another version of the shirt available with the following:
-
- I LOVE WAREZ
-
-
- The video includes footage from all three days, is six hours long and
- costs $18 plus $3 shipping ($4.00 if purchasing another item also). Please
- note that if you are purchasing multiple items, you only need to pay one
- shipping charge of $4.00, not a charge for each item. If you wish to send
- an order in now, make all checks or money orders payable to O.I.S.,
- include your phone number and mail it to the street address listed below.
- Allow a few weeks for arrival.
-
- There will be new HoHoCon '93 shirts available at the conference and a
- video of the festivities will be out early next year.
-
-
- Correspondence
- --------------
-
- If anyone requires any additional information, needs to ask any questions,
- wants to RSVP, wants to order anything, or would like to be added to the
- mailing list to receive the HoHoCon updates, you may mail us at:
-
-
- hohocon@cypher.com
- drunkfux@cypher.com
- cDc@cypher.com
- drunkfux@crimelab.com
- dfx@nuchat.sccsi.com
- drunkfux@5285 (WWIV Net)
-
- or via sluggo mail at:
-
- HoHoCon
- 1310 Tulane, Box 2
- Houston, Texas
- 77008-4106
-
-
- We also have a VMB which includes all the conference information and is
- probably the fastest way to get updated reports. The number is:
-
- 713-867-9544
-
- You can download any of the conference announcements and related
- materials by calling Metalland Southwest at 713-468-5802, which is the
- official HoHoCon BBS. The board is up 24 hours a day and all baud rates
- are supported.
-
- Those of you with net access can ftp to cypher.com and find all the
- HoHoCon information available in /pub/hohocon. The .gifs from previous
- cons are *not* currently online.
-
- Conference information and updates will most likely also be found in most
- computer underground related publications and mailing lists, including
- CuD, CSP, Mondo 2000, 2600, Phrack, TUC, phn0rd, cypherpunks, etc. They
- should also appear in a number of newsgroups including comp.dcom.telecom,
- alt.security, comp.org.eff.talk, and sci.crypt. We completely encourage
- people to use, reprint, and distribute any information in this file.
-
-
- Same stupid ending statement from last year to make us look good
- ----------------------------------------------------------------
-
- HoHoCon '93 will be a priceless learning experience for professionals
- and gives journalists a chance to gather information and ideas direct
- from the source. It is also one of the very few times when all the
- members of the computer underground can come together for a realistic
- purpose. We urge people not to miss out on an event of this caliber,
- which doesn't happen very often. If you've ever wanted to meet some of
- the most famous people from the hacking community, this may be your
- one and only chance. Don't wait to read about it in all the magazines
- and then wish you had been there, make your plans to attend now! Be a
- part of what we hope to be our largest and greatest conference ever.
-
- ------------------------------
-
- Date: Mon, 27 Sep 93 21:36:59 -0700
- From: annaliza@netcom.com (Annaliza T. Orquamada)
- Subject: File 5--"Hacker" Documentary Proposed
-
- ((MODERATORS' NOTE: Annaliza Orquamada, a film-school graduate from
- London, intends to challenge conventional media myths about "hackers"
- in a proposed documentary. Below, we print a summary of her project.
- We will post a substantial version in about a week. From our
- conversations and e-mail interaction with her, we find her a highly
- informed and competent observer and a refreshing change from most
- conventional media folk)).
-
-
- UNAUTHORIZED ACCESS ONLY
-
- Computers are becoming an integral part of our everyday existence.
- They are used to store a multitude of information, from credit reports
- and bank withdrawals to personal letters and highly sensitive military
- documents. So how secure are our computer systems?
-
- The computer hacker is an expert at infiltrating secured systems, such
- as those at AT&T, TRW, NASA and the DMV. Most computer systems that
- have a telephone connection have been under siege at one time or
- another, many without their owner's knowledge. The really good
- hackers can re-route the telephone system, obtain highly sensitive
- coporate and government documents, download individuals credit
- reports, make free phone calls globally, read private electronic mail
- and corporate bulletins and get away without ever leaving a trace.
-
- So who are these hackers? Just exactly WHAT do they DO, and WHY do
- they do it? Are they really a threat? What do they do with the
- information they obtain? Are hackers simply playing an intellectual
- game of chess or are hackers using technology to effectively take
- control of corporate and government systems that have previously
- appeared omnipotent?
-
- Our group is in the course of filming "Unauthorized Access", a
- documentary that will demystify the hype and propaganda surrounding
- the computer hacker.
-
- We will expose the truths of this sub-culture focusing on the hackers
- themselves. This will be a view from inside the global underground.
- We intend to shoot in the United States, Holland and Germany.
-
- This documentary will be of the highest broadcast quality and is
- intended for international television, festival and theatrical
- distribution.
-
- We are currently looking for additional financial backers interested
- in this project. For more information about "Unauthorized Access" or
- if you are intrested in providing any information or support, please
- contact annaliza@netcom.com.
-
- ------------------------------
-
- From: grmeyer@GENIE.GEIS.COM
- Date: Sun, 10 Oct 93 22:32:00 BST
- Subject: File 6--CuNews
-
- Extortion at AT&T
- =================
- Two men, one a former computer support services employee at AT&T, have
- pleaded guilty to conspiring to extort one million dollars from the
- company. The US Attorney in Newark, NJ reports that Lou Pacich and
- Richard Vignevic sent AT&T a tape-recorded message claiming sensitive
- information about commercial accounts was being leaked to competitors.
- The two offered to plug the leak in exchange for the money. To bolster
- the claim they sent copies of account information on 4,000 AT&T
- commercial customers. The information has been obtained, w/out
- authorization, from AT&T computer systems. Each man faces 20 years and
- $250,000 in fines.
- (Information Week. Sept 20, 1993 pg8)
-
- Piracy Around the Globe
- =======================
- The Oct 1993 issue of Technology Training reports on software piracy
- in various countries. In Cuba, there is a National Software
- Interchange Center where all types of software is available to any
- Cuban at no charge. The estimated piracy rate in China and South
- Korea is about 90%. Italy checks in at 80%.
- (Information Week. Sept 20, 1993 pg62)
-
- How do I love thee...
- =====================
- In "Hard Drives" (Los Angeles Times Magazine, Sept 12, 1993 pg26)
- author James Fallows says that we value computers for the ways they
- increase our efficiency and productivity. But we love them for the way
- they undermine productivity (games, BBSing, etc) and satisfy our
- craving for new possessions. Computers play on one of our basic needs,
- the compulsion to figure something out and make it work.
- (Information Week. Sept 20, 1993 pg62)
-
- IW Security Survey Results
- ==========================
- Information Week magazine and Ernst and Young conducted an extensive
- security survey and found, to their surprise, that a _minority_ of
- organizations polled considered security to be an important issue.
- They also found that one in four companies had last money over last
- two years due to security breaches in their networks. Most
- organizations don't even have full time security staffs. CuD
- encourages you to refer to "Tempting Fate", pgs42-52, October 4, 1993
- for complete details.
-
- P&G Consultant Indicted
- =======================
- A Procter & Gamble consultant, Matthew Daughtery, has been charged
- with three felony counts for using P&G computers to access a company
- bulletin board without authorization. The BBS is identified as
- "Regulatory and Clinical Development Network". Ohio prosecutors have
- not said what information Daughtery could have obtained from the
- system.
- (Information Week. pg8. Oct 4, 1993)
-
- Consumer Privacy Survey ======================= A Harris poll,
- sponsored by the non-profit Center for Social and Legal Research
- (Washington, DC), found that 53% OF American adults are very concerned
- about threats to their privacy from corporations. This is a
- substantial increase over results in previous years. Respondents were
- most concerned about financial services and health industries (72%),
- with mail-order consumer goods businesses rating 48%. For complete
- results refer to the Privacy & American Business newsletter. For more
- summary information refer to Information Week, pg58, Oct 4, 1993.
-
- Internet Access in NJ
- =====================
- New Jersey Bell and Bellcore are sponsoring a two-year experiment to
- allow people free access to the Internet in three dozen public
- libraries in the Garden State. Anyone with a modem can also tap into
- portions of the Internet from home by calling the project's dial-up at
- (201) 989-5999. Plans are in the works to have fiber-optic cable
- installed in every home and business throughout NJ by 2010. Officials
- will monitor this experiment to see how pedestrians interact with the
- worldwide network and hope the project will become a model for the
- nation.
- (Communications of the ACM, pg11, Oct 1993. Reprinted with permission)
-
- Sex and Violence Nipper Chip
- ============================
- For as little as $5 parents may soon be able to implement a computer
- chip in televisions to monitor programs their children watch. With the
- growing concern over TV sex and violence comes the debate whether
- "lock out" technologies are the solution. Under pressure from
- Congress, networks and stations may eventually be forced to rate shows
- -- "V" for violence, "N" for nudity, for instance -- and broadcast a
- code along with the show which could then be read by the "V-chip"
- installed in the set or cable box. The same technology is already used
- for broadcasting closed captioned information for the hearing impaired
- and will be used to transmit and display information such as the title
- and time remaining of shows in progress. Broadcasters and program
- producers are no fans of this idea, arguing the technology will take
- away viewers and frighten advertisers. (Communications of the ACM,
- pg12, Oct 1993. Reprinted with permission)
-
- Nightline on Security/Privacy?
- ==============================
- According to James Daly ("Security Watch") the folks at NBC's
- Nightline have been talking to folks in the computer security industry
- over the past few weeks. A show on security/privacy can't be far
- behind. Keep an eye out for it.
- (Computerworld, pg56, Oct 4, 1993.)
-
- ------------------------------
-
- Date: Fri, 15 Oct 1993 01:45:35 EDT
- From: Nikki Draper <draper@EUPHRATES.STANFORD.EDU>
- Subject: File 7--Student Pugwash Conference
-
- ANNOUNCING: Student Pugwash USA's Eight International Conference
-
- "SCIENCE AND TECHNOLOGY FOR THE 21ST CENTURY
- MEETING THE NEEDS OF THE GLOBAL COMMUNITY"
-
- JOIN: 100 talented students from over 25 countries to meet with
- accomplished professionals from science, government, industry,
- non-governmental organizations, and academe for a week-long
- educational forum to explore the impacts of technology on society and
- world affairs.
-
- TOPICS:
- * Resource Stewardship for Environmental Sustainability
- * Preventive Diplomacy and Conflict Resolution for a Secure Future
- * The Social Costs and Medical Benefits of Human Genetic Information
- * Overcoming Barriers to Health Care Education and Delivery
- * Designing the Future--From Corporations to Communities
- * Communications and Information Technologies
-
- ELIGIBILITY: ALL students (undergraduate, graduate and professional)
- from any and all disciplines. Student Pugwash USA encourages
- participation that represents a diversity of race, age, gender, sexual
- orientation, and national origin.
-
- APPLICATION INFORMATION:Participants will be chosen through a
- competitive, merit-based application process based, in part, upon
- applicants' submission of a brief 'issue paper' on one of the topics
- listed above. For an application or additional information, please
- CONTACT: Nicky Short Student Pugwash USA 1638 R Street NW, Suite 32
- Washington, D.C., 20009 phone:(202) 328-6555 email:uspugwash@igc.org
-
- PRELIMINARY APPLICATION DEADLINE: December 15, 1993
-
- ------------------------------
-
- Date: Thu, 14 Oct 93 04:55:32 PDT
- From: Fredrick B. Cohen <fc@JUPITER.SAIC.COM>
- Subject: File 8--Response to CuD 5.80 - Itar article
-
- ((MODERATORS' NOTE: The following post was originally less than 25
- percent substance, the remainder cascading citations and headers. At
- the poster's request, we edited out the superfluous citing while
- leaving the poster's comments intact.
-
- We remind readers that CuD is *not* a Usenet discussion group in which
- cascades are accepted)).
-
- ++++
-
- In CuD 5.80, bjones@WEBER.UCSD.EDU(Bruce Jones) writes:
-
- > Please note that the posting site for Mr. Cohen's message is
- > the Science Applications International Corporation, a La Jolla
- > California based think tank that has deep ties to the U.S. Gov't and
- > does lots of work for the DoD. Given his ties to the DoD, it comes
- > as small surprise that he was able to get export permission for his
- > RSA cryptosystem.
-
- Wrongo - This application was made by ASP, my company (then) in
- Pittsburgh, PA and with no government contracts whatsoever. This is a
- typical assumptive response from someone who doesn't understand that
- poor people like me get access to computers by the grace of others.
- Perhaps you think I was previously a professor at Duquesne University,
- and before that an employee of the NSA, and before that an employee of
- wherever my previous mail account came from. This kind of response
- from someone who appears from his mailing address to be from a person
- at a major university who is almost certainly getting government
- grants is certainly the pot calling the kettle black.
-
- > Why should a software manufacturer or a private citizen have to ask
- > permission in the first place, from the DoD (operating under the
- > guise of the Dept of Commerce) to export software that uses
- > encryption algorithms freely available in the country to which the
- > product is being exported?
-
- Interesting question, and one that I have asked, but then why should I
- need any permission from the government for anything? Perhaps I
- shouldn't, but the fact is, they have the power, and if you work
- within the structure, you may find that it is not as oppressive as you
- thought.
-
- > >IBM has been exporting DES for quite a few years according to sources
- > >I have in EC who have seen IBM chips with DES on them in EC computers.
- > >I believe they simply asked for permission and got it.
-
- > Again, it's likely quite simple for someone who does business with
- > the DoD and the U.S. Gov't to get permission to export.
-
- The point is that even ASP, a tiny company with no government ties got
- permission by simply following the rules. Should IBM be treated
- unfairly?
-
- > >I applaud the EFF for helping defend people in this area, but maybe if
- > >they tried to work within the law in the first place, they would have
- > >found it was easier to obey the law than break it.
- >
- > Serious charges without foundation. Whom within the EFF has been
- > accused of breaking the law?
-
- Try reading more closely. The EFF is defending those who may have
- broken the law. Sorry if I mixed my pronouns, I am a human being.
-
- > >Maybe if they apply now, they will end up with a no-case (assuming
- > >they get permission).
- >
- > A dodge of the issue, which is not about whether or not one can get
- > permission to do something specific, but whether or not the
- > government has a right to require permission in the first place.
-
- The government certainly has the right to require it, but perhaps it
- won't have that right as a result of the PGP case. The issue is that
- if they didn't want to go to federal court, why were they trying to
- play it so close to the edge? If I walk up to you and swing a
- baseball bat within a few inches of your head, are you going to ignore
- me because I didn't hit you?
-
- > One of the founding tenets of the Unites States of America is the
- > idea that its citizens may do whatever they like, so long as their
- > chosen activity is not proscribed by law and doesn't violate the
- > rights of their neighbors. The opposite is ostensibly true for
- > the government, which may only do what has been permitted it under
- > the law. We live in a society where those distinctions apparently
- > collapsed some time ago.
-
- Where does the constitution say this? I agree that I would prefer it that
- way, but I don't think there is any basis in law for your statement.
-
- ------------------------------
-
- End of Computer Underground Digest #581
- ************************************
-
-