home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Mar 16, 1995 Volume 7 : Issue 21
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Semi-retiring Shadow Archivist: Stanton McCandlish
- Correspondent Extra-ordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Monster Editor: Loch Nesshrdlu
-
- CONTENTS, #7.21 (Wed, Mar 16, 1995)
-
- File 1--CuD Listserv at UIUC having some problems
- File 2--Seizure of italian BBS - UPDATE
- File 3--(fwd) U. of Pittsburgh Netnews Policy (fwd)
- File 4--S. 314, Realism, Unanswered Questions
- File 5-- Dutch Hacker Arrested
- File 6--(fwd) Eyewitness account of 2/21 San Jose hearing, by C. Kaun
- File 7--Cu Digest Header Info (unchanged since 26 Feb, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ----------------------------------------------------------------------
-
- Date: Fri, 10 Mar 1995 15:24:43 (CST)
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 1--CuD Listserv at UIUC having some problems
-
- The UIUC Listserv is having some problems. People subscribing to
- CuD with standard internet addresses should be relatively
- unaffected. Those with BITNET addresses will likely not
- receive CuD this (or next) issue.
-
- Sorry for the inconvenience.......
-
-
-
- Jim and Gordon
-
- ------------------------------
-
- Date: Wed, 15 Mar 1995 11:07:11 +0000 (CUT)
- From: Luc Pac <lpaccagn@RISC1.GELSO.UNITN.IT>
- Subject: File 2--Seizure of italian BBS - UPDATE
-
- Press Release 13 March 1995
-
- BITS Against the Empire BBS, a node of the Italian Cybernet computer
- network), remains shut down due to police investigations. According
- to the authorities, the bulletin board's activities in pursuit of
- free communication and counter-information represent a danger to the
- democratic order.
-
- Ten days after police raids on the homes of a dozen activists, all
- hard copy materials, along with one of the computers seized, have been
- returned. The authorities remain in possession of the bulletin board
- computer itself, however, as well as all the floppy disks
- appropriated, in order that they might pursue a 'deeper analysis' of
- such electronic material.
-
- Clearly no-one has explained to them that hard disks and diskettes
- can be copied in a matter of minutes. Meanwhile, those facing
- prosecution, as well as the hundreds of users of the BITS Against the
- Empire BBS, must continue to wait as the police force's computer
- experts work to uncover not only the DOS 'copy' command, but also
- that very dangerous information - from publicly available electronic
- journals, articles and academic essays on the social use of new
- technology, to publicly accessible electronic discussion groups -
- which has inspired the charge of subversive association with
- terrorist intent (associazione eversiva con finalita' di terrorismo -
- art. 270 bis of the Italian penal code).
-
- BITS Against the Empire Labs
- Underground Research & Documentation
- Italy
-
- CyberNet 65:1400/1 (currently down)
- ECN 45:1917/2
- Fidonet 2:333/412 (currently down)
- Internet lpaccagn@risc1.gelso.unitn.it
-
- ------------------------------
-
- Date: Mon, 6 Mar 1995 01:27:49 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 3--(fwd) U. of Pittsburgh Netnews Policy (fwd)
-
- ---------- Forwarded message ----------
-
- PITT ADOPTS NEW COMPUTER ACCESS POLICY
-
- PITTSBURGH, March 2 -- The University of Pittsburgh will establish a
- standing committee to help determine which of the more than 10,000
- USENET news groups on the Internet will be carried on the University's
- computer network. This is one aspect of a new policy, approved by the
- University's senior administration, that was developed by the ad hoc
- committee formed to review the use of University computer resources to
- access, display, post or print materials that may have obscene or
- sexually explicit content.
-
- The policy addresses the need to provide appropriate protection
- for First Amendment rights, while, at the same time, adhering to
- federal and state statutes governing obscenity and sexually explicit
- material.
-
- The new standing committee, which will have faculty, staff and
- student members, will be charged with developing guidelines for use by
- the University's Computing and Information Services staff when making
- decisions about adding, deleting or retaining news groups. The
- guidelines will be content-neutral, except with respect to obscenity,
- or other speech not protected by the First Amendment.
-
- The committee will also formulate guidelines for separating the
- news groups into two categories: 1) those with content, as defined by
- state or federal law, that is likely to be obscene or sexually
- explicit and harmful to minors, and 2) those without such content.
- All authorized users under the age of 18 would be granted access only
- to the second group.
-
- The new policy also calls for the suspension of computing
- privileges as well as the possible imposition of additional sanctions
- upon anyone who is found to have employed University computer
- resources to use obscene or sexually explicit material in a way that
- violates University policies and guidelines. At the ad hoc
- committee's suggestion, the University will review its existing
- policies regarding "Computer Access and Use," "Sexual Harrassment,"
- and "Computing Ethics and Guidelines" to make sure that they
- adequately deal with issues such as the display of obscene or sexually
- explicit materials on computer screens.
-
- # # #
-
-
- AD HOC COMMITTEE PROPOSAL
-
- Accepted as University Policy by Executive Staff
- January, 1995
-
- For use until formally issued as a University policy.
-
- Our group has been charged with recommending a policy to ECAC
- regarding the use of University computer resources to access, display,
- post, and print materials which have possibly obscene and/or sexually
- explicit content. There exist both Federal and Pennsylvania statutes
- which govern obscene and/or sexually explicit material. Pitt is a
- state-related University, and, as such, must support and protect First
- Amendment rights.
-
- 1. We suggest that University of Pittsburgh Policies 10-02-05
- (Computer Access and Use) and 07-06-04 (Sexual Harassment Policy), and
- CIS' "Computing Ethics and Guidelines," be reviewed by the University
- to make sure that they adequately deal with issues such as the display
- of obscene and/or sexually explicit materials on computer screens.
-
- 2. There are approximately 10,000 USENET news groups on the Internet,
- the vast majority of which do not deal with obscene and/or sexually
- explicit material. CIS resource limitations prevent us from carrying
- all of those groups, even if we would want to do so. While the topics
- discussed by a group are generally assumed to be well described by the
- group's name and statements about its purpose, a group is the
- electronic analogue of a large bulletin board with open access.
- Anyone may post anything he/she wishes on the board; thus obscene
- and/or sexually explicit material may well exist in news groups with
- innocuous titles. It is impossible to review the content of all
- groups Pitt carries, even if we wished to do so. We propose that the
- University form a standing committee, with faculty, staff, student,
- and Office of General Counsel representation, which will draft,
- review, and update guidelines, on the basis of which a CIS staff
- member will add, delete, and retain news groups on the CIS system.
- Except with respect to obscenity, or other speech not protected by the
- First Amendment, the guidelines will be content-neutral. CIS
- currently has a process for selecting news groups; our proposal
- broadens the group involved in setting the policies to be followed and
- enhances legal safeguards to the policy-making process.
-
- 3. We recommend that the standing committee mentioned in the paragraph
- above formulate guidelines, on the basis of which CIS will segregate
- news groups into two categories: (1) those with content which is
- likely to be obscene or sexually explicit and harmful to minors, as
- defined by Federal and State law, and (2) those without. Matriculated
- students, faculty, and staff, age 18 and older, would automatically be
- granted access to all news groups being carried. All those under age
- 18 would normally be granted access to only the second news group. We
- recommend the establishment of a process and a set of guidelines by
- which those persons could apply for access to the other set of news
- groups under appropriate circumstances.
-
- 4. Computing privileges may be suspended or other sanctions imposed
- upon anyone found to have used University resources to display, print,
- or circulate obscene material, where "obscene" is defined by Federal
- and State law; anyone who circulates, to persons under the age of 18,
- sexually explicit materials which are defined by law as being harmful
- to minors; and anyone found to have used University resources to use
- obscene and/or sexually explicit material in a way which violates
- University policies and guidelines. The standing committee mentioned
- above will make recommendations to CIS for suspension of computing
- privileges or other sanctions in each case involving faculty or staff
- members. In cases involving students, the existing Student Judiciary
- Board will have jurisdiction. In addition, as noted in the August
- 1993 "Computing Ethics and Guidelines," "... failure to adhere to
- these guidelines can result in the suspension of computing privileges
- and prosecution under Federal and State law, where applicable." The
- University will fully cooperate with all such prosecutions.
-
- ------------------------------
-
- From: timk@WORLD.STD.COM(Tim King)
- Subject: File 4--S. 314, Realism, Unanswered Questions
- Date: Fri, 10 Mar 1995 13:19:13 -0500 (EST)
-
- Brad Hicks wrote:
-
- > If you want it to be legal for people to use [the Internet for
- > transmitting hard-core pornographic material in a manner which
- > would be illegal over a phone line under the existing law]...
- > well, then say so!
-
- To which Rhys Weatherley replied:
-
- > Very few free speech supporters, myself included, want that
- > kind of crap distributed on the Internet or anywhere...
-
- Um... Er... This does seem to be the point. The question is not
- whether anyone _wants_ it to happen. I'm sure that no one _wants_ it
- to happen. The question is whether or not "you want it to be legal."
- But, it appears, Brad thinks that the objections to S. 314 have been
- blown way out of proportion in an attempt to dodge the real issue.
- Now, far be it from me to assume to know Brad's thoughts and motives.
- Nevertheless, if I am correct in this interpretation, his assessment
- would seem to me to be a plausable one.
-
- There are several points that I have not yet seen addressed, but which
- appear to be intimately applicable to the debate. The first is that
- the current law seems to already apply to any service provider that
- makes obscene material avaiable over telephone lines. What
- differentiates any Internet provider or BBS operator from anyone else
- who "makes (directly or by recording device) any obscene [telephone]
- communication for commercial purposes to any person?" Now we can
- discuss whether or not the current law is appropriate for modern
- computer-based communication, but it still seems that Sen. Exon's bill
- would have negligible effect on many service providers.
-
- Secondly, how does the current law apply to pay-services, like singles
- lines, that provide PRIVATE messaging facilities? I've never actually
- used such a service, but my understanding is that they allow users to
- leave voice messages for other users. Now, when one user leaves an
- obscene message for another user, is the service provider deemed
- responsible? Or does someone really listen to every message left by
- every user before forwarding it to its destination voice mailbox?
- However the law applies, we can still discuss whether or not it is
- appropriate. But it seems to me that any requirements that can
- reasonably be made relating to private voice-mail messages can
- reasonably pertain to private email as well.
-
- Furthermore, the current law gives seemingly special protection to
- "common carriers." It is my understanding, however, that network
- operators, Internet providers, and BBS operators do not fall into this
- category. If so, isn't this point of more paramount concern? In
- other words, if this bill is going to be considered by congress,
- shouldn't it at least include provisions to restrict the liability of
- telecommunications services for data that they did not publish?
-
- I would be most grateful if someone could enlighten me with informed
- answers to these questions.
-
- ------------------------------
-
- Date: Tue, 14 Mar 1995 18:25:21 EST
- From: "Rob Slade, Social Convener to the Net" <roberts@MUKLUK.DECUS.CA>
-
- VIRETHIC
-
- Viral Morality: A Call for Discussion
-
- "Computer ethics" has been an ongoing study in the technical world.
- On the one hand is the study of the ethical, moral, or proper use of
- computers. On the other, is the study of computer crime and
- vandalism. Lately, I have noted a rather desperate interest in
- courses or training in computer ethics, as well as an increase in the
- frequency and depth of discussions regarding the ethics of virus
- writing. I would like to address this latter topic, specifically.
-
- One problem with current discussions and literature regarding the
- ethics of virus writing and distribution is the lack of dialogue
- between two opposing camps. This paper is not intended to present any
- final answer, nor to add to the literature in the field, but to open
- the field for comment. My purpose in writing this is to provide an
- initial overview and to elicit feedback from any and all concerned
- with the topic.
-
- For those of traditional moral stance, the current situation is
- discouraging. Peter Denning's "Computers Under Attack" (cf.
- BKDENING.RVW) has a very thorough survey of the field, but it provides
- little in the way of answers or hope. Deborah Johnson's work
- "Computer Ethics" (cf. BKCMPETH.RVW) is pre-eminent in the field, but
- serves only to clarify the problem. Sarah Gordon's interviews with
- computer students show responses typical of almost all such studies.
- The base attitude appears to be, "If I find it interesting, and I can
- do it, why do you say I shouldn't?"
-
- The proponents of security-breaking activities often question the
- traditional ethical position by asking, "Where's the harm?" This
- query is directly relevant to discussions of the morality of virus
- writing.
-
- I should begin by defining two generally opposed groups in this area.
- First is the "antivirus", or "AV", research community. Many, though
- not all, of the members of this group would be involved in producing
- antiviral software. All would study viral programs with a view to
- eliminating viral programs in the normal computing environment. They
- take a rather paranoid, and almost obsessive, position with regard to
- the sharing and distribution of viral code. (They would rejoin this
- last by pointing out that it isn't paranoia if someone is *really* out
- to get you.)
-
- The AV community is not really opposed to the writing of viral
- programs. It is seen as a trivial, and therefore pointless, exercise;
- but not necessarily evil, in itself. The communication of viral
- program code is also a normal professional and academic activity, as
- long as it is limited, done for a stated purpose, and the recipients
- are known. It is the unregulated exchange of virus code and source,
- providing open access to anyone with a computer and a modem, that is
- upsetting. The opposing group is therefore described as the virus
- exchange community, or "vx" for short. (This designation was first
- used by Sarah Gordon.) For the purposes of this paper, therefore,
- references to "virus writing", "virus exchange" or "vx" will mean the
- uncontrolled or unregulated exchange or provision of access to virus
- source and object code.
-
- (This does not necessarily mean deliberate distribution of infected
- programs by such means as infecting a legitimate program and then
- posting it, without warning, to a bulletin board system.
- "Trojanizing" of normal software or malicious invasion of systems is
- certainly happening in some areas, but it is not needed in the current
- computing situation. While there is debate over the relative
- contribution of "natural spread" and virus exchange to the current
- virus problem, it is known that code made available only as openly
- published material does eventually infect machines in the normal
- computing environment. The term vx does not, therefore, require any
- imputation of sinister motives or hidden activity for the purposes of
- this discussion.)
-
- There are some grey areas between these two poles. Some people have
- both written antiviral software *and* contributed to viral spread.
- Given, however, that one could expect a continuum of opinion, those in
- the middle are remarkably few. Either you are for virus exchange, or
- against it.
-
- One other, separate, group should be noted. Viral programs are often
- cited as an example of "artificial life", and the research community
- in that field, both professional and amateur, have a legitimate
- interest in viral programming. Work in the a-life field, however,
- does not justify unregulated code and source exchange. For one thing,
- current viral programs "in the wild" (those which are to be found in
- normal home and business computers, as opposed to those which exist
- only in a research or laboratory environment) have only the most
- tenuous claim to artificial life. Common viral programs are
- simplistic snippets of code without anything like the complexity of
- the simplest known natural life forms. In addition, those who really
- do work in the artificial life area will be well aware that it does
- carry possible dangers, and that research should be subject to
- controls similar to those imposed on biological and genetic study.
-
- The most common argument for virus-writing tends to boil down to, "You
- can't stop me." Many promote virus writing on the grounds of freedom
- of speech, a rather curious position in light of the incoherence of
- the arguments. (The most vocal of these tend to be Americans, who
- frequently cite "First Amendment Rights". This refers to the first
- amendment to the U.S. Constitution, which Americans tend to see as
- some universal law, rather than an arbitrary political document,
- however desirable.)
-
- Rights, though, carry with them a weight of responsibility. As is
- often quoted, your "right" to swing your fist ceases at the end of my
- nose. You have a "right" to free speech--so long as you are
- responsible and do not perpetrate fraud. You have a "right" to study
- whatever you like--so long as you are responsible enough not to carry
- out experiments in poison with human subjects. No PC is an island--at
- least, not where viral programs are concerned. Therefore, your
- "right" to study, write and distribute viral programs carries the
- responsibility to ensure that your creations do not--ever--run on
- machines where they are not authorized.
-
- One of the most confusing aspects of the "exchange/no exchange" debate
- is the concept of the "good" virus. There is nothing inherently evil
- in the concept of reproduction. (Dangerous, yes.) In fact, the very
- earliest experiment with self-reproducing programs was the Xerox Worm
- of Shoch and Hupp. This was designed to spawn "segments" of the
- central program on other machines in the network, thus bringing the
- power of many processors to bear on a single problem. Thus, in
- theory, viral programming could represent the same level of advanced
- technology in software that parallel processing represents in
- hardware.
-
- That's the theory. And it is promoted by no less eminent a researcher
- than Dr. Fred Cohen, who did seminal work on the security-breaking
- class of viral programs in a thesis, in 1984, and dissertation, in
- 1986. Unfortunately, the theory founders on some rather hard facts.
-
- There are three questions to ask of a new, inherently dangerous,
- technology. Has it a useful application? Can it fulfil that
- application better than current technologies? And, can the danger,
- either inherently, or effectively, be controlled?
-
- To date, no one has answered those three questions. While a variety
- of uses have been proposed for viral programs, there are none which
- are not effectively being done by other means. No viral programs
- have, indeed, been seen to be as effective as normal systems.
- Operating system upgrades could not guarantee universal coverage.
- Network management tasks could not promise reliable feedback.
- Automated utilities would confuse novice level users, who never run
- utilities anyway. The most useful function is still that proposed by
- Shoch and Hupp--and their programs were not, strictly speaking, viral.
-
- (Vesselin Bontchev's examination of this question is the most detailed
- to date, and is required reading for all who want to join the debate.
- His proposals, while demonstrating good ideas for safety and control,
- are still primarily an advanced automated distribution system. The
- necessity for viral functions in this regard is still unproven.)
-
- Those in the vx camp will point to two current viral programs which,
- they say, do have useful functions. One of these programs produces
- compressed executable files, thus saving disk space, while the other
- performs encryption on files. However, both of these functions are
- provided by other programs--from which, indeed, code was stolen for
- those two "good" virals. Neither of the viral programs are as easy to
- use or control as the original programs, and both have bugs which must
- place them firmly in the malware grouping, for nuisance value, if
- nothing else.
-
- Currently, therefore, the utility of viral programs is very much
- unproven. This would, though, mean only that they are neutral, were
- it not for the lack of any demonstrable control. Methods of control
- have been discussed primarily by Fred Cohen, but even he remains
- unconvincing. The mechanisms generally are limited to environmental
- checks which can either fail, or be easily cut out of the program.
- Some have proposed "hunter" virals, to go after programs which "turn
- rogue", but a program which is corrupted will behave in unpredictable
- ways and a hunter program would likely consume a lot of resources,
- fail, or (most likely) both.
-
- (Cohen frequently cites viral "programs which have been running since
- 1986 with no ill effects" and speaks of a VCE (viral computing
- environment). There are two points to be noted here. One is that
- Cohen has not yet described his viral programs in anything like the
- detail he put into his earlier work, so there can be no independent
- assessment of his claims. The second point is that the very term,
- VCE, implies that a viral computing environment is substantially
- different, and should be kept separate, from the "normal" computing
- environment as it is currently known. A VCE may very well be a
- powerful entity, but it is still an unknown and unproven concept.)
-
- Computer viral programs have an inherent danger: that of reproduction
- and spread. If you study explosives, and pass along that knowledge,
- you also have to pass along the materials before there is any risk of
- a blast. Even then, the materials do not multiply themselves: when
- exhausted, another supply must be found. The same is *not* true of
- viral programs. These entities are *designed* to reproduce. And,
- unlike the study of dangerous animals, or even germ warfare, viral
- programs are built to reproduce, multiply and spread without the aid
- of a skilled, or even aware, operator. If you are careless with a
- deadly animal or weapon, it is still only a single danger in a
- localized area. If you are careless with a computer virus, it can
- spread world-wide.
-
- We do not use computers because they are smart. Computers *aren't*
- smart. Sometimes we use them because they can do calculations very
- quickly, but even this is only a special case of the real value of
- computers. Computers always do the same thing in the same way. They
- are repeatable. They are, in this manner, reliable. Even a computer
- error can be useful to us--so long as it always happens the same way.
-
- Consider, then, the computer virus. In order to reproduce without the
- informed assistance of the user, the virus must be, in the computer
- sense, transparent. It must operate without alerting the operator, or
- interfering with the operator's interaction with the computer. If the
- virus even posts a notice ("Hi! I am infecting object X!"), it has a
- nuisance value and is, therefore, not good. (Vesselin Bontchev notes
- that even such a notice, by possibly delaying a process, may have
- grave consequences far beyond annoyance.)
-
- If, however, the virus does *not* notify the operator, then the
- operator is not aware of some additional code in the machine. This
- extra code will have an unknown, and inherently unknowable, effect on
- the computer. The operations of the computer are, therefore, no
- longer repeatable. This is a Bad Thing (TM).
-
- Some will protest that I have overblown the danger of both the
- notification messages and the possibility of conflicts. The point
- that I am trying to make is that you cannot predict the harm which may
- arise from interference either with the operator or the programs.
- Software is digital, and is subject to catastrophic collapse without
- prior warning. For those without a background in computer risk
- assessment, an excellent overview for the non-professional is found in
- Lauren Wiener's "Digital Woes" (cf. BKDGTLWO.RVW). An intriguing
- compilation of the types of things that can go wrong is to be found in
- Peter Neumann's "Computer Related Risks" (cf. BKCMRLRS.RVW). At the
- very least, as Sarah Gordon points out, the virus is an autonomous
- agent, making decisions and carrying out activities according to it's
- own internal constructs and the intention of its programmer. This is
- very likely not in correspondence with your own intention, and is
- therefore an invasion of privacy.
-
- A number of virus writers will object that their creations simply are
- not harmful. Not only is it impossible to guarantee that your virus
- will not conflict with existing systems, you also cannot guarantee
- that a given system will not conflict with your virus. Almost all
- file infecting viral programs will interfere with applications which
- have an internal integrity checksum or a non-standard loader, and will
- cause those applications to fail. (An example of this is that Windows
- programs infected with DOS viral programs always fail to load.) The
- "Ohio" virus (a prior version of Den Zuk) was not intended to carry
- any destructive payload, but an unusual interaction with a certain
- network operating system caused fatal disk corruption. Since both
- Ohio and Den Zuk are examples of the often proposed "virus hunter
- virus", it should be clear that the concept of using a viral program
- to hunt down and disinfect other viral programs is not a good one.
-
- Historically, and statistically, virus exchange people have been
- careless and incompetent programmers. Remember that we are talking
- vx, here, and those viral programs which have been released into the
- wild. There may be, carefully hidden in the desk of a virus writer,
- the "perfect" and harmless virus. If so, we haven't seen it yet. The
- majority have obvious bugs, sloppy coding and derivative programming.
- Less than one percent are interesting for *any* reason; only a handful
- have unique styles of algorithms. And even these last have
- programming pathologies.
-
- There are two other reasons often given to justify virus exchange.
- The first is generally described as experimentation and education.
- The second is described as antiviral research, or, more commonly,
- assessment of antiviral programs. These arguments *do* have some
- validity, and should be examined. Ultimately, though, the reality
- fails to support the claim.
-
- The call for experimentation is somewhat tied to the argument for a
- "good" virus. Current viral technology may be crude and ridiculous,
- but how can it be improved if there isn't any work or sharing of
- results? Quite true. The vx community, however, have obviously not
- read or noted any programming journals or texts. Discussions of
- programming and algorithms are supported by well-annotated code
- fragments. You don't present a whole program to discuss a specific
- function any more than you send an entire car with a manual on auto
- repair. You certainly don't use encoded or "DEBUG script" object
- code: that has no explanatory value at all.
-
- And I have yet to see, in the vx materials, any discussion of
- legitimate and positive uses for viral technology, any discussion of
- control technology, or any discussion directed at ensuring that viral
- programs do not create conflicts.
-
- In regard to education, it is true that a study of viral programs is
- related to a knowledge of operating system internals, as well as
- assembly language programming. However, viral study *requires* such
- knowledge, rather than providing it. Giving someone a virus and
- expecting them to learn from it is akin to "teaching" a surgeon by
- handing him a scalpel and pointing at a patient. Even the vx "old
- guard" are beginning to realize this. Viral programs use normal
- computer functions. If you understand computers, a virus is trivial.
- If you don't, well ...
-
- As far as virus exchange tutorials go, well, let me put it this way.
- I am a teacher. Many of you will also know that I review technical
- books on a daily basis. Some are great, enough are good, many are bad
- and some are just plain awful. Only a few are worse, in terms of
- tutorial effectiveness, than vx "zines" (electronic periodicals).
-
- Recently, someone who makes his living pushing virus source code
- promoted a collection of viral programs by suggesting you could test
- antiviral programs with it. This, superficially, sounds like a good
- idea--if you don't know what *real* software testing is like. What do
- we know about the quality of this "zoo" (set of virus samples)? What
- do we know about the structure, organization, documentation and so
- forth? How many duplicates are there? Of course, we *do* want
- duplicates in some cases; we want every possible variation on
- polymorphs. (For Tremor, that works out to almost six billion files.)
- But then, this collection was on a CD-ROM. What a pity. The most
- successful viral programs are boot sector infectors, and you need to
- have real, infected disks to truly test for them. At a minimum, you'd
- want all seven "common" disk formats, in both system and non-system
- versions. That's fourteen disks--for *each* BSI.
-
- For all the length of this piece, it is still only an overview. And,
- for all it's length, it probably hasn't convinced anyone. Ethics
- education (it used to be called "values education"), in whatever form
- and however presented, has very little to show that it works. There
- are various theories and models of moral training, the most
- sophisticated probably being Lawrence Kohlberg's "Moral Development"
- schema. All, though, basically boil down to sitting around talking
- about ethical dilemmas. They may develop debating skills and
- rhetorical sophistry, but there is no evidence to suggest that any of
- these programs leads to any significant change in behaviour.
-
- While Kohlberg's model of moral development has the most detailed
- construction, its utility is questionable. His system is not so much
- one of values education as of values measurement. It is, therefore, a
- guideline for evaluating other ethical training methods rather than a
- means of instruction and change. Moral development is a six stage
- structure, assessing the type of reasoning which goes into ethical
- choices. The stages range from "fear of punishment" to "internal
- ethical principles". There is great difficulty, however, in
- determining the "stage" of a given individual. Most ethical
- discussions will be judged as having reasoning at all of stages three,
- four and five. This entire document, for example, could be dismissed
- as being level one reasoning since it mentions the possibility of the
- danger of virus distribution and could therefore be seen as a "fear of
- punishment" (negative consequences) on my part. On the other hand,
- most of Kohlberg's proponents dismiss level six, since even a
- psychopath could be said to be acting from internal principles.
- Kohlberg, himself, has stated that he does not know if anyone
- consistently acts from stage six reasoning.
-
- Probably the major reason for this is that modern society has no
- fundamental moral foundation. The most widely cited (and Johnson
- gives an excellent critique of it) is utilitarianism--"the greatest
- good for the greatest number". Leaving aside the difficulties of
- assessing such a measure, utilitarianism, along with all the other
- modern "humanistic" philosophies, has nothing to support itself. Why
- is "the greatest good for the greatest number" to be chosen over "what
- *I* want"? An alternative is deontology; ethical principles derived
- from the concept of duty. (Ironically, this philosophy, while
- arguably superior to utilitarianism, is limited to Kohlberg's stage
- four almost by definition.) Again, however, there is no underpinning
- to the concept of duty, itself.
-
- Ironically, the much maligned "Judeo-Christian Ethic" did have such a
- foundation for moral standards--God. The theistic universe may yet
- have the last laugh over the mechanical universe of B. F. Skinner's
- "Beyond Freedom and Dignity". Maybe Jesus *is* the answer--or there
- may be no answer.
-
- Bibliography
-
- Bontchev, "Are `Good' Viruses Still a Bad Idea?", Proceedings of the EICAR '94
- Conference, pp.25-47, also
- ftp://ftp.informatik.uni-hamburg.de/pub/virus/texts/viruses/goodvir.zip
-
- Clarkson, "Windows Hothouse", 1994, 0-201-62669-1, U$34.95/C$44.95 - lots of
- artificial life fun with Visual C++
-
- Cohen, "It's Alive!", 1994, 0-471-00860-5, U$39.95 - an intriguing, provoking
- and practical exploration of computer programs as "artificial life", but
- somewhat narrow
-
- Denning, ed., "Computers Under Attack", 1990, 0-201-53067-8 - collection of
- essays roughly related to security, also "the net"
-
- Ermann/Williams/Gutierrez, "Computers, ethics and society" - textbook for
- computer ethics course: not great
-
- Gordon, "Technologically Enabled Crime", 1994
-
- Forester/Morrison, "Computer Ethics", 1994, 0-262-56073-9 - lots of great
- stories, but short on analytical depth
-
- Johnson, "Computer Ethics", 1994, 0-13-290339-3 - the basic work in the field,
- thorough coverage and good discussion starter
-
- Levy, "Artificial Life", 1992, 0-679-73489-8, U$13.00/C$17.00 - an interesting
- wander through fields studying artificial life but no strong points
-
- Neumann, "Computer-Related Risks", 1994, 0-201-55805-X, U$24.75 - exhaustive
- examples from the RISKS-FORUM Digest of potential technological perils
-
- Slade, "Robert Slade's Guide to Computer Viruses", 1994,
- 0-387-94311-0/3-540-94311-0, U$29.95 - chapter seven looks at the computer
- virus and society
-
- Thro, "Artificial Life Explorer's Kit", 1993, 0-672-30301-9, U$24.95/C$31.95 -
- good fun, but little analysis
-
- Wiener, "Digital Woes", 1993, 0-201-62609-8, U$22.95/C$29.95 - excellent
- introduction to the risks of software
-
- (A fuller bibliography on values education readings is available for those
- demonstrating a willingness to put some effort into it, since, frankly, it's a
- really disappointing field. Sarah Gordon's "Generic Virus Writer" paper has
- significant resources here.)
-
- copyright Robert M. Slade, 1995
- Permission is granted to post this file, in full, on any system.
-
- ======================
- DECUS Canada Communications, Desktop, Education and Security group newsletters
- Editor and/or reviewer ROBERTS@decus.ca, RSlade@sfu.ca, Rob Slade at 1:153/733
- Author "Robert Slade's Guide to Computer Viruses" (US contact 1-800-SPRINGER)
-
- ------------------------------
-
- Date: Thu, 9 Mar 95 12:52:26 MST
- From: Chris McDonald <cmcdonal@WSMR-EMH34.ARMY.MIL>
- Subject: File 5-- Dutch Hacker Arrested
-
- --------------Original message----------------
-
- UTRECHT, THE NETHERLANDS, 1995 MAR 6 (NB) -- A Dutch student has
- become the first person to be convicted of computer hacking in the
- Netherlands. Ronald Oosteveen, a 22 year old Utrecht computer science
- student, was handed down a six month suspended sentence by
- magistrates last week, and was fined around $3,200
-
- Oosteveen was accused of breaking into university, corporate and
- government computers, following his arrested in March, 1993, just
- three weeks after new Dutch anti-hacking legislation came into force.
-
- Oosteveen was caught in the act of trying to hack into the computer
- lines of a technical university in Delft near The Hague. He is also
- thought to have been responsible for previous hacking attacks which
- occurred before the new legislation came into force.
-
- In court, prosecutors said that he was challenged by university staff
- monitoring the computers, and police traced Oosteveen back to his
- home. There, police found computer disks with evidence that he had
- gained unauthorized access into the computer systems of several
- companies and government offices in the Netherlands, Norway, and
- Iceland.
-
- Handing down its verdict, the court said computers were vital to a
- modern society and it was "essential that information networks
- not be violated."
-
- ------------------------------
-
- Date: Sat, 25 Feb 1995 21:10:26 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 6--(fwd) Eyewitness account of 2/21 San Jose hearing, by C. Kaun
-
- ---------- Forwarded message ----------
- [Reposted from misc.legal.computing]
-
- From--ckaun@deimos.ads.com (Carl Kaun)
- Subject--Religious Technology vs. Netcom-On-Line
- Date--22 Feb 1995 23:38:17 GMT
-
- Apologies if this turns out to be a duplicate post. It was supposed
- to go out yesterday, but I think there were problems.
-
- I attended the hearing described below. I did not take notes at the
- hearing, and not being a lawyer, do not fully understand the nature of
- the legal comments. Still, my recollections may have some benefit,
- and are provided in that event. Question marks indicate where I did
- not hear or cannot recall clearly what was said, or where I have a
- question. Perhaps someone with legal background can answer some of
- these. Where I am adding commentary should be clear from the use of
- the first person, or by other qualifications. Full rights to
- reproduce or reuse in any form are granted.
-
- ============
-
- C-95-20091: Religious Technology vs. Netcom-on-Line, Judge Ronald Whyte
- presiding -- 2/21/95 hearing at Federal Court in San Jose (10:00-11:00)
-
- Plaintiffs: Attys McShane, Small, Korbin, others whose names I didn't
- catch (5 total).
- Defendants: Atty for Netcom and associate, Atty for Klemesrud
- (operator of BBoard), Dennis Erlich
-
- The purpose of the hearing was to show cause re. a preliminary
- injunction (same as temporary restraining order or 'TRO'?).
-
- Judge Whyte had initial concerns about whether the scope of the
- seizure order was exceeded. He asked what material (on a list
- provided by plaintiff, allegedly an inventory of materials taken in
- the seizure) was trade secret, and what was copyrighted. Plaintiffs
- could not identify which was what, and were given until Feb 24th to
- provide that identification. There was some discussion about sealing
- exhibits (presumably documents containing trade secrets), but no
- materials to be sealed were identified.
-
- Small made initial remarks, talking about the execution of the seizure
- order and items taken. He said that Netcom could "write a program to
- identify publications from sites (purportedly) publishing copyrighted
- materials, to enable a more in-depth review of these". Plaintiff did
- not seem to make many points with Judge Whyte.
-
- Erlich provided a statement to the court, and made additional comments
- to the effect that:
- (1) materials in his possession were obtained legally, being
- provided by various mechanisms including given or loaned by others
- (presumably obtained legally by them?), being purchased, or obtained
- as part of being a minister in the Church of Scientology. He
- called the judge's attention particularly to documents identified
- as being hardcopies in this regard.
- (2) no materials were identified to him as trade secrets.
- (3) postings to internet were made in form of commentary or satire (the
- word 'satire' was a significant element in comments during the
- early parts of the hearing), and were paragraphs or at most a
- couple of pages, and constituted fair use of the materials.
- (4) his use of the materials was not for monetary profit or gain
- (inferring that it was therefore beyond the scope of copyright law?).
- (5) (execution of?) the seizure order violated his 1st and 4th Amendment
- rights, making him the aggrieved party, on which basis he was
- entering suit (against the Church of Scientology and individuals
- involved in the seizure).
- (6) he was not permitted to monitor removal of materials, nor was
- he provided an inventory of items taken, except as a single
- unsigned page, and that because the materials were deleted, he
- has no way to verify what was claimed to have been seized (had in
- fact been in his possession?)
- (7) he had indicated his willingness to cease publication of and
- delete from his files any copyrighted or trade secret materials,
- and had requested plaintiff provide a means to identify/verify
- these, which plaintiff had not done.
-
- The Attorney for Klemesrud submitted a brief to the court, and in
- commment cited various precedent why Klemesrud should not be included
- in the suit; and indicated the impact of requiring Klemesrud to comply
- with what plaintiff wanted would be to shut down the B-board, thereby
- removing access to Internet for some 500 users.
-
- The Attorney for Netcom submitted a brief to the court, and in comment
- merely indicated Netcom's role as essentially a common carrier, with
- no control over content, and having no more liability than a
- bookseller would have.
-
- Somewhere along the line, attorneys for both Netcom and Klemesrud
- indicated they were filing motions for dismissal. Small tried to
- argue why they should not be dismissed with some sort of analogy about
- how a private toll booth operator should deny highway access to a
- particular car that had been described to the operator. I hope the
- judge thought it as ridiculous as I did.
-
- In subsequent comment, the attorney for Netcom made what I thought the
- neatest point of the day. He pointed out that plaintiff could not
- there in the court identify what was or was not copyrighted from a list
- of materials in his possession, yet plaintiff was asking Netcom to
- make that same determination nearly instantaneously on a very great
- volume of material. The only alternative to this would be to block
- access to individuals, for which there is absolutely no precedent.
-
- Late in the hearing, Small tried to make some point about how Erlich
- had initially cooperated with the seizure, but later on tried to block
- it "when he had called the press and guzzled some beer". You had to
- be there! Such inappropos slander attempts come across almost as CoS
- signature. He also tried to express outrage that Erlich had a scanner and
- was copying whole documents into his computer (even if it could be
- established what was being scanned, aren't backup copies of
- copyrighted materials allowed under various conditions?).
-
- Judge Whyte released Netcom and Klemesrud from the injunction/TRO
- "without prejudice" (??), and indicated he would replace the TRO
- against Erlich with a more carefully worded one. A further hearing
- with Erlich, etc. will occur on March 3rd. This might "take place
- by telephone, to alleviate travel costs" (aren't hearings like this
- supposed to be public, and doesn't a telephone conference preclude that?)
-
- ====
-
- I was not impressed by any crispness in the arguments, e.g. to
- establish any standards or boundaries (perhaps it is too
- early for this). Indeed, I have seen clearer commmenting on the net.
-
- One thing kind of surprised me -- I would have thought the court would
- take possession of the purportedly copyrighted materials to insure
- there was no tampering with "the evidence", especially given CoS'
- reputation. This was not done, nor was there any suggestion made to do
- so.
-
- ------------------------------
-
- Date: Sun, 26 Feb 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7--Cu Digest Header Info (unchanged since 26 Feb, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB <your name>
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: Bits against the Empire BBS: +39-464-435189
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.21
- ************************************
-
-