home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Aug 30, 1995 Volume 7 : Issue 71
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
-
- CONTENTS, #7.71 (Wed, Aug 30, 1995)
-
- File 1--Symposium on Security
- File 2--EFF, Mike Godwin, Cliff Stoll
- File 3--WebSite Wins Dvorak Award
- File 4--NIST Statement re "New" Crypto Policy
- File 5--eye on Silicon Snake Oil (eye Reprint)
- File 6--Russian Hackers hit Citibank (Risks-Forum Digest reprint)
- File 7--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Sat, 19 Aug 1995 14:39:03 +1494730 (PDT)
- From: Christopher Klaus <cklaus@iss.net>
- Subject: File 1----Symposium on Security
-
- Network System Operating Threats from Hackers, Crackers, Sniffers
-
- "Exploring the Hostile Cyberspace"
-
- Sponsored By:
- NASA Lewis Research Center
- Information Systems Security Association
- Information Systems Audit & Control Association
- National Computer Security Association (NCSA)
-
- Cleveland Airport Marriott
- September 11-13, 1995
-
- Featuring
-
- Winn Schwartau
- Author of "Information Warfare - Chaos on the Electronic Superhighway"
-
- Dr. Peter Tippett
- Keynote Address. President, National Computer Security Association
-
- Christopher Klaus
- Author of The Internet Security Scanner will conduct a mini-penetration
- workshop.
-
- and a host of public and private sector experts.
-
- Symposium Coordinator:
- New Dimensions International
- P. O. Box 897, Cardiff, CA 92007
- (619) 436-5618 Fax: (619) 436-1241
- Email: ndi@aol.com
-
- Agenda
-
- MONDAY 11 SEPTEMBER - THE GLOBAL THREAT TO CONFIDENTIALITY
-
- 0800 Welcome and Opening Remarks
- 0830 Addressing the National Problem: The Emerging Role of the CIO
- John Lynn, NASA Chief Information Officer
- 0900 Keynote Address - The Challenge to our National Computer Resources
- Dr. Peter Tippett, President, National Computer Security Association
- 1020 The Researchers Dilemma: Distributed Freedom or Controls?
- Deputy Director, NASA Lewis Research Center
- 1035 Featured Speaker - Winn Schwartau, author of "Information Warfare"
- 1140 Luncheon (Mr. Schwartau will autograph his book throughout the day)
- 1300 National Defense Perspective
- Ken Van Wyck, Defense Information Systems Agency (invited)
- 1430 The Iceberg Paradigm - Loss of Technology
- Pam Kotlenz, Lewis Research Center
- 1500 Trends, Analysis and Industry Technical Response
- Ron Tencati, Industry Specialist
- 1700 Adjourn
-
- Executive Panel: "Emerging Leadership Roles in Cyberspace " (Board Room)
-
- TUESDAY 12 SEPTEMBER - VULNERABILITIES AND TECHNO-BUSTERS
-
- 0800 Raising Awareness - Information Systems Security Association
- 0815 Mini-Penetration Workshop
- Christopher Klaus, author of the "Internet Security Scanner"
- 1030 Hacker Techniques; Tracking the Intruder; A Sniffer Case Study
- Brent Mead, Jet Propulsion Laboratory
- 1200 Lunch
- 1315 The National Information Infrastructure and NASA Incident Response (NASIRC)
- Richard Carr, NASA Information Technology Security Manager
- 1600 The Impact on Industry
- George Valente, Information Systems Audit & Control Association
- 1700 Adjourn
-
- WEDNESDAY 13 SEPTEMBER - CATCHING AND CONVICTING COMPUTER CRIMINALS
-
- 0830 Keynote Speaker "The Law Enforcement Perspective"
- Scott Charney, Department of Justice
- 1010 National Trends and Responses to Computer Crimes
- Richard Ress, FBI National Computer Crime Squad
- 1145 Lunch
- 1315 Investigating Computer Penetrations
- 1450 Panel Discussions moderated by Fred Villella, NDI
- 1600 Adjourn
-
- For reservations, call:
- New Dimensions International
- (619) 436-5618
-
- Symposium Registration Fee: $345.00
-
-
- SYMPOSIUM REGISTRATION FORM
-
- Please return completed form to:
-
- New Dimensions International
- P.O. Box 897, Cardiff, CA 92007.
- (619) 436-5618 or fax (619) 436-1241
-
- Name: Title:
- Agency:
- Address:
- City: State: Zip:
- Office Phone: Fax:
- Hotel Requirements: YES NO Room Rate: $67/night
- Arrival: Departure:
-
-
- o This symposium draws together some of the best computer security
- practitioners from the public and private sectors. Experts will
- discuss the nature of the growing menace from computer penetrations,
- the serious magnitude of this threat and the potential consequences.
-
- o Actual cases will be discussed and the growing "Hacker" culture and
- criminal uses of hacker techniques will be described. There are
- emerging challenges to today's operational personnel and the
- leadership of tomorrow. The presentations in this symposium will
- provide strong justification for improved organizational response to
- curb losses and potentially consequential damages to operating and
- developmental systems.
-
- o Some of the more revealing details will describe the vulnerability
- of the personal computer in the privacy of our homes. We will learn
- how celebrated "Master Hackers" penetrate even home computers. We
- will discover the exponential rate of new Internet subscribers in
- other nations and the potential impact on our network operating
- systems.
-
-
-
- Upcoming Conferences:
- Sunnyvale, California September 19-21*
- Nashua, New Hampshire October 24-26*
- Palm Springs, California November 6-8*
-
- * Speakers will vary by location. For detailed information and list of
- speakers for specific locations, please contact New Dimensions International
-
- --
- Christopher William Klaus Voice: (770)441-2531. Fax: (770)441-2431
- Internet Security Systems, Inc. "Internet Scanner lets you find
- 2000 Miller Court West, Norcross, GA 30071 your network security holes
- Web: http://iss.net/ Email: cklaus@iss.net before the hackers do."
-
- ------------------------------
-
- Date: Sat, 19 Aug 1995 16:18:05 -0700
- From: Andre Bacard <abacard@WELL.COM>
- Subject: File 2----EFF, Mike Godwin, Cliff Stoll
-
- *** PLEASE REDISTRIBUTE FREELY ***
- Hello CyberFolks,
-
- Wednesday, August 16th BayFF (Bay Area Chapter of EFF) held a meeting in
- San Francisco with speakers Mike Godwin and Cliff Stoll. Attached are a
- few notes for those of you who missed the opportunity to attend.
-
- See you in the future,
- Andre Bacard
- ======================================================================
- abacard@well.com Bacard wrote "The Computer Privacy
- Stanford, California Handbook" [Intro by Mitchell Kapor].
- http://www.well.com/user/abacard Published by Peachpit Press, (800)
- Enjoy your privacy... 283-9444, ISBN # 1-56609-171-3.
- =======================================================================
-
- Notes from the BayFF Semi-Underground
- Authorized by
- Andre Bacard <abacard@well.com>
-
- Wednesday, August 16, 1995, I found myself cruising through Golden Gate
- Park. Suddenly I swerved into the right lane and shouted "Eureka." For
- those who don't know, Eureka is the California state motto which, in the
- tradition of the Gold Rush, means "I found it!" In San Francisco IT means
- a parking place. Feeling euphoric about my good fortune, I started the
- short walk long on memories towards the Haight-Ashbury district. It was
- delightful and fogless. The salty air was cool. The smell of grass (the
- type that city gardener's mow) was fresh. Passing a guitarist, I thought
- of the Grateful Dead's Jerry Garcia, recently deceased. My mind flashed
- back twenty-five years ago when I first visited Haight-Ashbury. Twenty-
- five years ago at the dawn of the Computer Age... So many silicon chips
- under the bridge... I thought of all the people in the Haight mourning
- Garcia and donating to the Haight-Ashbury Free Clinic in Garcia's memory.
- I flashed back upon my first meeting with John Perry Barlow, lyricist for
- the Grateful Dead and co-founder of EFF. That meeting helped inspire me
- to write COMPUTER PRIVACY HANDBOOK. Such were a few of the images that
- danced through my mind as I entered the Cole & Page Street Public
- Library... It was appropriate to be attending an EFF meeting.
-
- John Gilmore, EFF Board Member, was the first person I saw. Gilmore
- reminds me of a lean Chesire cat. He has a mischievous smile as if to
- say, "You won't believe what just happened." Maybe we'll never discover
- what just happened with John, since he's so much into crypto. In any
- case, Gilmore introduced Mike Godwin as "The first lawyer in Cyberspace
- and EFF's first employee."
-
- Mike Godwin ("a cool guy who survived law school with his personality
- intact" according to an anonymous EFF publicist) spoke for 90 minutes
- about how to deal with reporters and, more specifically, about his role
- in trying to correct the damage done to cyberspace by TIME's infamous
- "CyberPorn" cover story. Godwin detailed many flaws in Carnegie Mellon
- University undergraduate Mr. Rimm's study of cyberporn that led to the
- "CyberPorn" piece. Godwin said of Rimm's paper: "It's as if you surveyed
- the bookstores in Times Square in Manhattan and generalized to all
- bookstores in America."
-
- Cliff Stoll ("a wild and crazy guy with interesting hair" according to
- the same anonymous EFF publicist) is the author of the best-selling book
- SILICON SNAKE OIL. Stoll personifies the eccentric heritage of the San
- Francisco counter-culture. With lots of humor and drama, Stoll presented
- a critical view of the Internet. "The Internet is a perfect diversion
- from learning" and "The Internet opens many doors that lead to empty
- rooms" were two of his many memorable lines. Stoll noted that wisdom and
- experience play little role in the Computer Cult (i.e., all the Hype
- surrounding the Information Superhighway).
-
- The EFF events that I've attended at WIRED's office in the San Francisco
- Mission District and last night are well worth the hassle of hunting down
- a parking place.
-
- To learn more about future monthly BayFF meetings, send this e-mail:
-
- To--listserv@eff.org
- Subject--[ignore]
- subscribe BayFF
-
- See you at future events,
- Andre Bacard
-
- P.S. I'm the guy with the fedora hat who people mistake for Indiana
- Jones.
-
- ------------------------------
-
- Date: Mon, 21 Aug 1995 15:55:12 -0700
- From: Ellen Elias <elias@ora.com>
- Subject: File 3----WebSite Wins Dvorak Award
-
- O'REILLY & ASSOCIATES WINS PRESTIGIOUS DVORAK AWARD FOR EXCELLENCE
-
- Sebastopol, CA, August 21, 1995 -- O'Reilly & Associates' WebSite (TM)
- has received the prestigious 1995 John C. Dvorak Award for Excellence
- in PC Telecommunications, it was announced at ONE BBSCON's annual
- conference in Tampa, Florida on Saturday, August 19.
-
- WebSite won the award for Outstanding Web Server Software, a new
- category this year. More than 40,000 nominations for this year's
- fourteen award categories were received by internationally known
- writer John Dvorak and his committee. WebSite is a 32-bit World Wide
- Web server software package for Windows 95 and Windows NT which offers
- an easy-to-use, completely graphical interface, from setup through
- administration and Web building.
-
- WebSite was developed collaboratively by O'Reilly & Associates,
- independent developer Bob Denny, and a team at Enterprise Integration
- Technologies (EIT) headed up by Jay Weber.
-
- Tim O'Reilly, President of O'Reilly & Associates, expressed his pride
- in receiving the award. "In many ways, this is an award to the
- Internet's open systems philosophy. The driving idea behind WebSite
- was that the Internet has always been a peer-to-peer network. For the
- Web to continue that tradition, everyone who has a Web browser ought
- to have access to a Web server. That belief set the standards for
- price, availability and ease of use. What's more, the net brought
- together the people who developed the product, connected them during
- the development process, and provided the network of thousands of beta
- testers who validated the product."
-
- O'Reilly & Associates joins respected organizations and individuals
- such as NCSA Mosaic, San Jose Mercury News, Delphi, America Online,
- and Dennis Hayes (Hayes Microcomputer Products) which have received
- Dvorak awards during the past four years. Historically, these awards
- are presented to the individual and corporate pioneers in the
- telecommunications industry whose vision and commitment have most
- significantly contributed to the advancement of PC telecommunications
- over the preceding twelve months.
-
- Accepting the award for WebSite were Gina Blaber, Director of O'Reilly
- & Associates' Software Products Group, Robert Denny, WebSite
- developer, and Atul Arora, member of EIT development team. O'Reilly &
- Associates is recognized worldwide for its definitive books on the
- Internet and UNIX, and more recently for its development of online
- content and software. Bob Denny created Win httpd, the 16-bit server
- for Windows 3.1 which has been available on the net and widely praised
- since early 1994. EIT, long-time developer of software tools for Web
- server administration, also founded TERISA Systems, the leader in Web
- security technology, and the CommerceNet Consortium, driving
- deployment of Internet electronic commerce.
-
- ------------------------------
-
- Date: Fri, 18 Aug 1995 09:52:06 -0500
- From: sobel@EPIC.ORG(David L. Sobel)
- Subject: File 4----NIST Statement re "New" Crypto Policy
-
- EMBARGOED FOR RELEASE: NIST 95-24
- 3 p.m. EDT, Thursday, Aug. 17, 1995
-
- Contact: Anne Enright Shepherd COMMERCE'S NIST ANNOUNCES
- (301) 975-4858 PROCESS FOR DIALOGUE ON
- KEY ESCROW ISSUES
-
- Furthering the Administration's commitment to defining a
- workable key escrow encryption strategy that would satisfy
- government and be acceptable to business and private users of
- cryptography, the Commerce Department's National Institute of
- Standards and Technology announced today renewed dialogue on key
- escrow issues.
-
- A Sept. 6-7 workshop will convene industry and government
- officials to discuss key escrow issues, including proposed
- liberalization of export control procedures for key escrow
- software products with key lengths up to 64 bits, which would
- benefit software manufacturers interested in building secure
- encryption products that can be used both domestically and
- abroad.
-
- Key escrow encryption is part of the Administration's
- initiative to promote the use of strong techniques to protect the
- privacy of data and voice transmissions by companies, government
- agencies and others without compromising the government's ability
- to carry out lawful wiretaps.
-
- In a July 1994 letter to former Rep. Maria Cantwell, Vice
- President Gore said that the government would work on developing
- exportable key escrow encryption systems that would allow escrow
- agents outside the government, not rely on classified algorithms,
- be implementable in hardware or software, and meet the needs of
- industry as well as law enforcement and national security. Since
- that time, discussions with industry have provided valuable
- guidance to the Administration in the development of this policy.
- For example, many companies are interested in using a corporate
- key escrow system to ensure reliable back-up access to encrypted
- information, and the renewed commitment should foster the
- development of such services.
-
- Consideration of additional implementations of key escrow
- comes in response to concerns expressed by software industry
- representatives that the Administration's key escrow policies did
- not provide for a software implementation of key escrow and in
- light of the needs of federal agencies for commercial encryption
- products in hardware and software to protect unclassified
- information on computer and data networks.
-
- Officials also announced a second workshop at which industry
- is invited to help develop additional Federal Information
- Processing Standards for key escrow encryption, specifically to
- include software implementations. This standards activity would
- provide federal government agencies with wider choices among
- approved key escrow encryption products using either hardware or
- software. Federal Information Processing Standards provide
- guidance to agencies of the federal government in their
- procurement and use of computer systems and equipment.
-
- Industry representatives and others interested in joining
- this standards-development effort are invited to a key escrow
- standards exploratory workshop on Sept. 15 in Gaithersburg, Md.
- This workshop is an outgrowth of last year's meetings in which
- government and industry officials discussed possible technical
- approaches to software key escrow encryption.
-
- The Escrowed Encryption Standard, a Federal Information
- Processing Standard for use by federal agencies and available for
- use by others, specifies use of a Key Escrow chip (once referred
- to as "Clipper chip") to provide strong encryption protection for
- sensitive but unclassified voice, fax and modem communications
- over telephone lines. Currently, this hardware-based standard is
- the only FIPS-approved key escrow technique. NIST officials
- anticipate proposing a revision to the Escrowed Encryption
- Standard to allow it to cover electronic data transmitted over
- computer networks. Under this revised federal standard, the
- Capstone chip and other hardware-based key escrow techniques
- developed for use in protecting such electronic data also will be
- approved for use by federal agencies.
-
- As a non-regulatory agency of the Commerce Department's
- Technology Administration, NIST promotes U.S. economic growth by
- working with industry to develop and apply technology,
- measurements and standards.
-
-
- ------------------------------
-
- Date: Wed, 09 Aug 1995 19:25:49 -0400
- From: kkc@INTERLOG.COM(K.K. Campbell)
- Subject: File 5----eye on Silicon Snake Oil (eye Reprint)
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- eye WEEKLY July 20 1995
- Toronto's arts newspaper .....free every Thursday
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- eye.NET eye.NET
-
- NETNEWS BLUES
- by
- K.K. CAMPBELL
-
- Ya read 15 megs, and whaddaya get?
- Another day older and deeper in debt.
- St Peter dontchya call me, coz I can't go...
- Just got 10 megs more from a bunch of assholes.
-
- -- lyrics copyright 1995
- Howling (In The Wires) Wolf
- aka K.K. Burnett
-
- Last week, I penetrated the Eglinton Rd. event horizon and spent six
- days on Georgian Bay. Among many astonishing adventures, I found our
- dog -- a puppy we got from the River St. Humane Society in '87 -- is
- actually a German shepherd-otter crossbreed.
-
- What the FAQ has this to do with the net?
-
- Well, not only were there no computers up there, there weren't even
- phones. Even if I'd had a laptop, I couldn't have jacked into the net.
- I purposely only took one slim book.
-
- Cold Turkey from email and netnews...
-
- And it was glorious.
-
- Which brings us to Cliff Stoll's new book, _Silicon Snake Oil: Second
- Thoughts On The Information Highway_ (Doubleday, $29.95 cloth). It's a
- reaction to the Info Shock phenomenon typical among netters. A call to
- unplug, if only for a while, for a fresher perspective. Cliff lights a
- match to the Star-Spangled Info Highway rhetoric about democracy and
- "giving the homeless laptops."
-
- You might recall Stoll as author of the (now classic) non-fiction
- computer-espionage thriller _The Cuckoo's Egg_ -- buy it, consume it.
- In that '89 book, Stoll writes about snaring an unknown intruder who
- slid into his UNIX network at California's Lawrence Livermore research
- labs. A Hanover hacker netted from a University of Bremen computer to a
- German Datex-P network, then via satellite link to a defence contractor
- computer in McClean, Va., where he used a Tymnet switching system to
- enter Stoll's Berkeley machine, which was on the Arpanet/Milnet (U.S.
- military nets). He then hit maybe 400 military computers. The book
- pisses all over _WarGames_, that homage to the Disney-esque hacker.
-
- So after a literary hiatus -- and scads of convention appearances --
- Cliff's back. And he's cranky, dammit.
-
- Stoll's out to broadside anything that twitches in cyberspace. He's
- collected all the hype and rebuts it relentlessly. But don't be fooled.
- Stoll's not really trashing cyberspace. Behind the pages of
- (well-deserved) jibes at (what passes for) overt net.culture, Cliff
- remains right on-board. Wouldn't surprise me to see him flogging IBM
- wares as a "net.spokesperson" in a year or three.
-
- He's never been your "typical" anything. He's sort of a leftover
- hippie, without the anti-tech hard-on -- an astronomer by education,
- hacker by inclination. His ideal weekend: staring at stars, consuming
- homemade cookies and shakes and sleeping beside his UNIX system. He's
- kinda what you'd get if Scotty were fucked up on Saurian Brandy (that
- blue swill) and beamed Albert Einstein, Pauly Shore and Phiber Optik
- aboard as a single person.
-
- In _Silicon Snake Oil_, Stoll remains unpretentiously charming. It's
- far more meandering and anecdotal. Travel with teenage Cliff as he
- spelunks. Follow an acquaintance who scoots around abandoned tracks in
- a little hand-built railcar.
-
- The result: a book as readable as the first, but far less important.
- It's more like Uncle Cliffy rocking on the cottage porch, sharing some
- homespun phee-los-oh-phee, whilst drawing on his pipe and scanning the
- lake. Not surprisingly you end up with some simplistic social theory --
- like suggesting a kid's use of the net is what alienates him from his
- family: "Kids that interact with computers rather than their parents
- miss out on the most important part of growing: being close to their
- families."
-
- He's rather confusing cause and effect.
-
- But it's enjoyable. I finished it over a weekend.
-
- *.GENERAL HOSPITAL
-
- During lunch the following Tuesday I speed-scanned the tube. The remote
- came to a screeching stop. I asked myself: "Did I just see some
- zany-haired guy who looked like Cliff Stoll playing with a yo-yo on
- TV?" I threw the remote into reverse and crawled back maybe 10
- channels.
-
- I answered myself: "Yes. Yes, you did. You did see some zany-haired guy
- who looks like Cliff Stoll playing with a yo-yo on TV."
-
- It _was_ Cliff. On CITY-TV's _LunchTelevision_. Book promo tour. The
- host held the book. Cliff held a yo-yo. And he was trying to make that
- baby sing.
-
- "Shit, Cliff," I muttered, fumbling for volume. "Are you suggesting to
- these yahoos that yo-yos are one of the lost pleasures human beings
- would rediscover if they disconnected?"
-
- Yo-yos and antics like hiding behind TV monitors aside, Cliff did make
- one solid point about keeping citizens docile in an Info Society:
- overload them.
-
- "The way to control people's thoughts is not to lock them out of
- information, but feed them a steady diet of dross."
-
- It's a tactic familiar to journalists: government and business bury
- critical data in a sea of sludge. As info is becoming "cheaper" all the
- time, the general public can now share the same wonderous experience by
- reading Usenet newsgroups -- especially unmoderated, ill-defined
- newsgroups.
-
- "The quality of information drops yearly -- the quantity goes up,"
-
- Stoll notes.
-
- He's hardly the first to notice this. As one netter wrote me in email:
-
- "Every so often I feel this compulsion to bail on all the local
-
- newsgroups [like tor.* and ont.*] due to their somewhat soap-opera-ish
-
- nature.... However, if I did, I'd be depriving myself of a nightly
-
- chuckle. Do ya think all the local groups all over the world are as
-
- resplendant with idiots as tor.general and ont.general are? You could
-
- just subscribe to *.general, and probably have a bigger laugh than any
-
- of the alt.* groups."
-
- So listen to Uncle Cliff. Unsubscribe from wanker.general! Put down
- that 2,700-page _Holy Precepts of UNIX Technobabble Revealed, 3rd
- Initiate_!
-
- Get out yer yo-yos!
-
- http://www.interlog.com/eye
-
- ------------------------------
-
- Date: Thu, 22 Aug 1995 22:51:01 EDT
- From: CuD Moderators <cudigest@mindvox.phantom.com>
- Subject: File 6----Russian Hackers hit Citibank (Risks-Forum Digest reprint)
-
- Date--Mon, 21 Aug 95 7:51:22 PDT
- From--"Peter G. Neumann" <neumann@chiron.csl.sri.com>
- Subject--Russian Hackers
-
- From - Risks-Forum Digest Monday 21 August 1995 Volume 17 : Issue 28
-
- Court documents were unsealed on 18 Aug 1995 that implicated Russian
- computer hackers in about 40 transfers totalling more than $10 million
- from the Citibank electronic funds transfer system, between June and
- October, 1994. The hackers were caught as they were trying to move
- $2.8M. The bank indicated only $400,000 was actually transferred --
- which at first reading would seem to contradict the $10 million
- figure, except for the fact that Citibank noted that none of its
- clients lost any money, and that all of the transfers were either
- blocked or reversed. Six people have been arrested. 24-year-old
- Vladimir Levin (who worked for AOSaturn, a Russian software house, and
- who is currently under arrest in London) apparently had figured out
- how to get around or through the Citibank security system. [Source:
- An Associated Press item in the San Francisco Chronicle, 19 Aug 1995,
- D1.] Sounds like another case of reusable (fixed) passwords biting the
- dust?
-
- [Christopher Klaus <cklaus@iss.net> added the following info,
- based on a report of Voice of America correspondent Breck
- Ardery:
- The other five include two people in the U.S., two in The
- Netherlands, and one in Israel. PGN]
-
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 7----Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.71
- ************************************
-
-