home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Dec 10, 1995 Volume 7 : Issue 95
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #7.95 (Sun, Dec 10, 1995)
-
- File 1--Internet Protest Day on December 12th
- File 2--Review of Takedown
- File 3--re: Magna Carta Response
- File 4--Re: Cu Digest, #7.93
- File 5--Re: Net Censorship (CuD 7.92)
- File 6--Cu Digest Header Info (unchanged since 5 Nov, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Fri, 8 Dec 1995 19:35:00 -0500
- From: bruce@PHANTOM.COM(Bruce Fancher)
- Subject: File 1--Internet Protest Day on December 12th
-
- Fellow Internet users,
-
- Efforts currently underway in Congress to pass legislation which would
- regulate the content of the Internet, including measures which are a clear
- violation of our right to free speech, threaten the freedom and security
- of every user of the Internet. At the request of Voters
- Telecommunications Watch, we are distributing the following call to action
- to all members of the MindVox community. We strongly urge all of you to
- participate in the Internet Protest Day next week.
-
- Thank you.
-
- Bruce Fancher
-
- - - - - - - - - -
-
- ========================================================================
- CAMPAIGN TO STOP THE NET CENSORSHIP LEGISLATION IN CONGRESS
-
- On Tuesday December 12, 1995, Join With Hundreds of Thousands
- Of Your Fellow Internet Users In
-
- A NATIONAL INTERNET DAY OF PROTEST
-
- PLEASE WIDELY REDISTRIBUTE THIS DOCUMENT WITH THIS BANNER INTACT
- REDISTRIBUTE ONLY UNTIL December 20, 1995
- ________________________________________________________________________
- CONTENTS
- Internet Day of Protest: Tuesday December 12, 1995
- What You Can Do Now
- List of Participating Organizations
- ________________________________________________________________________
- INTERNET DAY OF PROTEST: TUESDAY DECEMBER 12, 1995
-
- Outrageous proposals to censor the Internet demand that the Internet
- Community take swift and immediate action. We must stand up and let
- Congress know that we will not tolerate their attempts to destroy this
- medium! Please join hundreds of thousands of your fellow citizens in a
- national day of protest on Tuesday December 12, 1995.
-
- As you know, on Wednesday December 6, 1995, the House Conference
- Committee on Telecommunications Reform voted to impose far reaching and
- unconstitutional "indecency" restrictions on the Internet and other
- interactive media, including large commercial online services (such as
- America Online, Compuserve, and Prodigy) and smaller Internet Service
- Providers such as Panix, the Well, Echo, and Mindvox.
-
- These restrictions threaten the very existence of the Internet and
- interactive media as a means of free expression, education, and
- commerce. If enacted, the Internet as we know it will never be the
- same.
-
- Libraries will not be able to put any books online that might
- offend a child somewhere. No "Catcher in the Rye" or "Ulysses" on the net.
- Internet Service Providers could face criminal penalties for allowing
- children to subscribe to their Internet Services, forcing many small
- companies to simply refuse to sell their services to anyone under 18. Worst
- of all, everything you say and publish on the net will have to be "dumbed
- down" to that which is acceptable to a child.
-
- As Internet users, we simply must not allow this assault against the
- Internet and our most basic freedoms go unchallenged.
-
- On Tuesday December 12, the organizations below are urging you to
- join us in a NATIONAL DAY OF PROTEST. The goal is to flood key members of
- the House and Senate with phone calls, faxes and email with the message
- that the Internet community WILL NOT TOLERATE Congressional attempts to
- destroy the Internet, limit our freedoms and trample on our rights.
-
- Below are the phone, fax, and email address of several key members of
- Congress on this issue and instructions on what you can do to join the
- Day of Protest to save the Net.
-
- ______________________________________________________________________
- WHAT YOU CAN DO NOW
-
- 1. Throughout the day Tuesday December 12, please contact as many
- members of Congress on the list below as you can. If you are only
- able to make one call, contact House Speaker Newt Gingrich. Finally,
- if the Senator or Representative from your state is on the list
- below, be sure to contact him or her also.
-
- 2. Urge each Member of Congress to "stop the madness". Tell them that
- they are about to pass legislation that will destroy the Internet as
- an educational and commercial medium. If you are at a loss for
- words, try the following sample communique:
-
- Sample phone call:
-
- Both the House and Senate bills designed to protect children
- from objectionable material on the Internet will actually
- destroy the Internet as an medium for education, commerce, and
- political discourse. There are other, less restrictive ways to
- address this issue.
-
- I urge you to oppose both measures being proposed in the
- conference committee. This is an important election issue to
- me.
-
- Sample letter (fax or email):
-
- The Senate conferees are considering ways to protect children
- from inappropriate material on the Internet. A vote for either
- the House or Senate proposals will result in the destruction of
- the Internet as a viable medium for free expression, education,
- commerce. Libraries will not be able to put their entire book
- collections online. Everyday people like me will risk massive
- fines and prison sentences for public discussions someone s
- somewhere might consider "indecent".
-
- There are other, less restrictive ways to protect children from
- objectionable material online. This is an important election
- issue to me.
-
- 3. If you're in San Francisco, or near enough to get there, go to
- the Rally Against Censorship from Ground Zero of the Digital Revolution:
-
- WHEN: Monday, December 11, 1995 12:00 - 1:00 PM
- WHERE: South Park (between 2nd and 3rd, Bryant and Brannon) San Francisco.
- SPEAKERS: To be announced
- BRING: Attention-grabbing posters, signs, and banners that demonstrate
- your committment to free speech and expression, and your feelings
- about Congress.
- FOR UPDATED INFORMATION (including rain info):
- http://www.hotwired.com/staff/digaman/
-
- 4. Mail a note to protest@vtw.org to let us know you did your part.
- Although you will not receive a reply due to the number of
- anticipated responses, we'll be counting up the number of people that
- participated in the day of protest.
-
-
- P ST Name and Address Phone Fax
- = == ======================== ============== ==============
- R AK Stevens, Ted 1-202-224-3004 1-202-224-1044
- R AZ McCain, John 1-202-224-2235 1-602-952-8702
- senator_mccain@mccain.senate.gov
- D HI Inouye, Daniel K. 1-202-224-3934 1-202-224-6747
- R KS Dole, Robert 1-202-224-6521 1-202-228-1245
- D KY Ford, Wendell H. 1-202-224-4343 1-202-224-0046
- wendell_ford@ford.senate.gov
- R MS Lott, Trent 1-202-224-6253 1-202-224-2262
- R MT Burns, Conrad R. 1-202-224-2644 1-202-224-8594
- conrad_burns@burns.senate.gov
- D NE Exon, J. J. 1-202-224-4224 1-202-224-5213
- D SC Hollings, Ernest F. 1-202-224-6121 1-202-224-4293
- senator@hollings.senate.gov
- R SD Pressler, Larry 1-202-224-5842 1-202-224-1259
- larry_pressler@pressler.senate.gov
- R WA Gorton, Slade 1-202-224-3441 1-202-224-9393
- senator_gorton@gorton.senate.gov
- D WV Rockefeller, John D. 1-202-224-6472 n.a.
- senator@rockefeller.senate.gov
-
- Dist ST Name, Address, and Party Phone Fax
- ==== == ======================== ============== ==============
- 6 GA Gingrich, Newt (R) 1-202-225-4501 1-202-225-4656
- 2428 RHOB georgia6@hr.house.gov
- 14 MI Conyers Jr., John (D) 1-202-225-5126 1-202-225-0072
- 2426 RHOB jconyers@hr.house.gov
- 1 CO Schroeder, Patricia (D) 1-202-225-4431 1-202-225-5842
- 2307 RHOB
- 18 TX Jackson-Lee, Sheila (D) 1-202-225-3816 1-202-225-3317
- 1520 LHOB
- 6 TN Gordon, Bart (D) 1-202-225-4231 1-202-225-6887
- 2201 RHOB
-
-
- 4. Forward this alert to all of your wired friends.
-
- ________________________________________________________________________
- LIST OF PARTICIPATING ORGANIZATIONS
-
- In order to use the net more effectively, several organizations have
- joined forces on a single Congressional net campaign to stop the
- Communications Decency Act.
-
-
- American Civil Liberties Union * American Communication Association *
- American Council for the Arts * Arts & Technology Society * Association
- of Alternative Newsweeklies * biancaTroll productions * Boston
- Coalition for Freedom of Expression * Californians Against Censorship
- Together * Center For Democracy And Technology * Centre for Democratic
- Communications * Center for Public Representation * Citizen's Voice -
- New Zealand * Cloud 9 Internet *Computer Communicators Association *
- Computel Network Services * Computer Professionals for Social
- Responsibility * Cross Connection * Cyber-Rights Campaign * CyberQueer
- Lounge * Dorsai Embassy * Dutch Digital Citizens' Movement * ECHO
- Communications Group, Inc. * Electronic Frontier Canada * Electronic
- Frontier Foundation * Electronic Frontier Foundation - Austin *
- Electronic Frontiers Australia * Electronic Frontiers Houston *
- Electronic Frontiers New Hampshire * Electronic Privacy Information
- Center * Feminists For Free Expression * First Amendment Teach-In *
- Florida Coalition Against Censorship * FranceCom, Inc. Web Advertising
- Services * Friendly Anti-Censorship Taskforce for Students * Hands
- Off! The Net * Inland Book Company * Inner Circle Technologies, Inc. *
- Inst. for Global Communications * Internet On-Ramp, Inc. * Internet
- Users Consortium * Joint Artists' and Music Promotions Political Action
- Committee * The Libertarian Party * Marijuana Policy Project *
- Metropolitan Data Networks Ltd. * MindVox * MN Grassroots Party *
- National Bicycle Greenway * National Campaign for Freedom of Expression
- * National Coalition Against Censorship * National Gay and Lesbian Task
- Force * National Public Telecomputing Network * National Writers Union
- * Oregon Coast RISC * Panix Public Access Internet * People for the
- American Way * Republican Liberty Caucus * Rock Out Censorship *
- Society for Electronic Access * The Thing International BBS Network *
- The WELL * Voters Telecommunications Watch
-
- (Note: All 'Electronic Frontier' organizations are independent entities,
- not EFF chapters or divisions.)
-
- ------------------------------
-
- Date: Sat, 9 Dec 1995 00:39:42 -0500 (EST)
- From: Charles Platt <cp@panix.com>
- Subject: File 2--Review of Takedown
-
- The Mad-Scientist Myth Figure
-
- A circumlocuitous review of_Takedown_ by Tsutomu Shimomura and John Markoff
- (Hyperion, $24.95)
-
- by Charles Platt
-
-
- Hardly anyone had heard of Kevin Mitnick before Katie
- Hafner and John Markoff wrote about him in _Cyberpunk._
- Hafner now acknowledges that she was the one who gathered the
- data for that book, and its descriptions of Mitnick were
- mostly hers. In retrospect, she admits she characterized him
- unfairly. "It might have been a mistake to call him a
- darkside hacker," she told me during a telephone interview
- earlier this year. "Still, that's how you learn."
- Having benefited from her learning experience, she now
- seems sympathetic--almost motherly--toward the man she
- maligned. "I really think he is not darkside in the sense of
- being an electronic terrorist," she says. "He's not out to
- cripple the world. He isn't, he isn't! Saddam Hussein, or
- Hitler, they were out to cripple the world. There are
- malicious characters out there, but Kevin is not one of them.
- ... He has been turned into this bankable commodity. Leave
- the guy alone! He's had a really tragic life."
- How did her initial misconception come about? She says
- plaintively: "It was hard for me--since I hadn't spoken to
- him personally till after I wrote the book--to know what his
- motives were."
- Perhaps it seems strange that a journalist should defend
- herself by pleading ignorance of the subject that she chose
- to write about. Still, we should give Katie Hafner credit
- where it is due: she now seems genuinely repentant.
- The same can hardly be said for her ex-husband and ex-
- collaborator John Markoff, who must have made well over half
- a millions dollars by now, portraying Kevin Mitnick as an
- arch-enemy of techno-society. If Markoff regrets the
- "darkside hacker" label, he hasn't said much about it.
-
- * * *
-
- Unlike many hackers, Kevin Mitnick never looked for
- publicity. He felt he should be paid for giving interviews,
- and when Hafner and Markoff refused to come up with any
- money, he refused to talk to them. He became famous--or
- infamous--while doing his best to remain obscure.
- The key event that catalyzed this strange ascent to
- notoriety occurred on July 4th, 1994, when a story by John
- Markoff appeared on the front page of _The New York Times._
- Headlined "Cyberspace's Most Wanted: Hacker Eludes F.B.I.
- Pursuit," the text described Mitnick as "one of the nation's
- most wanted computer criminals" and was accompanied with a
- suitably menacing mug shot. The story was liberally spiced
- with tidbits recycled from _Cyberpunk,_ but if you looked
- more closely, there wasn't any actual news. Mitnick had
- violated parole a year or so previously, had disappeared at
- that time, and hadn't been seen since. That was all.
- Why was this on the front page of a highly respected
- newspaper? Maybe because of the scary implications: that a
- weirdo who could paralyze vast computer networks was on the
- loose, and law enforcement had been too stupid to catch him.
- In reality, though, Mitnick has never been accused of
- willfully damaging any hardware or data, and has never been
- charged with making money from his hacking activities. Other
- computer criminals have been far more ambitious. In October,
- 1994, for instance, Ivey James Lay, a switch engineer for MCI
- in Charlotte, North Carolina, was charged with stealing more
- than 100,000 telephone calling-card numbers and disposing of
- them through a network of dealers in Los Angeles, Chicago,
- Spain, and Germany (according to the Secret Service).
- Allegedly the numbers were used to make $50 million in calls-
- -the largest theft of telephone service ever blamed on one
- person. Yet the story was summarized briefly in only a few
- newspapers. _Time_ magazine didn't even bother to mention it.
- Lay certainly didn't get _his_ picture on the front page of
- the _New York Times._ So why was Mitnick singled out for this
- honor?
- In _Cyberpunk,_ he was described as an omnipotent,
- obsessive-compulsive, egotistical, vindictive sociopath who
- used his computer to take revenge on the world that had
- spurned him. He later claimed (in _2600_ magazine) that this
- was "twenty percent fabricated and libelous." Maybe so, but
- the image of a petulant fat boy punishing his enemies via a
- computer keyboard was so memorable, it quickly displaced
- reality. He became the modern-day equivalent of a mad
- scientist, directly comparable with Stevenson's Dr. Jekyll,
- Wells's Dr. Moreau, or Verne's Captain Nemo. About 100 years
- ago, these brooding, solitary antiheroes roused a mixture of
- fright and fascination in readers who were scared by the
- emergent powers of science. Today, readers are just as
- nervous about the emergent powers of networked computers, and
- the myth of Mitnick provides the same kind of titillation.
- So far as I can discover, the FBI didn't classify
- Mitnick as one of America's most wanted; it was John Markoff
- who chose to apply that label. Markoff went far beyond the
- traditional function of a journalist who merely reports news;
- he helped to create a character, and the character himself
- became the news.
- Unfortunately for Mitnick, this made him the target of a
- hacker witch hunt. A few years ago, here in CuD, Jim Thomas
- and Gordon Meyer published a short paper on this subject
- titled "(Witch)Hunting for the Computer Underground," in
- which they wrote that a witch hunt is "a form of
- scapegoating, in which public troubles are traced to and
- blamed on others. Although sometimes the others are guilty of
- some anti-social act, the response exceeds the harm of the
- act, and the targets are pursued not only for what they may
- have done, but also for the stigmatizing signs they bear."
- As I understnd it, this means that if someone looks like
- a hacker and smells like a hacker, the facts of his crime are
- secondary. He may have stolen a couple million from Citibank,
- or he may have merely trespassed into someone else's
- computer. It makes no difference; if he bears the hacker
- stigmata, he gets nailed.
- Which is precisely what happened to Mitnick.
-
- * * *
-
- He was finally caught in February, 1995, after a pursuit
- in which Markoff himself provided information to the FBI.
- This information probably wasn't worth much; Markoff told the
- feds that Mitnick could probably be found stuffing himself
- with junk food at the nearest Fatburger, whereas in fact
- Mitnick was working out regularly, had slimmed down to normal
- weight, and had become a vegetarian.
- Still, Markoff's unusually active participation in the
- case caused some cynics to suggest that he had followed a
- premeditated campaign, first exaggerating the Mitnick threat
- to make it more newsworthy, then helping to catch the hacker
- so he could write about it and make a bundle.
- Regardless of whether this was true, Markoff certainly
- showed no hesitation about cashing in. He wrote another
- front-page article for _The New York Times,_ then a long
- follow-up in the sunday edition--and then, of course, there
- was the much-publicized $750,000 deal for a new book to be
- written in collaboration with Tsutomu Shimomura, the
- "security expert" who had played a key role in catching
- Mitnick after Mitnick broke into Shimomura's computers at the
- end of 1994.
- John Markoff's precise motives remain a mystery. We can,
- however, learn something by examining his writing. In his
- _Times_ article describing Mitnick's capture, he stated that
- the hacker had been on a "long crime spree" during which he
- had managed to "vandalize government, corporate and
- university computer systems."
- These are interesting phrases. "Crime spree" suggests a
- wild cross-country caper involving robberies and maybe even a
- shoot-out. In reality, Mitnick seems to have spent most of
- his time hiding in an apartment, typing on a keyboard. The
- word "vandalize" implies that he wantonly wrecked some
- property; in reality, Mitnick caused no intentional damage to
- anyone or anything.
- I don't believe that these words were carelessly chosen.
- Markoff is a skillful writer. He addresses the reader with a
- tone of measured authority--yet at crucial points he lapses
- into the kind of innuendo normally reserved for tabloid
- journalism. This, I think, is the secret of his great
- success. His literate style, reinforced by the reputation of
- the _The New York Times,_ encourages readers to suspend their
- skepticism. The isolated nuggets of innuendo thus slip past
- unrecognized and are absorbed as if they are facts. This is
- an almost perfect way to circulate a false meme--such as the
- belief that Kevin Mitnick really _is_ one of America's most
- wanted computer criminals.
- The technique would be forgivable if Markoff buttressed
- his viewpoint with some objective sources. Objectivity,
- however, is not his strong suit. In his report of Mitnick's
- capture, he quoted a couple of sysadmins whose computers had
- been targeted by Mitnick in the past; naturally enough, they
- shared Markoff's critical viewpoint. He also quoted Assistant
- U.S. Attorney Kent Walker as saying that Mitnick "had access
- to corporate trade secrets worth millions of dollars. He was
- a very big threat." But this claim was never supported, and
- since Walker had helped run the investigation, he had an
- obvious interest in making the arrest seem as important as
- possible.
- When it came down to it, Markoff's journalism was long
- on opinion and short on facts. This was a formula that worked
- well for him in newspaper reports; but how would he be able
- sustain it throughout an entire new book?
-
- * * *
-
- I have a fantasy. In my fantasy, John Markoff bursts
- into a room where Tsutomu Shimomura sits as solemn as a zen
- master, peering impassively at a computer screen while he
- types a Perl script. "Tsutomu, I have good news and bad
- news!" Markoff exclaims. "The good news is, we sold the book
- rights for three-quarters of a million. The bad news is, I
- haven't got a clue what Mitnick was doing for the past two
- years. What the hell are we going to write about?"
- Shimomura doesn't even bother to look up. He gives a
- barely perceptible shrug and says, "Me, of course."
- I'm sure it didn't happen that way, but the end product
- makes it look as if it did. _Takedown_ isn't about Kevin
- Mitnick, because there was no way for Markoff to write such a
- book. Instead, it's an autobiographical account from
- Shimomura's point of view, describing in relentless detail
- the way in which Mitnick intruded into Shimomura's computers
- and the steps that Shimomura took to catch him.
- The book has one strong point: unlike Markoff's other
- work, it is rigorously factual. It may even be the most
- technically accurate popular book ever written on the subject
- of computers. Shimomura evidently took his collaborative role
- seriously, and he made his mark on this project.
- Of course, it's always nice to see someone get his facts
- right--but there is such a thing as _too many facts._ Do we
- really need to know the color of the cables in Shimomura's
- LAN? Do we need to know the _names_ he gave the computers in
- his bedroom (and why)? For that matter, do we really need to
- know that the bread sticks were stale in an Italian
- restaurant where he searched for healthy vegetarian food but
- was forced to eat a cheese sandwich?
- This book is a quagmire of trivia--but that's a
- secondary issue compared with its major problem, which is
- that it's written from the viewpoint of someone who is
- insufferably pompous and remarkably dull.
- Shimomura has a bad habit of flattering himself while
- demeaning the people he deals with. He was bored at Caltech;
- there was nothing exciting enough to be worthy of his time.
- He worked for the NSA but found the people "essentially
- inept." He had no respect, either, for critics who felt he
- shouldn't have sold his skills to that government agency;
- those critics didn't know what they were talking about.
- There's more--much more. Shimomura is scathing toward
- his assistant, a hapless graduate student whose errors are
- spelled out repeatedly in humiliating detail. He is disgusted
- by technical incompetence of staff at The Well. He scorns the
- abilities of other security experts, and is maddened by the
- slowness of the police. He even displays derision toward John
- Markoff at one point. And of course he has total contempt for
- Kevin Mitnick, whom he labels an "anklebiter."
- Mitnick grew up in a lower-class single-parent household
- and taught himself almost everything he knew about computers.
- At various times, Mitnick has made seemingly sincere attempts
- to find himself legitimate work in the computer field--until
- his reputation catches up with him. By comparison, Shimomura
- had many advantages that Mitnick lacked. His parents were
- scientists; they sent him to the best schools. Ultimately he
- found himself a secure niche in academia, and he enjoys a
- comfortable lifestyle staying in the homes of Silicon Valley
- millionaires, going away on skiing vacations, and doing the
- conference circuit.
- Shouldn't these advantages make it possible for
- Shimomura to be a little magnanimous toward his adversary?
- Alas, no. He constantly sneers and jeers at Mitnick. He
- claims that the hacker was "really more of a con man or a
- grifter than a hacker in the true sense of the word" and
- "didn't seem to be as brilliant a hacker as his legend
- claimed. ... he wasn't that clever and he was prone to
- mistakes."
- In which case, one has to wonder how he ever managed to
- crack the computer system maintained by such a world-famous
- "security expert."
-
- * * *
-
- _Takedown_ throws together a bizarre catalog of personal
- detail in an effort to make Shimomura seem less like a
- pompous disciplinarian and more like a regular guy. We learn
- that he used to wear roller blades at the San Diego
- supercomputer center, so he could move more speedily between
- his terminal and the printer. As a student he once destroyed
- his school's PA system by feeding house current into it. And
- then there was the time he crashed an ancient 14-inch IBM
- disk drive by telling it to seek past its final cylinder.
- These anecdotes from the life of a hardcore computer
- nerd are presented as if they're genuinely funny. Indeed,
- they're the high point of human interest. The low point comes
- when Shimomura goes into the most embarrassingly intimate
- details of his love life.
- Presumably because Markoff felt that some romantic
- interest would help to sell the story, this book contains
- revelations of a type normally reserved for Hollywood
- celebrities or British royalty. While he was pursuing
- Mitnick, Shimomura was also pursuing "Julia," the long-term
- girlfriend of John Gilmore, one of the first employees at Sun
- Microsystems in 1982 who subsequently co-founded the software
- corporation Cygnus.
- Without a hint of shame, Shimomura describes himself
- visiting Gilmore's home while Gilmore was out of town,
- staying as a guest, stripping naked, and soaking in the hot
- tub with Julia. He chronicles a whole series of seduction
- attempts, always sneaking away before Gilmore returns. And
- even though he is clearly trying to destroy someone else's
- long-term relationship, he maintains a plaintive, wounded
- tone, as if he expects us to share his pain. Clearly he feels
- that Julia should automatically prefer his company, and when
- she hesitates, this must mean there's something wrong with
- her. "I started to wonder," he says, "whether there was
- something self-destructive in her unwillingness to end her
- relationship with him."
- Kevin Mitnick begins to seem likable by comparison. At
- least he shows some irreverence, taunting Shimomura and
- trying to puncture his pomposity. At one point, Mitnick
- bundles up all the data he copied from Shimomura's computer
- and saves it onto the system at Netcom where he knows that
- Shimomura will find it. He names the file "japboy." At
- another point, in a private online communication (intercepted
- by Shimomura without any lawful authorization) Mitnick
- suggests to a hacker friend: "someone :-) needs to get to
- nytimes.com and create a story about japboy that he is a
- convicted child molester and get it printed with markoff's by
- line."
- Does Shimomura have any trouble maintaining his dignity
- in the face of these pranks? No trouble at all. He writes:
- "This was getting personal. ... none of us could believe how
- childish and inane it all sounded."
- Wounded dignity, in fact, seems the number-one reason
- why Shimomura put the rest of his life on hold, gave up a
- skiing vacation, interrupted his campaign to steal Gilmore's
- girlfriend, and started working 20-hour days to track down
- Kevin Mitnick. Clearly he was furious at Mitnick's invasion
- of his privacy. His tone of moral outrage reaches its
- crescendo when he sees Mitnick in court: "Having spent
- several weeks on this man's trail, seeing the damage he had
- caused, coming to learn that he was not only single-minded in
- his invasion of other people's privacy and his pursuit of
- their intellectual property, but also petty and vindictive, I
- knew one thing for certain about Kevin Mitnick: He was in no
- way the hero of a movie about some mistreated computer hacker
- whose only crime was curiosity. There was nothing heroic
- about reading other people's mail and stealing their
- software."
- Well, maybe so, but unlike Shimomura, Mitnick never
- claimed to be heroic. Nor did he cause any intentional
- "damage." Nor did he "attack," "pilfer," and "vandalize"
- computer systems, even though these words are used repeatedly
- throughout the book--in the same pejorative style that John
- Markoff previously perfected in _The New York Times._
-
- * * *
-
- All the charges except one have been dropped against
- Kevin Mitnick. He may even be out of jail in time for the
- Markoff/Shimomura book tour. In other words, the man
- described in advance publicity for _Takedown_ as a threat to
- global civilization will be free to go about his business--
- because, in the end, he wasn't much of a threat at all.
- Will this create an embarrassing schism between
- _Takedown_ and reality? Probably not. Reality has been at
- odds with the Mitnick myth for quite a while, but the myth is
- stronger than ever.
- During 1995, Mitnick's long-time friend "Roscoe" tried
- to sell his own book, telling the true Kevin Mitnick story.
- For one reason or another there were no takers. Here, then,
- was the final irony: book editors were not just willing to
- accept factual distortions, they actively prefered them.
- For most practical purposes, Kevin Mitnick no longer
- exists. He has been displaced by his own media image as a
- modern-day mad scientist. He is permanently imprinted with
- the hacker stigmata.
- And there's not a damned thing he can do about it.
-
- -------------------------------------------------------------
-
- Portions of this article will appear, in a different
- form, in a book titled FEAR AND FREEDOM ON THE INTERNET, to
- be published in 1996 by HarperCollins.
-
- ------------------------------
-
- Date: Tue, 5 Dec 1995 11:31:09 GMT
- From: rkmoore@INTERNET-EIREANN.IE(Richard K. Moore)
- Subject: File 3--re: Magna Carta Response
-
- >Terry McIntyre <tm@SBE.SWITCH.COM> wrote:
- >
- >Richard Moore...purports that the PPF's "Magna Carta for the Knowledge Age"
- >is less about individual freedom than about freedom of corporations.
-
- Dear Terry,
-
- I think "demonstrated" is more correct than "purports", unless you've found
- a fault in the analysis.
-
- >The report surely has its flaws, but the cure is not to axe the concept
- >of freedom altogether
-
- So who axed the concept of freedom? I'm very much for individual freedom,
- my objection is to the Magna Carta's devious manipulation of language,
- which intentionally confuses individual freedom with corporate
- deregulation.
-
- >nor to hand government the role of developing
- >the new fronteir.
-
- While a government-managed infrastructure might well provide the lowest
- cost and most level playing field for cyberspace -- continuing the success
- of the ARPA-created Internet -- such an approach is politically unrealistic
- in the current privatization frenzy. The relevant question today is not
- whether government should develop the infrastructure, but what rules of the
- road should be laid down. "No rules" does not give freedom to all
- uniformly, but overwhelmingly favors the biggest players with the deepest
- pockets, and makes monopolistic practices inevitable.
-
- >We already know that governments are no lovers of
- >freedom of expression. ...here in the United
- >States, Senator Exon and Ralph Reed have moved swiftly to prevent the
- >spectre of free speech from hampering their political aims.
-
- So? If government pursues censorship, we have mechanisms to fight that
- process: lobby, elect new Congresspeople, etc. If AOL or Southwestern Bell
- impose censorship, and there are no rules governing their decisions, we
- have no recourse. Besides, Exon-style legislation would apply regardless
- of who owns or develops cyberspace.
-
- >...The internet is growing at a rate of 100%
- >per year; hundreds of providers are competing to give inexpensive
- >access to homes everywhere. All of this has happened in one of the
- >least regulated industries in the world.
-
- This point is raised explicitly in the Cyber Baron article: the current
- regulatory regime is working quite well to foster "dynamic competition" --
- the aim of the Magna Carta manifesto is to _reduce_ competition and
- encourage monopolies, even though its devious language tries to claim the
- opposite.
-
- >Rather than forge new
- >chains, ...let us tell Ralph Reed and all of his cohorts that they may
- >speak on the same terms as everyone else - freely, to those who
- >wish to listen.
-
- No disagreement here.
-
- >The PPF and Newt surely have their failings, but not everything they
- >say is false. Where they speak for freedom, I would not decry them,
- >but urge that they be less stingy with a commodity which (alone among
- >those offered by governments) breaks no bones and picks no pockets -
- >liberty.
-
- You've fallen into the trap of accepting PFF's doublespeak, that
- "individual freedom" and "deregulation" (ie, corporate lawlessness) are the
- same thing. "Liberty", when applied to corporations can indeed break bones
- and pick pockets -- big time. Ask the victims of Bhopal (sp?), or the
- natives of Chiapas, or the Indians of the Amazon Valley, about how death
- and impoverishment can be the direct result of unrestrained corporate
- greed.
-
-
- Thanks for you comments,
- Richard
-
- ------------------------------
-
- Date: Mon, 04 Dec 1995 11:04:14 -0500
- From: Howard Gobioff <hgobioff@GS207.SP.CS.CMU.EDU>
- Subject: File 4--Re: Cu Digest, #7.93
-
- >From--Dave++ Ljung <dxl@HPESDXL.FC.HP.COM>
- >Subject--File 7--Re--Cyberangels
- >
- >
- >One of the items I pointed out to Gabriel was that I didn't see how his
- >list of 'crimes to be monitored' would include child pornography but not
- >bestiality, but he pointed out that this was an oversight.
- >
-
- I just wanted to point out that while "child pornography" is illegal
- that bestiality is not. Under federal obscenity law, child pornography
- is obscene and therefore illegal. However, bestiality is not immediately
- deemed obscene and must be subject to the Miller test. Due to this
- distinction, I am doubtful that the Cyberangel, despite good intentions,
- should be seeking out bestiality on the network. They are not the courts
- and it is not their decision if something is obscene or illegal.
-
- The interpetation of something being "child pornography" is also a non
- trivial assessment with current technology. We can generate sexually
- explicit images involving minors by applying digital image editing
- tools. A child need not be used in a sexually explicit manner to
- generate the images. Is such an image "kiddie porn"? While clearly
- it caters to the same tastes, it is not clear that it should be
- considered illegal. As has been mentioned before, a Canadian court
- found that such an image was "child pornography" but, to my knowledge,
- no U.S. court has handled a similar case. If this is to be a legally
- recognized distinction, not inevtiably but definitely possible when
- you consider some of the motivations of child porn laws, it will make
- it difficult for the Cyberangels to disinguish being crimes and legal
- actions. While the Cyberangels may be well meaning net citizens, they
- should not presume to be the judges of the rest of us...
-
- ------------------------------
-
- From: "David Gersic" <A02DAG1@NOC.NIU.EDU>
- Date: Wed, 29 Nov 1995 01:31:00 CDT
- Subject: File 5--Re: Net Censorship (CuD 7.92)
-
- -=> >>I am no wowser, adult material does not faze me, but when I >see detailled
- -=> >instructions on how to rape a four year old,
-
- Revolting or not, unless something has changed recently, this would
- still be covered by the concept of "free speach".
-
- -=> >together with photographs of
- -=> >the actual event,
-
- Is it just me, or do only the people that want more censorship seem
- to find this stuff so readily? I've yet to run across a host on the
- internet, in many years of poking around, that featured "how to rape
- a four year old", kiddie porn, or bomb making recepies. Maybe I'm
- just not trying hard enough...?
-
- -=> >Censorship is not the >answer. History shows this has
- -=> >never worked.
-
- Well, there's something we can agree on, though I don't see the
- "CyberAngle" bunch doing much to work against censorship.
-
- -=> > Let us try to at least shield our children from this sort of
- -=> >material,
-
- There's something else to agree on. You shield *your* children from
- it, and let me worry about mine.
-
- -=> >We have reported a number of Child Pornographers (50) to Sysadmins this
- -=> >month.
-
- Ahem. Here's an interesting thought. Though the author doesn't say,
- which country's laws is he planning on evaluating this charge by? I
- don't know what the laws of other countries around the world may be,
- but it's not inconceivable that in Lower Slobovia that there might
- not be a law against taking pictures of naked children. The SysAdmin
- of www.lower.slobovia.com may not have any reason to care if there
- are pictures of naked children on his machine. And that's just the
- tip of the iceberg. Anybody know what the American Indian treaties
- might contain that could be relevant? Even in states where gambling
- isn't legal, the Indians have begun setting up casinos on tribal
- lands. Could something similar happen with things that the CA people
- find offensive?
-
- I think that the person trying to start up this CA program has his
- heart in the right place, but he sounds terribly naive and short
- sighted.
-
- -=> > This was done only after we received from them graphic images
- -=> >(unsolicited) of child pornography. We forwarded the email, including the
- -=> >attached files, to respective ISPs with the question "Is this a violation
-
- of
-
- -=> >your TOS?
-
- Violation of a TOS? That's the least of your worries, actually. By
- recieving (I'll have to take his word for it for the moment) real
- child pornography, unsolicited or not, he's in for a world of
- trouble. Anybody have Inspector Dirtmeyer's address (the one from the
- AA BBS case a few months ago...)? Sounds like he'd like to talk to
- Gabriel about a few minor violations of the law that could get him
- sent to prison for more than a few years. By sending the self-
- described child pornography to the SysAdmins, he's become a
- *distributor* of child pornography. Hope the Angles have a good law
- firm picked out...
-
- -=> >Do you really want to listen to Gabriel month after month? ;)
-
- Not really, no.
-
- ------------------------------
-
- Date: Sun, 5 Nov 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 6--Cu Digest Header Info (unchanged since 5 Nov, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.95
- ************************************
-
-