home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Jun 23, 1996 Volume 8 : Issue 48
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.48 (Sun, Jun 23, 1996)
-
- File 1--GAO hacker report: selling wind
- File 2--"Don't Shoot the Senator" (EYE reprint)
- File 3--Cyber Gangs
- File 4--Hacking news
- File 5--ACLU Cyber-Liberties Update: 6/5/96
- File 6--Re: British investigation into "cyber terrorists"
- File 7--Child Molester Database on the web
- File 8--Reno calls for new Federal agency to oversee crypto
- File 9--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Thu, 20 Jun 1996 16:34:12 -0500 (CDT)
- From: Crypt Newsletter <crypt@sun.soci.niu.edu>
- Subject: File 1--GAO hacker report: selling wind
-
- "It is a great art to know how to sell wind."
- -- Baltasar Gracian
-
-
- The beginning of Summer has delivered a box load of public
- announcements on the growing horror of ill-defined hacker menace.
- Ever since the end of the Cold War, the U.S. government has been
- madly casting about for new enemies to take the place of the old
- bogeymen in the Politburo. At various times Third World nations
- have been suggested. However, U.S. citizens are uninterested in
- thugs from Somalia or Balkan butchers. They are loutish, messy,
- and lacking in ICBM fields, B-52s or other obvious means of
- projecting power or violence beyond their territories. Terrorist
- groups domestic and international have been sought, too.
- Unfortunately, the Japanese cult of nerve gas manufacturers has
- proven unstable as have the U.S. militias. The militias also have
- had the gall to hole up in isolated farm houses while surrounded
- by regiments of FBI agents. The pictures at ten fail to move the
- populace to panic, instead provoking laughter and ridicule or the
- vague suspicion that government employees are overdoing it.
-
- However, bands of hackers have proven far more durable
- and roadworthy. This is because they are being cleverly sold as
- capable of raping and pillaging the archdukes of capitalism simply
- by pushing a few buttons from the refuge of a faraway land or county.
- It is the closest anyone has been able to come to the symbolism of
- ICBMs and computerized launch codes.
-
- Hackers are good at making mechanisms, too. Small boxes utilized
- for the purposes of defrauding everyone's nemeses, the telephone
- companies, are now metamorphosing into bigger boxes.
-
- The recent issue of FORBES ASAP featured a number of menacingly
- posed fellows on its cover who consented to be avuncular bogeymen for
- a roundtable of editors. They spoke of weaponry like remote mass
- automatic garage door openers, HAM and short wave radio snoopers which
- allow one to eavesdrop on and speak through fast food restaurant
- drive-up speakerphones or those small walkie-talkie systems sold as baby
- monitors in catalogs like THE SHARPER IMAGE. Electronic death ray
- projectors called HERF guns were discussed. No one seems to have
- actually seen a HERF death ray but few people ever got to see a real
- ICBM or a shell loaded with sarin, either, so the point Crypt
- Newsletter attempts to make is probably moot.
-
- The Senate subcommittee on investigations was also hard at work
- this month publicizing a 63-page Government Accounting Office
- report entitled "Information Security: Computer Attacks at Department
- of Defense Pose Increasing Risks" on the threatening world of computer
- saboteurs and hacks on DoD networks.
-
- But the Government Accounting Office's report (GAO/AIMD-96-84)
- promised a lot more than it delivered. Disappointingly, Crypt noted it
- proved to be an extremely general discussion of hackers leavened with
- a lot of unsupported conjecture. A look at it convinced Crypt that
- anyone wishing to know anything real about computer hacking incidents
- would be better served by going to a good bookstore and purchasing
- copies of "The Hacker Crackdown," "The Cuckoo's Egg" and "Firewalls
- and Internet Security."
-
- Long segments of the GAO treatise also retold -- much less effectively --
- news stories that have appeared in the media in the last five
- years. For no apparent reason other than to provide "what-if's,"
- the GAO republished the tale of a scary Rand Corporation
- information warfare gaming exercise reported in a August 21,
- 1995 cover story for TIME magazine. It read as fiction. The
- GAO paper also anonymized and failed to properly cite the
- perfectly precise and specific story of Bill Cheswick and Steve
- Bellovin's tangle with the Dutch hacker "Berferd" in 1991
- (and published in their book, "Firewalls and Internet Security.")
-
- In the report, much is also made of a two year old incident
- at the Air Force Material Command facility in Rome, New York.
- Although the republic was not harmed, GAO and the military assessed
- the difficulties caused by the hack to have set the Department of
- Defense back $500,000.
-
- Jack Brock, the congressional General Accounting Office's point man
- on its hacker report, said in related congressional testimony:
- "Terrorists and other adversaries now have the ability to launch
- untraceable attacks from anywhere in the world. They could infect
- critical systems with sophisticated computer viruses, potentially
- causing them to malfunction."
-
- Yes, and it is easy to imagine that this statement would come as a
- very bitter surprise to Christopher Pile, a real British hacker who
- cast his SMEG viruses into the computer underground. Of course, he
- turned out to be far from "untraceable" and is now serving a year and
- a half jail sentence on charges having to do with his comings and
- goings in cyberspace.
-
- The GAO reports DoD computers "may" have been the target of assaults
- in the last year. Later on in the text, it is cited that there
- were 559 "officially reported" incidents in 1995. Very little meaning
- can be extracted from these figures since no real methodology on their
- derivation is presented. For example, would 250,000 assaults
- include Crypt Newsletter using telnet to bring up a network address
- reprinted in a nonfiction book on UFO's and finding that it was
- PENTAGON-AI.ARMY.MIL, a restricted site?
-
- A recent Washington Post article on the GAO/hacker/DoD congressional
- hearings also mentioned other reports which have built scenarios for
- effect. To wit: although FAA traffic control computers are safe
- because they are old, complicated and rickety, it is theoretically
- possible that future replacements would prove to be playgrounds for
- malicious but invisible hackers.
-
- The metaphor of the popular movie was also used to make a point: In
- "The Net" a hacker changes the medical records of the Secretary
- of Defense at the Bethesda Naval Center. Readers are asked to
- think of this as real.
-
- Work published by the Computer Security Institute projects the
- hacker menace onto US corporates, too. Forty two percent of 428
- respondents to a poll insist they've been hacked within the past year.
- The respondents are invisible. Always shielded by layers of
- confidentiality and anonymity we do not grant victims of sex
- offenders, corporate victims are said to speak of computer evil-doers.
- Science Applications International Corp., a giant think tank
- and Pentagon contractor pulls out of Congressional hearings on criminal
- hacking. "We have non-disclosure agreements with our clients and we
- were not given clear and absolute assurances that under questioning
- we wouldn't be expected to violate those nondisclosure agreements,"
- said a mouthpiece for the organization.
-
- Many, many foreign countries -- "more than 120" -- appeared to have
- hackers whom at one time or another try their hands on Department of
- Defense systems, Mr. Brock said. According to the news, he added the
- National Security Agency knew which countries these were but this was
- classified information. Secret. None of your business even though you
- paid for it. Invisible.
-
- Crypt phoned Mr. Brock in an effort to shed more light on the data
- in his report but he said he couldn't discuss anything about it with
- anyone, particularly over the telephone. Mr. Brock said the NSA had
- presented the data to him but had sworn him not to talk of it. Crypt
- felt sorry for questioning Mr. Brock because his style made it clear he
- was a little bit frightened of the mandarins at the NSA. One received
- the distinct impression that Mr. Brock felt that even if the simple words
- "hacker" or "computer virus" were mentioned on an open line too many
- times a bad thing might happen. It was like the reading of a horror
- novel by H. P. Lovecraft. If the wrong word were invoked an unspeakable
- creature might be summoned from the Arkham of Ft. Meade, one that could
- mutate the careless utterer of it into a many tentacled fish-frog.
-
- In seriousness, perhaps a bad thing could occur. A career could be
- smudged over something as simple as candor in a three minute phone
- chat.
-
- Mr. Brock also said a number of odd things. He said that there
- had been information presented by the NSA of varying sensitivity and
- there had been no decision on how it should be classified. So no blanket
- classification had been made but still no one could speak of it.
-
- "I'm not a good source," said Mr. Brock. Then he repeated it: "I am
- not a good source." What? But if not the GAO investigator, then who?
- Of course, the answer is a circular argument. The NSA was the final
- source -- that's who.
-
- Well, Crypt Newsletter readers no longer believe the standard
- bromides delivered by intelligence agencies. They know that
- excessive classification or gag orders are an indication of someone
- wishing to hide data that qualifies the publicized announcement, to
- disguise plagiarism from open sources, or cover up incompetence and
- outright fraud.
-
- Wrestling with invisibles, or symbols, was always what the Cold War
- was about. No one except an obscure lunatic named T. K. Jones in
- the Reagan administration really thought that either U.S. generals
- or their Soviet counterparts would call down the wrath of 10,000
- nuclear warheads. Yet the symbol of the nuclear-tipped missile
- remained the stone tablet of the religion of geopolitics, a totem
- that could be successfully shaken at newspapers, Congressional
- meetings and international summits.
-
- Hackers are a totem of great power, too. For a short period of
- time, Kevin Mitnick became the 1995 equivalent of Muammar Ghaddafi, at
- least in newspapers and on TV. Unknowable and unknown, his image - that
- of a menacing-looking cypher in thick glasses - was an appropriately
- fearful symbol to some. When the Mitnick-Ghaddafi turned out to be
- normal looking months later, no one cared anyway. Tsutomu
- Shimomura, like US F-111s, had already been dispatched to banish the
- Mitnick-Ghaddafi to the trashpits of Gehenna -- in this case
- city jails in North Carolina and Los Angeles. Shimomura, it
- turned out, appeared to have missed the real target but the F-111s sent
- to mail the Ghaddafi menace C.O.D. to Allah missed, too, and media
- history has been kind to both affairs.
-
- The Mitnick-Ghaddafi, said those with the loudest voices, at one
- point in the dim past might have been able to start World
- War III by diddling computers in Cheyenne Mountain. They were confused
- by Hollywood and appeared to believe that a teen movie called "Wargames"
- actually featured the Mitnick-Ghaddafi. Since the Mitnick-Ghaddafi had
- neither a press agent or a constant address he was certainly hard
- to find and not in much of a position to clarify matters. This worked
- against him and for the forgers of symbols and the tellers of tales. If
- Mitnick had possessed the wit to walk into a TV studio the day
- after his face showed up on the front page of The New York Times or to
- spend $500 dollars for a couple of news releases on the PR Newswire, his
- career as a religious totem used to scare and thrill the citizenry
- would have been over long before media momentum and book sales
- transformed him into a myth.
-
- From virus writers to Internet marauders the average computer d0od
- who fancies himself a successful hacker has never understood the
- mechanisms of media symbolism.
-
- Invariably, the hacker can always be lured into exaggerating his
- impact upon the republic by appropriate blandishments from reporters
- in the mainstream media. In need of a malevolent sounding man to portray
- as a dangerous computer-master weirdo? Place a query on the Internet
- and the editorial phone will ring off the hook.
-
- From the perspective of the hacker this seems like an attractive deal.
- He gets to tweak the nose of suits, make Congressmen scurry about at the
- behest of the NSA and cause the neighbors to keep the cat in at night.
- Power! Celebrity! The euphoria lasts until the inevitable story is
- published and a couple hundred thousand people read it. The reality of
- this leaves the interviewed computer jockey feeling nervous and cheated.
- He has been cast as a hideous but banal carnivorous ogre, not a cool
- clove cigarette-smoking anti-hero. If a photo is published it will
- invariably be the one that was the product of an atrocious camera angle,
- the one that made him look like a creepy slug or Doctor Octopus. Locals
- may be sufficiently frightened by this image to consider mustering a
- party to slay the ogre. Instead of getting on the cover of People, it has
- become time to lay low at the job, to change one's phone number or to ask
- the parents to fund a sojourn at an anonymous state university. The
- hacker so treated finds his life transformed as if by a philosopher's
- stone. But instead of being transmuted from lead into gold, the media
- has cruelly turned him into just a different isotope of lead -- that of
- the pariah.
-
- Malicious hackers are a fact of life. Some of them break into systems
- or write viruses that spread around the world. Some of them get away
- with a lot. But the lesson to be learned is not that they can smash
- the republic or loot corporate treasure. Rather the lessons are the
- stories of Kevin Mitnick, James Gentile, Chris Pile, Kevin Poulsen,
- Phiber Optik or whomever is the newest flavor of the week in the myth
- business. One can count on, at the least, family embarrassment and the
- inability to conduct one's future affairs in private or, at worst, a
- criminal record based, in part, on wind and an image that becomes a
- radical millstone in conservative times.
-
-
- Notes: The quote from Scientific Applications was taken from a
- story in the June 6 issue of the Washington Post: "U.S., Private
- Computers Vulnerable to Attacks by Hackers, Study Says" by
- Elizabeth Corcoran.
-
- ------------------------------
-
- Date: Sun, 23 Jun 1993 22:51:01 EDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 2--"Don't Shoot the Senator" (EYE reprint)
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- eye WEEKLY May 30, 1996
- Toronto's arts newspaper .....free every Thursday
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- EYENET EYENET
-
- DON'T SHOOT THE SENATOR
-
- by
- K.K . CAMPBELL
-
- Last week, the police were hot on the trail of the net.inspired
- Watermelon Bombers of Edmonton. "A reign of exploding fruit terror!"
-
- Well, the terror never stops online.
-
- Now a kid has been arrested for "terrorism" in California because he
- posted a suggestion to Usenet that a California senator who supports
- hunting mountain lions for fun should himself be declared open season
- for hunting.
-
- On March 6, a 19-year-old college student in El Paso, Texas, Jose
- Eduardo Saavedra (zuma@primenet.com), contributed a post in a Usenet
- thread about hunting mountain lions:
-
- "Let's hunt Sen. Tim Leslie for sport ... I think it would be great to
- see this slimeball, asshole, conservative moron hunted down and
- skinned and mounted for our viewing pleasure.
-
- "I would rather see every right-wing nut like scumface Leslie
- destroyed in the name of political sport, than lose one mountain lion
- whose only fault is having to live in a state with a fucked up jerk
- like this shit-faced republican and his supporters."
-
- It seems making the hunting of mountain lions legal is a hot issue in
- California. Leslie supports such hunting. Saavedra is apparently an
- animal-rights/anti-hunter activist, and so proposed hunting the
- senator instead. And he sent that proposal to newsgroups
- talk.environment, sci.environment, talk.politics.animals, rec.pets,
- ca.politics, rec.pets.cats, rec.animals.wildlife, rec.food.veg and
- alt.save-The-Earth.
-
- On March 13, Saavedra reappeared in the ca.general (general shit about
- California) newsgroup saying a California reporter had seen a copy of
- his original post and was just wondering if he really wanted people to
- kill the senator. Saavedra clarified his position:
-
- "I recently was contacted by a reporter for a northern California
- newspaper wanting to know if I really meant what I said about hunting
- Tim Leslie. Since it appears that the post has frightened some people
- -- let me offer some clarification," and he ends his post with this
- statement: "Would I hunt down Tim or anyone else -- no. Would I
- support such an action -- no. Would I be happy if some nut actually
- did such a thing? YES, just like a German Jew would have celebrated
- the death of Hitler. So -- If California would pass a law allowing the
- hunting of hunters -- then, and only then, would I go out, buy a gun,
- and become a hunter."
-
- On the morning of May 8, Saavedra was arrested on a no-bail warrant
- based on felony charges alleging that he made "terrorist threats and
- threatened a public official," according to Sgt. Don Marshall of the
- El Paso County Sheriff's office.
-
- The student was taken into custody in El Paso County Jail on a
- "Fugitive from Justice" warrant issued by the Sacramento district
- attorney's office.
-
- On May 10, the Sacramento Bee ran a story headlined "Internet Threat
- to Leslie Brings Arrest." It quoted Leslie: "I hope the message to the
- public is that it is not legal to abuse the Internet." The paper noted
- that Saavedra refused to waive extradition, so California would have
- to execute a governor's warrant to drag him there for trial.
-
- On May 11, the San Francisco Examiner ran an AP story titled "Net
- threat is traced to student."
-
- Free speech activists everywhere couldn't believe it was true at
- first, it was so ludicrous. But it was true, so they began analyzing
- Saavedra's posts with a legal eye. On the fight-censorship list, Jay
- Holovacs (holovacs@ios.com) noted: "This statement is so obviously
- sarcastic that I don't think any reasonable person reading it would
- actually believe he is planning to kill Leslie. If however, after this
- statement was made, someone took pot shots at Leslie, then it would be
- basis for investigation."
-
- EFF counsel Mike Godwin (mnemonic@well.com) made the comment that what
- Saavedra was doing was not very different from other "protected"
- political speech, like wearing a T-shirt emblazoned "Fuck The Draft."
-
- Leslie, meanwhile, told the press he was "relieved" an arrest had been
- made -- whew! He says Saavedra's case raises "big new issues" about
- the net. The senator also says it's a "very serious matter" to
- "threaten or intimidate or extort others in a public forum like this."
-
- OK, class -- having read the senator's observations, do you think he
- is a regular user of Usenet?
-
- Ann Beeson (beeson@nyc.pipeline.com), from the ACLU's National Office,
- says the ACLU of Northern California has agreed to take Saavedra's
- case. "The ACLU attorneys in North California are strategizing with
- Saavedra's attorney, a public defender in Texas," she says.
-
- The Sacramento DA's office says cops located Saavedra through
- information from the student's Internet provider, Arizona's Primenet.
-
- Beeson and the ACLU understand these kinds of cases are far bigger
- than just one student angry about the slaughter of mountain lions, or
- an asshole sitting in the U.S. senate. It's about the entire structure
- of the Internet and how quickly Internet service providers will pull
- down their pants when the cops come calling. How ready is your own ISP
- to just hand over access to all your email when John Law appears at
- their door asking for "cooperation" against whatever they are
- labelling you: terrorist/child pornographer/anarchist/drug dealer,
- etc.?
-
- "In addition to the obvious infringement on Saavedra's free speech
- rights, we are curious to learn just how much info PrimeNet of Arizona
- turned over to law enforcement to enable the arrest," Beeson says.
- "There may be a privacy issue here as well."
-
- California Senator Tim Leslie's office can be reached at (916) 445-
- 5788. Timmy... get yer gun...
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Retransmit freely in cyberspace Author holds standard copyright
- http://www.eye.net Mailing list available
- eyeNET archive --------------> http://www.eye.net/News/Eyenet
- eye@eye.net "...Break the Gutenberg Lock..." 416-971-8421
-
- ------------------------------
-
- Date: Wed, 5 Jun 1996 06:15:35 -0400 (EDT)
- From: NOAH <noah@enabled.com>
- Subject: File 3--Cyber Gangs
-
- From--Rogue Agent :::
-
- City of London Surrenders To Cyber Gangs
-
- Copyright 1996 Nando.net
- Copyright 1996 Times of London
-
- (Jun 2, 1996 00:06 a.m. EDT) -- City of London financial institutions
- have paid huge sums to international gangs of sophisticated "cyber
- terrorists" who have amassed up to 400 million pounds worldwide by
- threatening to wipe out computer systems.
-
- Banks, broking firms and investment houses in America have also secretly
- paid ransom to prevent costly computer meltdown and a collapse in
- confidence among their customers, according to sources in Whitehall and
- Washington.
-
- A Sunday Times Insight investigation has established that British and
- American agencies are examining more than 40 "attacks" on financial
- institutions in London and New York since 1993.
-
- Victims have paid up to 13 million pounds a time after the blackmailers
- demonstrated their ability to bring trading to a halt using advanced
- "information warfare" techniques learnt from the military.
-
- <snip>
-
- European and American police forces have set up special units to tackle
- the cyber criminals, who, Ministry of Defence sources believe, have
- netted between 200 and 400 million pounds globally over the past three
- years. But law enforcement agencies complain that senior financiers have
- closed ranks and are hindering inquiries.
-
- <snip>
-
- Scotland Yard is now taking part in a Europe-wide initiative to catch
- the cyber criminals and has appointed a senior detective from its
- computer crime unit to take part in an operation codenamed Lathe
- Gambit. Such is the secrecy that few details about the inquiry have
- emerged.
-
- In America, the FBI has set up three separate units to investigate
- computer extortion.
-
- The NSA believes there are four cyber gangs and has evidence that at
- least one is based in Russia. The agency is now examining four examples
- of blackmail said to have occurred in London:
-
- - -- January 6, 1993: Trading halted at a broking house after blackmail
- threat and computer crash. Ransom of 10 million pounds paid to
- account in Zurich.
-
- - -- January 14, 1993: a blue-chip bank paid 12.5 million pounds after
- blackmail threats.
-
- - -- January 29, 1993: a broking house paid 10 million pounds in ransom
- after similar threats.
-
- - -- March 17, 1995: a defence firm paid 10 million pounds in ransom.
-
- In all four incidents, the gangs made threats to senior directors and
- demonstrated that they had the capacity to crash a computer system. Each
- victim conceded to the blackmailers' demands within hours and
- transferred the money to offshore bank accounts, from which it was
- removed by the gangs within minutes.
-
- ...............
-
- ------------------------------
-
- Date: Wed, 5 Jun 1996 06:20:44 -0400 (EDT)
- From: NOAH <noah@enabled.com>
- Subject: File 4--Hacking news
-
- (Some Headers and Sigs removed)
-
- -Noah
- -----------------------
-
- From--Rogue Agent :::
-
- Shedding light on a 'darkside hacker'
-
- By Chris Nerney
-
- 05/06/96
-
- A magazine publisher says he has repeatedly invaded her
- computer system and tampered with her phones - a three-year campaign
- of harassment she estimates has cost her $1 million.
-
- A systems administrator for an Internet service provider (ISP)
- in Massachusetts alleges he knocked out an entire server and posted
- anti-Semitic messages through the service.
-
- Workers at the Boston Herald say he threatened to sabotage the
- newspaper's computer system after stories were printed about him.
-
- His name is u4ea. He calls himself a 'darkside hacker.'
-
- And no one knows his real identity.
-
- He may be anonymous, but u4ea is not unique. There are
- hundreds, maybe thousands, of hackers easily capable of breaking
- into systems while eluding detection.
-
- <snip>
-
- Copyright 1995 Network World, Inc.
-
- ------------------------------
-
- Date: Tue, 4 Jun 1996 20:14:08 GMT
- Subject: File 5--ACLU Cyber-Liberties Update: 6/5/96
- From: beeson@nyc.pipeline.com (Ann Beeson)
-
- ----------------------------------------------------------------
- June 5, 1996
- ACLU CYBER-LIBERTIES UPDATE
- An e-zine on cyber-liberties cases and controversies at the state and
- federal level.
- ----------------------------------------------------------------
- * Feds in Texas Execute Another Overbroad Computer Seizure in Search for
- Child Porn Peddlars on AOL
-
- The feds in Texas are at it again. In their zeal to find child porn
- peddlers on the Net, they seized the entire computer system of Paul
- Jones, a local computer expert in Allison, Texas. The basis for the
- warrant: the testimony of a former convicted sex offender, Jimmy
- Donaldson, arrested for the same offense, who told the feds that
- Jones had access to his e-mail password and was really the one who
- transmitted the porn.
-
- Rather than searching and seizing illicit files, the feds seized
- Jones' entire computer. The analogy is government seizure of an
- entire file cabinet full of perfectly legal documents in a search
- for one file of illegal pictures -- which is clearly an overbroad
- seizure under the Fourth Amendment.
-
- With their computer gone, Jones and his wife were immediately
- deprived of equipment needed for their livelihood. His wife works
- at home for the Yellow Pages, designing ads on the computer.
-
- The feds appear to have learned little from recent court rulings on
- the Fourth Amendment limits of warrants authorizing computer
- searches and seizures in cases involving online technology. In
- _Steve Jackson Games v. US_, 816 F. Supp. 432 (W.D. Texas 1993),
- aff'd, 36 F.3d 457 (5th Cir. 1994), the Fifth Circuit affirmed an
- award of damages under the Electronic Communications Privacy Act
- when agents seized an entire computer bulletin board system and
- other equipment in the search for evidence of a hacker conspiracy.
- Rather than seek "disclosure" of the content of certain
- communications relevant to the law enforcement inquiry, the Secret
- Service wrongly obtained "seizure of all information and the
- authority to review and read all electronic communications." Id.
- at 443.
-
- In _Religious Technology Center v. Netcom On-Line Communication
- Services, Inc._, 1995 U.S. Dist. LEXIS 16184 (Sept. 22, 1995), a
- federal judge in California ruled that the Church of Scientology had
- executed an overbroad seizure in a copyright infringement action.
- The application for the writ of seizure contained no specific
- criteria to narrow the seizure to the allegedly infringing material,
- thus giving the Church's computer experts the authority "to search
- through [the defendant's] possessions and computer files using their
- discretion in deciding what to seize." Id. at 92.
-
- So far, law enforcement have yet to reveal *any* evidence of illegal
- files on Jones' system, although they found several on Donaldson's
- computer. The agents have not yet returned the computer system or
- any of the files, and Jones faces a criminal trial this summer based
- on charges of trafficking in child porn.
-
- For general information about the ACLU, write to info@aclu.org.
-
- For more information about civil liberties, visit the ACLU Freedom
- Network at http://www.aclu.org, or the ACLU Constitutional Hall on
- America Online at keyword ACLU.
-
- ------------------------------
-
- Date: Sun, 9 Jun 1996 21:48:36 -0400 (EDT)
- From: "Declan B. McCullagh" <declan+@CMU.EDU>
- Subject: File 6--Re: British investigation into "cyber terrorists"
-
- Class III InfoWar Part 2 Report from Europe
-
- FEEL FREE TO DISTRIBUTE WIDELY
-
-
- I am ostensibly on vacation with my wife and two children ages 11 &
- 5 :
-
- Here we are in Venice, Italy but I can't ignore what seems to be
- going on in England. American media does not appear to be following
- it. So here's what is happening.
-
- Headline of June 9, 1996 Sunday Times in London reads:
-
- "Secret Inquiry into Cyber Terror."
-
- This is a follow-up of last Sundays story about alleged extortion
- attacks against British financial institutions using Trojan Horses
- and /or HERF Guns.
-
- According to today's article, the British government is holding
- secret investigations into the "attacks" for more than two years
- involving the Dept. of Trade and Industry (DTI), government
- communications headquarters (GCHQ), the Brits NSA, The Defence
- Research Agency (DRA), and the Bank of England.
-
- On June 8, the DTI issued a public statement which included : "We
- are very interested in the allegations of extortion directed at City
- of London institutions which were brought to our attention in 1994.
- We responded then by involving many government organizations ... so
- far we have not been presented with any hard evidence from victims.
- We would urge those threatened to come forward."
-
- DTI Director of Technical Affairs, David Hendon wrote a letter in
- May 1995 saying they took the extortion issue "Extremely seriously."
- The Times' reporter's say they have seen some of the evidence that
- was submitted to DTI and GCHQ which includes a chart on 46 of the
- attacks. According to the article DRA Senior Director, Professor
- David Parks, his agency is " especially interested in the
- "weaponry" deployed by the cyber terrorists."
-
- The Tmes continued : "The agency (DRA) believes high intensity
- radio frequency "HIRF" guns may have been used to black out trading
- positions in City finance houses. The weapon disables a computer by
- firing elctromagnetic radiation at it and is a "Black Programme" at
- the Defence Ministry, one of the highest security classification
- levels."
-
- In Dec. Of 1995, the DRA and Parks approached a company who
- specializes in information warfare and asked them to "arrange a
- demonstration of a portable HIRF weapon in Germany."
-
- The article further states that details on the HIRF systems and
- their use in the City of London have been compiled by a British
- computer magazine and are being passed onto government officials.
-
- *****
-
- I have spoken to more than fifty media in the last week about this
- story: The comments range from "suspicious" of the British reports,
- "sounds psy -fi", "alarming", "scary" and the like. Even though I
- am on vacation (Ha!) I called a few of my expert friends for a
- sanity check and here is what we have to say.
-
- * The alleged software attacks mentioned in last weeks article are
- more likely the weapon than HERF/HIRF attacks that todays' article
- focuses on.
-
- * "Given the kind of systems they use and their connectivity, I can
- figure a hundred ways to do what the article say" one of my experts
- stated.
-
- * As for the HERF/HIRF we have worked out a number of models for a
- number for the attacks scenarios mentioned, but we have a targeting
- problem. A free-space (air) based attacked would create a wide
- dispersion pattern and likely have effected other organizations not
- just those specifically under attack.
-
- * A ground plane attack might cause the alleged results but requires
- more physical access to the facility.
-
- A few thoughts of the potential motivations:
-
- * Were the alleged attacks meant as a malicious Denial of Service
- (DNS) attack or as a profit scheme? * Were trading volumes and the
- stock prices of the alleged victims effected during the times in
- question?
- * Was internal profit taking an ulterior motive ?
- * I have to keep in mind if we give these stories credence, that
- over 50% of computer crimes involve insiders.
-
- According to my British friends, the Sunday Times is preparing even
- more on this story which will appear next Sunday - when I will be
- in London to get it back to you within minutes.
-
- So, the kids are fine. "Thanks for asking." My life is almost
- relaxed, and we are now headed into the Alps for a leisurely 8 hr
- drive and will spend the night at the Jungfrau. "Damn, it's
- raining. It will have to be beer and sauerkraut."
-
- In the meantime, contact betty@infowar.com at Interpact for
- comments and interviews.
-
- Back at your later!
-
- Winn Schwartau
-
- ------------------------------
-
- Date: Sun, 16 Jun 1996 12:58:38 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 7--Child Molester Database on the web
-
- Great World Internet Services has set up a "child molester" database
- where Internet users can add records about people who are child
- molesters. The ISP's philosophy is listed below. There is also a
- separate disclaimer that information will be purged after 120 years,
- and that Great World Internet Services does not verify any of the
- data. There is a procedure for those who wish to dispute being
- entered into a database.
-
- There are expansion plans, too : deadbeat dads, crooked cops,
- elected official crimes, known drug dealers, etc.
-
- The site can be found at http://www.greatworld.com/public
-
- > Too many times in our twisted society, criminals are treated as
- > victims and victims are treated as inhuman and ignored. When our
- > President, our (In)Justice System, and our legislative bodies fail to
- > provide us with proper protection, then we as citizens must unite in
- > order to protect ourselves. The time for passivity has ended and the
- > time for proactive intervention is upon us.
- >
- > Therefore, as a parent and a citizen, I have made available a database
- > where child molesters can be listed. The difference between this
- > database and the databases of certain states (such as California) are
- > that this database is totally free. (There is no ridiculous $10 fee.)
- > Also, anyone can look up information. In California, the state feels
- > that persons need to be able to prove a need for the information
- > before the information may be released. By golly, I believe that the
- > welfare of our children is right enough to know who these victimizers
- > are and that this information should be made available to everyone in
- > order to protect our families from joining the growing roster of
- > victims.
- >
- > Also, this database doesn't require that those listed first be
- > convicted. If you are a victim and have been abused, then it doesn't
- > require a court of law to validate what you already know. The same
- > applies if you are a parent or a close relative and you have first
- > hand knowledge that someone committed the crime. The idea behind this
- > database is to make people aware of the criminals so that we can
- > protect our families before it is too late.
- >
- > Most states do not list cases involving incest or victimization by a
- > relative or sibling. Feel free to list the victimizers here. If they
- > did it once, they are likely to do it again. Once a victimizer's own
- > children have grown up, they often turn to the children of others.
- >
- > There are advocates of these vicious heartless tyrant criminals who
- > say that once a person who has served their time, they should be left
- > alone. Buddy, I have one thing to say to you. Don't let the proverbial
- > door slap you in the tail on your way off this page.
- >
- > When a criminal victimizes a child, the child is emotionally scarred
- > for life. Nightmares often last throughout the person's entire
- > lfetime. Many times the person is unable to function effectively in a
- > relationship. No one is unable to ever take away what has been done. I
- > personally believe that their should only be one sentence for child
- > molestation--death. In my opinion, no child molester has EVER served
- > his time as long as he still lives.
- >
- > This database will help to remind the people in communities throughout
- > America that certain people are dangerous and should be watched.
- >
- > ----------------------------------------------------------------------
- >
- > Message for Child Molesters: Before you molest your next victim, think
- > twice. Perhaps your name will be plastered here for all of the world
- > to see. Your mother, your father, your brothers and sisters, friends,
- > the world--will know what kind of a living monster you really are.
- > [Internet Link Exchange]
- >
- > Member of the Internet Link Exchange
- >
- > This site designed, managed, and hosted by Great World Internet
- > Services
-
- ------------------------------
-
- Date: Thu, 20 Jun 1996 08:29:12 -0400 (EDT)
- From: "Declan B. McCullagh" <declan+@CMU.EDU>
- Subject: File 8--Reno calls for new Federal agency to oversee crypto
-
- Deputy Atty General Jamie Gorelick earlier this year called for controls
- and a new "Manhattan Project" to deal with the Net:
- http://fight-censorship.dementia.org/dl?num=2733
-
- Now her boss -- Gorelick is second-in-command at Justice -- is going
- even further.
-
- -Declan
-
- ---
-
- From--tmpeters@calvanet.calvacom.fr (TM Peters)
-
- Compuserve Online Today Daily Edition, 15 June 1996:
-
- Attorney General Janet Reno is advancing a plan to establish a new agency
- overseeing all digital encryption, saying that would make it tougher for
- criminals and terrorists to use the Internet to carry out crimes.
-
- Speaking to the Commonwealth Club of California in San Francisco, Reno said
- her plan would require people to register with the new agency the secret
- codes -- or "keys" -- they use to encrypt messages online.
-
- Reporting on this speech, Sandra Ann Harris of United Press International
- adds, "Federal authorities could then obtain the information they need to
- decipher the encryptions using a court order and secretly monitor electronic
- communication on the Internet the same way wiretaps are used to monitor
- telephone conversations of suspected criminals."
-
- Reno added, "We look only to make existing law apply to new technology,"
- adding new computer programs designed to crack the new complicated
- encryptions take too long to be useful to law enforcement. "Some of our
- most important prosecutions have depended on wire taps."
-
- She also said registration of keys might end up being a worldwide
- requirement, since the Internet is used increasingly for international
- communication, commerce, and criminal enterprise.
-
- Reno told the group that effectively regulting electronic encryption will
- depend on fiding a blance between protecting privacy interests while
- stopping criminals from cashing in on the new technology.
-
- "If we do our job right citizens will enjoy the Information Age without
- being victimized" by high technology, Reno said.
-
- United Press International
- Charles Bowen
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 9--Cu Digest Header Info (unchanged since 7 Apr, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #8.48
- ************************************
-
-
-