home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Tue Dec 10, 1996 Volume 8 : Issue 87
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.86 (Tue, Dec 10, 1996)
-
- File 1--Is Connection to the Net an Inalienable Right?
- File 2--The strange case of Eric Jenott & "Mr. Liu" (continued)
- File 3--CDA Appeal on Supreme Court Docket
- File 4--OPPOSITION: FRC on Supreme Court News (CDA)
- File 5--Mike Godwin replies to CIEC bulletin on CDA
- File 6--New House Rules Means More Info
- File 7--BoS: Serious BIND resolver problem (fwd)
- File 8--Cu Digest Header Info (unchanged since 10 Dec, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Sun, 8 Dec 1996 21:53:43 -0600
- From: Richard Thieme <rthieme@thiemeworks.com>
- Subject: File 1--Is Connection to the Net an Inalienable Right?
-
- In his award-winning science fiction novel, "The Stars My
- Destination," Alfred Bester conceived of a world in which
- "jaunting," or short-distance teleportation, was the norm. In
- order to jaunt, you had to know exactly where you were, so
- criminals were kept in a maze-like cave in darkness, denied
- access to the sense data that would allow them to visualize their
- location. This intentionally cruel and unusual punishment had
- nothing to do with the crimes for which prisoners were sentenced.
- Participation in the Internet and other computer networks is
- our version of jaunting. That's how twenty-first century
- humankind transcends time and space. Denying a criminal access to
- computer networks is like breaking his fingers for writing a
- hold-up note and forbidding him to use a pen. When the crime has
- had nothing to do with computers or networks in the first place,
- it's like putting him into a sensory-deprivation tank simply to
- punish him.
- Enter Chris Lamprecht, alias "Minor Threat," a sometime hacker
- and formerly a programmer, installer, and trouble-shooter for Optical
- Document Technology in Austin, Texas. Lamprecht is now serving seventy
- months in a Texas prison for money laundering, although the
- activities connected to his sentencing included burglary and the
- theft and sale of hundreds of thousands of dollars worth of
- electronic switching systems and other telephone company
- equipment. His crimes had nothing to do with hacking, but if the
- criminal justice system has its way, he will not be able to use a
- computer connected to a modem or connect to a network when he
- gets out.
- The case illustrates not only the great gulf fixed between
- those who use the Net and those who don't, but also how the image
- of hackers as "evil geniuses" can distort the perception and
- judgement of those who play into the image as well as those who
- fear and misunderstand it.
-
- From the government side, it seems Lamprecht's computer
- activities were linked to his criminal activities through a
- bizarre chain of reasoning. Lamprecht once made calls to change
- the outgoing telephone message on someone's answering machine. He
- acknowledged that and stopped doing it. The police investigation
- determined, however, that Lamprecht was "computer literate" and
- he and his cohorts were "known hackers and had the capability to
- enter into a computer program and review, extract, and change
- information." Lamprecht and his pals, particularly Jason Copson,
- had penetrated several private and government computer systems,
- although "it is unknown if these illegal entries have resulted in
- monetary gain." (Lamprecht says he never made a dime from his
- hacking; like most hackers, he explored computer systems for the
- pleasure of the quest and to learn).
- One of Lamprecht's errors was speaking openly with Copson
- during a telephone call Copson made from prison. Both men knew
- the calls were monitored, but discussed nevertheless their desire
- to "ruin" an Austin cop, Paul Brick. They discussed obtaining his
- social security number. To prevent them from entering computer
- systems in search of that social security number, the following
- stipulation was made:
-
- "Upon release from imprisonment ... for a term of three
- years, the defendant cannot be employed where he is the
- installer, programmer, or trouble shooter for computer equipment;
- may not purchase, possess or receive a personal computer which
- uses a modem; and may not utilize the Internet or other computer
- networks."
-
- When he heard these conditions, Lamprecht broke down in the
- courtroom and cried. They had hit him where it hurt. They
- deprived him of the only way he knew how to make a living and
- banished him for three additional years to the wasteland of the
- caves.
- Did the judge, the Honorable Sam Sparks, really understand
- what he was doing? Did he really intend that Lamprecht should not
- attend schools that assign email addresses and in some cases
- insist email be used to submit papers? Did he really intend that
- he never use a public library online catalog?
- Doesn't Sparks know that anyone with a few dollars can buy a
- social security number in the data marketplace? Besides, good
- hackers are equally adept at "social engineering." If Lamprecht
- talks someone out of their social security number, should we cut
- out his tongue?
- In short, does the judge have a clue as to how life is lived
- these days?
- Lamprecht's former boss, Selwyn Polit of ODT, laughed when
- asked about the case. "They're dead scared of him because of the
- computer stuff," he said. "They treat him differently because
- they think if he just thinks about computers, he can do magical
- things."
- Unfortunately, Lamprecht's statements feed these
- projections. He plays enthusiastically to the "evil hacker genius" image.
- Lamprecht says his sentence is longer than that of any other
- hacker, for example. But if his crime has nothing to do with
- that, why identify himself that way? Why feed the distortion?
- Lamprecht often sounds as if he claims sole repsonsibility
- for creating ToneLoc, a widely used program that scans for carriers
- and selected dial tones; it's particularly useful for hacking PBX codes.
- Simple wardialers existed before ToneLoc, but ToneLoc added some significant
- features -- it did random scanning and displayed the scans graphically, for
- example. Yet Lamprecht states in his biogrpahy in Phrack that he had lost
- the source code and Mucho Maass brought the program back from the dead and
- made it "user
- friendly." The need to seem to be what his captors thought he was has
- contributed
- to the unnecessary harshness of his punishment.
- Lamprecht is learning painfully that you can be punished for
- how you're perceived as much as what you've done. Some of his
- colleagues describe him as an innocent despite his criminal
- activity, naive about the real world. His employer as well as his
- friends call him loyal, reliable, capable. His employer felt his
- need to be more than capable might have led him to exaggerate his
- computer skills.
- Polit said "he took pride in his work and wrote clean tight
- code, but nothing spectacular. He's sharp, but not
- extraordinary."
- Would ODT hire him back? Absolutely. But they may not have
- that opportunity.
- Lamprecht feels it's a question of free speech and first
- amendment rights, but he "will probably have an uphill battle
- because of the wide discretion given judges in creating
- conditions of probation," says Tim Muth, partner at Reinhart,
- Boerner, Van Deuren, Norris, and Rieselbach, a Milwaukee,
- Wisconsin, law firm. Muth built the firm's celebrated web site
- and has a passion for the legal issues emerging in the virtual
- world. "On the other hand, with the growing importance of
- computers and network communications for making a living, a court
- might say that a greater justification should be required for
- this kind of restriction. Unfortunately for Lamprecht, our courts
- have not yet recognized such a principle in the constitution or
- elsewhere."
- Lamprecht hopes to find lawyers willing to work pro bono to
- establish that principle. And who can blame him? Isolated from
- the network, deprived of his livelihood, the prospect of
- wandering the maze in the cave is a lonely one. You don't have to
- be the anti-hero of Neuromancer to know how it feels to be kept
- off the Net. Just as we don't speak a language, but our language
- speaks us, once we have been connected, we can never forget that
- the Net is our hive mind. We don't dream up the Net, the Net
- dreams us.
- Now more than ever, you just can't be a human being alone.
-
- Richard Thieme
-
- ------------------------------
-
- Date: Mon, 9 Dec 1996 15:44:21 -0600 (CST)
- From: Crypt Newsletter <crypt@sun.soci.niu.edu>
- Subject: File 2--The strange case of Eric Jenott & "Mr. Liu" (continued)
-
- According to the Fayetteville Observer, Eric Jenott's court martial
- on espionage charges at Fort Bragg, NC, was set to roll today, Monday,
- Dec. 9, 1996. If convicted, the potential sentence -- life in prison --
- is dire.
-
- The Army, according to the Observer, will try to show Jenott was trying
- to "gain favor" with the Chinese government by giving passwords on an
- Army system to a Chinese agent, known as "Mr. Liu." According to the
- paper, Jenott's family insist that he gave only an unclassified
- "Internet code" to Liu.
-
- Jenott's defense team wants "Mr. Liu," also identified as Qihang
- Liu, declared an essential witness. If this is granted by the court
- and Liu cannot be produced, the prosecution could collapse. Liu
- was a Chinese national who worked for a short time at Oak Ridge National
- Laboratory on a computer database and management system. He is no
- longer in America.
-
- According to the Observer, Liu was interrogated by the FBI before
- leaving the country.
-
- During this investigation, Liu apparently "told federal agents that
- Jenott did not give him a classified computer password. Later, he said
- Jenott might have given him the password, then
- finally said he probably received [a] password from Jenott."
-
- Further, "Liu told investigators that Jenott gave him at least two other
- computer passwords, including one that let him enter [a] University of
- Washington computer system."
-
- John Jenott, the Ft. Bragg soldier's father, has provided a partial
- transcript of a conversation conducted in which his son says the passwords
- weren't secret. The passwords, said Jenott, were published in training
- books given by GTE to soldiers for home study.
-
- The Observer's report on the case contains further confusing mumble
- about unspecified secret information on an Army system being passed by
- Jenott to yet another individual.
-
- The text of it can be found at http://www.foto.com .
-
- George Smith
- Crypt Newsletter
- http://www.soci.niu.edu/~crypt
-
- ------------------------------
-
- Date: Tue, 10 Dec 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 3--CDA Appeal on Supreme Court Docket
-
- Supreme Court to decide on Internet indecency law
-
- By Richard Carelli
- Associated Press Writer
-
- WASHINGTON (AP) - Charting its first venture into cyberspace law,
- the Supreme Court Friday agreed to decide whether Congress
- violated free-speech rights by restricting indecency on the
- Internet.
-
- The justices said they will study the Communications Decency Act,
- Congress' first crack at regulating the freewheeling global
- computer network.
-
- A three-judge federal court in Philadelphia blocked the law from
- taking effect earlier this year, ruling that it wrongly would
- chill adults' right of access to sexual material that may be
- inappropriate for children.
-
- A decision from the nation's highest court is expected by July.
-
- <snip>
-
- ------------------------------
-
- Date: Fri, 6 Dec 1996 16:21:07 -0700
- From: --Todd Lappin-- <telstar@wired.com>
- Subject: File 4--OPPOSITION: FRC on Supreme Court News (CDA)
-
- Source - fight-censorship@vorlon.mit.edu
-
- We're not the only ones who are excited about the pending Supreme Court
- case on the constitutionality of the Communications Decency Act.
-
- Turns out, the CDA's proponents are also looking forward to having their
- day in court.
-
- The following press release from the Family Research Council gives their
- side of the story, complete with Cathy Cleaver's usual rantings about the
- dangers of online smut.
-
- Remember... despite what the FRC says, "indecency" is NOT a synonym for
- pornography.
-
- Work the Network!
-
- --Todd Lappin-->
- Section Editor
- WIRED Magazine
-
- ---------------------------------
-
-
- FOR IMMEDIATE RELEASE: Dec. 6, 1996
- CONTACT: Kristi S. Hamrick, (202) 393-2100
- For Radio, Kristin Hansen
-
- SUPREME COURT TO REVIEW COMPUTER PORN RULING
-
- WASHINGTON, D.C. -- The Supreme Court announced Friday that it
- will review the Reno v. ACLU decision to enjoin the
- Communications Decency Act made earlier this year by a
- three-judge panel in Philadelphia.
-
- Family Research Council Director of Legal Studies Cathy Cleaver
- said that the Department of Justice's appeal of the
- Philadelphia ruling is the right thing to do, and that now the
- Supreme Court has the opportunity to "reverse the radical
- ruling which gave Bob Guccione the right to give his Penthouse
- magazine to our children on the Internet."
-
- Cleaver continued, "Laws against selling porn magazines to kids
- are not unconstitutional. Why should we have to tolerate the
- same degrading images of women being given to those same kids
- on-line?"
-
- Family Research Council presented a "friend of the court" brief
- with the Philadelphia judges in ACLU v. Reno defending the
- cyberporn provisions of the Communications Decency Act.
- Cleaver said the Philadelphia decision contradicts previous
- Supreme Court decisions on the distribution of indecent
- material through the media.
-
- The Communications Decency Act:
-
- * Prohibits adults from using a computer to send indecent
- pornography directly to a known child
-
- * Prohibits adults from knowingly displaying indecent
- pornography to children
-
- * Defines "indecent material" as material, which in context,
- depicts or describes sexual or excretory activities or organs
- in a patently offensive manner
-
- * Imposes fines, prison sentences (up to 2 years), or both on
- violators
-
- * Exempts those who merely provide access to a network or
- system over which they have no control
-
- * Provides limited defenses for employers and those who make a
- reasonable and effective effort to restrict children's access
- to pornography
-
- * Expands telephone harassment prohibitions to include
- harassment by computer
-
- Arguments will likely be heard in early spring. Family
- Research Council and other pro-family and anti-pornography
- groups will be filing briefs in support of the Justice
- Department's defense of the law.
-
- FOR MORE INFORMATION OR INTERVIEWS, CALL THE FRC MEDIA OFFICE.
-
- ###
-
- +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
- This transmission was brought to you by....
-
- THE CDA DISASTER NETWORK
-
- The CDA Disaster Network is a moderated distribution list providing
- up-to-the-minute bulletins and background on efforts to overturn the
- Communications Decency Act. To subscribe, send email to
- <majordomo@wired.com> with "subscribe cda-bulletin" in the message body. To
- unsubscribe, send email to <info-rama@wired.com> with "unsubscribe
- cda-bulletin" in the message body.
-
- WARNING: This is not a test! WARNING: This is not a drill!
-
- ------------------------------
-
- Date: Fri, 6 Dec 1996 23:17:18 -0800 (PST)
- From: Declan McCullagh <declan@well.com>
- Subject: File 5--Mike Godwin replies to CIEC bulletin on CDA
-
- Source - fight-censorship@vorlon.mit.edu
- [Forwarded with permission. --Declan]
-
- ---------- Forwarded message ----------
- Date--Thu, 5 Dec 1996 19:59:54 -0800
- From--Mike Godwin <mnemonic@well.com>
- Subject--Re--CIEC Bulletin No. 16 - SC Agrees to Hear CDA Appeal
-
-
- Dear Jonah,
-
- It seems to me that this release obscures rather than clarifies what the
- significance of today's announcement was. Despite some fallacious news
- reports, the announcement today was not about whether the Supreme Court has
- chosen to review the lower court's decision in ACLU v. Reno -- the Court
- has *no choice* as to whether it will review that decision, so long as the
- government's appeal is not a frivolous one.
-
- According to Article III of the U.S. Constitution, the Supreme Court can be
- compelled by Congress to hear certain kinds of appeals, even though
- normally Congress lets the Court set its own docket. Pursuant to Article
- III, the CDA, like the Voting Rights Act and certain other legislative
- measures, grants the government an "appeal as of right" whenever a
- provision of the act is found unconstitutional by a lower court . This is
- very different from the normal petition-for-certiorari process by which
- cases normally come before the Court.
-
- Journalists have been reporting the story today as if there had been some
- doubt before now that the Supremes would review the case -- as to this
- matter, that question was answered the instant the government filed its
- appeal. What is significant about today's news is that the Supreme Court
- has expressed 1) an interest in hearing oral arguments as well as 2) an
- interest in speaking *directly* to the issues raised by the case (as
- distinct from deciding the case summarily).
-
- Yes, I know the CIEC announcement says the Supreme Court has "agreed to
- hear" the case -- technically a true statement -- but a press release that
- is technically correct yet does not clarify the legal issues does no one
- any service. As lawyers and public-interest advocates, we are perpetually
- obligated to explain the issues to our clients and consituents, and to
- anticipate and resolve confusions before they happen. What we've done here
- instead is hand the radical right an opportunity to say or imply that this
- news signals the Court's intention to overturn the case, when in fact what
- it signals is the Court's deep interest in the case's issues.
-
- Let's do better than the other side and aim for 100-percent clarity and
- understanding evey time we tell people about our work.
-
-
- --Mike
-
-
-
-
- -- At 12:48 PM -0800 12/6/96, Jonah Seiger wrote:
-
- >-----------------------------------------------------------------
- > _______ _ _ ____ _ _ _ _
- > |__ __| (_) | | | _ \ | | | | | (_)
- > | |_ __ _ __ _| | | |_) |_ _| | | ___| |_ _ _ __
- > | | '__| |/ _` | | | _ <| | | | | |/ _ \ __| | '_ \
- > | | | | | (_| | | | |_) | |_| | | | __/ |_| | | | |
- > |_|_| |_|\__,_|_| |____/ \__,_|_|_|\___|\__|_|_| |_|
- >
- > Citizens Internet Empowerment Coalition Update No. 16
- > December 6, 1996
- > -----------------------------------------------------------------
- > http://www.cdt.org/ciec/
- > ciec-info@cdt.org
- > -----------------------------------------------------------------
- > CIEC UPDATES are intended for members of the Citizens Internet
- > Empowerment Coalition. CIEC Updates are written and edited by the
- > Center for Democracy and Technology (http://www.cdt.org). This
- > document may be reposted as long as it remains in its entirety.
- > ------------------------------------------------------------------
- >
- > ** 55,000 Netizens Vs. U.S. Department of Justice. **
- > * The Fight To Save Free Speech Online *
- >
- > Contents:
- >
- > o Supreme Court Agrees to Hear CDA Challenge
- > o What You Can Do - Join the CIEC!
- > o How to Remove Yourself From This List
- > o More Information on CIEC and the Center for Democracy and Technology
- >
- > ----------------------------------------------------------------------
- >
- >SUPREME COURT AGREES TO HEAR LANDMARK CASE TO DETERMINE FUTURE OF FREE
- >SPEECH IN CYBERSAPCE
- >
- >The United States Supreme Court today agreed to hear the government's
- >appeal of a landmark legal challenge to the Communications Decency Act.
- >The case, which will determine the future of freedom of speech in
- >cyberspace, is expected to be heard in March or April. A special panel
- >of
- >federal judges in Philadelphia ruled the CDA unconstitutional in June.
- >
- >The Citizens Internet Empowerment Coalition (CIEC), which brought a
- >successful challenge to the CDA earlier this year, applauded the courts
- >decision to hear the case.
- >
- >"This case will determine the future of free expression in the
- >information
- >age, and is the most important first amendment case before the court in
- >recent memory." said Jerry Berman, Executive Director of the Center for
- >Democracy and Technology (CDT) and one of the organizers of the CIEC.
- >"The lower court ruled unequivocally, based on a solid factual record,
- >that
- >the CDA was unconstitutional," Berman added, "and we believe the Supreme
- >Court will agree with them upon review."
- >
- >The CIEC is a broad coalition of groups concerned about the future of
- >the
- >Internet, including on-line service and Internet service providers,
- >libraries, book, magazine, newspaper and music publishers, software
- >companies, public interest organizations, and more than 55,000
- >individual
- >Internet users. The lead plaintiff in the case is the American Library
- >Association.
- >
- >The Philadelphia court ruled the CDA unconstitutional in June, agreeing
- >with the Citizens Internet Empowerment Coalition's arguments that:
- >
- >* The Internet is a unique communications medium that deserves free
- > speech protection at least as broad as that enjoyed by print medium.
- >
- >* Individual users and parents -- not the government -- should decide
- >what
- > material is appropriate for their children, and;
- >
- >* Simple, inexpensive user empowerment technology is a very effective
- >and
- > constitutional way of limiting the access of minors to inappropriate
- > material on the Internet.
- >
- >The CIEC challenge, also known as ALA v DOJ, was consolidated with a
- >separate lawsuit brought by the American Civil Liberties Union and 20
- >other
- >plaintiffs, ACLU v. Reno. The cases were argued together before the
- >three-judge federal panel in Philadelphia last spring, and the legal
- >teams
- >continue to work together as co-plaintiffs in the Supreme Court phase.
- >
- >The Communications Decency Act (CDA), passed by Congress in February
- >1996
- >for the first time imposed far reaching broadcast-style content
- >regulations
- >on the Internet.
- >
- >The full text of the Philadelphia ruling and other information on the
- >case
- >can be found on the Citizens Internet Empowerment Coalition Web Page
- >(http://www.cdt.org/ciec/). Please also visit the CIEC web page for the
- >latest news and information about the case.
- >
- >The 27 plaintiffs in the case include: American Library Association,
- >Inc.;
- >America Online, Inc.; American Booksellers Association, Inc.; American
- >Booksellers Foundation for Free Expression; American Society of
- >Newspaper
- >Editors; Apple Computer, Inc.; Association of American Publishers, Inc.;
- >Association of Publishers, Editors and Writers; Citizens Internet
- >Empowerment Coalition; Commercial Internet eXchange; CompuServe
- >Incorporated.; Families Against Internet Censorship; Freedom to Read
- >Foundation, Inc.; Health Sciences Libraries Consortium; HotWired
- >Ventures
- >LLC; Interactive Digital Software Association; Interactive Services
- >Association; Magazine Publishers of America, Inc.; Microsoft
- >Corporation;
- >Microsoft Network; National Press Photographers Association; NETCOM
- >On-Line
- >Communication Services, Inc.; Newspaper Association of America; Opnet,
- >Inc.; Prodigy Services Company; Wired Ventures, Ltd.; and, the Society
- >of
- >Professional Journalists Ltd.
-
- ------------------------------
-
- Date: Mon, 2 Dec 1996 18:21:33 -0800 (PST)
- From: "Brock N. Meeks" <brock@well.com>
- Subject: File 6--New House Rules Means More Info
-
- Source - fight-censorship@vorlon.mit.edu
-
- ((MODERATORS' NOTE: Brock Meeks, fearless Net-reporter and
- founder of CyberWire Dispatch, has moved on and up to MSNBC,
- where his articles can be found at:
- http://www.msnbc.com - His fans can find him there, and, of
- course, on the Well))
-
- House Rules Change Compels More Online Info
- by Brock N. Meeks
- Chief Washington Correspondent
- MSNBC
-
- Washington -- A new House rule for the 105th Congress compels committee
- chairmen to make published documents available via the Internet, MSNBC
- has learned.
-
- The rule requiring published documents to be put online is ambiguous and
- doesn't provide any details as to how the rule will be carried out.
- Indeed, the entire text of the rule, which hasn't been made public, is
- merely a single sentence: "Each committee shall, to the maximum extent
- feasible, make its publications available in electronic form."
-
- The House GOP leadership drafted the new rule as part of a package of
- rules changes during a closed door session last week. The new rules
- won't go into effect until voted on by the entire House when the 105th
- convenes January 7th. Before that action takes place, however, the
- rules must first be approved by the House Republican Conference
- Committee. That move will take place "shortly before the full House
- convenes," said a House Rules Committee staffer.
-
- The House Rules staffer confirmed that the intent of the rule is to have
- information available via the Internet. "We all share the goal of
- getting as much information out as quick as possible," he said. However,
- "there are some logistical problems if we tie this [rule] too tightly."
-
- One such problem is that of publishing committee meeting and hearing
- transcripts. Although committees usually get these transcripts back
- within 48 hours, "they are usually filled with errors," the staffer
- said. Such errors can be a quote attributed to the wrong member by the
- transcriber, he said. Transcripts are currently circulated to House
- members for the purposes of editing and error correction. However, that
- process often delays, sometimes by weeks during heavy legislative
- calenders, how quickly transcripts are put online.
-
- Other committee documents, such as the full text of bills are "much
- easier" to put online, the staffer said, "but things such as transcripts
- are a much stickier wicket."
-
- There also is some question as to what the word "publication" actually
- means. It's not clear, for example, that transcripts are publications,
- nor is it clear that so-called "discussion drafts" -- or working
- documents -- are publications the staffer said.
-
- The whole rule "turns on this one word, 'publication,'" says Gary
- Ruskin, director of the Congressional Accountability Project, a Ralph
- Nader congressional watchdog organization. "Some folks are saying that
- the word 'publication' might be restrictive or tautological," Ruskin
- said, "I'm still trying to figure it out."
-
- In general, Ruskin said the rule "looks like a good step forward." His
- organization pushed hard during the last Congress trying to get Speaker
- Newt Gingrich (R-Ga.) to make good on his 1994 promise that all
- congressional documents, without exception, would be made available via
- the Internet through the Thomas system <http://thomas.loc.gov>. Gingrich
- bailed on that promise and Thomas, though it now contains many more
- documents from when it was first launched, is still far from being the
- comprehensive service Gingrich promised.
-
- Although the phrase "to the maximum extent feasible" appears to give
- committee chairman a lot of latitude as to how quickly documents go
- online, Ruskin said he's encouraged by the wording. He said the
- "intent" of that statement puts the presumption on a committee that if a
- document is printed, "there should be no technical reason why it can't
- go online quickly." With this rule in place, "there will have to be an
- awfully good reason why [committees] fail to put such documents online,"
- Ruskin said.
-
- Although there are no penalities attached to such a rule, Ruskin said
- "if worse comes to worse" there can be a "an ethics complaint filed
- against the committee chairman if a reasonably case can be made that
- they aren't making documents available in a feasible time frame."
-
- Just how this new rule will effect the future of a bill introduced by
- Rep. Rick White (R-Wash.) late in the 104th, which mandated that a broad
- range of congressional documents be put online, isn't known. White's
- bill (H.Res. 478) never made it out of committee. White's office didn't
- return our calls for comment.
-
- Traditionally, committee chairman have used their power to distribute
- important committee documents as means of controlling the committee's
- agenda. For example, after a bill has been passed by the full
- committee, the chairman, behind closed doors and without the approval of
- the full committee, can amend the bill, sometimes altering it
- dramatically. This results in a "manager's amendment," a document that,
- though published, is not widely distributed beyond the chairman's
- political allies and assorted well-heeled lobbyists.
-
- No where was such micro-managing of a bill more apparent than during the
- legislative wrangling over the telecommunications reform act last year.
- The House version of the telecom reform bill was radically amended by
- Commerce Chairman Thomas Bliley (R-Va.) and few people, least of all the
- public, were allowed to see those changes before they came to the floor
- for a vote. Under the new proposed rule it, Bliley would not have been
- able to withhold that document from going online well before the floor
- vote was taken. To do so with the new rule in place would risk
- triggering an ethics complaint from a group such as Ruskin's
- Congressional Accountability Project.
-
- The new rule, however, doesn't mandate that the Speaker's office put any
- information online. Despite all the bluster from Gingrich about the
- benefits of a more informed public, he has yet to make the Speaker's
- office accessible via the Internet.
-
- --end--
-
-
- ------------------------------
-
- Date: Wed, 20 Nov 1996 08:16:38 -0500 (EST)
- From: Noah <noah@enabled.com>
- Subject: File 7--BoS: Serious BIND resolver problem (fwd)
-
- From -Noah
-
- ---------- Forwarded message ----------
- Date--Mon, 18 Nov 1996 22:53:16 -0700 (MST)
- From--Oliver Friedrichs <oliver@secnet.com>
- To--firewalls@greatcircle.com
- Subject--BoS--Serious BIND resolver problem
-
-
- ###### ## ## ######
- ## ### ## ##
- ###### ## # ## ##
- ## ## ### ##
- ###### . ## ## . ###### .
-
- Secure Networks Inc.
-
- Security Advisory
- November 18, 1996
-
- Vulnerability in Unchecked DNS Data.
-
- In research for our upcoming network auditing tool, we have uncovered a
- serious problem present in implementations of BIND which trust invalid data
- sent to them. This vulnerability specifically applies to hostname to address
- resolution and can result in local and remote users obtaining root privileges.
-
- It is recommended that security conscious users upgrade to the latest version
- of the BIND resolver immediately. Information on obtaining the latest
- official release is provided at the end of this message.
-
- Technical Details
- ~~~~~~~~~~~~~~~~~
-
- When a standard hostname lookup is performed on internet connected U..
-
-