home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Jan 12, 1997 Volume 9 : Issue 03
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.03 (Sun, Jan 12, 1997)
-
- File 1--AOL hax0rs beware (fwd)
- File 2--AOL: The Happy Hacker (fwd)
- File 3--Morality of Undoing Blocking Software
- File 4--Run for the hills! Virulent Shergold meme escapes cyberspace!
- File 5--Crypt News forces correction in FBI newsletter
- File 6--7th Computers, Freedom & Privacy Conf - Mar.11-14
- File 7--Foreign spies snoop the Net, from The Netly News
- File 8--Soliciting a Child via Computer now a Crime in Illinois
- File 9--Re: Cu Digest, #8.93 (xchaotic Xmas e-bombings)
- File 10--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Wed, 8 Jan 1997 19:18:36 -0500 (EST)
- From: "noah@enabled.com" <noah@enabled.com>
- Subject: File 1--AOL hax0rs beware (fwd)
-
- From -Noah
-
- ---------- Forwarded message ----------
- Date--Wed, 8 Jan 1997 18:16:18 -0600 (CST)
- From--"Brett L. Hawn" <blh@nol.net>
-
- [-] Brett L. Hawn (blh @ nol dot net) [-]
- [-] Networks On-Line - Houston, Texas [-]
- [-] 713-467-7100 [-]
-
- ---------- Forwarded message ----------
-
- Hacker admits to AOL piracy
- By Jeff Pelline
- January 8, 1997, 1 p.m. PT
-
- A college student today pleaded guilty to illegally creating a
- program that allowed him to access America Online for free.
-
- Known online as Happy Hardcore, 20-year-old Nicholas Ryan of Yale
- University entered his plea in federal district court in
- Alexandria, Virginia. The felony offense carries a fine of up to
- $250,000 and five years in prison. Sentencing is set for March.
-
- Ryan used his illegal software, dubbed "AOL4Free" between June
- and December 1995. He also made it available to others. The
- investigation was carried out by the Secret Service and Justice
- Department's computer crime section.
-
- AOL called the case a "legal milestone," representing the first
- successful computer fraud prosecution involving an online
- network.
-
- "We hope this conviction sends a message to our members that AOL
- is dedicated to stopping hackers and their activities on the
- service and creating a safe online experience," said Tatiana Gau,
- the newly named vice president for Integrity Assurance at AOL.
-
- ------------------------------
-
- Date: Fri, 10 Jan 1997 22:03:29 -0700 (MST)
- From: Gordon J Lyon <gordonl@GAS.UUG.Arizona.EDU>
- Subject: File 2--AOL: The Happy Hacker (fwd)
-
- ---------- Forwarded message ----------
- Date--Thu, 09 Jan 1997 01:32:39 -0800 (PST)
- From--David Cassel <destiny@crl.com>
-
- T h e H a p p y H a c k e r
-
- +~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~
-
- In 1995 a hacker named Happy Hardcore wrote a program that granted
- unlimited free access to AOL. Yesterday AOL issued a press release
- applauding his conviction in a court in Virginia.
- (http://www.prnewswire.com/pdata/19970108-DCW022.html)
-
- According to press accounts, Nicholas Ryan -- who studies computer science
- at Yale university -- was found guilty of a felony offense under the
- Computer Fraud and Abuse Act: he illegally accessed AOL "and violated
- AOL's terms of service".
-
- But AOL's press release doesn't tell the whole story. The Washington Post
- reported that in fact, AOL dropped over 370,000 subscribers between March
- and June of 1996 "for credit card fraud, hacking, etc." [9/16/96] Up
- until September of 1995, AOL didn't even verify the authenticity of credit
- card information submitted for free-trial accounts. (And as of last year,
- they'd distributed over 100 million of them.) Monday AOL shut local phone
- access to the entire nation of Russia because it couldn't collect enough
- accurate information to cover their expenses.
-
- Ryan was targeted because he created a program used by other hackers--and
- because he publicly taunted AOL in the program's documentation. He
- included internal AOL e-mail (stolen by other hackers) discussing the
- company's plans to thwart his program. Ryan wasn't charged with creating
- the program, but for accessing the system illegally--a crime he shared
- with nearly half a million others.
-
- For six months of access, he faces a maximum of five years in prison and
- $250,000 in fines. Under AOL's new value plan, the stolen time would have
- a cash value of $60.
-
- AOL's public statements indicate they want to appear tough on hackers --
- especially now that they're seeking revenue from on-line transactions. A
- press release announcing the appointment of a vice president to AOL's
- optimistically-named "Integrity Assurance" division stressed her previous
- employment at the CIA--saying Tatiana Gau wants to "improve the world's
- most secure online environment". (The phrase "most secure" appeared
- three times.) Yesterday's announcement even asserted AOL had achieved "the
- first successful computer fraud prosecution involving an Internet online
- network." (One technology correspondent quipped, "Maybe it means that
- Kevin Mitnick is just a figment of Tsutomu Shimomoura's imagination.")
- AOL's announcement went so far as to claim that AOL is safer than the
- internet because AOL uses a private network.
-
- But safety still depends on how a network is administered. In 1995, a
- beta of AOL's telnet client put users directly behind their firewalls--and
- earlier that year, AOL's mail server was accessible via telnet, allowing
- forged mail from any AOL address. Hackers even took the stage during a
- 1995 celebrity appearance on AOL--then taunted the scheduled guest and the
- event sponsors. (http://www.aolsucks.org/security/recondite.html). "I am
- sure Corporate Communications will be getting some questions about it,"
- read an internal e-mail titled "Hacker Attack In the Rotunda Last Night".
- Ironically, that message later ended up on the AOL Security Page--"What
- AOL Does Not Tell You." http://www.netvirtual.com/blank/aol)
-
- The next month AOL's CEO Steve Case wrote a letter to all users about
- hacker problems, arguing that "it happens everywhere", and adding that
- "when we discover hackers", AOL "aggressively take measures to head them
- off". But within days of that announcement, hackers were posting internal
- mail that they'd stolen to the internet. They continued undaunted, posting
- internal memos, and even Case's home address. In probably the most
- embarrassing development, in-house mail ABOUT the hackers was being
- circulated BY The hackers (ftp://ftp.crl.com/users/de/destiny/aol/hacker1)
- At the time, AOL spokeswoman Pam McGraw told me, "We've encountered these
- problems in the past, and we make changes to the service as appropriate--
- and as we can".
-
- The hackers had reverse-engineered AOL's "Rainman" software, which had
- been mistakenly stored in AOL file libraries accessible by their hundreds
- of remote staffers. The company fumbled for an explanation--Pam McGraw
- told the press AOL believed the heist was effected with the Visual Basic
- macro program AOHell. (Some later attributed her remarks to a deliberate
- disinformation campaign--especially when, to suppress the program's
- distribution, AOL later told Boardwatch magazine AOHell contained built-in
- child pornography. ftp://ftp.boardwatch.com/aohell.txt)
-
- But AOL's attempts to cover-up security breaches left their members even
- more vulnerable. "I went to a bunch of new member chat rooms, used AOHell
- to fish for passwords, and got 25 of them," one Usenet poster gloated.
- "Doesn't AOL tell its users to not do that?" There were worse abuses.
- When AOL realized hackers could "sniff" passwords during TCP/IP
- connections, staffers say they were warned--but not the customers. "I
- hope that AOL alerts the General Membership to this problem in a timely
- manner," one staffer complained, "and not, as in the previous situation,
- wait until they are forced to by negative news coverage." Sources had
- told the Wall Street Journal that the 1995 security breach included
- hackers distributing customer credit card numbers in AOL hacker chat
- rooms, and AOL had warned staffers about the breach--but didn't tell their
- users (until the story broke in nationwide news reports.)
-
- The staffers complained AOL's hush-hush policy was aimed more at
- protecting their image than protecting their customers. In a memo warning
- staffers not to speak to the press, Steve Case countered that "We need
- everyone's support...to protect AOL's interest". That even applied AOL's
- content providers. Shortly before hackers took the stage at his live
- event, the producer of AOL's MacWorld area asked AOL about earlier
- problems. He told me AOL had attributed them to "some security holes that
- AOL promised were closed."
-
- It was when hackers took the stage that he found they were not.
-
- Even AOL's latest statements are suspect. The press release claims that
- AOL "immediately upgraded its security measures to prevent AOL4FREE or any
- similar software from working". But Nicholas Ryan told a different story.
- "AOL found a way to detect users of AOL4Free," began the program's
- documentation. "However, with only a few lines of additional code
- AOL4Free is again undetectable!"
-
- Tatiana Gau's claims that AOL has a "zero tolerance" policy for hackers is
- patently implausible. Macromedia's software piracy suit fingered 67
- screen names in 1995. And over 70 came into play for the "Hacker Riot"
- that November--a coordinated attack on the New Member Lounges
- (http://www.getnet.com/~onion/work/planetmag/current/features/aolside.html)
- lasting several hours and affecting hundreds of users. This August AOL's
- Chief Financial Officer even pointed to the fake accounts as a possible
- culprit for the high figures on their subscriber churn rate. And just six
- weeks ago hackers doctored text at AOL keyword: legal.
- (http://www.news.com/News/Item/0,4,5712,00.html). Even yesterday,
- aolsucks.org received the comment, "AOL SUX!!!!! Thats why I make fake
- accounts with them!!!"
-
- Ironically, the documentation for AOL4Free ends with the classic hacker
- manifesto "The Conscience of a Hacker." The 1986 document ends, "I am a
- criminal. My crime is that of curiosity..."
-
- And most technology pundits agree. AOL's MacWorld area was mailbombed for
- a week and a half, with dozens of junk posts to its bulletin boards. "We
- hate that," their producer told me. "Does that mean the FBI needs to be
- brought in? Probably not." Chris Flores of Microsoft's Developer
- Division agreed. "If a Visual Basic program can automate hitting this key
- and hitting that key, the blame should be on AOL for allowing a certain
- keystroke to be hit... They should think of AOHell as a blessing. Since
- they know about it, they know that they have a fault in their system."
- MacWorld's producer added, "You've got to admire the hacker ethic in a
- certain way, because it's how things get done...how holes get patched."
-
- Indeed, as a result of the hacker presence, AOL began accompanying all
- e-mail and instant messages with a warning in red letters--that AOL staff
- will never ask you for your password. One Florida resident with a degree
- in criminology pointed out on Usenet that this alone wouldn't be
- sufficient--because password-fishers were incorporating the warnings into
- their scams! ("Enter your password to confirm that you understand the
- warning below." "Enter your password now to turn on pass-block, which
- offers protection beyond the simple password warning given below.")
-
- Now AOL's 3.0 software requires users to download small software changes
- before they can access the system. Unfortunately, there's no way to opt
- out--which creates a major security hole waiting to backfire.
-
- In any case, the hacker presence belies AOL's claims of the "highest level
- of security". In fact, Wired News reported that "Gau is confident, but
- she knows she has her work cut out for her. She's already spotted a link
- on the Web announcing her arrival. It was titled 'Hackers are laughing.'".
-
-
- It was my page.
-
-
-
- THE LAST LAUGH
-
- Within days of its creations, AOL threatened the AOL Security page with
- charges of copyright infringement.
-
- Unfortunately, the tactic inspired three other sites to mirror the
- documents--which are still there to this day.
-
-
- David Cassel
- More Information - http://www.wco.com/~destiny/time.htm
-
-
- ~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~
- Please forward with subscription information and headers in-tact.
-
- To subscribe to this moderated list, send a message to MAJORDOMO@CLOUD9.NET
- containing the phrase SUBSCRIBE AOL-LIST in the message body. To unsubscribe
- send a message saying UNSUBSCRIBE AOL-LIST to MAJORDOMO@CLOUD9.NET
- ~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~
-
- ------------------------------
-
- Date: Sat, 11 Jan 1997 11:05:09 -0500
- From: "Glen L. Roberts" <glr@GLR.COM>
- Subject: File 3--Morality of Undoing Blocking Software
-
- ((MODERATORS' NOTE: Glen Roberts of Full Disclosure has taken some
- criticism for advocating and making available the means of
- circumventing homepage blockers. Here, he responds to one of his
- critics)).
-
- Critic: I have just visited your (glr's) site for the first time even
- though I have been a listener to your program for some time
- now. Normally I agree with everthing you put forth on your
- show but, I now have serious questions as to your moral
- sense of right and wrong! Imagine my surprise when I
- found your page describing how to circumvent blocks of web
- pages such as those promoting explicit sexual content and
- abhorent behavior. While I am in support of maintaining our
- freedom to access information on the Internet, I can not
- condone your publishing work arounds for parental net
- censorship programs.
-
- GLR: If the programs 1) effectively blocked porn and 2) did not block
- non-obnoxious sites, my interest in publishing that information
- would be minimal.
-
- Additionally, the programs are so simply, that any teenager who
- has the intellect to make it in the real world in a few years
- will be able to figure out how to turn off these programs without
- my instructions (the original instructions on my page for turning
- off Cybersitter came from a teenager). The answer to keeping our
- kids from turning off the blocking programs is to keep our kids
- stupid. The idea of computers and the internet is to expand our
- intellect. I believe from my limited use of Cybersitter, that it
- would pretty much interefere with downloading most shareware from
- the internet.
-
- Critic: You obviously do not or would not restrict your own
- children from viewing all manner of objectionable material
- because of their 'right' to access such information and
- your desire of not "depriving them of the knowledge
- contained therein".
-
- My reference there is obviously to the thousands of web pages
- blocked by the various blocking programs that are not immoral by
- anyone's opinion... for example, my anti-junk email page, fishing
- spots in chicago, the Girl Scouts home page, etc.
-
- Critic: I find this idea reprehensible and beneath any reasonable
- common sense when it comes to protecting ones own children.
-
- I don't view that these programs actually protect anybody. They
- may filter SOME immoral sites, however, with 50,000,000+ web
- pages and more everyday how they can get them all?
-
- Critic: You may certainly have a case in stating that this is
- only the first step in preventing all manner of useful
- information that the tyrannical government, for instance,
- does not desire it's subject to view. However, this is not
- an excuse to interfere with my right as a parent to prevent
- unhealthy material from falling in the hands of potential
- innocent children!
-
- What am I interfering with? If you buy a blocking program that is
- ineffective because your kids can use notepad to turn it off,
- your problem should be with the company that offers that program.
-
- Critic: You should realize that we do not live in a perfect society
- and some of us will have to sacrifice their right to be
- accessed (if you have do not have immoral material) on the
- internet to protect the innocense of our children. It is
- precisely your opinion that everyone should have access to
- anything on the Internet that I find myself not even
- allowing my children to use this extremely useful medium at
- all.
-
- You want a magic bullet to protect your children in cyberspace.
- You won't find that anywhere. I have seen some schools ask about
- software that will allow students to surf the internet
- unsupervised. What other school activities exist wher kids do
- something UNSUPERVISED? None. Your job as a parent is to
- supervise your kids, set limits, encourage their intellectual
- development and teach them to distringuish between right and
- wrong.
-
- You cannot go to the corner store and buy a $39.95 product that
- will protect your kids from harms in the real world. You do not
- keep your kids inside 24 hrs a day, because there are drugs, sex
- and other evils in the real world. Why do you expect that in
- cyberspace?
-
- Critic: I have tried to use some of the programs you so arrogantly
- bash and find that they do not and can not limit access to
- sexually explicit sites due to the concept they use to
- block them. There is no way for all offensive sites to
- discovered and placed in a database for distribution to
- users of these various programs. It is physically
- impossible to keep up with new site additions and only
- promotes the same mentality of our current 'throw away'
- free-market enterprise system. I refuse to participate in
- this 'sceme' to extract as much money as possible from the
- users of these services.
-
- Exactly. The programs do not protect you. They block many
- non-offensive sites. They give you a false sense of security. No
- program can be an alternative to your being a good parent. No
- corporate executive can make the moral decisions for you (if the
- programs were effective).
-
-
- Critic: Again, I support your views, to an extent, on access to
- information. But, I can not sacrifice the mental health of
- my children by exposing them to many various profane
- materials present on the Internet today. I sincerely hope
- you do not hold the view that parents are not the best
- judge of what is proper for their own children.
-
- They are. Which is why, even if the programs worked effective,
- they would still be a bad idea.
-
- Critic: I must say that this appears to be your view based on your
- support and open defiance of such programs. Maybe you have
- a better way of protecting children from the dreggs of
- society that have apparently migrated to the internet that
- I am not aware of. Please let me know if so!
-
- Work with your kids on the net. Help them explore the wonderful
- world out there... help them learn to be excited about life and
- the opporunities. "Just say no" doesn't work for drugs or
- cyberspace. Help them develop a keen zest for life and the
- ability to distinguish between right and wrong. Something a
- "purifying" filter cannot do.
-
- Critic: I hope you can understand my position in the matter and
- look forward to a response from you. Thank you in advance
- for considering my position.
-
- Sincerely,
- Concerned Parent
-
- The Stalker's Home Page -- What the hell? Are you listed? Privacy?
- http://pages.ripco.com:8080/~glr/stalk.html
- Tech Support Hell Hole: http://pages.ripco.com:8080/~glr/hellhole.html
-
- ------------------------------
-
- Date: Mon, 6 Jan 1997 12:09:31 -0800 (PST)
- From: Stanton McCandlish <mech@EFF.ORG>
- Subject: File 4--Run for the hills! Virulent Shergold meme escapes cyberspace!
-
- ((MODERATORS' NOTE: If readers would send in some of the more
- egregious examples of cyber-urban legends, we'll try to run a few
- of them within the next few months)).
-
- Imagine my shock when today I entered our building's elevator, only to
- find that a construction company had posted a flyer in it, saying that a
- kid named Craig Sherman with brain cancer was collecting business cards
- via a Make-a-Wish Foundation maildrop, to get into the Guiness Book of
- World Records before he died. The earnest company urged everyone who read
- it to participate by sending cards, and said they'd gotten word from another
- participating contruction company.
-
- Needless to say, I warned both companies and Make-a-Wish about this
- latest iteration of the Craig Shergold hoax, and wrote a warning about
- all this on the flyers themselves.
-
- Still, the fact that company number one enlisted the aid of other
- organizations in spreading this thing around suggests it may get another
- few years of life out of this, offline, since by now the "news" has
- probably been mailed, faxed, and posted a zillion more times, starting a
- domino effect. <sigh>
-
- ------------------------------
-
- Date: Thu, 9 Jan 1997 16:09:28 -0600 (CST)
- From: Crypt Newsletter <crypt@sun.soci.niu.edu>
- Subject: File 5--Crypt News forces correction in FBI newsletter
-
- In follow-up to last CuD's article on the FBI Law Enforcement Bulletin
- "joke virus" gaffe:
- ------------------------------
-
- You may recall Crypt 40's short piece on the FBI's Law Enforcement
- Bulletin and its humorous run-in with the Internet jokes known as
- the Clinton, Clipper, SPA and Newt Gingrich viruses.
-
- In an article on the emerging face of computer crime, authors David
- L. Carter and Andra J. Katz, wrote that these jokes were real examples
- of "insidious" computer viruses.
-
- Of course, this was nonsense and Crypt News set out to ask the
- editor of the FBI's bulletin how jokes from the Internet had contaminated
- a supposedly serious article on computer crime.
-
- Apparently embarrassed over the mistake, the editor of the Law and
- Enforcement Bulletin did not return repeated phone calls from Crypt
- Newsletter. Andra J. Katz, reached over Christmas, said only that her
- co-author was responsible for the goofed-up material in question.
-
- However, increasing interest after the Bulletin's mistake was first
- published in Crypt Newsletter has resulted in a hasty edit in which the
- references to the jokes-as-viruses were simply hacked out.
-
- However, the rewrite is still imperfect. Reference to the "Clinton"
- virus remains in the feature's section on "Virus introduction."
-
- The FBI's curious article can be found off the FBI home page on
- the Web:
-
- http://www.fbi.gov/leb/dec961.txt .
-
- The "joke virus" portion from the _original_ edition of LEB has
- been posted at --
-
- http://www.soci.niu.edu/~crypt/other/orig.htm
-
- ------------------------------
-
- Date: Thu, 9 Jan 1997 14:31:36 -0800
- From: Jim Warren <jwarren@well.com
- Subject: File 6--7th Computers, Freedom & Privacy Conf - Mar.11-14
-
- Please repost and recirculate. [Also sent it to others via blind cc]
-
- --jim
- Jim Warren (jwarren@well.com)
- GovAccess list-owner/editor, advocate & columnist (Govt.Technology, MicroTimes)
- 345 Swett Rd., Woodside CA 94062; voice/415-851-7075; fax-for-the-quaint/<ask
- -------------------------
-
- Date--Wed, 8 Jan 1997 18:12:41 -0800 (PST)
- From--Bruce R Koball <bkoball@well.com
-
- The Seventh Conference on Computers, Freedom, and Privacy
- March 11-14, 1997
- San Francisco Airport Hyatt Regency; Burlingame, California
-
- CFP'97 : Commerce & Community
-
- CFP'97 will assemble experts, advocates, and interested people
- from a broad spectrum of disciplines and backgrounds in a balanced
- public forum to address the impact of new technologies on society.
- This year's theme addresses two of the main drivers of social and
- technological transformation. How is private enterprise changing
- cyberspace? How are traditional and virtual communities reacting?
- Topics in the wide-ranging main track program will include:
-
- PERSPECTIVES ON CONTROVERSIAL SPEECH
- THE COMMERCIAL DEVELOPMENT OF THE NET
- GOVERNMENTAL & SOCIAL IMPLICATIONS OF DIGITAL MONEY
- INTERNATIONAL PERSPECTIVES ON CRYPTOGRAPHY
- CYPHERPUNKS & CYBERCOPS
- REGULATION OF ISPs
- SPAMMING
- INFOWAR
- INTELLECTUAL PROPERTY AND INFO-PROPERTY
- THE 1996 ELECTIONS: CREATING A NEW DEMOCRACY
- THE COMING COLLAPSE OF THE NET
-
- INFORMATION:
-
- A complete conference brochure and registration information are
- available on our web site at: http://www.cfp.org
-
- For an ASCII version of the conference brochure and registration
- information, send email to: cfpinfo@cfp.org
-
- For additional information or questions, call: 415-548-2424
-
- ------------------------------
-
- Date: Mon, 6 Jan 1997 20:14:17 -0800 (PST)
- From: Declan McCullagh <declan@well.com>
- Subject: File 7--Foreign spies snoop the Net, from The Netly News
-
- The Netly News
- http://netlynews.com/
-
- SPY VS. SPY
- January 6, 1997
- By Declan McCullagh (declan@well.com)
-
- Move over, James Bond. Take your last bow, Maxwell Smart.
- Modern spies are jacked into the Net, a recent report from the
- multiagency National Counterintelligence Center says. It claims
- the Internet is now the "fastest growing" means for foreign
- governments and firms to gather information about U.S.
- businesses.
-
- The eight-page quarterly report says that malevolent "foreign
- entities" are sorting through web sites, pounding on search
- engines and firing off e-mail queries to U.S. defense contractors
- in hopes of winnowing out sensitive data.
-
- "Use of the Internet offers a variety of advantages to a
- foreign collector. It is simple, low cost, non-threatening and
- relatively 'risk free' for the foreign entity attempting to
- collect classified, proprietary, or sensitive information... We
- also know foreign intelligence and security services monitor the
- Internet," says the report, which is distributed to government
- agencies and contractors.
-
- Search engines apparently serve spies well. Want a copy of
- something you shouldn't be able to get? Perhaps it was left in an
- unprotected directory; try Altavista. "Foreign intelligence
- services are known to use computers to conduct rudimentary
- on-line searches for information, including visits to governments
- and defense contractors' on-line bulletin boards or web sites on
- the Internet. Access to Internet advanced search software
- programs could possibly assist them in meeting their collection
- requirements," the NACIC briefing paper says.
-
- Beware of spam from spies, it warns: "These foreign entities
- can remain safe within their borders while sending hundreds of
- pleas and requests for assistance to targeted US companies and
- their employees." Of course! This is any e-mail spammer's modus
- operandi: Flood an astronomical number of addresses at an
- infinitesimal cost. Then hope that at least some recipients will
- respond with the information you want.
-
- This isn't the first time that the Clinton administration has
- painted economic espionage as a dire threat. Last February, FBI
- director Louis Freeh warned the Senate Select Committee on
- Intelligence of the possible harm. He said foreign governments
- are especially interested in "economic information, especially
- pre-publication data" including "U.S. tax and monetary policies;
- foreign aid programs and export credits; technology transfer and
- munitions control regulations... and proposed legislation
- affecting the profitability of foreign firms acting in the United
- States."
-
- Note to Freeh: That information already is online. For
- proposed legislation, try Thomas -- or for munition regulations,
- the White House web site is a good bet.
-
- But forget Freeh's rhetoric. The White House isn't serious
- about halting the overseas flow of American secrets over the Net.
- If it were, President Clinton would lift the crypto export
- embargo. Strong encryption is the most effective way for
- companies to fend off foreign data-pirates, but current
- regulations allow U.S. multinational firms to use only the
- cipher-equivalent of a toy cap gun. Worse yet, last week the
- Commerce Department moved further in the wrong direction by
- releasing its new encryption export regulations that continue to
- keep American businesses at a competitive disadvantage compared
- to their foreign competitors, which generally are less hampered
- by crypto export rules. "The new regulations are worse" than the
- old, says Dave Banisar, a policy analyst at the Electronic
- Privacy Information Center.
-
- Sure, France and Britain spy on us for economic purposes.
- But we're just as guilty. We snooped on the French -- and got
- several U.S. "diplomats" kicked out of France two years ago. We
- peeked at Japanese secrets during automobile trade negotiations
- -- and got caught then, too. Especially under President Clinton,
- economic intelligence has become part of the mission of our spy
- agencies. Yet if we complain about other countries while doing it
- ourselves, we become hypocrites.
-
- Stanley Kober, a research fellow at the Cato Institute,
- argues in a recent paper that it's "folly" for the U.S. to
- continue such spying and risk alienating political allies: "The
- world is still a dangerous place, and it would be folly for the
- democracies to engage in nasty intramural squabbles. Yet that is
- the danger that economic espionage against other free societies
- poses."
-
- "Washington ought to consider that it may need the
- cooperation of Paris (or other Western capitals) to help deal
- with a mutual security threat" from terrorism, Kober writes.
-
- I asked Kober what he thought of the NACIC report. "It
- strikes me as a normal security reminder," he says. "The
- specifics are fairly slim. It's not the sort of thing that's sent
- to everyone. It's sent to their clients, the people who have
- government contracts. Since the Internet is new, they're telling
- people to be careful."
-
- Indeed, netizens must be careful. It's common sense, really,
- and defensive driving for the Net. Encrypt that e-mail. Use the
- anonymizer at least once a day. Let paranoia be your watchword.
- That e-mail from your mother may come from the KGB. When you're
- not watching it, your monitor may be watching you.
-
- Be afraid, Maxwell Smart. Your shoe phone may be listening back.
-
- ------------------------------
-
- Date: Mon, 16 Dec 96 16:37 CST
- From: Cu Digest (tk0jut2@mvs.cso.niu.edu)
- Subject: File 8--Soliciting a Child via Computer now a Crime in Illinois
-
- SOLICITING A CHILD VIA COMPUTER NOW A CRIME
-
- A state law effective Sunday makes it a crime (in Illinois)
- for anyone to use cyberspace to lure children into sex. Violators
- face up to 5 years in prison if convicted.
-
- The law goes a step beyond existing laws that make it a crime
- to take indecent liberties with a minor. Earlier this year, FBI
- agents arrested more than a dozen people accused of using America
- Online to meet children for sex.
-
- ------------------------------
-
- Date: Fri, 3 Jan 1997 01:16:39 GMT
- From: hud@NETCOM.COM(Hud Nordin)
- Subject: File 9--Re: Cu Digest, #8.93 (xchaotic Xmas e-bombings)
-
- >today's act of "cyber-terrorism" is brought to you by the
- >letters 'A', 'D', and the number '1'. and the person who
- >brought it to you? you know who you are. <p>
-
- Run! Johnny's got his gun but he doesn't know how to shoot straight!
-
- Johnny, in the December Unamailer/xchaotic manifesto alleged to you,
- you seem to wish people would be more accurate in their dealings with
- the Net.
-
- In your victims list, I find this fascinating excerpt:
-
- > hud@netcom.com Co$ Supporter or Member
-
- > the cult of scientology needs to be shut down. it is a
- > criminal organization and should be treated as such.
-
- Your research is shoddy. I am neither a member nor a supporter of the
- Church of Scientolgy. In fact, I am a critic. (My Usenet posting
- history should prove it. If you can't be bothered to check, maybe this
- sentiment will do: Fuck the lying sonofabitch L. Ron Hubbard and the
- bait-and-switch scam "church" he rode in on. OK? I can provide
- references.) I am highly insulted to find myself labeled a proponent of
- scientology.
-
- I expect you to apologize to me. After that, issuing a retraction would
- be the right thing to do.
-
- You may be relieved to know that you didn't wind up inconveniencing me
- -- someone who shares many of your beliefs; I easily installed
- procmail shields to divert your errant flood.
-
- Please be more careful in your next act of sabotage. Actually, you
- might want to reconsider this whole bombing thing. You are hurting
- people. I think you are hurting your cause.
-
- Hud Nordin
- hud@netcom.com
-
- ------------------------------
-
- Date: Thu, 15 Dec 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 10--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.03
- ************************************
-
-
-