home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Apr 20, 1997 Volume 9 : Issue 31
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Field Agent Extraordinaire: David Smith
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.31 (Sun, Apr 20, 1997)
-
- File 1--XT clone for donation or sale (Sun Devil Redux)
- File 2--ACLU Cyber-Liberties Update
- File 3--Technology and Society (from NETFUTURE #45)
- File 4--Texas ISPs Targed in Secessionist Case
- File 5--Crack DES Challenge
- File 6--(Fwd) A listserv joke
- File 7--Family-Friendly Internet Access Act of 1997
- File 8--Cu Digest Header Info (unchanged since 13 Apr, 1997)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Thu, 10 Apr 1997 09:18:48 -0500 (CDT)
- From: Bob Izenberg <bei@austin.sig.net>
- Subject: File 1--XT clone for donation or sale (Sun Devil Redux)
-
- ((MODERATORS' NOTE: Back in the dark days of early 1990, when
- the US Secret Service "discovered" TGHM (The Great Hacker Menace),
- Bob Izenberg was one of the system administrators caught up
- in the Kafkaesque nightmare of legal limbo. He was never
- arrested, indicted, or accused of wrong-doing, but his
- computer equipment was seized and prosecutors left him
- limbo for years. In part, it seemed that, like Dr Ripco and
- some others, the feds weren't sure what to do with him,
- and personnel changes amongts the feds added to the confusion
- on both sides. Finally, somebody in the USSS figured out that
- maybe, just maybe, somebody should close the case and return
- his equipment.
- For a summary of what all the fuss was about back in 1990,
- go out and buy Bruce Sterling's THE HACKER CRACKDOWN,
- which remains the best source of information for the period)).
-
- The United States Secret Service has returned to me the PC-XT
- clone system seized at my residence in February of 1990. It still
- works, which surprised me, but of course its disk had been wiped.
- It wasn't bad for an XT by the standards of the day: 2Mb EEMS
- memory card, Perstor disk controller, full-height 70Mb MFM fixed
- disk, NEC V20 processor. Today, of course, it's a doorstop.
- Anyway, as Ron Roberts and many other taxpayers graciously paid
- for its storage for all these years, it's the least that I can do
- to give it away to a worthy cause. Or even an un-worthy cause,
- just to get it out from under the desk. No, it won't run Windows
- 95 or any software written in at least the last five years. No
- warranty is offered, other than an assurance that seven years
- stored next to the Ark of the Covenant in Illinois hasn't damaged
- (or improved) it one bit. First come, first served, and you pay
- the shipping. After May 1st, it's history if nobody's claimed it.
-
- Bob
- --
- ================ "We make the Internet work." ================
- bob izenberg phone: +1 512 306-0700
- sig.net network operations bei@sig.net
-
- ------------------------------
-
- Date: Wed, 16 Apr 1997 20:19:36 GMT
- From: "ACLU Cyber-Liberties Update Owner"@newmedium.com
- Subject: File 2--ACLU Cyber-Liberties Update
-
- ACLU Cyber-Liberties Update
- Wednesday, April 16, 1997
-
- * Act Now to Restore Telephone Privacy - Fax Congress
-
- The FBI is using a 1994 law (CALEA, or the "Communications Assistance to
- Law Enforcement Act") to force telecommunications companies to change
- their equipment and facilities to weaken privacy protection and provide
- enhanced wiretap access for government agents. In 1994, Congress
- authorized a half-billion dollars to pay for changes in old technology
- but blocked actual funding until last year when Congress both set up a
- special "slush fund" using excess funds from intelligence and law
- enforcement agencies and said the FBI could spend part of the money
- authorized in 1994. But Congress prohibited spending any money until the
- FBI submitted an implementation plan approved by Congress.
-
- The annual appropriations process gives us yet another chance to tell
- Congress not to allow this unprecedented attack on our privacy. Let your
- own representative and senators know that you want them to oppose funding
- this attack on your telephone privacy.
-
- Use the ACLU web site action fax page to send a fax to your members of
- Congress telling them not to fund CALEA! The free web-to-fax gateway will
- allow you to look up your representatives on Capitol Hill and send faxes
- right to their offices. It can be found at:
-
- http://www.aclu.org/action/calea_act.html
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- * Privacy Risks Shut Down Government Web site
-
- The Social Security Administration recently announced that it had shut
- down an Internet site that supplied information about people's personal
- income and retirement benefits because of concerns that it might violate
- privacy rights, the New York Times reports.
-
- Thousands of people have obtained such data on the World Wide Web by
- requesting "personal earnings and benefit estimate statements." A
- computer user seeking the information need only supply a name, address,
- telephone number, place of birth, social security number and mother's
- maiden name. Experts on computer and privacy law expressed concern that
- such safeguards were not enough to keep people from obtaining
- confidential electronic data about others.
-
- "It remains unclear exactly where SSA officials were trying to go with
- this program, but in any case they ran over the privacy of 140 million
- Americans to get there,"said Don Haines, legislative counsel on privacy
- and cyberspace issues for the Washington national office of the American
- Civil Liberties Union.
-
- "We appreciate that the agency was trying to expand access to public
- information, but in doing so, it made the information a little too
- public. Without providing appropriate safeguards, the agency had no way
- of insuring that private information was only available to those entitled
- to have access."
-
- Haines said that with confidential information open to ex-spouses,
- landlords, employers, co workers, intrusive neighbors and credit
- agencies, the potential for abuse was enormous. The ACLU is working with
- members of Congress on legislation to correct the problem.
-
- Acting Commissioner of Social Security John J. Callahan said the agency
- would hold public forums around the country in the next 60 days to hear
- from beneficiaries and experts on privacy and computer security.
-
- This is just the most recent case of problems with the privacy of records
- held by the Social Security Administration. Almost exactly a year ago, in
- what computer experts said might be one of the biggest breaches of
- security of personal data held by the Federal government, Federal
- prosecutors in New York revealed that several employees of the Social
- Security Administration passed information on more than 11,000 people to
- a credit-card fraud ring. That information, the prosecutors said in
- court papers, included social security numbers and mothers' maiden names,
- and allowed the ring to activate cards stolen from the mail and run up
- huge bills at merchants ranging from J&R Music world to Bergdorf Goodman.
-
-
-
- The Internet address of the Social Security Administration is
- http://www.ssa.gov. General information about Social Security programs
- is still available there.
-
-
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- * Witnesses testify in New York State Cyber-censorship case. Oral
- Arguments scheduled for April 22.
-
-
- In hearings last week, witnesses representing an online arts group,a
- library, a gay issues forum and the American Civil Liberties Union all
- testified that a New York statute barring "indecency" on the Internet
- could subject them to criminal prosecution.
-
- Their testimony on Monday April 7 concluded three days of
- courtroom hearings before Judge Loretta A. Preska in ALA v. Pataki, the
- challenge to New York`s Internet censorship law brought by the American
- Civil Liberties Union, the New York Civil Liberties Union, the American
- Library Association, and others.
-
- The groups argue that the law, which imposes criminal sanctions of
- up to four years in jail for communicating so-called "indecency" to a
- minor, would reduce all speech on the Internet to a level suitable for a
- six-year-old. The ACLU successfully challenged a similar federal law in
- Reno v. ACLU, currently under review by the Supreme Court.
-
- "We think we were able to demonstrate the disastrous effect the
- New York law -- like the federal CDA -- would have on individual
- speakers and non-profit groups who communicate on the Internet both
- within and outside the state of New York," said Ann Beeson, an ACLU
- national staff attorney who conducted direct examination of several
- plaintiff witnesses. "A long line of well-established Supreme Court
- decisions demonstrate that government cannot ban protected speech for
- adults in the name of shielding children."
-
- Beeson is profiled in this week`s New York Magazine, in an article that
- raises, and answers in the affirmative, the question "Could it be that
- New York`s redundant, unconstitutional Internet-indecency law is more
- useful for scoring political points for protecting children?"
-
- Judge Preska has scheduled oral arguments in the case for April 22.
- Argument will begin at 2:00pm in room 12A at 500 Pearl Street, New York
- City.
-
- Full information on the New York Internet censorship case, including
- links to transcripts, can be found at
- http://www.aclu.org/news/nycdahome.html
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-
- ACLU Cyber-Liberties Update Editor:
- Lisa Kamm (kamml@aclu.org)
- American Civil Liberties Union National Office
- 132 West 43rd Street
- New York, New York 10036
-
- To subscribe to the ACLU Cyber-Liberties Update, send a message
- to majordomo@aclu.org with "subscribe Cyber-Liberties" in the
- body of your message. To terminate your subscription, send a
- message to majordomo@aclu.org with "unsubscribe Cyber-Liberties"
- in the body.
-
- The Cyber-Liberties Update is archived at
- http://www.aclu.org/issues/cyber/updates.html
-
- For general information about the ACLU, write to info@aclu.org.
- PGP keys can be found at http://www.aclu.org/about/pgpkeys.html
-
- ------------------------------
-
- Date: Wed, 9 Apr 1997 17:19:23 -0400
- From: Steve Talbott <stevet@ora.com>
- Subject: File 3--Technology and Society (from NETFUTURE #45)
-
- ((MODERATORS' NOTE: We came across NETFUTURE and were impressed
- by it. Here's a sample of the articles that Steve Talbott, the
- editor, runs. This E-Zine is worth taking a look it!))
-
- +++++++++++++
-
- Technology and Human Responsibility
-
- ------------------------------------------------------------------
- Issue #45 Copyright 1997 Bridge Communications April 9, 1997
- -----------------------------------------------------------------
- Opinions expressed here belong to the authors, not Bridge Communications.
-
- Editor: Stephen L. Talbott
-
- NETFUTURE on the Web: http://www.ora.com/people/staff/stevet/netfuture/
- You may redistribute this newsletter for noncommercial purposes.
-
-
- From Steve Talbott <stevet@ora.com>
-
- The evidence of our hollowing out as human beings
- is staring us in the face.
-
- Is anyone home?
-
- These days no article about technology and society seems complete without
- at least one reference to the accelerating pace of change. But, despite
- their ubiquity, a number of these references have particularly jumped out
- at me in recent weeks. Here are a few examples:
-
- * An article about Cisco in the *Boston Globe* described that company's
- current, top-of-the-line router, the model 7500, which sells for some
- $100,000 "fully loaded," and routes a million packets per second.
- "For a while," the article noted, "that capacity set the industry
- standard. But within months of the 7500's release in 1996, some Cisco
- customers were describing the machine as `long in the tooth' and
- `dinky.'"
-
- * The *EE Times* carried a piece about a new generation of fast Internet
- protocols. A high-tech executive is quoted as saying, "This is not a
- little, incremental shift. It's a major disruption of everything
- that's going on in the industry."
-
- * Princeton University vice president, Ira Fuchs, on Internet II: "It's
- not as simple as `You change the backbone and all will be well.' For
- individual users to take full advantage of the change in the
- infrastructure, you'll have to change everything." Also, "the
- technology is advancing so rapidly that by the time the computer you
- originally asked for is finally delivered, you don't want that
- computer any more."
-
- * From *Publisher's Weekly*: Database vendors serving libraries "have
- become frustrated with the number of new platforms they have to
- support. It cost one company $2 million to convert its databases to
- SGML for CD-ROM. Then the Web and HTML came along, costing $100,000
- more for conversion, and now they must ready themselves for Java."
-
- * The *Economist*: A venture capitalist who sits on the boards of
- several small Internet companies says that "`a major strategic
- decision' is taken at virtually every meeting. This nimbleness is
- prompted by fear. The technology market changes so quickly that any
- company which fails to adjust will get pushed out." The magazine goes
- on to report that "age and experience, which elsewhere get people
- promoted, are no help in [Silicon] valley; on the contrary, there is a
- distinct bias in favor of youth. Nowadays the average software-
- engineering qualification becomes obsolete in around five years, so a
- student fresh out of college may be more valuable to a company than a
- 40-year-old. Many of the new Internet firms are headed by people in
- their mid-20s."
-
- Here closer to home, I find that my text-only Lynx browser is rapidly
- becoming a cripple on today's Web. Many sites now require frame support,
- which my browser does not have. Other sites, such as MSNBC, immediately
- hang the window in which I'm working; Lynx compatibility is simply not
- something Web site managers worry about. Apparently, as a sixteen-year
- veteran of the Net who would rather not spend his time downloading cutesy
- graphics, I've gotten myself a little behind the curve. I might as well
- be a dinosaur.
-
- The browser problem illustrates, I think, one striking fact about many Web
- sites: they are content providers for whom content scarcely matters.
- They do not begin with something important to say, and then seek the most
- effective vehicle for saying it. Rather, they are enamored of the vehicle
- (latest model only!) and are looking for something to say with it. Not
- surprisingly, the result is a lot of pandering. The message is there only
- to serve alien purposes.
-
- This is no eccentric reading of my own. It is the explicit acknowledgment
- of an entire industry that begins by producing and playing with whatever
- is technically feasible, and then hopes for a "killer app" to fasten the
- technical innovations upon the body social. Here, too, some recent news
- reports have leapt out at me:
-
- * Speaking of the high-tech transformation of the U.S. military, the
- *Economist* writes: "This embryonic revolution, unlike the
- development of nuclear weapons, has not emerged in response to any
- particular threat to the United States or its allies. It has come
- about because it is there -- that is, because generals want to play
- with new technologies in case a future threat emerges."
-
- * *Internet World* tells corporate executives they must embrace
- intranets for no other reason than that they are happening. "You can
- catch the Intranet wave and ride it or let your firm and your LAN be
- overwhelmed by the tides of change." The argument? None seems to be
- necessary. It's enough that intranets are *there*, and are deemed to
- represent a technical advance. "By now, you've gathered that
- intranets can be pricey and, in some ways, hard to manage. Are they
- worth it? The answer is yes. The future clearly belongs to the
- intranet model. Proprietary LANs ... have run their course. The
- future belongs to intranets, where getting information anywhere and
- anytime is possible for your users."
-
- * And the *Economist* again: "By 2000 customers will have shelled out a
- total of $200 billion on networking software and related equipment;
- but most forecasts for revenues from Internet-related activities, such
- as advertising on websites, are no more than $35 billion -- hardly a
- quick return."
-
- If you build the technology, a killer app will eventually come -- such is
- the reigning faith. Of course, as long as the rest of us are willing to
- go along with this backward game, chasing after the latest gadgetry
- regardless of need, it works quite well. Out of this willingness, the
- technological "necessity" that so many perceive in these matters is born.
-
- It's a strange infatuation that has a mature society hitching itself with
- uncritical enthusiasm to whatever happens to issue from the endless rows
- of cubicles where programmers -- often college students -- exercise their
- technically constrained and hopelessly uneducated imaginations. The
- cubicles themselves, I suppose, are a pretty good image of the inevitable
- result. We always mirror our inner worlds in the outer.
-
-
- The Loss of Purpose
- -------------------
-
- So, what is going on here?
-
- Technical innovation -- the devising of new tools -- is surely a desirable
- activity. But unless there is a balance between our fascination with
- tools and our concern for the ends they may help us achieve, the tool
- becomes tyrannical. What stares us in the face today is the startling
- fact that, not only has the balance been upset, but one of its terms has
- virtually disappeared. Technological innovation now proceeds for its own
- sake, driven by its own logic, without reference to human need. We are a
- society obsessed with new tools, but incapable of asking in any serious
- way, "what are we developing these tools *for*?"
-
- It's rather as if a musician became so enamored of new instruments capable
- of generating novel sounds that he lost all interest in seeking the kind
- of disciplined musical inspiration that makes his art finally worthwhile.
-
- What I'm talking about here -- and what the preceding quotations testify
- to -- is a reversal of ends and means. I previously (NF #39 and NF #40)
- tried to show what this reversal looks like within the individual company,
- where the pursuit of worthwhile ends under the discipline of economics
- eventually gets twisted around to a pursuit of profits as an end in
- themselves. Now, however, I'm talking about society as a whole, driven as
- it increasingly is by the high-tech industry.
-
- A society obsessed by tools and technology without a balancing focus upon
- ends is a society whose members are being hollowed out. It is, after all,
- in establishing and pursuing higher values -- something we can only do
- from within ourselves -- that we assert our humanity. Otherwise, we
- merely react, machine-like, without internal compass. That is, we become
- like the programmed machines to which we devote so much of our energy.
-
- I for one would not want to quarrel with those who recognize a certain
- necessity in the one-sided tool focus of the past few hundred years. Nor
- would I want to insist that the U.S. military cease pushing its technical
- capabilities to the practical limit. And surely there is in any case
- little likelihood that the foreseeable future will bring a significant
- slowing of the overall, furious extension of the technical reach of our
- tools.
-
- What this means is that everything hinges upon our ability to
- counterbalance the prevailing technical mania with a strengthened inner
- compass. We must, wherever possible, be all the more forceful in asking,
- What is this tool *for* -- how does it relate to the deepest needs and
- yearnings of the human being? The stronger the tendency of the high-
- tech/commercial matrix to drive itself forward in terms of its own
- inherent logic, the more we must appeal to needs, values, and human ends
- in order to reign in and guide this logic.
-
- In making this effort we can hardly be satisfied with the hollow
- platitudes of those who would sell us an endless array of new gadgets.
- Our pressing need is *not* for more information, or faster access to
- information, or more connectivity. Our decisive problems arise -- as many
- others have noted -- from the lack of meaningful, value-centered contexts
- to which new information can be assimilated, and from those connections to
- other people we already have, but do not know how to deepen and make
- healthy. Adding new information and additional connections where these
- fundamental problems have not been solved only carries us further from
- ourselves and each other.
-
- Yet within the high-tech industry itself the platitudes have a certain
- validity. Any company that does not develop new technology fast enough --
- human needs and purposes be damned -- will not likely survive for long.
- This industry, in other words, has itself become machine-like, hollowed
- out, lacking all evidence of the guiding human interior. Its employees
- and owners and investors sleepwalk through their working lives, bringing
- full consciousness only to the technical dimensions of their jobs. And we
- who buy their products in a similar trance contribute our fair share to
- the undermining of society.
-
- Do not underestimate the potential evils of a society that worships every
- new tool in forgetfulness of its own inner purposes through which alone
- the tools can be justified. Hollow men and women, whether educated or
- not, whether technically competent or not, can never sustain a healthy
- society, and are capable of unimagined monstrosities.
-
- Eventually we will have to recognize the symptoms of our hollowness in
- unexpected places. For example, in the burgeoning commercialized sex
- industry, where external presentations (now greatly aide by technology)
- substitute for profound connection between human beings. Or in the
- deranged excesses at the fringes of the fast-growing New Age movements,
- where the meaning so conspicuously absent from the social mainstream is
- sought in borderline experiences -- and even, as with the Heaven's Gate
- community, in death. Or in the outrages committed against man and nature
- by commercially driven biotechnologists. Or in the politics of appearance
- without principle. Or in the fragmentation of society, with the economic
- disfranchisement of large groups.
-
- Our only escape from the tyranny of the tool as an end in itself lies in
- our becoming *more* than our tools. Only we ourselves can supply the
- ends, and we can do so only by waking up to our own inner resources. The
- prevailing notion that the logic of high-tech development will itself
- guide society into a better future amounts to an abdication of our
- humanity. After all, a society with abundant technical means and no
- governing values and purposes can only become a hellish and dangerous
- place. On the other hand, a society struggling toward its own governing
- values is a society on its way toward healing.
-
- Which is it? Personally, I see little basis for optimism. But it may
- well be that I've just been leafing through too many trade rags lately.
-
- ------------------------------------------------------------
- *** About this newsletter (29 lines)
-
- NETFUTURE is a newsletter concerning technology and human responsibility.
- Publication occurs roughly once per week. Editor of the newsletter is
- Steve Talbott, a senior editor at O'Reilly & Associates. Where rights are
- not explicitly reserved, you may redistribute this newsletter for
- noncommercial purposes.
-
- Current and past issues of NETFUTURE are available on the Web:
-
- http://www.ora.com/people/staff/stevet/netfuture/
-
- To subscribe to NETFUTURE, send an email message like this:
-
- To: listproc@online.ora.com
-
- subscribe netfuture yourfirstname yourlastname
-
- No Subject line is needed. To unsubscribe, the second line shown above
- should read instead:
-
- unsubscribe netfuture
-
- To submit material to the editor for publication in the forum, place the
- material in an email message and address it to:
-
- netfuture@online.ora.com
-
- Send general inquiries to netfuture-owner@online.ora.com.
-
- ------------------------------
-
- Date: Tue, 15 Apr 1997 10:02:45 EDT
- From: Martin Kaminer <iguana@MIT.EDU>
- Subject: File 4--Texas ISPs Targed in Secessionist Case
-
- Date--Sat, 12 Apr 1997 11:10:22 -0500
- From--FringeWare News Network <email@Fringeware.COM>
-
- Sent from: Jon Lebkowsky <jonl@onr.com>
-
- [ mod's note: ROT information can be found at
- http://www.flash.net/~robertk/
- ]
-
- Texas ISPs Targeted in Secessionist Case
- by Ashley Craddock
-
- 5:55pm 11.Apr.97.PDT
-
- Saying the Texas attorney general is violating the electronic privacy
- rights of their subscribers, two Lone Star Internet service providers
- have refused to turn over information about members of a secessionist
- movement who use their services.
-
- The movement, known as the Republic of Texas, holds that Congress' 1845
- annexation of the independent state was illegal and that only a citizen
- vote can legalize its status as part of the Union. Charging everyone
-
- >from Governor George Bush Jr. to private citizens with the illegal
-
- seizure of property, the Republic has flooded state courts with liens
- that have been declared illegal.
-
- In a counterattack, Attorney General Dan Morales - of what the movement
- calls "the de facto state of Texas" - on 2 April served subpoenas on 10
- ISPs who do business with the members of the group that state officials
- seem to delight in calling ROT.
-
- The subpoenas demand copies of all members' email, login and user IDs,
- subscriber applications, and billing information - including credit
- card and checking-account numbers. The court order was filed as part of
- a civil case, Morales v. Van Kirk et al., that the attorney general
- brought last June to stop the movement from posing as a government
- entity and clogging the courts with liens.
-
- Eight of the ISPs have agreed to comply with the subpoenas. Two others,
- Internet Texoma Inc. and the Overland Network, have refused. Both say
- the subpoenas violate a portion of the federal Electronic
- Communications Privacy Act stipulating that the information sought must
- be "relevant and material to an ongoing criminal investigation."
-
- In a Friday letter to the attorney general, W. Scott McCollough, the
- Texas Internet Service Providers Association attorney representing both
- ISPs, stated that the subpoenas "do not overcome our ... federal
- obligations."
-
- "This is a civil, not a criminal case," McCollough said. "Plus, the
- AG's office hasn't gone through due process in requesting the
- information. They didn't serve us with a search warrant. And if my
- clients turned over the information without a warrant, there's always
- the possibility that these people could sue us. I don't know if they
- would since they don't acknowledge the court system, but they could."
-
- Attorney general's spokesman Ward Tisdale said on Friday that since the
- "Republic of Texas folks do most of their communication over the
- Internet, we're simply taking the reasonable steps to gather all the
- information we need in the course of our investigation."
-
- Responding to McCollough's letter, the attorney general's office took a
- slightly different tack in an effort to skirt the issue of the federal
- privacy law. It called off the subpoenas and told McCollough it will
- file a civil investigative demand, a less-stringent request for
- material relevant to ongoing litigation.
-
- ------------------------------
-
- Date: Thu, 10 Apr 1997 10:41:58 -0500 (CDT)
- From: "Robert A. Hayden" <hayden@krypton.mankato.msus.edu>
- Subject: File 5--Crack DES Challenge
-
- I'm just forwarding along. Check out the web page towards the end for all
- the relevant software and such.
-
- - --
-
- FOR IMMEDIATE RELEASE:
-
- DESCHALL Group Searches for DES Key
-
- Sets out to prove that one of the world's most popular encryption
- algorithms is no longer secure.
-
- COLUMBUS, OH (April 9, 1997). In answer to RSA Data Security, Inc.'s
- "Secret Key Challenge," a group of students, hobbyists, and
- professionals of all varieties is looking for a needle in a haystack
- 2.5 miles wide and 1 mile high. The "needle" is the cryptographic key
- used to encrypt a given message, and the "haystack" is the huge pile
- of possible keys: 72,057,594,037,927,936 (that's over 72 quadrillion)
- of them.
-
- The point? To prove that the DES algorithm -- which is widely used in
- the financial community and elsewhere -- is not strong enough to
- provide protection from attackers. We believe that computing
- technology is sufficiently advanced that a "brute-force" search for
- such a key is feasible using only the spare cycles of general purpose
- computing equipment, and as a result, unless much larger "keys" are
- used, the security provided by cryptosystems is minimal. Conceptually,
- a cryptographic key bears many similarities to the key of a typical
- lock. A long key has more possible combinations of notches than a
- short key. With a very short key, it might even be feasible to try
- every possible combination of notches in order to find a key that
- matches a given lock. In a cryptographic system, keys are measured in
- length of bits, rather than notches, but the principle is the same:
- unless a long enough key is used, computers can be used to figure out
- every possible combination until the correct one is found.
-
- In an electronic world, cryptography is how both individuals and
- organizations keep things that need to be private from becoming public
- knowledge. Whether it's a private conversation or an electronic funds
- transfer between two financial institutions, cryptography is what
- keeps the details of the data exchange private. It has often been
- openly suggested that the US Government's DES (Data Encryption
- Standard) algorithm's 56-bit key size is insufficient for protecting
- information from either a funded attack, or a large-scale coordinated
- attack, where large numbers of computers are used to figure out the
- text of the message by brute force in their idle time: that is, trying
- every possible combination.
-
- Success in finding the correct key will prove that DES is not strong
- enough to provide any real level of security, and win the first person
- to report the correct solution to RSA $10,000.
-
- Many more participants are sought in order to speed up the search. The
- free client software (available for nearly every popular computer
- type, with more on the way) is available through the web site. One
- simply needs to follow the download instructions to obtain a copy of
- the software. Once this has been done, the client simply needs to be
- started, and allowed to run in the background. During unused cycles,
- the computer will work its way through the DES keyspace, until some
- computer cooperating in the effort finds the answer.
-
- If you can participate yourself, we urge you to do so. In any case,
- please make those you know aware of our effort, so that they might be
- able to participate. Every little bit helps, and we need all the
- clients we can get to help us quickly provide an answer to RSA's
- challenge.
-
- Contact Information
-
- * Media Contact
- Matt Curtin +1 908 431 5300 x295
- <cmcurtin@research.megasoft.com>
- * Alternate Contact
- Rocke Verser, Contract Programmer, +1 970 663 5629
- <rcv@dopey.verser.frii.com>
- * Web Site
- http://www.frii.com/~rcv/deschall.htm
- * Mailing List
- deschall@gatekeeper.megasoft.com
- To subscribe, send the text subscribe deschall to
- <majordomo@gatekeeper.megasoft.com> and you'll be emailed
- instructions.
- * RSA Data Security Secret Key Challenge '97 Site
- http://www.rsa.com/rsalabs/97challenge/
-
- ------------------------------
-
- Date: Thu, 17 Apr 1997 09:43:14 -0500
- From: "Julia N. Visor" <jnvisor@RS6000.CMP.ILSTU.EDU
- Subject: File 6--(Fwd) A listserv joke
-
- Q: How many internet mail list subscribers does it take
- to change a light bulb?
-
-
- A: 1,331:
- 1 to change the light bulb and to post to the mail
- list that the light bulb has been changed
- 14 to share similar experiences of changing light
- bulbs and how the light bulb could have been
- changed differently.
- 7 to caution about the dangers of changing light bulbs.
- 27 to point out spelling/grammar errors in posts about
- changing light bulbs.
- 53 to flame the spell checkers
- 156 to write to the list administrator complaining about
- the light bulb discussion and its inappropriateness
- to this mail list.
- 41 to correct spelling in the spelling/grammar flames.
- 109 to post that this list is not about light bulbs and
- to please take this email exchange to alt.lite.bulb
- 203 to demand that cross posting to alt.grammar,
- alt.spelling and alt.punctuation about changing
- light bulbs be stopped.
- 111 to defend the posting to this list saying that we
- all use light bulbs and therefore the posts
- **are** relevant to this mail list.
- 306 to debate which method of changing light
- bulbs is superior, where to buy the best light bulbs,
- what brand of light bulbs work best for this
- technique, and what brands are faulty.
- 27 to post URLs where one can see examples of
- different light bulbs
- 14 to post that the URLs were posted incorrectly, and
- to post corrected URLs.
- 3 to post about links they found from the URLs that
- are relevant to this list which makes light bulbs
- relevant to this list.
- 33 to concatenate all posts to date, then quote
- them including all headers and footers, and then
- add "Me Too."
- 12 to post to the list that they are unsubscribing
- because they cannot handle the light bulb
- controversey.
- 19 to quote the "Me Too's" to say, "Me Three."
- 4 to suggest that posters request the light bulb FAQ.
- 1 to propose new alt.change.lite.bulb newsgroup.
- 47 to say this is just what alt.physic.cold_fusion
- was meant for, leave it here.
- 143 votes for alt.lite.bulb.
-
- ------------------------------
-
- Date: Sat, 12 Apr 1997 02:50:49 -0400
- From: "Robert A. Costner" <pooh@efga.org>
- Subject: File 7--Family-Friendly Internet Access Act of 1997
-
- Source - fight-censorship@vorlon.mit.edu
-
- On March 20th, a national bill similar to the Texas law was introduced.
- The substantial part of the law is as follows:
-
- ------------------------------------
-
- http://thomas.loc.gov/cgi-bin/query/z?c105:H.R.1180:
-
- (d) OBLIGATIONS OF INTERNET ACCESS PROVIDERS- An Internet access provider
- shall, at the time of entering an agreement with a customer for the
- provision of Internet access services, offer such customer screening
- software that is designed to permit the customer to limit access to
- material that is unsuitable for children. Such software shall be provided
- either at no charge or for a fee that does not exceed the cost of such
- software to such provider.
-
- ------------------------------------
-
- The above amendment to 47 USC 230 uses language that indicates an ISP is
- not a common carrier (see the link for definitions). Unlike the Texas law,
- this applies to all providers, not just the for pay providers. Also unlike
- the Texas law, the amendment provides for what is to be blocked - material
- that is unsuitable for children. Unlike the Texas law, this does not
- provide an exclusion for the ISP if the blocking software does not work
- properly.
-
- The term "limit access to material" would be up for debate, but I assume
- that a partial reduction in improper material would be fine. However, I
- assume that there is a requirement to block all areas, not just web sites.
-
- If this law has a prayer of passing, I'd prefer to see the Texas version
- instead.
-
- ------------------------------
-
- Date: Thu, 15 Dec 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 8--Cu Digest Header Info (unchanged since 13 Apr, 1997)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
- Web-accessible from: http://www.etext.org/CuD/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.31
- ************************************
-
-
-