home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 319.3 KB | 6,863 lines |
- _ _______
- Release Date: __ N.I.A. _ ___ ___ Are you on any WAN? Are
- 08AUG91 ____ ___ ___ ___ ___ you on Bitnet, Internet
- _____ ___ ___ ___ ___ Compuserve, MCI Mail,
- Editors: ___ ___ ___ ___ ___________ Sprintmail, Applelink,
- Judge Dredd ___ ___ ___ ___ ___________ Easynet, Usenet,
- Lord Macduff ___ ______ ___ ___ ___ FidoNet, et al.?
- Advisors: ___ _____ ___ ___ ___ If so please drop us a
- Knight Lighting ____ _ __ ___ line at
- Jim Thomas ___ _ ___ nia@nuchat.sccsi.com
- __
- _ Network Information Access
- Ignorance, There's No Excuse.
-
- Issue 072 :: Volume 02
-
- "Do you know why there are so few sophisticated computer terrorists in the
- United States? Because your hackers have so much mobility into the
- Establishment. Here there is no such mobility. If you have the slightese bit
- of intellectual integrity you cannot support the government... That's why
- the best computer minds belong to the opposition."
- - An anonymous member of the
- Polish trade union Solitarity.
-
- ^*^
-
- Greetings, avid readers! This issue marks a departure from our usual
- pattern, in that we now have the beginnings of an advisory staff. We would
- like to welcome Knight Lightning, Ex-editor of the now-late Phrack Inc.
- magazine. We would also like to welcome Jim Thomas, Editor of the Computer
- Underground Digest. If you feel you have certain qualities that could
- improve NIA magazine, please write us at nia@nuchat.sccsi.com.
-
- ============================================================================
- 1. Index to NIA072 .............................................NIA Editors
- 2. The Renaissance of Hacking ...............................Mark Hittinger
- 3. The Hacker Manifesto ......................................Erik Bloodaxe
- 4. Foiling the Cracker [Dept. of Defense]......................Killing Joke
- 5. UNIX: JE Documentation ................................Terminal_Erection
- 6. Network Miscellany ......................................Various Sources
- 7. CyberTimes (Vox Populi) [1/4] ...............................Judge Dredd
- 8. CyberTimes (Vox Populi) [2/4] ...............................Judge Dredd
- 9. CyberTimes (Vox Populi) [3/4] ...............................Judge Dredd
- 10. CyberTimes (Vox Populi) [4/4] ...............................Judge Dredd
- 11. Editor's Comments ...........................................NIA Editors
- ============================================================================
-
-
- / /
- / NIA 072 / File 2 /
- / Hacking and Hackers: The Rise, Stagnation, and Renaissance. /
- / Copyright(C) 1991 By Mark Hittinger /
- / /
-
- It doesn't take a rocket scientist to figure out that the publicity
- afforded to hacking has risen to peak levels within the last year. As
- one would expect, the political attention being paid to the subject of
- hackers has also risen to peak levels. We are hearing more about
- hackers each day. The newspapers have articles about alleged computer
- crime and phone fraud almost weekly. The legal system is issuing
- indictments, the secret service is running around with wildcard search
- warrants, and captured naive hackers are turning on each other. Some
- well known computer people have formed a lobby called the "Electronic
- Frontier Foundation". Fox TV has news people on the scene during a
- bust of an alleged "hacker" who was invading their own doofus system!
- Non-computer "lay" people have been asking me a lot of questions.
-
- So who am I? I'm just another computer bum. I got into computers in
- the early seventies during high school. I've witnessed computing's
- rise as something social outcasts did to something everybody wanted to
- be a part of. Babes looked at us with disgust as we grabbed our data
- on 110 baud teletypes and paper tape. Rolls of paper tape and access
- to timeshared basic was so great that we didn't even think that it
- could get better. Well guess what? Computers and our social position
- kept getting better. It got so good that pretty soon everybody wanted
- to ask us questions.
-
- These days we are like doctors at a cocktail party, we are always
- getting hit on for free computer consulting! Even from the babes!
- You've come a long way baby! Later I got into the professional side,
- that is, systems programming, systems management, and software
- development. I've worked with GE, Xerox, IBM, Digital, CDC, HP,
- Prime, anything I could get my hands on. I dearly loved the DEC-10,
- learned to live with VAX/VMS, and now grit my teeth when I work with
- Unix/MS-DOS. My hobby became my career, and they paid me money for
- it. My chosen hacking name is "bugs bunny" and you can find me on some
- bulletin boards as user "bugs". Bugs was always creating virtual
- rabbit holes out of thin air and dodging in and out of them. True
- hackers love to find and fix software "bugs". Yea!! I'm 34 now and a
- dad.
-
- Being involved in computers for a long time gives me a better
- perspective than most. Over the years there would sometimes be a major
- media coverage of some computer crime event. As a local computer
- "heavy", there were always questions coming my way about what these
- things were all about. Lately, the questions are more frequent and
- more sophisticated. All these big highly publicized busts are opening
- a lot of issues. I didn't have answers to some of these questions so
- I sat down and did some thinking. Writing this article is an
- outgrowth of that. I am not a writer so grant me some journalistic
- slack.
-
- Back in the early seventies hacking was quite free. Most of the
- important stuff was running on batch mainframes that had no connection
- to the outside world. The systems that we played with were not really
- considered critical by anyone. We were allowed to play to our hearts
- content, and nobody really worried about it at all. This period is
- what I like to think of as the "rise of hacking". You can read about
- some of it in the first section of Levy's book, "HACKERS". I love
- that section and read it when current events depress me. In those
- days the definition of hacker was clear and clean. It was fun, it was
- hi-tech, it was a blast, and it was not a threat. There were no big
- busts, very few people understood computing, and the public had no
- interest in it.
-
- We hacked for the sheer love of it. How can I describe the depth of
- interest that we had? We were not concerned with our image or our
- "identity". We wrote games, wrote neat hacks, and learned the
- strengths or weaknesses of each system. We were able to obtain access
- to a broad range of systems. Consider teenage boys comparing and
- contrasting the systems designed by older engineers! We eventually
- reached a point where we decided how a system should be set up. At
- this point we began to make an annoyance of ourselves. In all
- instances the various administrations considered us minor annoyances.
- They had much more pressing problems!
-
- New users began to show up in the labs. They reluctantly wanted to
- get something done that absolutely had to be done on the computer. In
- many cases they had no idea how to start, and were left to their own
- devices. Centralized data processing management (MIS) didn't want to
- deal with them. Often, they saw us playing around, joking, laughing,
- carefree, and not at all intimidated by the computer. They, on the
- other hand, were quite intimidated. We helped these people get
- started, showed them were the documentation was, and explained
- various error conditions to them. We quickly developed reputations as
- knowing how to get something to work.
-
- One of the people I helped made a remark to me that has stuck with me
- for a long time. He said, "I am trained as a civil engineer, so I
- don't have a feel for this. But you, you are pure bred. You've
- gotten into this fresh and taught yourself from the ground up. You
- haven't been trained into any set doctrine." Phar out man! This is
- an important point. There were no rules, guidelines, or doctrines.
- We made our own up as our experiences dictated.
-
- As time wore on, the new user pool began to grow more rapidly. The
- computers began to creak and groan under the work loads that were
- being placed upon them. During the day time, we came to the computer
- area to find it packed. We could no longer access the computers
- during the day. After all, we were just playing! That was OK with
- us. Soon we were there at night and on weekends. We obtained the
- off-hour non-prime time access, but this put us further away from the
- mainstream. These new guys liked the timeshared computers much more
- than their mainframe batch machines. They started to move their darn
- *important* crud from the mainframe machines to "our" timesharing
- computers. Pretty soon the administrations started to think about
- what it meant to have payroll or grades on the same computers that had
- "star-trek version 8", "adventure", or "DECWAR version 2.2". They
- were concerned about security on the timesharing systems, but due to
- their budget constraints, most of the centralized MIS shops still had
- to give priority to their batch mainframes. We continued to play, but
- we cursed at the slow systems when the important stuff was running. I
- got off "tuning" systems to make them run faster or more efficiently.
- Interactive response time became the holy grail.
-
- The "rise of hacking" was beginning to run out of steam. The
- timesharing systems had been expanded as much as technology and
- budgets would allow. We had learned the various systems internals
- inside and out. We now knew much more about the systems than the
- "official" maintainers did, and these maintainers perceived us as a
- threat to their positions. The computers were still overloaded. The
- nasty politics of access and resources began to rear their head. A
- convenient scapegoat was to eliminate access to games. Eliminate the
- people that were just playing. Examine all computing activity and bill
- for it. This didn't solve any of the problems (we all knew payroll
- and grades wouldn't fit in!) but it did raise the issue of the hackers
- to the surface. All of a sudden we became defined as a problem! We
- were soon getting shut out of various systems. New kids began to show
- up and pretend to be hackers. They would do anything to show off, and
- created large problems for "us".
-
- At this point the "stagnation" period was beginning. These were hard
- days for us. Many of my friends quit what they were doing. Many of
- us got real jobs on the computers we played with as a dodge.
- Centralized MIS departments began to be placed between the rock and
- hard place of limited budgets and unlimited customers. The new kids,
- the overloaded systems, the security concerns for the important
- applications, and the political situation all resulted in the
- stagnation of hacking.
-
- "Hacker" took on a bad connotation. I saw all kind of debates over
- what "hacker" meant. Some claimed it was a compliment, and should
- only be awarded to those bit twiddlers that were truly awesome. Many
- claimed that hackers were the scum of the earth and should be totally
- decimated! What could you do but stay out of the way and let things
- take their course? I realize now that it was in the MIS departments'
- *VESTED INTEREST* to define the term "hacker". Centralized MIS did
- not have the courage to fight for larger budgets. Upper level
- administrators who just approved the budget would freak out when they
- saw kids playing games on the computers in the library. MIS had to
- define this as bad, had to say they would put a stop to it. MIS had
- to look like they were managing the computer resources responsibly.
- Any unusual or politically unacceptable computer event that couldn't
- be covered up was caused by "hackers". It was a dodge for MIS! I am
- not saying that some questionable stuff didn't go down, I am just
- saying that it was logical to call anything "bad" by some sort of
- easily accepted label - "hackers".
-
- Of course, when the unusual computing event took place your budding
- journalists were johnny on the spot. You don't climb that journalist
- ladder by writing about boring stories. Wild computer stories about
- hacking captured the public interest. I suppose the public liked to
- hear that somebody could "beat" the system somehow. Journalists
- picked up on this and wrote stories that even I found hard to believe.
- The new kids, even when not asked, would blab all day long about the
- great things that they were doing. And don't you know, they would blab
- all day long about great hacks they heard that you pulled! Stories
- get wilder with each re-telling. I realize now that it was in the
- journalists' *VESTED INTEREST* to define the term "hacker". The public
- loves robin hood, the journalists went out and found lots of
- pseudo-robin hoods.
-
- More and more stories began to hit the public. We heard stories of
- military computers getting penetrated. We heard stories of big
- financial rip-offs. We heard cute stories about guys who paid
- themselves the round-off of millions of computer generated checks. We
- heard stories of kids moving space satellites! We heard stories of old
- ladies getting their phone bills in a heavy parcel box! As an old
- timer, I found a lot of these stories far fetched. It was all
- national inquirer type stuff to me. The public loved it, the
- bureaucrats used it, and the politicians began to see an opportunity!
-
- The end of the "stagnation" period coincides the arrival of the
- politicians. Was it in the *VESTED INTEREST* of the politicians to
- define the term "hacker"? You bet! Here was a safe and easy issue!
- Who would stand up and say they were FOR hackers? What is more
- politically esthetic than to be able to define a bad guy and then say
- you are opposed to it? More resources began to flow into law
- enforcement activities. When actual busts were made, the legal system
- had problems coming up with charges. The legal system has never really
- felt comfortable with the punishment side of hacking, however, they
- LOVE the chase. We didn't have guns, we were not very dangerous, but
- it is *neat* to tap lines and grab headlines!
-
- What a dangerous time this was. It was like a feedback loop, getting
- worse every week. When centralized MIS was unable to cover up a
- hacking event, they exaggerated it instead. Shoddy design or poor
- software workmanship was never an issue. Normally "skeptical"
- journalists did not ask for proof, and thrilled at the claims of
- multi-million dollar damages. Agents loved to be seen on TV (vote for
- me when I run!) wheeling out junior's Christmas present from last
- year, to be used as "evidence". The politicians were able to pass new
- laws without constitutional considerations. New kids, when caught,
- would rabidly turn on each other in their desperation to escape.
- Worried older hackers learned to shut up and not give their side for
- fear of the feeding frenzy. Hackers were socked with an identity
- crisis and an image problem. Hackers debated the meaning of hacker
- versus the meaning of cracker. We all considered the fundamental
- question, "What is a true hacker?". Cool administrators tried to walk
- the fine line of satisfying upper level security concerns without
- squelching creativity and curiosity.
-
- So what is this "renaissance" business? Am I expecting to see major
- hacker attacks on important systems? No way, and by the way, if you
- thought that, you would be using a definition created by someone with
- a vested interest in it. When did we start to realize that hacker was
- defined by somebody else and not us? I don't know, but it has only
- been lately. Was it when people started to ask us about these
- multi-million dollar damage claims? I really think this is an
- important point in time. We saw BellSouth claim an electronically
- published duplicate of an electronic document was worth nearly
- $100,000 dollars!
-
- We later saw reports that you could have called a 1-800 number and
- purchased the same document for under twenty bucks. Regular
- non-computer people began to express suspicion about the corporate
- claims. They expressed suspicion about the government's position. And
- generally, began to question the information the media gave them.
- Just last month an article appear in the Wall Street Journal about
- some hackers breaking in to electronic voice mail boxes (fancy
- answering machines). They quoted some secret service agent as saying
- the damages could run to the tens of millions of dollars. Somebody
- asked me how in the world could screwing around with peoples answering
- machines cause over 10 million dollars in damages? I responded, "I
- don't know dude! Do you believe what you read?"
-
- And when did the secret service get into this business? People say
- to me, "I thought the secret service was supposed to protect the
- president. How come the secret service is busting kids when the FBI
- should be doing the busting?" What can I do but shrug? Maybe all the
- Abu-Nidals are gone and the president is safe. Maybe the FBI is all
- tied up with some new AB-SCAM or the S&L thing. Maybe the FBI is
- damn tired of hackers and hacking!
-
- In any event, the secret service showed it's heavy hand with the big
- series of busts that was widely publicized recently. They even came
- up with *NEAT* code names for it. "Operation SUNDEVIL", WOW! I
- shoulda joined the secret service!!! Were they serious or was this
- their own version of dungeons and dragons? In a very significant way,
- they blew it. A lot of those old nasty constitutional issues surfaced.
-
- They really should define clearly what they are looking for when they
- get a search warrant. They shouldn't just show up, clean the place
- out, haul it back to some warehouse, and let it sit for months while
- they figure out if they got anything. This event freaked a lot of
- lay people out. The creation of the Electronic Frontier Foundation is
- a direct result of the blatantly illegal search and seizure by the
- secret service. People are worried about what appears to be a police
- state mentality, and generally feel that the state has gone to far. I
- think the average American has a gut level feel for how far the state
- should go, and the SS clearly went past that point. To be fair, there
- aren't any good guidelines to go by in a technical electronic world,
- so the secret service dudes had to decide what to do on their own. It
- just turned out to be a significant mistake.
-
- I saw Clifford Stoll, the author of the popular book "Cuckoos Egg"
- testify on national C-SPAN TV before congress. His book is a very
- good read, and entertaining as well. A lot of lay people have read
- the book, and perceive the chaos within the legal system. Stoll's
- book reveals that many systems are not properly designed or
- maintained. He reveals that many well known "holes" in computer
- security go unfixed due to the negligence of the owners. This book
- generated two pervasive questions. One, why were there so many
- different law enforcement agencies that could claim jurisdiction? Lay
- people found it amazing that there were so many and that they could
- not coordinate their efforts. Two, why were organizations that
- publicly claimed to be worried about hackers not updating their
- computer security to fix stale old well known problems? If indeed a
- hacker were able to cause damage by exploiting such a well known
- unfixed "hole", could the owner of the computer be somehow held
- responsible for part of the damage? Should they?
-
- We all watched in amazement as the media reported the progress of
- Robert Morris's "internet worm". Does that sound neat or what?
- Imagine all these lay people hearing about this and trying to judge if
- it is a problem. The media did not do a very good job of covering
- this, and the computing profession stayed away from it publicly. A
- couple of guys wrote academic style papers on the worm, which says
- something about how important it really was. This is the first time
- that I can remember anyone examining a hacking event in such fine
- detail. We started to hear about military interest in "worms" and
- "viruses" that could be stuck into enemy computers. WOW! The media
- accepted the damage estimates that were obviously inflated. Morris's
- sentence got a lot of publicity, but his fine was very low compared to
- the damage estimates. People began to see the official damage
- estimates as not being very credible.
-
- We are in the first stages of the hacking renaissance. This period
- will allow the hackers to assess themselves and to re-define the term
- "hacker". We know what it means, and it fits in with the cycle of
- apprentice, journeyman, and master. Its also got a little artist,
- intuition, and humor mixed in. Hackers have the chance to repudiate
- the MISs', the journalists', and the politicians' definition! Average
- people are questioning the government's role in this and fundamental
- rights. Just exactly how far should the government go to protect
- companies and their data? Exactly what are the responsibilities of a
- company with sensitive, valuable data on their computer systems?
- There is a distinct feeling that private sector companies should be
- doing more to protect themselves. Hackers can give an important
- viewpoint on these issues, and all of a sudden there are people
- willing to listen.
-
- What are the implications of the renaissance? There is a new public
- awareness of the weakness in past and existing systems. People are
- concerned about the privacy of their electronic mail or records on the
- popular services. People are worried a little about hackers reading
- their mail, but more profoundly worried about the services or the
- government reading their stuff. I expect to see a very distinct public
- interest in encrypted e-mail and electronic privacy. One of my
- personal projects is an easy to use e-mail encrypter that is
- compatible with all the major e-mail networks. I hope to have it
- ready when the wave hits!
-
- Personal computers are so darn powerful now. The centralized MIS
- department is essentially dead. Companies are moving away from the
- big data center and just letting the various departments role their
- own with PCs. It is the wild west again! The new users are on their
- own again! The guys who started the stagnation are going out of
- business! The only thing they can cling to is the centralized data
- base of information that a bunch of PCs might need to access. This
- data will often be too expensive or out-of-date to justify, so even
- that will die off. Scratch one of the vested definers! Without
- centralized multi-million dollar computing there can't be any credible
- claims for massive multi-million dollar damages.
-
- Everyone will have their own machine that they can walk around with.
- It is a vision that has been around for awhile, but only recently have
- the prices, technology, and power brought decent implementations
- available. Users can plug it into the e-mail network, and unplug it.
- What is more safe than something you can pick up and lock up? It is
- yours, and it is in your care. You are responsible for it. Without
- the massive damage claims, and with clear responsibility, there will
- no longer be any interest from the journalists. Everybody has a
- computer, everybody knows how much the true costs of damage are. It
- will be very difficult for the journalists to sensationalize about
- hackers. Scratch the second tier of the vested definers! Without
- media coverage, the hackers and their exploits will fade away from the
- headlines.
-
- Without public interest, the politicians will have to move on to
- greener pastures. In fact, instead of public fear of hackers, we now
- are seeing a public fear of police state mentality and abuse of power.
- No politician is going to want to get involved with that! I expect to
- see the politicians fade away from the "hacker" scene rapidly.
- Scratch the third tier of the vested definers! The FBI and the secret
- service will be pressured to spend time on some other "hot" political
- issue.
-
- So where the heck are we? We are now entering the era of truly
- affordable REAL systems. What does REAL mean? Ask a hacker dude!
- These boxes are popping up all over the place. People are buying them,
- buying software, and trying to get their work done. More often than
- not, they run into problems, and eventually find out that they can ask
- some computer heavy about them. Its sort of come full circle, these
- guys are like the new users of the old timesharing systems. They had
- an idea of what they wanted to do, but didn't know how to get there.
- There wasn't a very clear source of guidance, and sometimes they had
- to ask for help. So it went!
-
- The hackers are needed again. We can solve problems, get it done,
- make it fun. The general public has the vested interest in this! The
- public has a vested interest in electronic privacy, in secure personal
- systems, and in secure e-mail. As everyone learns more, the glamour
- and glitz of the mysterious hackers will fade. Lay people are getting
- a clearer idea of whats going on. They are less willing to pay for
- inferior products, and aren't keen about relying on centralized
- organizations for support. Many know that the four digit passcode
- some company gave them doesn't cut the mustard.
-
- What should we hackers do during this renaissance? First we have to
- discard and destroy the definition of "hacker" that was foisted upon
- us. We need to come to grips with the fact that there were
- individuals and groups with a self interest in creating a hysteria
- and/or a bogeyman. The witch hunts are over and poorly designed
- systems are going to become extinct. We have cheap personal portable
- compatible powerful systems, but they do lack some security, and
- definitely need to be more fun. We have fast and cheap e-mail, and
- this needs to be made more secure. We have the concept of electronic
- free speech, and electronic free press. I think about what I was able
- to do with the limited systems of yesterday, and feel very positive
- about what we can accomplish with the powerful personal systems of
- today.
-
- On the software side we do need to get our operating system house in
- order. The Unix version wars need to be stopped. Bill Gates must
- give us a DOS that will make an old operating system guy like me
- smile, and soon! We need to stop creating and destroying languages
- every three years and we need to avoid software fads (I won't mention
- names due to personal safety concerns). Ken Olsen must overcome and
- give us the cheap, fast, and elegantly unconstrained hardware platform
- we've waited for all our lives. What we have now is workable (terrific
- in terms of history), but it is a moral imperative to get it right.
- What we have now just doesn't have the "spark" (I am not doing a pun
- on sun either!!!). The hackers will know what I mean.
-
- If we are able to deal with the challenges of the hacking
- renaissance, then history will be able to record the hackers as
- pioneers and not as vandals. This is the way I feel about it, and
- frankly, I've been feeling pretty good lately. The stagnation has
- been a rough time for a lot of us. The stock market guys always talk
- about having a contrarian view of the market. When some company gets
- in the news as a really hot stock, it is usually time to sell it.
- When you hear about how terrible some investment is, by some perverse
- and wonderful force it is time to buy it. So it may be for the
- "hackers". We are hearing how terrible "hackers" are and the millions
- of dollars of vandalism that is being perpetrated. At this historic
- low are we in for a reversal in trend? Will the stock in "hackers"
- rise during this hacking renaissance? I think so, and I'm bullish on
- the 90's also! Party on d00des!
-
- ------------------------------------------------------------------------------
-
- / /
- / NIA072 / File 3 /
- / /
- / MANIFESTO OF THE AMERICAN COMPUTIST /
- / by Erik Bloodaxe /
- / /
- / /
-
- A spectre is haunting the America--the spectre of
- Computing. All the Powers of Western Capitalism have entered
- into a holy alliance to exorcise this spectre: BOC and LDS,
- lawyers and judges, corporate CEOs and federal law
- enforcement officials.
-
- Where is the person in quest of knowledge that has not
- been decried as "hacker" by opponents in power? Where the
- Opposition that has not hurled back the branding reproach of
- Social Miscreant, against the more advanced opposition, as
- well as against its techno-illiterate adversaries?
-
- Two things result from this fact.
-
- I. Computers are already acknowledged by all Western
- Powers to be themselves a power.
- II. It is high time that the Computists should openly,
- in the face of the whole world, publish their views, their
- aims, their tendencies, and meet this nursery tale of the
- Spectre of Computing with a manifesto of the users
- themselves.
-
- To this end, Computists of various races, purposes, and
- classes have voiced their opinions, and from these the
- following Manifesto has been sketched.
-
-
- I. BUSINESSMEN AND USERS
-
- The history of all hitherto existing society is the
- history of struggles. Freeman and slave, patrician and
- plebeian, lord and serf, guild-master and journeyman, in a
- word, oppressor and oppressed, stood in constant opposition
- to one another, carried on an uninterrupted, now hidden, now
- open fight, a fight that each time ended either in a
- revolutionary re-constitution of society at large, or in the
- common ruin of the contending classes.
-
- In this, the era of epoch of Big Business, we are again
- engaged in struggle. This era, however, possesses a
- distinctive feature: the objective of increased profit masks
- the reality of those that are truly threats, and those that
- are merely perceived as such. Through this avaricious
- vision, government is forced into becoming a pawn of the
- corporate leaders who wish to stamp out any threat, real or
- imaginary, upon their first instinct to do so.
-
- Through this procedural paranoia, those who get caught
- in the whirlwind of events stemming from business-induced
- federal investigations often find their rights in serious
- jeopardy.
-
- The word of Business is taken as law. The colorful
- portrait of a computer-based threat to the workings of
- Business, thereby disrupting profit, and in turn the economy,
- force the politicians to act in great haste in forcing orders
- down the bureaucratic hierarchy to eliminate the threat.
- This fact, accompanied by the threat of removal of corporate
- contributions to political campaigns, increases the bias in
- which the procedures of investigation are conducted.
-
- Business today has achieved near deification. The reach
- of corporations has become immeasurable. This influence has
- stripped away the existence of the rights of individuals,
- leaving behind only a few stray hemp fibers from a once full
- Constitution.
-
- This fact is intolerable. The Government was created
- by and for the people that it would govern. Special influences
- have no place in decision making on who is to be governed and
- how. The corporate grasp must be loosened so that Democracy
- can flourish in its natural course.
-
-
- II. SOCIETY AND COMPUTISTS
-
- To society as a whole, the Computist is an often
- misunderstood entity. The media representation of the
- Computist left the public with a jaded image. Stories of
- Computer-based threats to National Security, to Emergency
- Networks, and to Hospital Patients left the public enraged
- by and frightened of the people possessing knowledge to
- interface with today's electronic world.
-
- Actual computer-related incidents that may have
- adversely affected the nation can be counted on the fingers
- of one hand, while more minor instances are played up by the
- Corporations and sent to the media to stir up more unrest
- against the Computist. The more often occurrence is an
- action of benefit. Computists point out flaws, alert people
- to problems in security, and in general assure that the
- nation's computer networks remain safe from foreign
- intrusions.
-
- These actions are mutually beneficial for both parties.
- The Computist gains the experience and knowledge, and the
- Business owning the system gains further protection. For
- this act of good faith, the Computist is not thanked, rather
- he is threatened, investigated, fined and possibly jailed.
- This is most often the case even when the Computist has made
- himself known from the onset.
-
- Computists have the power to do a great many things that
- society as a whole is unaware of. This power is perceived as
- a threat to Business, who has kept the mere existence of such
- power quietly to themselves. It has long been agreed upon
- that the public should never truly know the true extent of
- the influence Business actually has over their individual
- lives. Business, through the use of a computer, has ready
- access to eavesdrop on any telephone call placed in this
- country; to view any criminal record, sealed or unsealed; to
- view and alter any financial and credit records; to seize and
- transfer assets from any bank or other financial institution
- and to view any medical or psychiatric records.
-
- Business knows who you associate with, what you spend,
- what you buy, where you go, and who and what you are.
- Through these records they can designate how much you will
- have to pay for the things you wish to purchase, and what
- methods you will most easily succumb to in being forced to do
- so.
-
- To alert the public to these facts and to help in the
- eradication of Business influence, the Computists call for
- certain measures to be enacted.
-
- 1. The abolition of all current computer crime laws.
-
- 2. The re-evaluation of what encompasses computer crime
- by legislature, by Computists, and by other legal counsel to
- provide legal statutes that strictly outline progressive
- guidelines to the crime and their respective punishments.
-
- 3. Full disclosure by Business of the powers they have
- kept hidden from the public, so that all may know the
- possibilities that exist today for Business to invade the
- privacy of the society.
-
- 4. Extensive training for all federal and local law
- enforcement officials who will be assigned to investigate
- computer-related crime so that they will be skillful enough
- in their duties to properly execute this task.
-
- 5. Computer education classes to be required of all
- children enrolled in schools, public or otherwise, to begin
- as early as the first year enrolled, and to continue up
- through the completion of the end of their secondary
- education.
-
- 6. Continuing education classes in computer instruction
- to be provided free-of-charge to any willing adult through
- local educational facilities.
-
- 7. Government published documents on all conceivable
- aspects of computing to be provided free-of-charge through
- the General Services Administration via the Consumer
- Information Catalog.
-
-
- III. COMPUTIST LITERATURE
-
- In the past most Computist literature has been left as
- underground newspapers, and selectively mailed electronic
- digests. These were the first to attempt to expose the
- untruths and to surface the hidden powers of Business. This
- media, although provided at little or no cost, has always
- received limited distribution due to Business-induced
- governmental intrusions.
-
- There have also been countless texts produced covering
- the operations of softwares and of operating systems. These
- texts have always had the potential to reach a great many
- persons, but have been provided at a cost that may have
- deterred the average person from their purchase.
-
- Government publications have the potential to reach
- every member of society, and can provide all people with
- current, correct, and understandable information. This type
- of distribution would greatly increase society's knowledge of
- computers and reduce the tensions felt towards the subject.
- With increased knowledge of computers, society as a whole
- would prosper, allowing all members the potential to move
- technology forward towards a better and more productive
- future.
-
-
- IV. POSITION OF THE COMPUTIST STRUGGLE IN RELATION TO THE
- VARIOUS EXISTING OPPOSITION PARTIES
-
- The struggle of the Computist against Big Business is a
- microcosm of society as a whole. This struggle should be the
- struggle of every man and woman in this country. We are all
- being oppressed and suppressed by the powers of Big Business
- influencing our government, making it work against the needs
- of society. To end this atrocity that we have allowed to
- imbed itself in our nation we must all work together.
-
-
- PEOPLE OF THE NATION, UNITE!
-
- -----------------------------------------------------------------------------
-
-
- / /
- / NIA 072 / File 4 /
- / /
- / `Foiling the Cracker' /
- / A Survey of, and Improvements to, Password Security /
- / This work was sponsored in part by the U.S. Department of Defense. /
- / /
- / Killing Joke /
- / /
-
- Daniel V. Klein
- Software Engineering Institute
- Carnegie Mellon University
- Pittsburgh, PA 15217
- dvk@sei.cmu.edu
- +1 412 268 7791
-
- With the rapid burgeoning of national and international networks, the
- question of system security has become one of growing importance. High speed
- inter-machine communication and even higher speed computational processors
- have made the threats of system ``crackers,'' data theft, data corruption
- very real. This paper outlines some of the problems of
- current password security by demonstrating the ease by which individual
- accounts may be broken. Various techniques used by crackers are outlined,
- and finally one solution to this point of system vulnerability, a proactive
- password checker, is proposed.
-
- Introduction
-
- The security of accounts and passwords has always been a concern for the
- developers and users of Unix.
- When Unix was younger, the password encryption algorithm was a simulation of
- the M-209 cipher machine used by the U.S. Army during World War II.
-
- %A Robert T. Morris
- %A Ken Thompson
- %T Password Security: A Case History
- %J Communications of the ACM
- %V 22
- %N 11
- %P 594-597
- %D November 1979
- %L Morris1979
-
- This was
- a fair encryption mechanism in that it was difficult to invert under the
- proper circumstances, but suffered in that it was too fast an algorithm. On a
- PDP-11/70, each encryption took approximately 1.25ms, so that it was possible
- to check roughly 800 passwords/second. Armed with a dictionary of 250,000
- words, a cracker could compare their encryptions with those all stored in the
- password file in a little more than five minutes. Clearly, this was a
- security hole worth filling.
-
- In later (post-1976) versions of Unix, the DES algorithm
-
- %T Proposed Federal Information Processing Data Encryption Standard
- %J Federal Register (40FR12134)
- %D March 17, 1975
- %L DES1975
-
- was used to encrypt
- passwords. The user's password is used as the DES key, and the algorithm is
- used to encrypt a constant. The algorithm is iterated 25 times, with the
- result being an 11 character string plus a 2-character ``salt.'' This method
- is similarly difficult to decrypt (further complicated through the
- introduction of one of 4096 possible salt values) and had the added advantage
- of being slow. On a (VAX-II (a machine substantially faster than a
- PDP-11/70), a single encryption takes on the order of 280ms, so that a
- determined cracker can only check approximately 3.6 encryptions a second.
- Checking this same dictionary of 250,000 words would now take over 19
- hours of CPU time. Although this is still not very much time to break
- a single account, there is no guarantee that this account will use one of
- these words as a password. Checking the passwords on a system with 50
- accounts would take on average 40 CPU days (since the random selection
- of salt values practically guarantees that each user's password will be
- encrypted with a different salt), with no guarantee of success. If this new,
- slow algorithm was combined with the user education needed to prevent the
- selection of obvious passwords, the problem seemed solved.
-
- Regrettably, two recent developments and the recurrence of an old one have
- brought the problem of password security back to the fore.
-
- CPU speeds have gotten increasingly faster since 1976, so much so that
- processors that are 25-40 times faster than the PDP-11/70 (e.g., the
- DECstation 3100 used in this research) are readily
- available as desktop workstations. With inter-networking, many sites have
- hundreds of the individual workstations connected together, and enterprising
- crackers are discovering that the ``divide and conquer'' algorithm can
- be extended to multiple processors, especially at night when those processors
- are not otherwise being used. Literally thousands of times the computational
- power of 10 years ago can be used to break passwords.
-
- New implementations of the DES encryption algorithm have been developed, so
- that the time it takes to encrypt a password and compare the encryption
- against the value stored in the password file has dropped below the 1ms mark.
-
- %A Matt Bishop
- %T An Application of a Fast Data Encryption Standard Implementation
- %J Computing Systems
- %V 1
- %N 3
- %P 221-254
- %D Summer 1988
- %L Bishop1988
-
-
- %A David C. Feldmeier
- %A Philip R. Karn
- %T UNIX Password Security - Ten Years Later
- %J CRYPTO Proceedings
- %D Summer 1989
- %L Feldmeier1989
-
- On a single workstation, the dictionary of 250,000 words can once
- again be cracked in under five minutes. By dividing the work across multiple
- workstations, the time required to encrypt these words against all 4096 salt
- values could be no more than an hour or so. With a recently described
- hardware implementation of the DES algorithm, the time for each encryption
- can be reduced to approximately 6ms.
-
- %A Philip Leong
- %A Chris Tham
- %T UNIX Password Encryption Considered Insecure
- %J USENIX Winter Conference Proceedings
- %D January 1991
- %L Leong1991
-
- This means that this same dictionary can be be cracked in only 1.5 seconds.
-
- Users are rarely, if ever, educated as to what are wise choices for
- passwords. If a password is in a dictionary, it is extremely vulnerable to
- being cracked, and users are simply not coached as to ``safe'' choices for
- passwords. Of those users who are so educated, many think that simply
- because their password is not in /usr/dict/words, it is safe from
- detection. Many users also say that because they do not have any private
- files on-line, they are not concerned with the security of their account,
- little realizing that by providing an entry point to the system they allow
- damage to be wrought on their entire system by a malicious cracker.
-
- Because the entirety of the password file is readable by all users, the
- encrypted passwords are vulnerable to cracking, both on-site and off-site.
- Many sites have responded to this threat with a reactive solution - they
- scan their own password files and advise those users whose passwords they are
- able to crack. The problem with this solution is that while the local site
- is testing its security, the password file is still vulnerable from the
- outside. The other problems, of course, are that the testing is very time
- consuming and only reports on those passwords it is able to crack. It does
- nothing to address user passwords which fall outside of the specific test
- cases (e.g., it is possible for a user to use as a password the letters
- ``qwerty'' - if this combination is not in the in-house test dictionary, it
- will not be detected, but there is nothing to stop an outside cracker from
- having a more sophisticated dictionary!).
-
- Clearly, one solution to this is to either make /etc/passwd unreadable,
- or to make the encrypted password portion of the file unreadable. Splitting
- the file into two pieces - a readable /etc/passwd with all but the
- encrypted password present, and a ``shadow password'' file that is only
- readable by Broot is the solution proposed by Sun Microsystems (and
- others) that appears to be gaining popularity. It seems, however, that this
- solution will not reach the majority of non-Sun systems for quite a while,
- nor even, in fact, many Sun systems, due to many sites'
- reluctance to install new releases of software.
-
- The problem of lack of password security is not just endemic to Unix. A
- recent Vax/VMS worm had great success by simply trying the username as the
- password. Even though the VMS user authorization file is inaccessible to
- ordinary users, the cracker simply tried a number of ``obvious'' password
- choices - and easily gained access.
-
- What I propose, therefore, is a publicly available proactive password
- checker, which will enable users to change their passwords, and to
- check a priori whether the new password is ``safe.'' The criteria for
- safety should be tunable on a per-site basis, depending on the degree of
- security desired. For example, it should be possible to specify a minimum
- length password, a restriction that only lower case letters are not allowed,
- that a password that looks like a license plate be illegal, and so on.
- Because this proactive checker will deal with the pre-encrypted passwords, it
- will be able to perform more sophisticated pattern matching on the password,
- and will be able to test the safety without having to go through the effort of
- cracking the encrypted version. Because the checking will be done
- automatically, the process of education can be transferred to the machine,
- which will instruct the user why a particular choice of password is bad.
-
- Password Vulnerability
-
- It has long been known that all a cracker need do to acquire access to a
- Unix machine is to follow two simple steps, namely:
-
- Acquire a copy of that site's /etc/passwd file, either through an
- unprotected uucp link, well known holes in sendmail, or via
- ftp or tftp.
-
- Apply the standard (or a sped-up) version of the password encryption
- algorithm to a collection of words, typically /usr/dict/words plus some
- permutations on account and user names, and compare the encrypted results to
- those found in the purloined /etc/passwd file.
-
- If a match is found (and often at least one will be found), the
- cracker has access to the targeted machine. Certainly, this mode of attack
- has been known for some time,
-
- %A Eugene H. Spafford
- %T The Internet Worm Program: An Analysis
- %R Purdue Technical Report CSD-TR-823
- %I Purdue University
- %D November 29, 1988
- %L Spafford1988
-
- and the defenses against this attack have also
- long been known. What is lacking from the literature is an accounting of
- just how vulnerable sites are to this mode of attack. In short, many people kno
- w that there is a problem, but few people believe it applies to them.
-
- ``There is a fine line between helping
- administrators protect their systems and providing a cookbook for bad guys.''
-
- %A F. Grampp
- %A R. Morris
- %T Unix Operating System Security
- %J AT&T Bell Labs Technical Journal
- %V 63
- %N 8
- %P 1649-1672
- %D October 1984
- %L Grampp1984
-
- The problem here, therefore, is how to divulge useful information on the
- vulnerability of systems, without providing too much information, since
- almost certainly this information could be used by a cracker to break into
- some as-yet unviolated system.
- Most of the work that I did was of a
- general nature - I did not focus on a particular user or a
- particular system, and I did not use any personal information that might be
- at the disposal of a dedicated ``bad guy.'' Thus any results which I have
- been able to garner indicate only general trends in password usage, and
- cannot be used to great advantage when breaking into a particular system. This
- generality notwithstanding, I am sure that any self-respecting cracker would
- already have these techniques at their disposal, and so I am not bringing to
- light any great secret. Rather, I hope to provide a basis for protection for
- systems that can guard against future attempts at system invasion.
-
- The Survey and Initial Results
-
- In October and again in December of 1989, I asked a number of friends and
- acquaintances around the United States and Great Britain to participate
- in a survey. Essentially what I asked them to do was to mail me a copy of
- their /etc/passwd file, and I would try to crack their passwords (and
- as a side benefit, I would send them a report of the vulnerability of their
- system, although at no time would I reveal individual passwords nor even of
- their sites participation in this study). Not surprisingly, due to the
- sensitive nature of this type of disclosure, I only received a small fraction
- of the replies I hoped to get, but was nonetheless able to acquire a database
- of nearly 15,000 account entries. This, I hoped, would provide a
- representative cross section of the passwords used by users in the community.
-
- Each of the account entries was tested by a number of intrusion strategies,
- which will be covered in greater detail in the following section. The
- possible passwords that were tried were based on the user's name or account
- number, taken from numerous dictionaries (including some containing
- foreign words, phrases, patterns of keys on the keyboard, and enumerations),
- and from permutations and combinations of words in those dictionaries.
- All in all, after nearly 12 CPU months of rather exhaustive testing,
- approximately 25% of the passwords had been guessed. So that you do not
- develop a false sense of security too early, I add that 21% (nearly 3,000
- passwords) were guessed in the first week, and that in the first 15
- minutes of testing, 368 passwords (or 2.7%) had been cracked using what
- experience has shown
- would be the most fruitful line of attack (i.e., using the user or
- account names as passwords). These statistics are
- frightening, and well they should be. On an average system with 50
- accounts in the /etc/passwd file, one could expect the first account to
- be cracked in under 2 minutes, with 5-15 accounts being cracked by the end of
- the first day. Even though the Broot account may not be cracked, all it
- takes is one account being compromised for a cracker to establish a toehold
- in a system. Once that is done, any of a number of other well-known security
- loopholes (many of which have been published on the network) can be used to
- access or destroy any information on the machine.
-
- It should be noted that the results of this testing do not give us any
- indication as to what the uncracked passwords are. Rather, it only
- tells us what was essentially already known - that users are likely to use
- words that are familiar to them as their passwords.
-
- %A Bruce L. Riddle
- %A Murray S. Miron
- %A Judith A. Semo
- %T Passwords in Use in a University Timesharing Environment
- %J Computers & Security
- %V 8
- %N 7
- %P 569-579
- %D November 1989
- %L Riddle1989
-
- What new information it did provide, however, was the degree of
- vulnerability of the systems in question, as well as providing a basis for
- developing a proactive password changer - a system which pre-checks a
- password before it is entered into the system, to determine whether that
- password will be vulnerable to this type of attack. Passwords which can be
- derived from a dictionary are clearly a bad idea,
-
- %A Ana Marie De Alvare
- %A E. Eugene Schultz, Jr.
- %T A Framework for Password Selection
- %J USENIX UNIX Security Workshop Proceedings
- %D August 1988
- %L Alvare1988
-
- and users should be
- prevented from using them. Of course, as part of this censoring process,
- users should also be told why their proposed password is not good, and
- what a good class of password would be.
-
- As to those passwords which remain unbroken, I can only conclude that these
- are much more secure and ``safe'' than those to be found in my dictionaries.
- One such class of passwords is word pairs, where a password consists of two
- short words, separated by a punctuation character. Even if only words of
- 3 to 5 lower case characters are considered, /usr/dict/words provides
- 3000 words for pairing. When a single intermediary punctuation character is
- introduced, the sample size of 90,000,000 possible passwords is rather
- daunting. On a DECstation 3100, testing each of these passwords against that
- of a single user would require over 25 CPU hours - and even then, no
- guarantee exists that this is the type of password the user chose.
- Introducing one or two upper case characters into the password raises the
- search set size to such magnitude as to make cracking untenable.
-
- Another ``safe'' password is one constructed from the initial letters of an
- easily remembered, but not too common phrase. For example, the phrase ``Unix
- is a trademark of Bell Laboratories'' could give rise to the password
- ``UiatoBL.'' This essentially creates a password which is a random string of
- upper and lower case letters. Exhaustively searching this list at 1000 tests
- per second with only 6 character passwords would take nearly 230 CPU
- days. Increasing the phrase size to 7 character passwords makes the
- testing time over 32 CPU years - a Herculean task that even the most
- dedicated cracker with huge computational resources would shy away from.
-
- Thus, although I don't know what passwords were chosen by those users I was
- unable to crack, I can say with some surety that it is doubtful that anyone
- else could crack them in a reasonable amount of time, either.
-
- Method of Attack
-
- A number of techniques were used on the accounts in order to determine if the
- passwords used for them were able to be compromised. To speed up testing,
- all passwords with the same salt value were grouped together. This way, one
- encryption per password per salt value could be performed, with multiple
- string comparisons to test for matches. Rather than considering 15,000
- accounts, the problem was reduced to 4,000 salt values. The password tests
- were as follows:
-
- Try using the user's name, initials, account name, and other relevant
- personal information as a possible password. All in all, up to 130 different
- passwords were tried based on this information. For an account name
- Bklone with a user named ``Daniel V. Klein,'' some of the passwords that
- would be tried were: klone, klone0, klone1, klone123, dvk, dvkdvk, dklein,
- DKlein, leinad, nielk, dvklein, danielk, DvkkvD, DANIEL-KLEIN, (klone),
- KleinD, etc.
-
- Try using words from various dictionaries. These included lists of men's and
- women's names (some 16,000 in all); places (including permutations so that
- ``spain,'' ``spanish,'' and ``spaniard'' would all be considered); names of
- famous people; cartoons and cartoon characters; titles, characters, and
- locations from films and science fiction stories; mythical creatures
- (garnered from Bulfinch's mythology and dictionaries of mythical beasts);
- sports (including team names, nicknames, and specialized terms); numbers
- (both as numerals - ``2001,'' and written out - ``twelve''); strings of
- letters and numbers ( ``a,'' ``aa,'' ``aaa,'' ``aaaa,'' etc.); Chinese
- syllables (from the Pinyin Romanization of Chinese, a international standard
- system of writing Chinese on an English keyboard); the King James Bible;
- biological terms; common and vulgar phrases (such as ``fuckyou,'' ``ibmsux,''
- and ``deadhead''); keyboard patterns (such as ``qwerty,'' ``asdf,'' and
- ``zxcvbn''); abbreviations (such as ``roygbiv'' - the colors in the rainbow,
- and ``ooottafagvah'' - a mnemonic for remembering the 12 cranial nerves);
- machine names (acquired from /etc/hosts); characters, plays, and
- locations from Shakespeare; common Yiddish words; the names of asteroids;
- and a collection of words
- from various technical papers I had previously published.
- All told, more than 60,000 separate words were considered per user (with any
- inter- and intra-dictionary duplicates being discarded).
-
- Try various permutations on the words from step 2. This included making the
- first letter upper case or a control character, making the entire word
- upper case, reversing the word (with and without the aforementioned
- capitalization), changing the letter `o' to the digit `0' (so that the word
- ``scholar'' would also be checked as ``sch0lar''), changing the letter `l' to
- the digit `1' (so that ``scholar'' would also be checked as ``scho1ar,''
- and also as ``sch01ar''), and performing similar manipulations to change the
- letter `z' into the digit `2', and the letter `s' into the digit `5'.
- Another test was to make the word into a plural (irrespective of whether the
- word was actually a noun), with enough intelligence built in so that
- ``dress'' became ``dresses,'' ``house'' became ``houses,'' and ``daisy''
- became ``daisies.'' We did not consider pluralization rules exhaustively,
- though, so that ``datum'' forgivably became ``datums'' (not ``data''), while
- ``sphynx'' became ``sphynxs'' (and not ``sphynges''). Similarly, the suffixes
- ``-ed,'' ``-er,'' and ``-ing'' were added to transform words like ``phase''
- into ``phased,'' ``phaser,'' and ``phasing.'' These 14 to 17 additional
- tests per word added another 1,000,000 words to the list of possible
- passwords that were tested for each user.
-
- Try various capitalization permutations on the words from step 2 that were not
- considered in step 3. This included all single letter capitalization
- permutations (so that ``michael'' would also be checked as ``mIchael,''
- ``miChael,'' ``micHael,'' ``michAel,'' etc.), double letter capitalization
- permutations (``MIchael,'' ``MiChael,'' ``MicHael,'' ... , ``mIChael,''
- ``mIcHael,'' etc.), triple letter permutations, and so on. The single letter
- permutations added roughly another 400,000 words to be checked per user,
- while the double letter permutations added another 1,500,000 words. Three
- letter permutations would have added at least another 3,000,000 words per
- user had there been enough time to complete the tests. Tests of 4, 5, and
- 6 letter permutations were deemed to be impracticable without much more
- computational horsepower to carry them out.
-
- Try foreign language words on foreign users. The specific test that was
- performed was to try Chinese language passwords on users with Chinese names.
- The Pinyin Romanization of Chinese syllables was used, combining syllables
- together into one, two, and three syllable words. Because no tests were
- done to determine whether the words actually made sense, an exhaustive search
- was initiated. Since there are 398 Chinese syllables in the Pinyin system,
- there are 158,404 two syllable words, and slightly more than 16,000,000 three
- syllable words.
-
- The astute reader will notice that 398\s-2\u3\d\s+2 is in fact 63,044,972.
- Since Unix passwords are truncated after 8 characters, however, the number
- of unique polysyllabic Chinese passwords is only around 16,000,000.
- Even this reduced set was too large to complete under the imposed time
- constraints.
-
- A similar mode of attack could as easily be used with English, using rules
- for building pronounceable nonsense words.
-
- Try word pairs. The magnitude of an exhaustive test of this nature is
- staggering. To simplify this test, only words of 3 or 4 characters in length
- from /usr/dict/words were used. Even so, the number of word pairs is
- BOR(10\s-3\u7\d\s+3) (multiplied by 4096 possible salt values), and as of
- this writing, the test is only 10% complete.
-
- For this study, I had access to four DECstation 3100's, each of which was
- capable of checking approximately 750 passwords per second. Even with this
- total peak processing horsepower of 3,000 tests per second (some machines were
- only intermittently available), testing the BOR(10\s-3\u10\d\s+3)
- password/salt pairs for the first four tests
- required on the order of 12 CPU months of computations. The remaining
- two tests are still ongoing after an additional 18 CPU months of computation.
- Although for research purposes this is well within acceptable ranges, it is a
- bit out of line for any but the most dedicated and resource-rich cracker.
-
- Summary of Results
-
- The problem with using passwords that are derived directly from obvious words
- is that when a user thinks ``Hah, no one will guess this permutation,'' they
- are almost invariably wrong. Who would ever suspect that I would find their
- passwords when they chose ``fylgjas'' (guardian creatures from Norse
- mythology), or the
- Chinese word for ``hen-pecked husband''? No matter what words or permutations
- thereon are chosen for a password, if they exist in some dictionary, they are
- susceptible to directed cracking. The following table give an overview of
- the types of passwords which were found through this research.
-
- A note on the table is in order. The number of
- matches given from a particular dictionary is the total number of matches,
- irrespective of the permutations that a user may have applied to it. Thus, if
- the word ``wombat'' were a particularly popular password from the biology
- dictionary, the following table will not indicate whether it was entered as
- ``wombat,'' ``Wombat,'' ``TABMOW,'' ``w0mbat,'' or any of the other 71 possible
- differences that this research checked. In this way,
- detailed information can be divulged without providing much knowledge to
- potential ``bad guys.''
-
- Additionally, in order to reduce the total search time that was needed for
- this research, the checking program eliminated both inter- and
- intra-dictionary duplicate words. The dictionaries are listed in the order
- tested, and the total size of the dictionary is given in addition to
- the number of words that were eliminated due to duplication. For
- example, the word ``georgia'' is both a female name and a place, and is only
- considered once. A password which is identified as being found in the common
- names dictionary might very well appear in other dictionaries. Additionally,
- although ``duplicate,'' ``duplicated,'' ``duplicating'' and ``duplicative'' are
- all distinct words, only the first eight characters of a password are used in
- Unix, so all but the first word are discarded as redundant.
-
- Passwords cracked from a sample set of 13,797 accounts
- _
- Type of:Size of:Duplicates:Search:# of:Pct.:Cost/Benefit
- Password:Dictionary:Eliminated:Size:Matches:of Total:Ratio\s-2\u*\d\s+2
- =
- User/account name:130\s-3\u\(dg\d\s+3:\-:130:368:2.7%:2.830
- Character sequences:866:0:866:22:0.2%:0.025
- Numbers:450:23:427:9:0.1%:0.021
- Chinese:398:6:392:56:0.4%\s-3\u\(dd\d\s+3:0.143
- Place names:665:37:628:82:0.6%:0.131
- Common names:2268:29:2239:548:4.0%:0.245
- Female names:4955:675:4280:161:1.2%:0.038
- Male names:3901:1035:2866:140:1.0%:0.049
- Uncommon names:5559:604:4955:130:0.9%:0.026
- Myths & legends:1357:111:1246:66:0.5%:0.053
- Shakespearean:650:177:473:11:0.1%:0.023
- Sports terms:247:9:238:32:0.2%:0.134
- Science fiction:772:81:691:59:0.4%:0.085
- Movies and actors:118:19:99:12:0.1%:0.121
- Cartoons:133:41:92:9:0.1%:0.098
- Famous people:509:219:290:55:0.4%:0.190
- Phrases and patterns:998:65:933:253:1.8%:0.271
- Surnames:160:127:33:9:0.1%:0.273
- Biology:59:1:58:1:0.0%:0.017
- /usr/dict/words:24474:4791:19683:1027:7.4%:0.052
- Machine names:12983:3965:9018:132:1.0%:0.015
- Mnemonics:14:0:14:2:0.0%:0.143
- King James bible:13062:5537:7525:83:0.6%:0.011
- Miscellaneous words:8146:4934:3212:54:0.4%:0.017
- Yiddish words:69:13:56:0:0.0%:0.000
- Asteroids:3459:1052:2407:19:0.1%:0.007
- _
- Total:86280:23553:62727:B3340:B24.2%:0.053
-
- In all cases, the cost/benefit ratio is the number of matches divided by the
- search size. The more words that needed to be tested for a match, the lower
- the cost/benefit ratio.
-
- The dictionary used for user/account name checks naturally changed
- for each user. Up to 130 different permutations were tried for each.
-
- While monosyllablic Chinese passwords were tried for all users (with 12
- matches), polysyllabic Chinese passwords were tried only for users with
- Chinese names. The percentage of matches for this subset of users is 8% -
- a greater hit ratio than any other method. Because the dictionary size is
- over 16\(mu10\s-2\u6\d\s+2, though, the cost/benefit ratio is infinitesimal.
-
- The results are quite disheartening. The total size of the dictionary was
- only 62,727 words (not counting various permutations). This is much smaller
- than the 250,000 word dictionary postulated at the beginning of this paper,
- yet armed even with this small dictionary, nearly 25% of the passwords were
- cracked!
-
-
- Length of Cracked Passwords
- _
- Length:Count:Percentage
- =
- 1 character:4:0.1%
- 2 characters:5:0.2%
- 3 characters:66:2.0%
- 4 characters:188:5.7%
- 5 characters:317:9.5%
- 6 characters:1160:34.7%
- 7 characters:813:24.4%
- 8 characters:780:23.4%
-
- The results of the word-pair tests are not included in either of the two
- tables. However, at the time of this writing, the test was approximately 10%
- completed, having found an additional 0.4% of the passwords in the sample
- set. It is probably reasonable to guess that a total of 4% of the passwords
- would be cracked by using word pairs.
-
- Action, Reaction, and Proaction
-
- What then, are we to do with the results presented in this paper? Clearly,
- something needs to be done to safeguard the security of our systems from
- attack. It was with intention of enhancing
- security that this study was undertaken. By knowing what kind of passwords
- users use, we are able to prevent them from using those that are easily
- guessable (and thus thwart the cracker).
-
- One approach to eliminating easy-to-guess passwords is to periodically run a
- password checker - a program which scans /etc/passwd and tries to
- break the passwords in it.
-
- %A T. Raleigh
- %A R. Underwood
- %T CRACK: A Distributed Password Advisor
- %J USENIX UNIX Security Workshop Proceedings
- %D August 1988
- %L Raleigh1988
-
- This approach has two major drawbacks. The first
- is that the checking is very time consuming. Even a system with only 100
- accounts can take over a month to diligently check. A halfhearted check is
- almost as bad as no check at all, since users will find it easy to circumvent
- the easy checks and still have vulnerable passwords. The second drawback is
- that it is very resource consuming. The machine which is being used for
- password checking is not likely to be very useful for much else, since a
- fast password checker is also extremely CPU intensive.
-
- Another popular approach to eradicating easy-to-guess passwords is to force
- users to change their passwords with some frequency. In theory, while this
- does not actually eliminate any easy-to-guess passwords, it prevents the
- cracker from dissecting /etc/passwd ``at leisure,'' since once an
- account is broken, it is likely that that account will have had it's password
- changed. This is of course, only theory. The biggest disadvantage is that
- there is usually nothing to prevent a user from changing their password from
- ``Daniel'' to ``Victor'' to ``Klein'' and back again (to use myself as an
- example) each time the system demands a new password. Experience has shown
- that even when this type of password cycling is precluded, users are easily
- able to circumvent simple tests by using easily remembered (and easily
- guessed) passwords such as ``dvkJanuary,'' ``dvkFebruary,'' etc.
-
- %A Dr. Brian K Reid
- %D 1989
- %I DEC Western Research Laboratory
- %O Personal communication.
- %L Reid1989
-
- A good
- password is one that is easily remembered, yet difficult to guess. When
- confronted with a choice between remembering a password or creating one that
- is hard to guess, users will almost always opt for the easy way out, and
- throw security to the wind.
-
- Which brings us to the third popular option, namely that of assigned
- passwords. These are often words from a dictionary, pronounceable nonsense
- words, or random strings of characters. The problems here are numerous and
- manifest. Words from a dictionary are easily guessed, as we have seen.
- Pronounceable nonsense words (such as ``trobacar'' or ``myclepate'') are
- often difficult to remember, and random strings of characters (such as
- ``h3rT+aQz'') are even harder to commit to memory. Because these passwords
- have no personal mnemonic association to the users, they will often write
- them down to aid in their recollection. This immediately discards any
- security that might exist, because now the password is visibly associated
- with the system in question. It is akin to leaving the key under the door
- mat, or writing the combination to a safe behind the picture that hides it.
-
- A fourth method is the use of ``smart cards.'' These credit card sized
- devices contain some form of encryption firmware which
- will ``respond'' to an electronic ``challenge'' issued by the system onto
- which the user is attempting to gain acccess. Without the smart card, the
- user (or cracker) is unable to respond to the challenge, and is denied access
- to the system. The problems with smart cards have nothing to do with
- security, for in fact they are very good warders for your system. The
- drawbacks are that they can be expensive and must be carried at all times
- that access to the system is desired. They are also a bit of overkill for
- research or educational systems, or systems with a high degree of user
- turnover.
-
- Clearly, then, since all of these systems have drawbacks in some
- environments, an additional
- way must be found to aid in password security.
-
- A Proactive Password Checker
- The best solution to the problem of having easily guessed passwords on a
- system is to prevent them from getting on the system in the first place. If
- a program such as a password checker reacts by detecting guessable
- passwords already in place, then although the security hole is found, the hole
- existed for as long as it took the program to detect it (and for the user to
- again change the password). If, however, the program which changes user's
- passwords (i.e., /bin/passwd) checks for the safety and guessability
- before that password is associated with the user's account, then the
- security hole is never put in place.
-
- In an ideal world, the proactive password changer would require eight
- character passwords which are not in any dictionary, with at least one
- control character or punctuation character, and mixed upper and lower case
- letters. Such a degree of security (and of accompanying inconvenience to the
- users) might be too much for some sites, though. Therefore, the proactive
- checker should be tuneable on a per-site basis. This tuning could be
- accomplished either through recompilation of the passwd program, or
- more preferably, through a site configuration file.
-
- As distributed, the behavior of the proactive checker should be that of
- attaining maximum password security - with the system administrator being
- able to turn off certain checks. It would be desireable to be able to test
- for and reject all password permutations that were detected in this research
- (and others), including:
-
- Passwords based on the user's account name
-
- Passwords based on the user's initials or given name
-
- Passwords which exactly match a word in a dictionary (not
- just /usr/dict/words)
-
- Passwords which match a word in the dictionary with some or all
- letters capitalized
-
- Passwords which match a reversed word in the dictionary
-
- Passwords which match a reversed word in the dictionary with some or all
- letters capitalized
-
- Passwords which match a word in a dictionary with an arbitrary letter turned
- into a control character
-
- Passwords which match a dictionary word with the numbers `0', `1', `2', and
- `5' substituted for the letters `o', 'l', 'z', and 's'
-
- Passwords which are simple conjugations of a dictionary word (i.e., plurals,
- adding ``ing'' or ``ed'' to the end of the word, etc.)
-
- Passwords which are patterns from the keyboard (i.e., ``aaaaaa'' or ``qwerty'')
-
- Passwords which are shorter than a specific length (i.e., nothing shorter than
- six characters)
-
- Passwords which consist solely of numeric characters (i.e., Social Security
- numbers, telephone numbers, house addresses or office numbers)
-
- Passwords which do not contain mixed upper and lower case, or mixed letters
- and numbers, or mixed letters and punctuation
-
- Passwords which look like a state-issued license plate number
-
-
- The configuration file which specifies the level of checking need not be
- readable by users. In fact, making this file unreadable by users (and by
- potential crackers) enhances system security by hiding a valuable guide
- to what passwords are acceptable (and conversely, which kind of
- passwords simply cannot be found).
-
- Of course, to make this proactive checker more effective, it woule be
- necessary to provide the dictionaries that were used in this research
- (perhaps augmented on a per-site basis). Even more importantly, in addition
- to rejecting passwords which could be easily guessed, the proactive password
- changer would also have to tell the user why a particular password was
- unacceptable, and give the user suggestions as to what an acceptable password
- looks like.
-
- Conclusion (and Sermon)
-
- It has often been said that ``good fences make good neighbors.'' On a
- Unix system, many users also say that ``I don't care who reads my files, so I
- don't need a good password.'' Regrettably, leaving an account vulnerable to
- attack is not the same thing as leaving files unprotected. In the latter
- case, all that is at risk is the data contained in the unprotected files,
- while in the former, the whole system is at risk. Leaving the front door to
- your house open, or even putting a flimsy lock on it, is an invitation to the
- unfortunately ubiquitous people with poor morals. The same holds true for an
- account that is vulnerable to attack by password cracking techniques.
-
- While it may not be actually true that good fences make good neighbors, a
- good fence at least helps keep out the bad neighbors. Good passwords are
- equivalent to those good fences, and a proactive checker is one way to
- ensure that those fences are in place before a breakin problem occurs.
-
- -----------------------------------------------------------------------------
-
-
- / /
- / NIA 072 / File 5 /
- / /
- / JONAS & ERICKSON /
- / PRIME EXL-316 /
- / /
- / Terminal_Erection /
- / /
-
- Differences between the C.T. & Prime EXL
-
- - You Can't log in as root anywhere except the console.
- (But you can log in as mars and then use the su command).
-
- - The console port prompt is Console Login: and everyone else is
- the standard login:
-
- - You will not have to re-configure the kernel anymore. Three
- kernels are provided by corporate services on a separate tape.
-
- - The /etc/rc file is now /etc/rc2.
-
- - There is a system administrator command that allows you to add
- users, assign passwords, install additional hardware and a lot
- more.
-
- - On-line help facility call 'help', for most unix commands.
-
- - No /etc/issue file, must use /etc/motd.
-
- - No 'more' command, must use 'pg'.
-
- - The <ESC> key is now the <DEL> key.
-
- - You may not backspace while logging in.
- (The system will ask for a password, press <RETURN> to get the
- login prompt back.)
-
- - To see the directories in column format you must use the ls -C
- command.
-
- - In the /etc/gettydefs file all the labels have an 'h' in front
- except the 9600 label (eg. 1200 is now h1200, 300 is now h300)
-
- - The Prime Exl does not support parallel printers.
-
- - The STOP button on the front of the EXL is equal to the
- shutdown command.
-
- - All formatting and partitioning of the disks is done
- automatically. (Explained later).
-
- - tty device names are different.
- (eg. /dev/tty01, /dev/console, /etc/ttyax)
-
- - Tape device name is /dev/rct/c0d5. (Not /dev/rmt0).
-
- - Configurable kernel is an extra cost add-on. Since we didn't
- want to add the cost to every system, we obtained Prime's
- permission to send out pre-configured kernels from corporate
- services. Unfortunately this means you cannot reconfigure the
- kernel in the field.
-
-
-
- CHECKLIST
-
-
- Page Check Description
-
- 4 _____ 1. Connect console terminal
- 5 _____ 2. Install operating system
- 6 _____ 3. Initial system setup
- 8 _____ 4. Restoring the kernel
- 9 _____ 5. Configuring terminals and ports
- 11 _____ 6. Edit /etc/gettydefs
- 12 _____ 7. Edit /etc/rc2
- 13 _____ 8. Edit /etc/profile
- 13 _____ 9. Create directories
- 14 _____10. Install Thoroughbred Basic
- 15 _____11. Install J & E programs
- 15 _____12. Edit IPLINPUT
- 16 _____13. Adjust terminal types
- 17 _____14. Add appropriate /mars /backup /fullback and
- /printbu shell scripts.
- 18 _____15. Edit /etc/passwd to add mars login code and a
- set of login codes specific to the client.
- 20 _____16. Create /etc/motd file for J&E welcome message at
- login.
- 20 _____17. Reboot system, test client login.
- 21 _____18. Define all J&E data files as per client file
- sizing.
- 21 _____19. Test as much as you can.
- 21 _____20. Label special ports at the rear of the system,
- take a full backup, and repack it for shipping.
- 21 _____21. Disable / Enable lock.
-
- 22 Simplified System Administration.
- 23 Prime EXL-316 Cabling Information.
-
-
- DETAILED DESCRIPTIONS
-
- These instructions have been written by a programmer, to a
- programmer. If you are not a programmer and you can't fake it,
- then you really should go and get one. In many instances, we
- have given very exacting detail, but things can go wrong. Also,
- the instructions are given in a way that each step could be
- performed separately. However, generally, you can get a lot of
- overlap in by combining steps and not rebooting the system until
- you have to in order to test something.
- Below is a diagram showing you the port layout on the EXL. Please
- note that the EXL ports are numbered in the octal number system.
-
-
-
-
-
-
-
- Prime EXL-316
-
- -------------------
- | | Where:
- | ( REAR VIEW ) |
- | | A=ttyax
- | | C=console
- | | V=Voltage selector
- | |
- | V | Number=tty ports
- | |
- | A |
- | C 00 10 20 |
- | 01 11 21 |
- | 02 12 22 |
- | |
- | 03 13 23 |
- | 04 14 24 |
- | 05 15 25 |
- | 06 16 26 |
- | 07 17 27 |
- | |
- --------------------
-
-
- FIGURE 1-1
-
-
- Caution:
- Before doing anything set the voltage selector switch to 115V on
- the rear on the EXL.
-
- Step 1. (Getting the EXL ready)
- Unpack the computer using the instruction in the Prime
- installation and operation guide.
-
- Check the following list before doing anything to make sure you
- have all the tools you require to do the install.
-
- _____ Delivery of Prime EXL & terminals.
- _____ Jonas & Erickson software tape, (From Corporate Services).
- _____ Jonas & Erickson kernels tape, (From Corporate Services).
- _____ Prime EXL Operating Systems tape.
- _____ Prime EXL Extended Diagnostic tape.
- _____ Thoroughbred Basic tape.
- _____ Thoroughbred Basic manual
- _____ Thoroughbred Basic passport security device (small box).
- _____ Prime terminal cables. ( RJ45 to RS232 )
- _____ Prime EXL-316 power cable.
- _____ Small Standard Screwdriver & 3/16" nut driver.
-
- Five manuals supplied by Prime. They are:
-
- _____ 1. Systems Administrator Reference Manual.
- _____ 2. Systems Administrator Guide.
- _____ 3. Users guide.
- _____ 4. Users Reference Manual.
- _____ 5. Installation and Operation Guide.
-
-
- INSTRUCTIONS:
- - Unpack and place the inserts for the Prime manuals in the
- correct sequence.
- - If you have not done so, set the voltage selector switch to 115
- volts on the rear of the computer.
- - Remove the shipping insert that should be in the tape drive.
- - Connect the power cord & plug it in the wall.
- - Unpack the terminal & plug it in to the wall.
- - Connect the communications cable from the console port,
- (see diagram 1-1) to the fixed female connection on the
- passport. Notice that the cable has a removable sex-changer
- that must be removed & connected separately using a 3/16" nut
- driver. Connect the ribbon cable from the passport, (small box)
- to the main port on the terminal.
- - Set your terminal as follows:
-
-
-
- Terminal settings
-
- Baud rate : 9600
- Data bits : 8
- Stop bits : 1
- Parity : none
- Handshake : XON/XOFF
- Communications : Full Duplex
- Emulation : TVI925
-
-
- - Press the power on switch at the rear on the computer.
- (0 = Off, 1 = On)
- - Make sure the control panel key is set to ENABLE.
-
- Step 2. (Installing the Prime EXL UNIX operating system.)
-
- - Insert the tape marked "PRIME EXL tm Operating System" supplied
- by PRIME, into the tape drive. Make sure the indicator is in
- the safe position. (Insert opening in the tape to the left,
- metal plate face down.)
- - Press the START switch. The EXL will do some diagnostics, play
- some music, display some messages and after a few minutes will
- come up to the # prompt.
- - At the # prompt, enter:
- # install (CR)
- The system may display a date and time and ask if you wish to
- change the time zone plus the date & time. You should reply no
- since this is described later on.
- Change the time zone? [y,n,?,q] n(CR)
- Change the date and time? [y,n,?,q] n(CR)
- Formatting will start and will take approximately 10 minutes.
- You will see:
- Formatting....
- .
- .
- .
- Partitioning the disk...
- Creating empty root file system on /dev/dsk/c0d0s0.
- Creating empty usr file system on /dev/dsk/c0d0s1..
- Installing root file system on /dev/dsk/c0d0s1...
- Installing usr file system on /dev/dsk/c0d0s1...
-
- Rewinding tape...
- Writing boot block...
-
-
-
- When the installation is complete you will see:
-
- The PRIME EXL Operating System is now installed.
- Remove the cartridge tape and press STOP.
-
- - Do what it said. (The STOP key in on the front of the EXL.)
- Let the EXL power down completely. The operating system has
- been installed and two partitions have been installed. They are
- /root and /usr.
- - Press the START key. This should now boot the operating system
- off the disk.
- - At the Console Login: prompt type
-
- Console Login: root (CR)
-
- - Insert the "PRIME EXL tm Extended Diagnostics Monitor" tape
- provided by Prime. (Make sure the indicator is set to safe)
-
- - At the # prompt type:
-
- # cd /dedgmon (CR)
-
- then type: (Note: The next command is in upper case)
-
- # INSTALL (CR)
-
- You will be prompted to "install" tape and press <RETURN> key
- when ready. Do so. This will install the extended diagnostic on
- to the Prime EXL's operating system. (Takes about 1 minute)
- - Once you see "edmon installation complete" remove the tape from
- the tape drive and put it back in the plastic cover.
-
- Step 3 (Initial system setup)
-
- At the # prompt type:
-
- # cd / (CR)
- # sysadm setup (CR)
-
- You will be prompted to:
-
- 1. Set the time zone.
- 2. System date & time.
- 3. First user on the system. (mars)
- 4. To enter a root password
- 5. Naming the computer
-
-
-
- Note: sysadm is a utility that allows you to do most of the
- administrative work you would normally have to do by editing
- files.
- eg. Add users, delete user, add tty ports, change passwords etc
- (See page 19 of this manual for further details)
-
- For sysadm procedure most responses are:
-
- y=Yes, n=No, ?=Display more info, q=Quit
-
- Date and Time:
-
- Current time and zone is : 15:55 EDT
- Change the time zone? [y,n,?,q]
-
- If the time zone is not correct then type y (CR)
- You will be prompted to choose between 10 time zones.
- Enter (1-10)
-
- This will edit the /etc/TIMEZONE file.
-
- Does your time zone use Daylight Savings Time during the year?
- Answer y or n. (CR)
-
- Change the date and time [y,n,q,?]
- If you answer y (CR) then you will be prompted to enter the hour
- and minute etc.
-
- Setting up the first login:
-
- You will prompted:
-
- Enter user's full name [?,q]: mars (CR)
- Enter user's login ID [?,q]: mars (CR)
- Enter user ID number (default 100) [?,q]: (CR)
- Enter group ID number or group name
- (default 1) [?,q]: (CR)
- Enter the user's login (home) directory name.
- (default '/usr/mars') [?,q]: (CR)
-
-
-
- This is the information for the new login:
- User's name: mars
- login ID: mars
- user ID: 100
- group ID: 1
- home directory: /usr/mars
- Do you want to install,edit, or skip this entry
- [i,e,s,q]? i (CR)
- Login installed.
-
- Do you want to give the user a password? [y,n] n (CR)
- Do you want to add another login? [y,n,q] n (CR)
-
- Assigning a password to root
-
- Do you want to give passwords to administrative logins
- [y,n,?,q] n (CR)
- Do you want to give password to system logins?
- [y,n,q,?] n (CR)
-
- Naming the machine
-
- This machine is currently called "exl".
- Do you want to change it? [y,n,q,?] n (CR)
-
-
- Step 4. ( Restoring J & E kernels )
-
- Restoring J & E kernels
-
- The commands are as follows:
- -put in the J&E EXL kernel tape into the tape drive.
- # cd / (CR)
- # cpio -icvdumaB < /dev/rct/c0d5 (CR)
- ... (restores the file ...
-
- When complete remove the tape & return it to its plastic covering
- (Note: Should restore three files)
-
- You now have four versions of unix on the system disk, the system
- that was distributed, as well as three new versions.
-
- They are: /unix (Distributed version)
- /je.unix.8 (Eight user version)
- /je.unix.16 (Sixteen user version)
- /je.unix.24 (Twenty-four user version)
- /je.DOC (A copy of this manual)
- Future use ---> /je.create.t1 (Makes nodes for tty20-tty27)
- Future use ---> /je.create.t2 (Makes nodes for tty30-tty57)
-
-
- Start by making a backup of the current kernel.
- cp /unix /unix.save(CR)
-
- If you have a 8 user system you simply copy /je.unix.8 to /unix.
- If you have a 16 user system you copy /je.unix.16 to /unix etc.
- In this example we are assuming you have a 24 user system, so we
- would type:
- Warning: If you don't have a 24 user system do not use the bigger
- shell. There are memory restrictions.
-
- mv /je.unix.24 /unix (CR)
-
- Now sync the disks by typing:
-
- sync;sync;sync (CR)
- Now, press the STOP button (on the front of the machine). Ignore
- warning messages which may appear. They appear because the
- current "/unix" is not the same as the one which was booted.
-
- Once the system is powered down completely, press the START
- button. The new kernel you just installed is now being booted.
-
- Step 5. ( Configuring terminals and printers )
- The file /etc/inittab configures the terminal ports on the
- system. Please note that this controls login terminals only.
- Ports to be used for serial printers will have to be turned off
- here and configured in /etc/rc2. Other ports that you would want
- turned off would include transport ports, and ports for any
- serial devices which are not login terminals such as point-of-
- sale devices. Modems count as login terminals.
- Our first task here is to determine the correspondence between
- the physical port labels, and the unix terminal device names (tty
- numbers). On EXL-316s Port tty00 is the port on the first
- communications board labelled channel 1 (the first communications
- board is the left most when viewed from the rear, labelled 1 to
- 8). It is important to know the ports are numbered in octal. They
- go 0 to 7, 10 to 17, 20 to 27 etc. Also there are two ports that
- Prime has installed that are called ttyax and console. The ttyax
- will be used for the modem and console is the system console.
- (See diagram 1-1). Port tty00 is the port labeled channel 1.
- Ports tty00 through tty07 are on the first RS232 expansion board.
- The second RS232 expansion board is further right consisting of
- ports tty10 through tty17, and so on (Remember the ports are
- numbered in octal). The RS232 expanders come in 8 port version.
- All versions use 8-pin RJ45 connectors. (Big telephone jacks).
- What we have to do, is determine which ports will physically be
- connected to a login terminal, and make sure that the
- corresponding lines in /etc/inittab are enabled. Take some time
- at this point to decide which equipment you will be plugging into
- which port. After you have determined which ports can physically
- have terminals it is necessary to edit /etc/inittab to tell the
- system what's what. J&E's standard is to always connect the
-
-
- support modem to ttyax, and to assign ports to non-terminal
- devices (such as printers) starting at the end and working back.
- The format of a line in /etc/inittab is as follows:
- nn:X:Y:/etc/getty T Z
- where-nn is the port number (co=console, ta=ttyax, ##=number of
- tty port, in octal.)
- -X is the word off if the port is to be turned off. If
- the port is to be turned on, then X will be a number
- which must contain the digit 2.
- -Y should be the word respawn. If it is the word off, then
- the port is again turned off (Note: This is the preferred
- way of turning off a port).
- -T is the tty number
- -Z is a label corresponding to an entry in the file
- /etc/gettydefs. IT IS NOT the baud rate, although the
- labels used usually correspond to a baud rate for
- convenience. The usual values for Z are either 9600,
- h1200, or h300 (for modems). You should only need to
- change this to set modem ports.
- There are three ways to turn a port off. The preferred way is to
- change the word Y from respawn to off. The second way is to
- change the number X to the word OFF. The third way is to place a
- colon as the first character of the line making the entire line a
- comment.
- You should ensure that all the ports that the machine physically
- will have login terminals connected to are turned on. Do not
- turn on any ports that will not have a terminal connected, even
- if the client will be adding terminals in a little while, as this
- will slow down the system. If you turn on a port that the
- machine does not physically have then T0 (console) will get
- periodic error messages, messing up the screen displays.
- After making changes to /etc/inittab, they will automatically go
- into effect in about 5-10 minutes, or following a reboot. You
- can also put them into effect immediately by the root command:
- # telinit q(CR)
- #
- On a typical new system, only console will be turned on.
- If you are not familiar with any Unix editor, then the following
- is intended as a key by key guide for someone setting up
- /etc/inittab for the first time, but this would be a good time to
- learn the ed editor as its multi-line replacement will save you
- some time.
-
- Console Login: root(CR)
- # ed /etc/inittab(CR) <-- invoke line editor
- 1227 <-- system responds with the # of chars (May differ)
- /nn(CR) <--finds the definition line for ttynn
- nn:X:Y:/etc/getty tttttt Z <--note X, Y and Z will
- have some value that we will check
- <-- make sure that X is 2 - if it isn't then change it by
- s/3/2(CR) <-- eg. X was "3" but we wanted "2"
- <-- make sure that Y is respawn - if it isn't then change it
- s/off/respawn(CR) <-- eg. Y was "off" but we wanted
- "respawn"
- <-- make sure that Z is correct for the login device you are
-
-
- using as follows: 9600 for normal 9600 baud login
- terminal, h1200 for 1200 baud modem, h300 for 300 baud
- modem
- <-- if Z is incorrect, then change it by
- s/9600/h1200(CR) <-- eg. Z was 9600 but we wanted h1200
- <-- after each "s" for substitute command above, the system
- will respond by echoing back the new line
-
- Repeat the above sequence for each login port until all the ones
- that you are going to use are turned on. Also, make sure that
- any ports that you will use for special equipment such as serial
- printers, cash registers, transport ports, etc. (anything that is
- not a login terminal) are left turned off (ie. off instead of
- respawn). When you are done editing, exit the editor as follows:
- w <-- rewrite the file
- 1397 <-- responds with the new number of chars (May differ)
- q <-- to quit the editor
-
- On the EXL's we've seen so far, only the console port is turned
- on by default. Also, you will probably want to change the baud
- rate on the ttyax post to be h1200 (or h300).
-
- Step 6. (Editing gettydefs)
- You should change /etc/gettydefs on all EXL-316s. Basically,
- this file contains the initial stty options for terminals
- 'respawn'ed by 'getty' as per 'inittab' (remember inittab?).
- Each line in gettydefs starts with a label used in inittab, and
- ends with another label to use if the user hits the break key
- while logging in. This is how variable baud rates are handled on
- a single port as the labels, by convention, correspond to baud
- rates. The trouble with this is that autobaud detect modems get
- confused, so its better to disable this.
- Caution: as the file /etc/gettydefs contains lines that are more
- than 200 characters long, we recommend that you do not use vi to
- make the changes. The steps below, effect the change using the
- ed editor.
- Console Login: root(CR)
- # ed /etc/gettydefs(CR) <-- invoke line editor
- 1002 <-- response is # of chars (May differ)
- /B300(CR) <-- find the 300 baud label
- ...
- s/9600/300(CR) <-- change it to loop to itself
- ...
- /B1200(CR) <-- find the 1200 baud label
- ...
- s/300/1200(CR) <-- change it to loop to itself
- ...
- /B2400(CR) <-- find 2400 baud label
- ...
-
-
-
- s/1200/2400(CR) <-- change it to loop to itself
- ... <-- response is new login line
- w(CR) <-- rewrite the file
- 1002 <-- response is new # of chars (May differ)
- q(CR) <-- quit to Unix
- #
-
- The new parameters will go into effect following the next
- shutdown and reboot.
-
- Step 7. (Editing rc2)
- The file /etc/rc2 is a Unix shell script that runs every time the
- system is rebooted. There are two things that we have had
- occasion to change in this file. These are as follows:
-
- a. Define communications parameters for serial printers.
- Basically this involves getting a "sleep" command going on the
- port and using "stty" to set the baud rate, etc. The following
- key by key example adds the commands necessary to define a
- printer on tty17 with 8-bits, no parity and x-on/x-off flow
- control (our standard for serial printers on CT's).
- Console Login: root(CR)
- # ed /etc/rc2(CR) <-- invoke the line editor
- 1290 <-- system response is # of chars (May differ)
- $a(CR) <-- editor command to append at the bottom
- (there is no prompt in response)
- sleep 2000000 > /dev/tty17 &(CR) <-- add sleep
- command
- stty 9600 cs8 -parenb ixon ixoff ixany -echo < /dev/tty17 &(CR)
- .(CR) <-- editor command to get out of append mode
- w(CR) <-- to rewrite the file
- 1379 <-- system response, is # of chars. (May differ)
- q(CR) <-- to quit the editor
- # <-- shutdown and reboot to get new stty parameters set
- Note the ampersand (&) at the end of the sleep and stty commands.
- It is critically important as the /etc/rc2 script file will never
- finish executing if the cable is ever pulled out, and
- consequently, the system will never finish booting! If this
- happens, call for help. You'll need to boot from tape to get the
- system going again (or plug the cable back in).
-
- b. Start spooler if necessary. Since you should only do this
- under very special circumstances the Unix spooler is not covered
- here. Please refer to the separate document in the System
- Administrator Reference manual and/or call for help.
-
-
- Step 8. (Editing profile)
- The file /etc/profile is executed for each terminal that logs in
- to Unix in a standard manner. Please note that the way we set up
- basic users does not pass through this, so it's not very useful
- to J&E. You may have occasion to use it if you are setting up
- logins for other Unix applications or using the help command in
- unix.
- The file /.profile is executed each time you login as root. The
- default file sets the file creation parameters so that if root
- creates a file, other login's cannot use it. We recommend
- changing this in case any Basic work is ever done from root.
- Console Login: root (CR)
- # cd /etc(CR)
- # ed profile(CR)
- ... <-- system response in number of chars
- /umask(CR) <-- find umask line
- umask 022 <-- response is current setting
- s/22/00(CR) <-- change 022 to 000
- umask 000 <-- response is changed line
- /pt200 <-- find pt200 line
- s/pt200/tvi925 <-- change terminal type to TVI925
- export TERM; TERM=tvi925 #default terminal type <-- response
- w(CR) <-- rewrite the file
- 887 <-- new number of chars (May differ)
- q(CR) <-- quit the editor
-
- Step 9. (Creating directories)
- For Thoroughbred Basic (formerly SMC Basic), the J&E standard is
- to set up a directory called "JE" on each file system on the
- machine. This allows us to distinguish our stuff from other Unix
- stuff, while still permitting Basic to get at all of the
- available disk space. Before you create the directories, get
- started with the following commands. They set the default
- permissions on the files so that any user can have full access.
- Console Login: root(CR)
- # umask 0(CR) <-- set default full permissions
- #
- The next step is to get a list of the file systems on the
- machine.
- Type in:
- # df -t(CR) <-- "disk free" command lists file systems
-
-
- Each file system has a two line description. The first part is
- the part which we need - the full pathname of the mount point
- (directory) of the file system. Also, make note of the number of
- free blocks (of 1024 bytes each) on each file system. On a
- typical EXL-316 with one 258Mb drive, you will have the following
- file systems; / and /usr, with /usr having the most free space.
- (About 200 mb). Create an JE directory on each file system except
- the root file system (/) with the mkdir command. (In this case we
- would create a "JE" directory on /usr only.)
- It is a bad idea to allow JE to create files on the root file
- system. There's typically not a lot of space there and you could
- create problems if a large file gets accidently created on this
- file system and fills the root directory. For this reason, the
- following installation procedure does NOT create a /JE directory.
- In effect, your client's machine will have some "spare" disk
- space that you could make available in the future if the system
- gets close to being full. (on a 258 mb drive this is on 7 mb)
- Using the EXL-316 example, the command would be:
- # mkdir /usr/JE(CR)
- Within the JE directory, we must now create sub-directories for
- various uses by basic. There will be one "main working
- directory" for basic where all the programs, all the work files
- and the Thoroughbred Basic interpreter itself reside. The
- remaining data files may be spread around as desired to make best
- use of the available disk space.
- To create the sub-directories for the main JE directory use:
- # mkdir /usr/JE/WORK /usr/JE/DATA0 /usr/JE/PGM(CR)
- (Note that the UTILS directory for the Basic utilities will be
- created automatically when we install the interpreter).
-
- Please number your data directories in order of preference of
- using up space. Generally, number them in order from most
- available space to least. In a later step, we will configure
- Basic to assign a "logical disk" number to each JE sub-directory
- (in IPLINPUT).
-
- Step 10.(Installing Thoroughbred)
-
-
- The installation steps are as follows:
- - put the Thoroughbred tape in the drive (Openings in tape to
- left, metal plate face down. Make sure safe indicator is to
- safe position).
- Console Login: root(CR)
- # cd /usr/JE(CR) <-- change to the main directory for Basic
- # cpio -icvdumaB < /dev/rct/c0d5(CR) <-- to restore tape
- ...... <-- will list the files as they're loaded
- nn blocks
- #
- (Note: This takes about 1 minute to restore)
- - When completed Remove the tape from the tape drive.
-
-
- Step 11. (Installing J & E programs)
- J&E's convention for programs is to install all programs on the
- main working directory for Basic (/usr/JE always) under the
- subdirectory PGM. If the systems that you require came on more
- than one tape, then repeat these steps for each tape.
- - put the tape in the drive (Openings in tape to left, metal
- plate face down.)
- Console Login: root(CR)
- # cd /usr/JE/PGM(CR) <-- change to the main directory for
- Basic - subdirectory PGM for programs
- # cpio -icvdumaB < /dev/rct/c0d5(CR) <-- to restore tape
- tape will list the files as they're
- (and overwrite any previous programs with
- the same name.
- nn blocks
- #
-
- (Note: This takes about 2-5 minutes, depending on
- the number of programs being restored).
- - When completed Remove the tape from the tape drive.
-
-
- Step 12. (Editing IPLINPUT)
- The file IPLINPUT in the main working directory for Basic is the
- interface configuration file between Basic and the unix operating
- system. It is used to associate the names of system devices and
- disk directories between what unix uses, and what Basic uses.
- The IPLINPUT file as released requires at least the addition of
- one or two disk directories. In addition, you would have to
- change IPLINPUT for the following:
- - serial printers
- - transport ports
- - foreign devices (eg. POS cash registers)
- - a spooled printer
- (Note: The EXL-316 does not support parallel printers)
-
- It is possible to have several completely separate IPLINPUT files
- on the same machine, thereby setting up individual working
- environments that have no overlap (or even that do have some
- overlap). While this is good for an in-house development
- environment, we strongly advise against it on a client system.
- The IPLINPUT file as released with the Thoroughbred Basic tape
- contains the following:
-
- CNF 1,5,1,18,CUTERR <-- 5 must match the # of DEV statements
- PTN 1,60000
- DEV D0,1,,,,,,UTILS
- DEV D2,1,,,,,,WORK
- DEV T0,1,,,,,,tty
- DEV LP,4,,136,,,,lp
- DEV P7,4,,,,,,null
- IPL 1,2,T0,*JPSD
- END
-
-
- By now, you should be fairly familiar with the workings of the
- editor, so the following descriptions will not give the key-by-
- key commands to make changes to IPLINPUT.
- Change IPLINPUT to look like the following:
-
- CNF 1,6,1,18,CUTERR <-- Notice 6 matches number of DEV
- PTN 1,60000
- DEV D0,1,,,,,,UTILS
- DEV D1,1,,,,,,WORK
- DEV D2,1,,,,,,PGM
- DEV D3,1,,,,,,DATA0
- DEV T0,7,,,,,,tty
- DEV LP,4,,136,,,,tty17
- IPL 1,2,T0,GO <-- starts program GO on initial login
- END
-
- UPDATE: for all of these devices to be accessible to Basic users,
- you will need to change the default permissions on the device
- special files in the /dev directory. For example, for the above
- mentioned device, the commands would be:
-
- # chmod a+rwx /dev/tty17(CR) <-- for serial printing
-
- Step 13.(Adding terminals to "TERMINAL" / Adjust terminal types)
- There is a file called "TERMINAL" in the /usr/JE directory. This
- file should contain one entry called console. TERMINAL is the
- file that contains all the valid terminal that can access
- Thoroughbred basic. So, you must add all the terminals that will
- be used by Thoroughbred Basic. An example of what the file should
- contain is listed below. Remember the terminal numbers are using
- the octal number system. Also Thoroughbred has a limit to the
- number of entries that can be in this file. The label on the
- passport device will tell you how many terminals you can
- configure.
-
- Example of 16 user system:
-
- console
- ttyax
- tty00
- tty01
- tty02
- tty03
- tty04
- tty05
- tty06
- tty07
- tty10
- tty11
- tty12
- tty13
- tty14
- tty15
-
-
- The TCONFIG file defines for Basic exactly what the
- characteristics are of each terminal on the system. The TCONFIG
- file can be modified using the *NPSD utility. The terminal names
- are in the Basic format Tx. Run the utility program *NPSD to
- change the terminal model codes to TVI950. If you have any old
- MAI terminals on the system, you will have to use *NPSD to change
- their model code to B4 7250 (Note the space in the name).
-
- To access *NPSD directly type:
-
- Console Login: root(CR)
- cd /usr/JE(CR)
- ./b ./IPLINPUT.term(CR)
-
-
- Note: The terminal numbering system starts at T0 thru T9 then TA,
- TB, TC etc.
-
- Warning: Do not use this method of getting into BASIC after the
- system is in production as you always get T0 reguardless
- of which terminal you really are.
-
- Step 14. (Adding J & E utilities)
- To each EXL machine, we add four utility shell scripts. Three of
- these (/mars, /fullback and /printbu) are identical on every
- system. The fourth and most important (/backup) depends on the
- disk structure used in configuring the system. The contents of
- the shell scripts and a description of their functions follows.
- As you should be familiar with the operation of one of the
- editors by now, the detail has been left out.
-
- /mars shell script - this script is simply used by J&E staff to
- get into Thoroughbred Basic if we have logged in as root instead
- of the normal customer login. The contents are as follows:
- echo '... and AWAY we go ...'
- cd /usr/JE
- ./b
-
- /fullback shell script - this script is used for performing a
- full backup on the system. This will include everything on every
- disk on the machine. The contents are as follows:
- cd /
- find . -print | cpio -ovcB > /dev/rct/c0d5
-
- /printbu shell script - this script is used for listing the
- contents of a backup tape on the parallel line printer. The
- contents are as follows:
- cpio -icvdumtaB < /dev/rct/c0d5 > /dev/tty17
- Note:(/dev/tty17 is an example only.)
-
-
- The fourth and final (and most important) shell script is the
- /backup script. This is the script that the client will use for
- their critical nightly backups. It is vitally important that you
- get this one right, and that you carefully test it before
- installing the machine. An example follows:
- cd /
- find usr/JE -print > /bulist
- find u/JE -print >> /bulist (Note: only if /u exists)
- cpio -ovcB < /bulist > /dev/rct/c0d5
- Basically, this procedure is building up a list of all of the
- files and sub-directories in all of the Basic disk directories.
- This list is then passed as input to the cpio backup routine.
- The differences between this example, and what you require for
- your system would be only in the number of find commands. Note
- the use of the Unix redirection symbols > and >> for sending the
- output of the find command into the file /bulist. The first find
- command in the script file has only one > which means to replace
- any old /bulist file with the new list. The remaining find
- commands have two >> which means to APPEND the output from the
- find command to the target file /bulist.
- To test the procedure, run the backup as documented in the user
- startup/shutdown/backup procedures, and run a /printbu on the
- tape. Carefully check the output and make sure that all JE
- directories and files were backed up.
-
- When a file is created by the ed or vi editors, the default
- permissions exclude execute permission. Therefore, before these
- four script files can be run, you need to use the chmod (change
- mode) command to add execute permissions as follows:
- # chmod a+rwx /mars /backup /fullback /printbu(CR)
-
- Step 15. ( Adding users )
-
- Change is required to the /usr/JE/.profile file so when a user
- logs in, it will automatically take them to BASIC.
-
- Console Login: root(CR)
- cd /usr/JE(CR)
- ed .profile(CR) <-- edit .profile file
- 1i(CR) <-- insert to top of file
- stty -lcase(CR) <-- Set terminal to lower case
- .(CR) <-- end append mode
- w(CR) <-- write changes to file
- 21 <-- Displays number of char. in file
- q(CR) <-- quit editor
-
-
- The above file should now contain:
- stty -lcase
- ./b
- exit
-
- The file /etc/passwd defines all the legal user's to the system
- and (optionally) associates a password with each. Our purpose
- here is to simply define several logins that automatically run
- Basic on login, and automatically log-out when you RELEASE from
- Basic. This protects the client from having to learn anything
- about Unix. Please note that passwords are not covered here. If
- your customer is concerned about security, and wants passwords on
- the user logins, then you should refer them to the administrators
- manual (sysadm modusr command. covered later in this document).
- Suppose the client's company name is RCH Construction, and you
- decide to pick the letters rch as the client login (must be lower
- case), then you would add the following lines to /etc/passwd.
- The first number is the 'user number' and must be different for
- each login, so you should first look at the last line in
- /etc/passwd and find the highest used number. Suppose its 105,
- then the logins to add are:
- mars::106:1:mars:/usr/JE:
- rch::107:1:mars:/usr/JE:
- rch1::108:1:mars:/usr/JE:
- ...
- rch10::117:1:mars:/usr/JE:
- Please note in step 3 you added a user called mars. The
- "sysadm adduser" command will only let you create a home
- directory if it does not exist. Therefore a directory was created
- which is /usr/mars. In order to make mars working directory
- correct you must change the user mars working directory from
- /usr/mars to /usr/JE
-
- IMPORTANT: Encourage the client to use a different login on each
- terminal as some unix tables are maintained by the user name
- instead of by terminal.
-
- There are 6 fields in each line of the /etc/passwd file. They
- are separated by colons (:) and are described as follows:
-
-
-
- 1) user name - this is what you type in response to the
- login: prompt
- 2) password - always leave blank - passwords are added by
- logging in and using the passwd command.
- 3) user number - just use the next available number in the file.
- 4) group number - always use 1 - groups may go away in a
- future version of unix.
- 5) comment - memo field only, we usually put in the word mars.
- 6) home directory - this should be the main working directory
- for Basic. (ie. /usr/JE).
- If you'd like to be really friendly, you can setup logins to
- match the names of the departments or people within the client's
- organization.
-
- Step 16. (Editing motd)
- The file /etc/motd is printed on every screen during the login
- process. If you wish, you can add a line similar to the
- following:
- Welcome to Jonas & Erickson Software Systems
-
- Step 17. (Reboot)
- The system reboot puts our changes (/etc/inittab, /etc/rc2, etc,
- etc, etc) into effect. Be sure to do a proper shutdown first.
- Refer to the user startup/shutdown/backup procedures
- documentation for instructions on setting the system date and
- time with the unix date command. These instructions should be
- part of the client's J & E Primer. At the # prompt type:
-
- # shutdown(CR)
- or
- Press the STOP button on the front of the Prime EXL.
-
-
- Step 18. (define J & E files)
- The first time you run Basic, mars will create a login password
- J&E with only the security system defined. There may also exist
- programs for automatically creating all of the data files for
- each of the systems you are installing. At the time of this
- writing, the initialization programs are being sent out with the
- machines, but there is no documentation as yet. If there is no
- initialization program for some of your systems, you will have to
- create the files yourself from the file layouts.
- NOTE: the initial login password may be mars instead of J&E.
-
- Step 19. (Test)
- Test as much as you can think of.
- When testing printers, its a good idea to make sure they work
- from unix first, before trying to access them from Basic. An
- easy way to do this is to use the calendar command and redirect
- the output to the device special file. For example, testing a
- serial printer on tty17:
- # cal > /dev/tty17(CR)
- With serial printers, be sure to test for proper handling of
- xon/xoff flow control by letting a large listing start, taking
- the printer off-line, waiting long enough 'till you're sure the
- buffer has filled, putting the printer back on-line, and making
- sure the report is OK.
-
- Step 20. (Label ports)
- Label any ports that you have specially defined so that your
- hardware installer knows where to plug things in. According to
- Murphy's law, it is practically guaranteed that you will have a
- hard disk crash during final shipping of the system to the
- customer, unless you take a full backup at this point. For EXL
- you should find a blank tape with the machine which you could use
- for this backup.
-
- Step 21. (Enable / Lock)
- The switch on the front of the Prime EXL marked ENABLE/LOCK is
- used for safety purposes. If the switch is in the LOCK position
- then this disables all three buttons on the front. Therefore we
- suggest that for normal day to day operations this switch should
- be set to the LOCK position. This will prevent any accidental
- shutdown of the machine.
-
-
- Simplified System Administration
-
-
- Within the Prime's EXL-316 operating system there is built in
- commands to simplify operating functions, such as:
-
-
- * Assigning passwords to administrative logins
- * Assigning passwords to system logins
- * Adding users to the system
- * Performing system backups
- * Installing optional add-on hardware
- * Creating file systems
-
- The sysadm command uses interactive software programs with menus,
- subcommands, instructions, questions, and user input. As you
- enter you responses, sysadm guides you step by step through a
- system administration task. After you become familiar with
- sysadm, you can bypass the menus and enter the subcommands
- directly.
- eg. sysadm modtty (Will allow you to modify port settings)
-
- Below is a list of sysadm commands which we believe to be of help
- to you. Refer to Prime EXL 316 Installation and Operation Guide
- for a complete listing.
-
- Description Command
-
- Add a user adduser
- Add user group addgroup
- Assign root password admpasswd
- Change root password admpasswd
- Change port settings modtty
- Change user information moduser
- Change users password moduser
- Delete a user deluser
- List larger files filesize
- List older files fileage
- List users lsuser
- Modify ports modtty
- Modify users information moduser
- Set date and time datetime
- Shutdown powerdown
- Note: adduser is of little use for adding basic users as it
- cannot set the home directory to /usr/JE.
-
- There is also a on-line help command to assist you with UNIX
- commands. To start it up type:
-
- help(CR)
-
- For further information see Operating System Users Guide.
-
-
- Cabling Information
-
- The cable connection at the back of the EXL-316 use an RJ45
- connection which is like a big modular telephone jack. Since this
- is a none standard type of connection, we are including with
- every order a 12 foot "adapter cables" which will convert from
- the RJ45 connector to the standard DB25 connector. Note, however,
- that these adapter cables end up "crossing pins 2 & 3". Therfore,
- the pin specification for cables to terminals and printers is as
- follows:
-
- DB25 Male DB25 Male
-
- 1 - - - - - - - - - -1
-
- 2--------------------2
- 3--------------------3
-
- 4-| |-4
- 5-| |-5
- 6-| |-6
-
- 7--------------------7
-
- 8-| |-8
- 20-| |-20
-
- Below is the cabling specs. of the cable supplied by Prime :
-
- Pin positions for RJ45
-
- |XX|
- |XX| <------ Cable
- |XX|
- |XX|
- -------------------------
- | |
- | FRONT VIEW |
- | |
- -+--+--+--+--+--+--+--+---
- 1 2 3 4 5 6 7 8
-
- RJ45 Connector DB25 Connector Signal Name
- | |
- 1 | 6 --> -| TO | Data Set Ready
- 2 | 5 --> | EXL | Clear To Send
- 3 | 3 --> -| 316 | Receive Data
- 4 | 7 | Ground
- 5 | 7 | Ground
- 6 | 2 <-- -| FROM | Send Data
- 7 | 4 <-- | EXL | Request to Send
- 8 | 20 <-- -| 316 | Data Terminal Ready
-
- -----------------------------------------------------------------------------
-
-
- / /
- / NIA072 / File 6 /
- / /
- / NETWORK MISCELLANY /
- / /
- / File1: FEDIX by P.H.R.A.C.K. /
- / File2: Toll-Codes by David Leibold /
- / /
-
- ---
-
- ________________________________________________________
- | |
- | :-) FEDIX |
- | On-Line Information Service |
- | |
- | Written by the people at FEDIX |
- | |
- | Submitted to NIA by |
- | |
- | Progressive Hegemony of Radical Activist Computer Kids |
- | |
- | "Supporting the Concept of Freedom of Information" |
- |________________________________________________________|
-
-
- What is FEDIX?
-
- FEDIX is an on-line information service that links the higher education
- community and the federal government to facilitate research, education, and
- services. The system provides accurate and timely federal agency information
- to colleges, universities, and other research organizations.
-
- There are NO REGISTRATION FEES and NO ACCESS CHARGES for using FEDIX. The
- only cost is for the phone call.
-
- FEDIX provides daily information updates on:
-
- - Federal EDUCATION and RESEARCH PROGRAMS (including descriptions,
- eligibility, funding, deadlines).
- - SCHOLARSHIPS, FELLOWSHIPS, and GRANTS
- - Available used government RESEARCH EQUIPMENT
- - New funding for specific research and education activities from
- the COMMERCE BUSINESS DAILY, FEDERAL REGISTER, and other sources.
- - MINORITY ASSISTANCE research and education programs
- - NEWS & CURRENT EVENTS within participating agencies
- - GENERAL INFORMATION such as agency history, budget, organizational
- structure, mission statement, etc.
-
-
- PARTICIPATING AGENCIES
-
- Currently FEDIX provides information on 7 federal agencies broken down into 2
- general categories:
-
- 1. Comprehensive Education and Research Related Agency Information
- - The Department of Energy (DOE)
- - Office of Naval Research (ONR)
- - National Aeronautics and Space Administration (NASA)
- - Federal Aviation Administration (FAA)
-
- 2. Minority Assistance Information
- - National Science Foundation (NSF)
- - Department of Housing and Urban Development (HUD)
- - Department of Commerce (DOC)
-
- Additional government agencies are expected to join FEDIX in the future.
-
-
- REQUIRED HARDWARE AND SOFTWARE
-
- Any microcomputer with communications software (or a dumb terminal) and a modem
- operating at 1200 or 2400 baud can access the system.
-
-
- HOURS OF OPERATION
-
- The system operates 24 hours a day, 7 days a week. The only exceptions are for
- periodic system updating or maintenance.
-
-
- TELEPHONE NUMBERS
-
- * Computer (data line): 301-258-0953 or 1-800-232-4879
- * HELPLINE (technical assistance): 301-975-0103.
-
- The HELPLINE (for problems or comments) is open Monday-Friday 8:30 AM-4:30 PM
- Eastern Daylight Time, except on federal holidays.
-
-
- SYSTEM FEATURES
-
- Although FEDIX provides a broad range of features for searching, scanning, and
- downloading, the system is easy to use. The following features will permit
- quick and easy access to agency databases:
-
- Menus
- -- Information in the system is organized under a series of branching menus.
- By selecting appropriate menu options (using either the OPTION NUMBER or the
- two-character MENU CODE), you may begin at the FEDIX Main Menu and work your
- way through various intermediate menus to a desired sub-menu. However, if you
- already know the menu code of a desired menu, you may bypass the intermediate
- menus and proceed directly to that menu by typing the menu code at the prompt.
-
- Help screens are available for key menus and can be viewed by typing '?'
- at the prompt.
-
- Capturing Data
- -- If you are using a microcomputer with communications software, it is likely
- that your system is capable of storing or "capturing" information as it comes
- across your screen. If you "turn capture on", you will be able to view
- information from the databases and store it in a file on your system to be
- printed later. This may be desirable at times when downloading is not
- appropriate. Refer to your communications software documentation for
- instructions on how to activate the capture feature.
-
- Downloading
- -- Throughout the system, options are available which allow you to search,
- list, and/or download files containing information on specific topics. The
- download feature can be used to deliver text files (ASCII) or compressed,
- self-extracting ASCII files to your system very quickly for later use at your
- convenience. Text files in ASCII format, tagged with a ".MAC" extension, are
- downloadable by Macintosh users. Compressed ASCII files, tagged with an ".EXE"
- extension, may be downloaded by users of IBM compatible computers. However,
- your system must be capable of file transfers. (See the documentation on your
- communication software).
-
- Mail
- -- An electronic bulletin board feature allows you to send and receive messages
- to and from the SYSTEM OPERATOR ONLY. This feature will NOT send messages
- between users. It can be used to inquire about operating the system, receive
- helpful suggestions from the systems operator, etc.
-
- Utility Menu
- -- The Utility Menu, selected from the FEDIX Main Menu, enables you to modify
- user information, prioritize agencies for viewing, search and download agency
- information, set a default calling menu, and set the file transfer protocol for
- downloading files.
-
-
- INDEX OF KEY INFORMATION ON FEDIX
-
- Key information for each agency is listed below with the code for the menu from
- which the information can be accessed. Please be advised that this list is not
- comprehensive and that a significant amount of information is available on
- FEDIX in addition to what is listed here.
-
- AGENCY/DATABASE MENU CODE
-
- DEPARTMENT OF ENERGY (DOE)/DOEINFO
- Available Used Research Equipment :EG:
- Research Program Information :IX:
- Education Program Information :GA:
- Search/List/Download Program Information :IX:
- Research and Training Reactors Information :RT:
- Procurement Notices :MM:
- Current Events :DN:
-
-
- NATIONAL AERONAUTICS AND SPACE ADMINISTRATION/NASINFO
- Research Program Information :RP:
- Education Program Information :EA:
- Search/List/Download Program Information :NN:
- Description/Activities of Space Centers :SC:
- Procurement Notices :EV:
- Proposal/Award Guidelines :NA:
-
-
- OFFICE OF NAVAL RESEARCH/ONRINFO
- Research Program Information :RY:,:AR:
- Special Programs (Special Research and Education Initiatives) :ON:
- Search/List/Download Program Information :NR:
- Description/Activities of Laboratories and other ONR Facilities :LB:
- Procurement Notices (Broad Agency Announcements, Requests for --
- Proposals, etc. :NE:
- Information on the Preparation and Administration of Contracts, --
- Grants, Proposals :AD:
-
-
- FEDERAL AVIATION ADMINISTRATION/FAAINFO
- Education Program Information - Pre-College :FE:
- Mio rity Aviation Education Programs :FY:
- Search/List/Download Program Information :FF:
- Aviation Education Resources (Newsletters, Films/Videos, --
- Publications) :FR:
- Aviation Education Contacts (Government, Industry, Academic, --
- Associations) :FO:
- College-Level Airway Science Curriculum Information :FC:
- Procurement Notice :FP:
- Planned Competitive and Noncompetitive Procurements for the --
- Current Fiscal Year :F1:
- Employment Information :FN:
- Current Events :FV:
-
-
- MINORITY/MININFO
- U. S. Department of Commerce
- Research/Education Minority Assistance Programs :CP:
- Procurement Notices (ALL Notices for Agency) :M1:
- Current Events :M1:
- Minority Contacts :M1:
-
- Department of Energy
- Research/Education Minority Assistance Programs :EP:
- Procurement Notices (ALL Notices for Agency) :M2:
- Current Events :M2:
- Minority Contacts :M2:
-
- U.S. Department of Housing and Urban Development
- Research/Education Minority Assistance Programs :HP:
- Procurement Notices (ALL Notices for Agency) :M3:
- Current Events :M3:
- Minority Contacts :M3:
-
- National Aeronautics and Space Administration
- Research/Education Minority Assistance Programs :NP:
- Procurement Notices (ALL Notices for Agency) :M4:
- Current Events :M4:
- Minority Contacts :M4:
-
- National Science Foundation
- Research/Education Minority AssisdaXce Programs :SP:
- Procurement Notices (ALL Notices for Agency) :M5:
- Budget Information :SB:
- NSF Bulletin :M5:
- Minority Contacts :M5:
- _______________________________________________________________________________
-
- ---
-
-
- [Here is the first edition of the toll-free/tolled codes list;
- thanks to all who participated ... any followups, clarifications,
- etc would be appreciated.]
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- Toll-free, local rated and specialty toll services 26 July 1991
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- The following indicates access codes and numbers used within various
- countries for toll-free and special paid services. The dialing codes
- shown represent how they would be dialed within the country involved.
- Generally, it is not possible to access another country's domestic
- toll-free or specialty network directly. Where an international access
- is available, it is normally done by using the domestic services which
- then forward the call to the destination country.
-
- Where possible, the number of digits has been indicated with 'n'
- (a number from 2 to 8) or 'x' (any number). An ellipsis (...)
- indicates that there are a variable number of extra digits, or
- possibly a conflict in the reports of numbers of digits used.
-
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- Toll-free or equivalent local charge services
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
-
- =================
- A u s t r a l i a
- =================
-
- 008 xxx xxx (that is how Telecom recomends it be written
- to differentiate it from STD area codes
- which are written with area codes (0x) thru
- (0xxx) and numbers n xxxx through nxx xxxx.
-
- 0014 ttt xxx xxx International Toll free access from Australia
- (ttt is reported as "800" or other toll-free
- access code; or, ttt may not be present at all)
-
- Brendan Jones:
-
- "... I have dialled international toll free to the USA (Fred Pryor
- Seminars) and I dialled verbatim: 0014 800 125 385."
-
- (Canada Direct uses 0014 881 150 - djcl)
-
- =============
- B e l g i u m
- =============
-
- 11 xxxx
-
- =============
- D e n m a r k
- =============
-
- 800 xxxxx
- 8001 xxxx (charged as local call)
-
- =============
- F i n l a n d
- =============
-
- 9800 xxxxx (...) PTT as local service provider
- 0800 xxxxx (...) Private phone company as local service provider
-
- Kauto Huopio:
-
- "(I _think_ that 0800 numbers are only for the local calling area."
-
- haa:
-
- "...but many service givers have more [digits than 5] in theis mnemonics)."
-
- (haa also mentions 9800 costs the same as a local call (dialable from
- all areas in Finland) while 0800 are truly toll-free and dialable
- from all private telco areas)
-
- ===========
- F r a n c e
- ===========
-
- 05 xxxxxx (Numero Vert)
- [note: this is outside area code 1, so from Paris
- 16 05...]
-
- 05 19 xx xx these numbers terminate outside France
-
- 36 63 xx xx Local call rate (Numero Azur)
-
- Allan G. Schrum:
-
- "`11' is computer directory information (Minitel)
- `12' is voice directory information (equivalent to 411)"
-
- ===========================
- G e r m a n y ( w e s t )
- ===========================
-
- 0130 xxxx (...xx)
-
- Mickey Ferguson:
-
- "I was over in Germany for three months, and the number is 0130-...
- To use ATT, it is 0130-0010, and U.S. Sprint is 0130-0013 (easy to
- remember :) For general toll-free number listings, pick up a copy
- of the International Herald newspaper (I think it is available in
- the US as well as most places internationally) and in the sports
- section is usually an ATT add for dialing the US from various countries.
- Of course, chop off the exchange and only use the "area code" number."
-
- =============
- I r e l a n d
- =============
-
- 1800 xxxxxx
- 1850 xxxxxx (local rate)
-
- =========
- I t a l y
- =========
-
- 167 xxxxx (digits length?)
-
- Colum Mylod:
-
- "I'm not 100% sure about the length of digits for Italy. One way to
- check these is to get a copy of an *international* edition of the
- weekly magazines like TIME, all ads and little contents. But they do
- goof up regularly, like printing Paris numbers as (01) xxxxxxxx when
- they mean (1) xxxxxxxx."
-
- ===========
- M e x i c o
- ===========
-
- 91 800 xxxxx....
-
- =====================
- N e t h e r l a n d s
- =====================
-
- 06-0xxx
- 06-0xxxxxx
- 06-4xx(x)
-
- Ralph Moonen:
-
- "06-0229111 = AT&T USA direct
- And also Sprint & MCI have operator services on 06-022xxxx
-
- Side note: It used to be possible to call 06-022xxxx to Denmark, and then
- use the CCITT no. 4 signalling system to phreak calls to anywhere in the
- world."
-
- Peter Knoppers:
-
- "06-11 This is the Dutch equivalent of 911, it is free when dialled
- from a phone company operated payphone, otherwise the charge
- is one unit, DFL 0.15, about US $ 0.08. There were discussions
- about making such calls free from any phone, but I haven't
- followed them recently. Calling a toll-free number from a
- payphone requires a deposit of one coin, which is returned
- after the call.
-
- The total length of the numbers varies from 4 to 10 digits.
-
- The dash indicates the secondary dial tone.
- It is not possible to reach 06 prefixed numbers from abroad."
-
- =====================
- N e w Z e a l a n d
- =====================
-
- 0800 xxx xxx
-
- clear@cavebbs.gen.nz:
-
- "That is through the state telco, Telecom New Zealand. Clear Communications,
- the recently started alternative LD carrier, does not offer a toll-free
- service as yet."
-
- When Clear offer one, it will more than likely be to the subscribers
- existing number (eg Dial toll free 050-04-654-3210) as they are not
- in control of number issue. 0800 is strictly Telecom at this stage."
-
- =========================
- N o r t h A m e r i c a
- =========================
-
- 1 800 nxx xxxx Access to toll free numbers can vary according
- to region, state or country ie. not all 800
- numbers are accessible to all regions
-
- The nxx prefix portion of the 800 number presently
- determines which long distance carrier or 800
- service company will handle the call (and in
- some cases determine the geographical region)
-
- =========
- S p a i n
- =========
-
- 900 xxxxxx
-
- Michael Klein, BellSouth Telephone Operations:
-
- "(N.B. The number for ATT direct in Spain is 900-99-00-11.
- The payphones are all push-button but generate pulses.
- It takes forever to get connected.)"
-
- ===========
- S w e d e n
- ===========
-
- 020 xxxxxx (without dialtone after '020').
-
- =====================
- S w i t z e r l a n d
- =====================
-
- 04605 xxxx (not toll-free but metered at lowest rate)
- 155 xx xx ("green number")
-
- [also a new one something like 122...]
-
- Jim Smithson:
-
- "Here in Switzerland there is nothing exactly equivalent to US 800 service.
- I see the PTT is now encouraging the use of "green numbers" beginning with
- 155.
- The direct marketing ads on TV often give the order number for Switzerland
- as a number such as 155 XX XX.
- The access number for MCI Call USA is for example 155 02 22.
- But there are two problems with this that I don't think MCI was aware of
- when they asked the PTT for "a toll free" number.
-
- 1. When calling from a model AZ44(older model) payphone
- All numbers which begin with a "1" are treated as "service"
- numbers and the payphone begins to sound a "cuckoo clock
- noise" once the 155 is entered. The "cuckoo clock noise"
- is to alert operators on the "service numbers" that the caller
- is using a payphone(fraud protection). This noise is quite a
- distraction when calling someone in the USA using MCI Call USA.
- This is one reason(not the biggest one) I cancelled my MCI Card.
-
- 2. The newer style TelcaStar phones are programmed to block the
- keypad after 3 digits are dialed of a "service number".
- It used to be that the only numbers beginning with "1" were
- "service numbers" and all "service numbers" were 3 digits.
- The PTT is aware of this problem and are said to be considering
- what instructions to give the manufacturer of the payphones.
-
- AT&T USA Direct has an access number of 046 05 00 11
- This is not a free call, but the time is metered at the lowest rate.
- This number does not suffer the "cuckoo clock noise" problem."
-
- (Canada Direct uses 046 05 83 30 - djcl)
-
- ===========================
- U n i t e d K i n g d o m
- ===========================
-
- 0800 xxx xxx Toll-free
- 0345 xxx xxx Local rate
-
-
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- Tolled/Specialty Pay services
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- =================
- A u s t r a l i a
- =================
-
- 0055 x yxxx where y=0-4,8 means the number is Australia
- wide (and costs more),
- y=5 means the number is only state wide,
- y=6,7,9 means the number is for the
- capital city only.
-
- =============
- F i n l a n d
- =============
-
- 9700 xxxxx PTT-operated
- 0700 xxxxx Private telco-operated
-
- haa:
-
- "cost ranging from about 0.5 USD to 5 USD per minute."
-
- ===========
- F r a n c e
- ===========
-
- 36 65 xx xx (5 message units each call for up to 140 seconds)
-
- Olivier Giffard:
-
- "These are for various information services as
- well as chat lines and so on."
-
- =====================
- N e t h e r l a n d s
- =====================
-
- 06-9 xx...
- 06-321 xx...
- 06-8 xx... (3 to 40ct/min)
-
- Peter Knoppers:
-
- "Other codes (such as 06-9) precede special tariff calls (similar to 900 in
- the US). The highest special rate is (currently) DFL 0.50 / minute."
-
- =========================
- N o r t h A m e r i c a
- =========================
-
- 1 900 nxx xxxx (various rates, depending on provider)
- 1 (npa) 976 xxxx (in many area codes, connected through regional telco;
- in some areas, the call requires the area code where
- depending on the intra-area dialing used)
-
- (other exchange prefixes within area codes such as 540, 720 or 915
- are used for other pay services such as group chat, other types of
- recorded messages, etc. These vary depending on the area code within
- North America, and not all regions in North America have these.)
-
- ===========
- S w e d e n
- ===========
-
- 071 x xxxxx
-
- Dan Sahlin:
-
- "The "900"-numbers in Sweden all start with 071.
- The charges are related to the next digit, as follows.
-
- code SEK/minute
- 0712xxxxx 3,65
- 0713xxxxx 4,90
- 0714xxxxx 6,90
- 0715xxxxx 9,90
- 0716xxxxx 12,50
- 0717xxxxx 15,30
- 0719xx varying fees, cannot be dialled directly but needs operator
-
- Numbers starting with 0713-0717 can only be dialled from phones connected
- to AXE exchanges. At present about half of all phones in Sweden are
- connected to such exchanges.
-
- Another special toll number is domestic number information: 07975
- (6,90 SEK/minute)."
-
- ===========================
- U n i t e d K i n g d o m
- ===========================
-
- 0836 xxx xxx
- 0898 xxx xxx
-
- J. Philip Miller:
-
- "Rate seems to be uniform as 34p per minute cheap rate,
- 45p at all other times."
-
-
-
- ------------------------------------------------------------------------------
-
-
- / /
- / NIA072 / File 7 /
- / CyberTimes (Vox Populi) /
- / Judge Dredd /
- / /
-
- The following 4 files of CyberTimes (Vox Populi) is telecom news since
- 01JAN91 to 01AUG91.
-
- #O GRID News
- #I Vol. 2, No. 6
- #D February 22, 1991
- #T Michigan to Overhaul Telecom Rules
- #A Michael E. Marotta
-
- On February 19 and 20, companion bills were introduced into the
- state house and state senate of Michigan. "The Michigan
- Telecommunications Act" is House Bill 4343 and Senate Bill 124.
- The two versions are identical. HB4343 was introduced by Alma G.
- Stallworth (D-Detroit), chair of the House Public Utilities
- committee. SB124 was introduced by Mat J. Dunaskiss (R-Lake
- Orion), chair of the newly-created Senate Technology and Energy
- Committee. If passed by October 1, 1991, the bills become law on
- that date and have sunset limits of four years, expiring on
- September 30, 1995.
-
- The Michigan Telecommunications Act would, if passed into law,
- accomplish the following:
- (*) establish a new regulator, the Michigan Telecommunications
- Commission, removing telephone from the Public Service
- Commission and bringing cable television under the new
- agency's scope.
- (*) de-regulate local exchange providers, allowing them
- monopoly status and the right to sell other services,
- including long distance, cable television and information.
- (*) freeze local rates at the current level, allowing no
- increase beyond the maximum rate as of Nov. 1, 1990.
- (*) require 911 service to be provided to any county that
- wants it. In fact, there are 48 separate provisions for
- 911 service, significantly more than any other section of
- the act. (Mandatory service for the hearing impaired runs
- a mere 42 lines.)
- (*) Outlaw unsolicited advertising via fax. (This provision,
- like many of the 911 rules, is already in place. It was
- created in 1990 as an amendment to the Telephone Act of
- 1913 and is being carried over.)
-
- The Michigan Telecommunications Act specifically seeks to overturn
- the "Modified Final Judgement." Its goal is to allow Michigan
- telecom providers the freedom to develop products and services.
- Whether and to what extent it meets those goals will be determined
- in part by what happens to the bills in committees and on the
- floors.
-
-
-
-
- #O NewsBytes
- #D March 4, 1991
-
- MIDDLE ISLAND, NEW YORK, U.S.A., 1991 MAR 4(NB) --
- Emmanuel Goldstein, editor and publisher of 2600: The Hacker Quarterly, has
- told Newsbytes that The Texas Department of Criminal Justice has prohibited
- delivery delivery of the fall 1990 issue of 2600 to a subscriber
- incarcerated in a Texas prison.
-
- The official "Publication Denial Notification" form, dated January 9, 1991,
- was received by Goldstein and published in the Winter 1990-91 issue that
- was released on March 1st. The form indicates that the denial was
- instituted because "Publication contains material on the setting up and
- operation of criminal schemes or how to avoid detection of criminal schemes
- by lawful authority charged with the responsibility for detected such
- illegal activity."
-
- The specific reasons for determining the basis for the ruling are listed as
- "Pages 18, 19, 20, 21, 29, 42 and 43 contain information on misusing
- telephone equipment to make telephone calls illegally and to obtain cash
- and credit cards illegally."
-
- Goldstein, commenting on the ban to Newsbytes, said "Inside of prison,
- there is not much freedom so I guess it's not surprising that they do
- things like this. What is surprising is that the article which they were
- most concerned with was written by the Fraud Division of the U.S. Secret
- Service and was clearly indicated to have been so authored."
-
- Newsbytes examined the Fall issue of 2600 and found that the Secret Service
- technical synopsis is contained on pages 18-21 while page 29 is part of the
- letters from readers section and contains a letter from a prisoner in an
- unnamed prison explaining how he or she makes unpaid telephone calls. Pages
- 42 and 43 contain an article by "Crazed Luddite & Murdering Thug", "An
- Algorithm For Credit Cards", which explains the checksum verification of
- credit card numbers.
-
- Also contained in the same issue is an interview with security expert Dr.
- Dorothy Denning, an explanation of caller-id and an article by Goldstein on
- alleged BellSouth plans for monitoring telephone lines.
-
- A supervisor at the Texas Department of Criminal Justice, Institutional
- Division told Newsbytes that "Inmates may subscribe to any publication they
- choose but they understand that the magazines are subject to review for
- appropriateness. If they contain any material that does not meet or
- standards, either the articles in question or the entire magazine will be
- rejected." The supervisor, who could not speak for attribution, explained
- that, if the objectionable passages were 5 pages or less, they would have
- been removed and the remainder of the magazine delivered. She also said
- that both the inmate and the publication have the right to appeal the
- decision.
-
-
-
-
- #O Associated Press Wire [herby refered to as APwire]
-
- BALTIMORE (AP) -- A computer hacker pleaded guilty Friday to stealing
- information from American Telephone & Telegraph and its subsidiary
- Bell Laboratories.
-
- Under an agreement with prosecutors, Leonard Rose pleaded guilty in
- U.S. District Court to one count of sending AT&T source codes via
- computer to Richard Andrews, an Illinois hacker, and a similar wire
- fraud charge involving a Chicago hacker.
-
- Prosecutors said they will ask that Rose be sentenced to two
- concurrent one-year terms. Rose is expected to be sentenced in May.
-
- Neither Rose nor his attorney could be immediately reached for comment
- late Friday.
-
- "Other computer hackers who choose to use their talents to interfere
- with the security and privacy of computer systems can expect to be
- prosecuted and to face similar penalties," said U.S. Attorney
- Breckinridge L. Willcox.
-
- "The sentence contemplated in the plea agreement reflects the serious
- nature of this new form of theft," Willcox said.
-
- Rose, 32, was charged in May 1990 in a five-count indictment following
- an investigation by the Secret Service and the U.S. Attorney's offices
- in Baltimore and Chicago.
-
- He also had been charged with distributing "trojan horse" programs,
- designed to gain unauthorized access to computer systems, to other
- hackers.
-
- Prosecutors said Rose and other hackers entered into a scheme to steal
- computer source codes from AT&T's UNIX computer system.
-
- The plea agreement stipulates that after he serves his sentence, Rose
- must disclose his past conduct to potential employers that have
- computers with similar source codes.
-
-
-
-
- #O Washington Post
- #I n/a
- #D March 23, 1991 [pp A1, A10]
- #T 'Hacker' Pleads Guilty in AT&T CASE: Sentence Urged for Md. Man
- Among Stiffest Yet for Computer Crime
- #A Mark Potts/Washington Post Staff Writer
-
- BALTIMORE, March 22--A computer "hacker" who was trying to help others
- steal electronic passwords guarding large corporate computer systems
- around the country today pleaded guilty to wire fraud in a continuing
- government crackdown on computer crime.
-
- Federal prosecutors recommended that Leonard Rose Jr., 32, of
- Middletown, Md., be sent to prison for one year and one day, which
- would be one of the stiffest sentences imposed to date for computer
- crime. Sentencing is scheduled for May before U.S. District Judge J.
- Frederick Motz.
-
- Cases such as those of Rose and a Cornell University graduate student
- who was convicted last year of crippling a nationwide computer network
- have shown that the formerly innocent pastime of hacking has
- potentially extreme economic ramifications. Prosecutors, industry
- officials and even some veteran hackers now question the once popular
- and widely accepted practice of breaking into computer systems and
- networks in search of information that can be shared with others.
-
- "It's just like any other form of theft, except that it's more subtle
- and it's more sophisticated," said Geoffrey R. Garinther, the
- assistant U.S. attorney who prosecuted the Rose case.
-
- Rose--once part of a group of maverick hackers who called themselves
- the Legion of Doom--and his attorneys were not available for comment
- after the guilty plea today. The single fraud count replaced a
- five-count indictment of the computer programmer that was issued last
- May after a raid on his home by Secret Service agents.
-
- According to prosecutors, Rose illegally obtained information that
- would permit him to secretly modify a widely used American Telephone &
-
- (See HACKER, A10, Col 1)
-
- Telegraph Co. Unix software program--the complex instructions that
- tell computers what to do. The two former AT&T software employees who
- provided these information "codes" have not yet been prosecuted.
-
- Rose altered the AT&T software by inserting a "Trojan horse" program
- that would allow a hacker to secretly gain access to the computer
- systems using the AT&T Unix software and gather passwords used on the
- system. The passwords could then be distributed to other hackers,
- permitting them to use the system without the knowledge of its
- rightful operators, prosecutors said.
-
- Rose's modifications made corporate purchasers of the $77,000 AT&T
- Unix program vulnerable to electronic break-ins and the theft of such
- services as toll-free 800 numbers and other computer-based
- telecommunications services.
-
- After changing the software, Rose sent it to three other computer
- hackers, including one in Chicago, where authorities learned of the
- scheme through a Secret Service computer crime investigation called
- Operation Sun Devil. Officials say they do not believe the hackers
- ever broke into computer systems.
-
- At the same time he pleaded guilty here, Rose pleaded guilty to a
- similar charge in Chicago; the sentences are to be served
- concurrently, and he will be eligible for parole after 10 months.
-
- Rose and his associates in the Legion of Doom, whose nickname was
- taken from a gang of comic-book villains, used names like Acid Phreak
- Terminus--Rose's nickname--as their computer IDs. They connected their
- computers by telephone to corporate and government computer networks,
- outwitted security screens and passwords to sign onto the systems and
- rummaged through the information files they found, prosecutors said.
-
- Members of the group were constantly testing the boundaries of the
- "hacker ethic," a code of conduct dating back to the early 1960s that
- operates on the belief that computers and the information on them
- should be free for everyone to share, and that such freedom would
- accelerate the spread of computer technology, to society's benefit.
-
- Corporate and government computer information managers and many law
- enforcement officials have a different view of the hackers. To them,
- the hackers are committing theft and computer fraud.
-
- After the first federal law aimed at computer fraud was enacted in
- 1986, the Secret Service began the Operation Sun Devil investigation,
- which has since swept up many members of the Legion of Doom, including
- Rose. The investigation has resulted in the arrest and prosecution of
- several hackers and led to the confiscation of dozens of computers,
- thousands of computer disks and related items.
-
- "We're authorized to enforce the computer fraud act, and we're doing
- it to the best of our ability," Garry Jenkins, assistant director of
- investigations for the Secret Service, said last summer. "We're not
- interested in cases that are at the lowest threshold of violating the
- law...They have to be major criminal violations before we get
- involved."
-
- The Secret Service crackdown closely followed the prosecution of the
- most celebrated hacker case to date, that of Robert Tappan Morris
- Cornell University computer science graduate student and son of a
- computer sicentist at the National Security Agency. Morris was
- convicted early last year of infecting a vast nationwide computer
- network in 1988 with a hugely disruptive computer "virus," or rogue
- instructions. Although he could have gone to jail for five years, Mo
- $10,000, given three years probation and ordered to do 400 hours of
- community service work.
-
- Through Operation Sun Devil and the Morris case, law enforcement
- authorities have begun to define the boundaries of computer law.
- Officials are grappling with how best to punish hackers and how to
- differentiate between mere computer pranks and serious computer
- espionage.
-
- "We're all trying to get a handle for what is appropriate behavior in
- this new age, where we have computers and computer networks linked
- together," said Lance Hoffman, a computer science professor at George
- Washington University.
-
- "There clearly are a bunch of people feeling their way in various
- respects," said David R. Johnson, an attorney at Wilmer, Cutler &
- Pickering and an expert on computer law. However, he said, "Things
- are getting a lot clearer. It used to be a reasonably respectable
- argument that people gaining unauthorized access to computer systems
- and causing problems were just rambunctious youth." Now, however, the
- feeling is that "operating in unauthorized computing spaces can be an
- antisocial act," he said.
-
- Although this view is increasingly shared by industry leaders, some
- see the risk of the crackdown on hackers going to far. Among those
- concerned is Mitch Kapor, the inventor of Lotus 1-2-3, the
- best-selling computer "spreadsheet" program for carrying out
- mathematical and accounting analysis. Kapor and several other
- computer pioneers last year contributed several hundred thousands
- dollars to set up the Electron Freedom Foundation, a defense fund for
- computer hackers.
-
- EFF has funded much of Rose's defense and filed a friend-of-the-court
- brief protesting Rose's indictment.
-
- From: The Washington Post, Tuesday March 26, 1991, Page A3.
-
- CORRECTION [to Saturday March 23, 1991 article]
-
- "Leonard Rose, Jr., the Maryland computer hacker who pleaded guilty
- last week to two counts of wire fraud involving his illegal possession
- of an American Telephone & Telegraph Co. computer program, was not a
- member of the "Legion of Doom" computer hacker group, as was reported
- Saturday, and did not participate in the group's alleged activities of
- breaking into and rummaging through corporate and government computer
- systems."
-
-
-
-
- #O NewsBytes
- #D April 1, 1991
-
- PHOENIX, ARIZONA, U.S.A., 1991 APR 1(NB) -- The Maricopa County
- Arizona County Attorney's Office has announced the arrest of Baron
- Majette, 19, also known as "Doc Savage", for alleged crimes uncovered
- in the joint federal / state "SunDevil" investigation in progress for
- over a year.
-
- Majette is charged with a number of felony crimes including the use
- of a telephone lineman's handset in March 1990 to tap into a Toys 'R
- Us telephone line to set up two conference calls between 15
- participants. According to the charges, each call lasted
- approximately 10 hours and cost $4,000. A spokesperson for the County
- Attorney's office told Newsbytes that a Tucson resident, Anthony
- Nusall, has previously pleaded guilty to being a participant in the
- conference Majette is also accused of illegally accessing TRW's
- credit data base to obtain personal credit information and account
- numbers of persons in the TRW database. He is alleged to have then
- used the information obtained to divert existing account mailings to
- mail drops and post office boxes set up for this purpose. He is also
- alleged to have additional credit cards issued based on the
- information obtained from the database. He is further alleged to have
- obtained cash, goods and services, such as airline tickets, in excess
- of $50,000 by using cards and account information obtained through
- entry into the TRW database.
-
- It is further alleged that Majette stole credit cars from U.S. Mail
- boxes and used them to obtain approximately $10,000 worth of cash,
- goods and services.The allegations state that Majette acted either
- alone or as part of a group to perform these actions. A County
- Attorney spokesperson told Newsbytes that further arrests may be
- expected as result of the ongoing investigation.
-
- While bail was set on these charges at $4,900. Majette is being held
- on a second warrant for probation violation and cannot be released on
- bail until the probation hearing has been held.
-
- Gail H. Thackeray, former Assistant Attorney General for the State of
- Arizona, currently working with Maricopa County on the SunDevil
- cases, told Newsbytes "The SunDevil project was started in response
- to a high level of complaint of communications crimes, credit card
- fraud and other incidents relating to large financial losses. These
- were not cases of persons accessing computers 'just to look around'
- or even cases like the Atlanta 'Legion of Doom' one in which the
- individuals admitted obtaining information through illegal access.
- They are rather cases in which the accused alleged used computers to
- facilitate theft of substantial goods and services."
-
-
-
-
- #O Newsweek Magazine
- #T Cyberpunks and the Constitution
- The fast-changing technologies of the late 20th century pose
- a challenge to American laws and principles of ages past
- #A Phillip Elmer-Dewitt
-
- Armed with guns and search warrants, 150 Secret Service agents staged
- surprise raids in 14 American cities one morning last May, seizing 42
- computers and tens of thousands of floppy disks. Their target: a
- loose-knit group of youthful computer enthusiasts suspected of
- trafficking in stolen credit-card numbers, telephone access codes and
- other contraband of the information age. The authorities intended to
- send a sharp message to would-be digital desperadoes that computer
- crime does not pay. But in their zeal, they sent a very different
- message - one that chilled civil libertarians. By attempting to crack
- down on telephone fraud, they shut down dozens of computer bulletin
- boards that may be as fully protected by the U.S. Constitution as the
- words on this page.
-
- Do electronic bulletin boards that may list stolen access codes enjoy
- protection under the First Amendment? That was one of the thorny
- questions raised last week at an unusual gathering of computer
- hackers, law-enforcement officials and legal scholars sponsored by
- Computer Professionals for Social Responsibility. For four days in
- California's Silicon Valley, 400 experts struggled to sort out the
- implications of applying late-18th century laws and legal principles
- to the fast-changing technologies of the late 20th century.
-
- While the gathering was short on answers, it was long on tantalizing
- questions. How can privacy be ensured when computers record every
- phone call, cash withdrawal and credit-card transaction? What
- "property rights" can be protected in digital electronic systems that
- can create copies that are indistinguishable from the real thing?
- What is a "place" in cyberspace, the universe occupied by audio and
- video signals traveling across state and national borders at nearly
- the speed of light? Or as Harvard law professor Laurence Tribe aptly
- summarized, "When the lines along which our Constitution is drawn warp
- or vanish, what happens to the Constitution itself?"
-
- Tribe suggested that the Supreme Court may be incapable of keeping up
- with the pace of technological change. He proposed what many will
- consider a radical solution: a 27th Amendment that would make the
- information-related freedoms guaranteed in the Bill of Rights fully
- applicable "no matter what the technological method or medium" by
- which that information is generated, stored or transmitted. While
- such a proposal is unlikely to pass into law, the fact that one of the
- country's leading constitutional scholars put it forward may persuade
- the judiciary to focus on the issues it raises. In recent months,
- several conflicts involving computer-related privacy and free speech
- have surfaced:
-
- -- When subscribers to Prodigy, a 700,000-member information system
- owned by Sears and IBM, began posting messages protesting a rate hike,
- Prodigy officials banned discussion of the topic in public forums on
- the system. After protesters began sending private mail messages to
- other members - and to advertisers - they were summarily kicked off
- the network.
-
- -- When Lotus Development Corp. of Cambridge, Mass., announced a joint
- venture with Equifax, one of the country's largest credit-rating
- bureaus, to sell a personal-computer product that would contain
- information on the shopping habits of 120 million U.S. households, it
- received 30,000 calls and letters from individuals asking that their
- names be removed from the data base. The project was quietly canceled
- in January.
-
- -- When regional telephone companies began offering Caller ID, a
- device that displays the phone numbers - including unlisted ones - of
- incoming calls, many people viewed it as an invasion of privacy.
- Several states have since passed laws requiring phone companies to
- offer callers a "blocking" option so that they can choose whether or
- not to disclose their numbers. Pennsylvania has banned the service.
-
- But the hacker dragnets generated the most heat. Ten months after the
- Secret Service shut down the bulletin boards, the government still has
- not produced any indictments. And several similar cases that have
- come before courts have been badly flawed. One Austin-based game
- publisher whose bulletin-board system was seized last March is
- expected soon to sue the government for violating his civil liberties.
-
- There is certainly plenty of computer crime around. The Secret
- Service claims that U.S. phone companies are losing $1.2 billion a
- year anc credit-card providers another $1 billion, largely through
- fraudulent use of stolen passwords and access codes. It is not clear,
- however, that the cyberpunks rounded up in dragnets like last May's
- are the ones committing the worst offenses. Those arrested were
- mostly teenagers more intent on showing off their computer skills than
- padding their bank accounts. One 14-year-old from New York City, for
- instance, apparently specialized in taking over the operation of
- remote computer systems and turning them into bulletin boards - for
- his friends to play on. Among his targets, say police, was a Pentagon
- computer belonging to the Secretary of the Air Force. "I regard
- unauthorized entry into computer systems as wrong and deserving of
- punishment," says Mitch Kapor, the former president of Lotus.
-
- And yet Kapor has emerged as a leading watchdog for freedom in the
- information age. He views the tiny bulletin-board systems as the
- forerunners of a public computer network that will eventually connect
- households across the country. Kapor is worried that legal precedents
- set today may haunt all Americans in the 21st century. Thus he is
- providing funds to fight for civil liberties in cyberspace the best
- way he knows how - one case at a time.
-
-
-
-
- #O Financial Post & Financial Times of London
- #T Canada is Accused of Using Stolen Software
- #A Eric Reguly & Alan Friedman
-
- NEW YORK -- Government agencies in Canada and other countries are using
- computer software that was stolen from a Washington-based company by the
- U.S. Department of Justice, according to affidavits filed in a U.S.
- court case.
-
- In a complex case, several nations, as well as some well-known
- Washington insiders - including the national security advisor to former
- President Ronald Reagan, Robert McFarlane - are named as allegedly
- playing a role.
-
- The affidavits were filed in recent weeks in support of a
- Washington-based computer company called Inslaw Inc., which claims that
- its case-tracking software, known as Promis, was stolen by the U.S.
- Department of Justice and eventually ended up in the hands of the
- governments of Israel, Canada and Iraq.
-
- NEW MOTION
- Yesterday, lawyers for Inslaw filed a new motion in federal bankruptcy
- court in Washington demanding the power to subpoena information from the
- Canadian government on how Ottawa came to acquire Promis software. The
- motion states, "The evidence continues to mount that Inslaw's
- proprietary software is in Canada."
-
- The affidavits allege that Promis - designed to keep track of cases and
- criminals by government agencies - is in use by the RCMP and the
- Canadian Security Intelligence Service.
-
- The Canadian Department of Communications is referring calls on the
- subject to the department's lawyer, John Lovell in Ottawa, while a CSIS
- spokesman will not confirm or deny whether the agency uses the software.
- "No one is aware of the program's existence here," Corporal DEnis
- Deveau, Ottawa-based spokesman for the RCMP, said yesterday.
-
- The case of Inslaw, which won a court victory against the Justice
- Department in 1987, at first glance appears to be an obscure lawsuit by
- a small business that was forced into bankruptcy because of the loss of
- its proprietary software.
-
- But several members of the Washington establishment are suggesting
- Inslaw may have implications for U.S. foreign policy in the Middle East.
- The Case already has some unusual aspects.
-
- At least one judge has refused to handle it because of potential
- conflicts of interest, and a key lawyer representing Inslaw is Elliot
- Richardson, a former U.S. attorney general and ambassador to Britain who
- is remembered for his role in standing up to Richard Nixon during the
- Watergate scandal.
-
- Richardson yesterday told the Financial Times of London and The
- Financial Post that: "Evidence of the widespread ramifications of the
- Inslaw case comes from many sources and keeps accumulating."
-
- A curious development in the Inslaw case is that the Department of
- Justice has refused to provide documents relating to Inslaw to Jack
- Brook, chairman of the Judiciary Committee of the House of
- Representatives.
-
- Richardson said, "It remains inexplicable why the Justice Department
- consistently refuses to pursue this evidence and resists co-operation
- with the Judiciary Committee of the House of Representatives."
-
- The Inslaw case began in 1982 when the company accepted a US $10-million
- contract to install its Promis case management software at the
- Department of Justice. In 1983 the government agency stopped paying
- Inslaw and the firm went into Chapter 11 bankruptcy proceedings.
-
- Inslaw sued Justice in 1986 and the trial took place a year later. The
- result of the trial in 1987 was a ruling by a federal bankruptcy court
- in Inslaw's favor.
-
- The ruling said that the Justice Department "took, converted, stole"
- Promis software through "trickery, fraud and deceit" and then conspired
- to drive Inslaw out of business.
-
- That ruling, which received little publicity at the time, was upheld by
- the U.S. District Court in Washington in 1989, but Justice lodged an
- appeal last year in an attempt to overturn the judgement that it must
- pay Inslaw US $6.1 million (C $7.1 million) in damages and US $1.2
- million in legal fees.
-
- The affidavits filed in recent weeks relate to an imminent move by
- Richardson on behalf of Inslaw to obtain subpoena power in order to
- demand copies of the Promis software that the company alleges are
- being used by the Central Intelligence Agency and other U.S.
- intelligence services that did not purchase the technology from Inslaw.
-
- In the affidavit relating to McFarlane that was filed on March 21, Ari
- Ben-Menashe, a former Israeli intelligence officer, claims that
- McFarlane had a "special" relationship with Israeli intelligence
- officials. Ben-Menashe alleges that in a 1982 meeting in Tel Aviv, he
- was told that Israeli intelligence received the software from McFarlane.
-
- FLORIDA COMPANY
-
- McFarlane has stated that he is "very puzzled" by the allegations that
- he passed any of the software to Israel. He has termed the claims
- "absolutely false".
-
- Another strange development is the status of Michael Riconosciuto, a
- potential witness for Inslaw who once worked with a Florida company that
- sought to develop weapons, including fuel-air explosives and chemical
- agents.
-
- Riconosciuto claimed in his affidavit that in February he was called by
- a former Justice Department official who warned him against co-op
- with the House Judiciary Committee's investigation into Inslaw.
- Riconosciuto was arrested last weekend on drug charges, but claimed he
- had been "set up".
-
- In his March 21 affidavit, Riconosciuto says he modified Promis software
- for law enforcement and intelligence agencies. "Some of the
- modifications that I made were specifically designed to facilitate the
- implementation of Promis within two agencies of the government of
- Canada... The propriety (sic) version of Promis, as modified by me,
- was, in fact, implemented in both the RCMP and the CSIS in Canada."
-
- On Monday, Richardson and other lawyers for Inslaw will file a motion in
- court seeking the power to subpoena copies of the Promis software from
- U.S. Intelligence agencies.
-
-
-
-
- #O NewsByetes
- #D April 3, 1991
-
- SAN LUIS OBISPO, CALIFORNIA, U.S.A., 1991 APR 3 (NB) --Ron Hopson
- got a call at work from his neighbor who informed him police broke
- down his front door, and were confiscating his computer equipment.
- The report, in the San Luis Obispo (SLO) Telegram-Tribune, quoted
- Hopson as saying, "They took my stuff, they rummaged through my
- house, and all the time I was trying to figure out what I did, what
- this was about. I didn't have any idea."
-
- According to the Telegram-Tribune, Hopson and three others were
- accused by police of attempting to break into the bulletin board
- system (BBS) containing patient records of SLO dermatologists
- Longabaugh and Herton. District Attorney Stephen Brown told
- Newsbytes that even though the suspects (two of which are Cal Poly
- students) did not know each other, search warrants were issued after
- their phone numbers were traced by police as numbers attempting
- access to the dermatologists' system by modem "more than three times
- in a single day."
-
- Brown told Newsbytes the police wouldn't have been as concerned if
- it had been the BBS of a non-medical related company, but faced with
- people trying to obtaining illegal narcotics by calling pharmacies
- with fraudulent information...
-
- What the suspects had in common was the dermatologists' BBS phone
- number programmed into their telecommunications software as the
- Cygnus XI BBS. According to John Ewing, secretary of the SLO
- Personal Computer Users Group (SLO PC UG), the Cygnus XI BBS was a
- public BBS that operated in SLO, but the system operator (sysop)
- moved less than a year ago and discontinued the board. It appears
- the dermatologists inherited the number.
-
- John Ewing, SLO PCUG editor, commented in the SLO PC UG newsletter,
- "My personal opinion is that the phone number [for the Cygnus XI
- BBS] is still listed in personal dialing directories as Cygnus XI,
- and people are innocently calling to exchange information and
- download files. These so-called hackers know that the password they
- used worked in the past and attempt to connect several times. The
- password may even be recorded as a script file [an automatic log-on
- file]. If this is the case, my sympathies go out to those who have
- had their hardware and software confiscated."
-
- Bob Ward, secretary of the SLO PC UG, told Newsbytes, "The number
- [for Cygnus XI] could have been passed around the world. And, as a
- new user, it would be easy to make three mistaken calls. The board
- has no opening screen, it just asks for a password. So, you call
- once with your password, once more trying the word NEW, and again to
- try GUEST."
-
-
-
-
- #O California Computer News
- #D April 1991 [p26]
- #T Modem Mania: More Households Go Online Every Day
- #A Dennis B. Collins
-
- Get your scissors. Here come some statistics you'll want to save. I've
- been doing a lot of research lately regarding computer bulletin board
- systems (BBSs). Prodigy's research and development department said that
- 30 percent of American homes have some sort of PC. Of these homes, 20
- percent have a modem. This means that six percent of all homes have the
- capability to obtain computer data via phone line! The Information Age
- is now in its infancy - it is here and it is real. It is also growing at
- a rate of 400 percent a year.
-
- CompuServe and Prodigy both claim 750,000 paying customers. Prodigy
- stresses that their figures reflect modems at home only. They have no
- count of businesses. Local system operators tell me a significant number
- of calls originate from offices - their "guesstimate" is that office use
- may increase the figures by another 20 percent.
-
- (...)
-
- The question keeps coming up: How many BBSs are there? Nobody knows.
- In Sacramento, the best guess is about 200. Worldwide, the number is
- quickly growing. About two years ago I obtained a list of BBS members of
- FidoNet. At the time there were about 6,000 member systems. The
- January 1991 Node lists over 11,000 BBSs worldwide! It is important to
- note that there are several large networks, of which FidoNet is only
- one. U.S. Robotics claims to have a list of 12,000 BBSs that use their
- modems in this country alone. It is clear that millions of individuals
- are using PC telecommunications and the numbers are getting larger.
-
-
-
-
- #O LAN Times
- #D March 18, 1991 [pp75-76]
- #T Software Piracy Now Costs Industry Billions: But software authentication
- devices can protect your investment from thieves
- #A Charles P. Koontz
-
- About a zillion years ago when I first read _Swiss Family Robinson_, I
- always wondered why the Robinson family was so fearful of Malaysian
- pirates. After all, I was accustomed to the proper civilized pirates in
- all the Errol Flynn movies. But it turns out the Malaysian variety were
- much worse. The same is true of the pirates that prey on the modern
- software industry.
-
- In the software industry, the civilized pirates are the ones who copy an
- occasionally program from a friend without paying for it.. Most of us at
- lest know someone who's done it. I've heard of places where none of the
- software in an office is legal.
-
- Civilized pirates are still thieves and they break the law, but they
- have a better attitude. They should look into shareware as an
- alternative source. It's almost as cheap and often every bit as good.
-
- In the software industry, the crook who makes a living by making and
- selling copied software is the modern equivalent of a Malaysian pirate.
- The fact that a lot of them are located in the orient where piracy may
- not be illegal helps the analogy. It seems however that the practice is
- spreading to more local climates.
-
- The process is fairly simple and requires only a small investment to get
- started. At the simplest level, all the pirate needs is a copy of a
- popular program, a PC, and a place to duplicate the distribution
- diskettes. More sophisticated pirates have factories employing dozens
- of workers running high-speed disk duplicators and copy machines so they
- can include the manual in their shrink-wrapped counterfeit package. Some
- even copy the silk screening on the manual covers. They then find a
- legitimate outlet for the software. The customer only finds out that
- the company is bogus when he calls for technical support, if the real
- manufacturer tracks serial numbers.
-
- Software piracy has become a part of the cost of doing business for
- major software manufacturers. The Software Publishers Association (SPA)
- estimates that piracy costs the software industry between 1.5 and 2
- billion dollars annually in the USA alone. Worldwide estimates range
- from 4 to 5 billion dollars. The legitimate domestic software market
- accounts for only 3 billion dollars annually. The SPA estimates that
- for every copy of legal software package, there is at least one illegal
- copy. If you think this is an exaggeration, just consider all the
- illegal copies you know about.
-
- [rest of article discusses hardware anti-piracy devices]
-
-
-
-
- #O New York Times
- #D April 21, 1991
- #T Dutch break into U.S. computers from 'hacker haven'
- #A John Markoff
-
- Beyond the reach of American law, a group of Dutch computer intruders
- has been openly defying United States military, space and intelligence
- authorities for almost six months.
-
- Recently the intruders broke into a U.S. military computer while being
- filmed by a Dutch television crew.
-
- The intruders, working over local telephone lines that enable them to
- tap American computer networks at almost no cost, have not done
- serious damage and haven't penetrated the most secure government
- computer systems, federal investigators say.
-
- The group, however, has entered a wide range of computer systems with
- unclassified information, including those at the Kennedy Space Center,
- the Pentagon's Pacific Fleet Command, the Lawrence Livermore National
- Laboratory and Stanford University.
-
- U.S. government officials said they had been tracking the interlopers,
- but no arrests have been made because there are no legal restrictions
- in the Netherlands on unauthorized computer access.
-
- "This has been a terrible problem," said Gail Thackeray, a former
- Arizona assistant attorney general who has prosecuted computer crimes.
- "Until recently there have been few countries that have computer crime
- laws. These countries are acting as hacker havens."
-
- American law-enforcement officials said they believed there were three
- or four members of the Dutch group, but would not release any names.
- A Dutch television news report in February showed a member of the
- group at the University of Utrecht reading information off a computer
- screen showing what he said was missile test information taken from a
- U.S. military computer. His back was to the camera, and he was not
- identified.
-
- Because there are no computer crime laws in the Netherlands, American
- investigators said the Dutch group boasts that it can enter computers
- via international data networks with impunity.
-
- One computer expert who has watched the electronic recordings made of
- the group's activities said the intruders do not demonstrate any
- particularly unusual computer skills, but instead appear to have
- access to documents that contain recipes for breaking computer
- security on many U.S. systems. These documents have been widely
- circulated on underground systems.
-
- The computer expert said he had seen several recordings of the
- break-in sessions and that one of the members of the group used an
- account named "Adrian" to break into computers at the Kennedy Space
- Center and the Pentagon's commander in chief of the Pacific.
-
-
-
- #O GRID News
- #I vol. 2, No. 11x&12x
- #D April 28, 1991
- #T Libertarian Party Candidate Says Yes! to Hackers
- #T Telecom Bills Move Forward, Meet Opposition
-
- According to LP presidential hopeful, Andre Marrou, 35% of the
- dues-paying members of his party are computer programmers. Despite
- the fact that Marrou had never heard of Craig Neidorf or Operation
- Sundevil, he had strong opinions on the issues. "A computer is a
- printing press. You can churn out stuff on the printer." He did not
- move away from the paradigms print gave him but at least he was at a
- loss to understand how anyone could not see something so obvious, that
- a computer is a printing press.
-
- Then he defended a special kind of hacking. "If you mean hacking to
- get into government computers to get the information, there is nothing
- wrong with that. There is too much secrecy in government. There is a
- principle that the information belongs to the people. 99% of the
- classified material is not really important. With hackers most of the
- stuff they want to get into should be public in the first place.
- Anything the government owns belongs to all of us. Like in real
- estate you can get information from the county and I'd extend that
- rule of thumb. It would be a good thing if they could get into the
- IRS data files."
-
- In line with mainstream libertarian thought, both Andre Marrou his
- campaign manager, Jim Lewis (also a former LP veep candidate), said
- that they support the idea of government-granted patents. Marrou said
- he had never heard of patents being granted for software but knew that
- software can be copyrighted. Andre Marrou graduated from MIT.
-
- (2) Telecom Bills Move Forward, Meet Opposition
-
- "Competition and innovation will be stifled and consumers will pay
- more for telephone service if the Legislature approves the
- telecommunication legislation now before Senate and House committees,"
- said 15 lobbyists speaking through the Marketing Resource Group.
- Representatives from the AARP, AT&T, MCI, Michigan Cable Television
- Association, and the Michigan Association of Realtors all agreed that
- it would be wrong to let the local exchange carriers sell cable
- television, long distance and information services and manufacture
- equipment.
-
- The AARP has opposed this legislation because they do not see a limit
- on the cost of phone service. According to the bill BASIC phone rates
- would be frozen forever at their November 1990 level. However, there
- is no limit on charges for "enhanced services." There is also no
- DEFINITION of "enhanced service" but most people involved in the bill
- have cited call forwarding, call waiting, fax and computer.
-
- Other provisions of the proposed law would regulate all "information
- providers." Further, those who provide information from computers via
- the telephone would receive their service "at cost." This provision
- takes on new colors in light of a Wall Street Journal story from Jan.
- 9, 1991, issued along with press release materials from Marketing
- Resources. That story outlines how NYNEX inflated its cost figures
- selling itself services far in excess of the market rate.
-
- Interestingly enough, increased competition is one of the goals cited
- by the bill's key sponsor, Senate Mat Dunaskiss.
-
-
-
-
- #O Telegram-Tribune Newspaper
- #D March 23, 1991
- #T Amature Hackers Tripped Up
- #A Danna Dykstra Coy
-
- San Luis Obispo police have cracked a case of computer hacking. Now
- they've got to work out the bugs. Officers were still interviewing
- suspects late Friday linked to a rare case of computer tampering that
- involved at least four people, two of them computer science majors
- from Cal Poly.
-
- The hackers were obvious amateurs, according to police. They were
- caught unknowingly tapping into the computer system in the office of
- two local dermatologists. The only information they would have
- obtained, had they cracked the system's entry code, was patient
- billing records.
-
- Police declined to name names because the investigation is on-going.
- They don't expect any arrests, though technically, they say a crime
- has been committed. Police believe the tampering was all in fun,
- though at the expense of the skin doctors who spent money and time
- fixing glitches caused by the electronic intrusion.
-
- "Maybe it was a game for the suspects, but you have to look at the
- bigger picture," said the officer assigned to the case, Gary Nemeth.
- "The fact they were knowingly attempting to access a computer system
- without permission is a crime." Because the case is rare in this
- county, police are learning as they go along. "We will definitely
- file complaints with the District Attorney's Office," said Nemeth.
- "They can decide whether we've got enough of a case to go to trial."
-
- Earlier this month San Luis dermatologists James Longabaugh and
- Jeffrey Herten told police they suspected somebody was trying to
- access the computer in the office they share at 15 Santa Rosa St. The
- system, which contains patient records and billing information,
- continually shut down. The doctors were unable to access their
- patients' records, said Nemeth, and paid a computer technician at
- least $1,500 to re-program their modem.
-
- The modem is a device that allows computers to communicate through
- telephone lines. It can only be accessed when an operator "dials" its
- designated number by punching the numbers on a computer keyboard. The
- "calling" computer then asks the operator to punch in a password to
- enter the system. If the operator fails to type in the correct
- password, the system may ask the caller to try again or simply hang
- up. Because the doctors' modem has a built-in security system,
-
- (cont' NIA072 File 8)
-
- / /
- / NIA072 / File 8 /
- / CyberTimes (Vox Populi) /
- / Judge Dredd /
- / /
-
- (cont' NIA072 / File 7)
-
- several failed attempts causes the system to shut down completely.
-
- The technician who suspected the problems were more than mechanical,
- advised the doctors to call the police. "We ordered a telephone tap
- on the line, which showed in one day alone 200 calls were made to that
- number," said Nemeth. "It was obvious someone was making a game of
- trying to crack the code to enter the system." The tap showed four
- residences that placed more than three calls a day to the doctors'
- computer number. Three of the callers were from San Luis Obispo and
- one was from Santa Margarita. From there police went to work.
-
- "A lot of times I think police just tell somebody in a situation like
- that to get a new phone number," said Nemeth, "and their problem is
- resolved. But these doctors were really worried. They were afraid
- someone really wanted to know what they had in their files. They
- wondered if it was happening to them, maybe it was happening to
- others. I was intrigued."
-
- Nemeth, whose training is in police work and not computer crimes, was
- soon breaking new ground for the department. "Here we had the
- addresses, but no proper search warrant. We didn't know what to name
- in a search warrant for a computer tampering case." A security
- investigator for Pacific Bell gave Nemeth the information he needed:
- disks, computer equipment, stereos and telephones, anything that could
- be used in a computer crime.
-
- Search warrants were served at the San Luis Obispo houses Thursday and
- Friday. Residents at the Santa Margarita house have yet to be served.
- But police are certain they've already cracked the case. At all three
- residences that were searched police found a disk that incorrectly
- gave the doctors' phone number as the key to a program called "Cygnus
- XI". "It was a fluke," said Nemeth. "These people didn't know each
- other, and yet they all had this same program". Apparently when the
- suspects failed to gain access, they made a game of trying to crack
- the password, he said. "They didn't know whose computer was hooked up
- to the phone number the program gave them," said Nemeth. "So they
- tried to find out."
-
- Police confiscated hundreds of disks containing illegally obtained
- copies of software at a residence where two Cal Poly students lived,
- which will be turned over to a federal law enforcement agency, said
- Nemeth.
-
- Police Chief Jim Gardner said he doesn't expect this type of case to
- be the department's last, given modern technology. "What got to be a
- little strange is when I heard my officers talk in briefings this
- week. It was like I need more information for the database'." "To
- think 20 years ago when cops sat around and talked all you heard about
- was 211' cases and dope dealers."
-
-
-
-
- #O Telegram-Tribune Newspaper
- #D March 29, 1991
- #T Computer Case Takes A Twist
- #A Danna Dykstra Coy
-
- A suspected computer hacker says San Luis Obispo police overreacted
- when they broke into his house and confiscated thousands of dollars of
- equipment. "I feel violated and I'm angry" said 34-year-old engineer
- Ron Hopson. All of Hopson's computer equipment was seized last week
- by police who believed he may have illegally tried to "hack" his way
- into an office computer belonging to two San Luis Obispo
- dermatologists. Police also confiscated equipment belonging to three
- others.
-
- "If police had known more about what they were doing, I don't think it
- would have gone this far," Hopson said. "They've treated me like a
- criminal, and I was never aware I was doing anything wrong. It's like
- a nightmare." Hopson, who has not been arrested in the case, was at
- work last week when a neighbor called to tell him there were three
- patrol cars and two detective cars at his house. Police broke into
- the locked front door of his residence, said Officer Gary Nemeth, and
- broke down a locked door to his study where he keeps his computer.
- "They took my stuff, they rummaged through my house, and all the time
- I was trying to figure out what I did, what this was about. I didn't
- have any idea."
-
- A police phone tap showed three calls were made from Hopson's
- residence this month to a computer at an office shared by doctors
- James Longabaugh and Jeffrey Herten. The doctors told police they
- suspected somebody was trying to access the computer in their office
- at 15 Santa Rosa St. Their system, which contains patient records and
- billing information, kept shutting down. The doctors were unable to
- access their patients' records, said Nemeth. They had to pay a
- computer technician at least $1,500 to re-program their modem, a
- device that allows computers to communicate through telephone lines.
-
- Hopson said there is an easy explanation for the foul-up. He said he
- was trying to log-on to a public bulletin board that incorrectly gave
- the doctors number as the key to a system called "Cygnus XI". Cygnus
- XI enabled people to send electronic messages to one another, but the
- Cygnus XI system was apparently outdated. The person who started it
- up moved from the San Luis Obispo area last year, and the phone
- company gave the dermatologists his former number, according to
- Officer Nemeth.
-
- Hopson said he learned about Cygnus XI through a local computer club,
- the SLO-BYTES User Group. "Any of the group's 250 members could have
- been trying to tap into the same system", said Robert Ward, SLO-BYTES
- club secretary and computer technician at Cal Poly. In addition, he
- suspects members gave the phone number to fellow computer buffs and
- could have been passed around the world through the computer
- Bulletin-Board system. "I myself might have tried to access it three
- or four times if I was a new user," he said. "I'd say if somebody
- tried 50 times, fine, they should be checked out, but not just for
- trying a couple of times."
-
- Police said some 200 calls were made to the doctors modem during the
- 10 days the phone was tapped. "They say, therefore, its obvious
- somebody is trying to make a game of trying to crack the computer
- code", said Hopson. "The only thing obvious to me is a lot of people
- have that published number. Nobody's trying to crack a code to gain
- illegal access to a system. I only tried it three times and gave up,
- figuring the phone was no longer in service."
-
- Hopson said he tried to explain the situation to the police. "But
- they took me to an interrogation room and said I was lying. They
- treated me like a big-time criminal, and now they won't give me back
- my stuff." Hopson admitted he owned several illegally obtained copies
- of software confiscated by police. "But so does everybody," he said,
- "and the police have ever right to keep them, but I want the rest of
- my stuff."
-
- Nemeth, whose training is in police work and not computer crimes, said
- this is the first such case for the department and he learning as he
- goes along. He said the matter has been turned over to the District
- Attorney's Office, which will decide whether to bring charges against
- Hopson and one other suspect.
-
- The seized belongings could be sold to pay restitution to the doctors
- who paid to re-program their system. Nemeth said the police are
- waiting for a printout to show how many times the suspects tried to
- gain access to the doctors' modem. "You can try to gain access as
- many times as you want on one phone call. The fact a suspect only
- called three times doesn't mean he only tried to gain access three
- times."
-
- Nemeth said he is aware of the bulletin board theory. "The problem is
- we believe somebody out there intentionally got into the doctors'
- system and shut it down so nobody could gain access, based on evidence
- from the doctors' computer technician," said Nemeth. "I don't think
- we have that person, because the guy would need a very sophisticated
- system to shut somebody else's system down." At the same time, he
- said, Hopson and the other suspects should have known to give up after
- the first failed attempt. "The laws are funny. You don't have to
- prove malicious intent when you're talking about computer tampering.
- The first attempt you might say was an honest mistake. More than
- once, you have to wonder."
-
- Police this week filled reports with the District Attorney's Office
- regarding their investigation of Hopson and another San Luis Obispo
- man suspected of computer tampering. Police are waiting for Stephen
- Brown, a deputy district attorney, to decide whether there is enough
- evidence against the two to take court action. If so, Nemeth said he
- will file reports involving two other suspects, both computer science
- majors from Cal Poly. All computers, telephones, computer instruction
- manuals, and program disks were seized from three houses in police
- searches last week. Hundreds of disks containing about $5,000 worth
- of illegally obtained software were also taken from the suspects'
- residences.
-
- Police and the District Attorney's Office are not naming the suspects
- because the case is still under investigation. However, police
- confirmed Hopson was one of the suspects in the case after he called
- the Telegram-Tribune to give his side of the story.
-
-
-
-
-
- #O Telegram-Tribune Newspaper
- #D April 12, 1991
- #T Hackers' Off Hook, Property Returned
- #A Danna Dykstra Coy
-
- Two San Luis Obispo men suspected of computer tampering will not be
- charged with any crime. They will get back the computer equipment
- that was seized from their homes, according to Stephen Brown, a deputy
- district attorney who handled the case. "It appears to have been a
- case of inadvertent access to a modem with no criminal intent," said
- Brown. San Luis Obispo police were waiting on Brown's response to
- decide whether to pursue an investigation that started last month.
- They said they would drop the matter if Brown didn't file a case.
-
- The officer heading the case, Gary Nemeth, admitted police were
- learning as they went along because they rarely deal with computer
- crimes. Brown said he doesn't believe police overreacted in their
- investigation. "They had a legitimate concern."
-
- In early March two dermatologists called police when the computer
- system containing patient billing records in their San Luis Obispo
- office kept shutting down. They paid a computer technician about
- $1,500 to re-program their modem, a device that allows computers to
- communicate through the telephone lines. The technician told the
- doctors it appeared someone was trying to tap into their system. The
- computer's security system caused the shutdown after several attempts
- to gain access failed.
-
- Police ordered a 10-day phone tap on the modem's line and, after
- obtaining search warrants, searched four residences where calls were
- made to the skin doctors' modem at least three times. One suspect,
- Ron Hopson, said last week his calls were legitimate and claimed
- police overreacted when they seized his computer, telephone, and
- computer manuals. Hopson could not reached Thursday for comment.
-
- Brown's investigation revealed Hopson, like the other suspects, was
- trying to log-on to a computerized "bulletin-board" that incorrectly
- gave the doctors' number as the key to a system called "Cygnus XI".
- Cygnus XI enabled computer users to electronically send messages to
- one another. Brown said while this may not be the county's first
- computer crime, it was the first time the District Attorney's Office
- authorized search warrants in a case of suspected computer fraud using
- telephone lines. Police will not be returning several illegally
- obtained copies of software also seized during the raids, he said.
-
-
-
-
- #O Contingency Journal
- #D May/June 1991
- #T Restitution Ordered For Bell South Hackers
- #D Michael H. Agranoff, Attorney
-
- The law is beginning to respond effectively to the problem of computer
- hacking. In September 1988, three young men began implementing a
- scheme to steal proprietary data from Bell South Telephone Co.
- computers. They illegally gained access to Bell South from a home
- computer, downloaded the data and tried to disguise the fraud by using
- the IDs of legitimate users.
-
- The stolen data was transferred on an interstate computer network and
- stored on a bulletin board system. It was made known to others in a
- hacker's newsletter published by one of the schemers.
-
- If the fraud had continued, it could have disrupted telecommunication
- channels throughout the country, according to government prosecutors.
- The hackers were in a position to retrieve and modify credit
- information, eavesdrop on telephone conversations and worse.
-
- Various charges of fraud, theft and conspiracy were lodged against the
- trio. They attempted to get the charges dismissed on technical
- grounds, were unsuccessful and pleaded guilty to a smaller number of
- charges.
-
- A federal judge in Georgia imposed sentences last November. One
- hacker was given 21 months in prison and two years supervised
- probation.
-
- The other two hackers were each given 14 months in prison. Seven of
- those months were to be served in a half-way house, where they must
- assist colleges and businesses in computer work. Following release,
- the hackers must each complete three years community service, to
- include 120 hours each year of computer-related work, during which
- time they may not own or access a computer, except for employment,
- without supervision approved by the court.
-
- Each of the three hackers was also ordered to pay restitution to Bell
- South amounting to $233,880 per hacker. Readers may reflect upon this
- sentence. In trying to protect the public interest and yet not be
- vindictive, the judge rendered (in this writer's opinion) a wise and
- thoughtful decision. Will it send the appropriate message to potential
- hackers throughout the country? Let us see.
-
-
-
-
- #O Unix Today
- #D April 29, 1991
- #T Internet Break-Ins
- #A Dutch Cracker Easily Accessed U.S. Computers
-
- Allegations that Dutch crackers have been operating with impunity for
- months against U.S. computers has stirred a debate whether systems
- administrators have been negligent in failing to close easy, obvious
- security holes that have been well-known for years.
-
- Dutch crackers have, since September, been using the Internet to
- access computers, most of them Unix machines, at the Kennedy Space
- Center, the Pentagon's Pacific meet Command, the Lawrence Livermore
- National laboratories and Stanford University. The techniques they've
- used have been simple, well-known and uncreative, and they've found
- the job an easy one, say sources. "These are not skilled computer
- geniuses like Robert Morris," said Cliff Stoll, author of The Cuckoo's
- Egg, who said he's been in contact with some Dutch crackers who may
- have committed the break-ins. "These are more like the kind of hacker
- I caught, sort of plodding, boring people." Stoll's 1989 book
- concerned his pursuit of a cracker.
-
- Techniques include guessing at commonly used passwords, default
- passwords that ship with Unix systems and that some users don't bother
- to change, and using guest accounts, said Stoll.
-
- The crackers managed to obtain superuser privileges at a system at
- Stanford University, said Bill Bauridel, information security officer
- at Stanford University Data Center. They used a bug in sendmail - the
- same program exploited by Robert Morris to loose a worm on the
- Internet in 1988, though Bauridel said the crackers did not use the
- sendmail feature that Morris exploited.
-
- The Lawrence Livermore Laboratories computers were only used as a
- gateway to other systems, said Bob Borchers, associate director for
- computation at the labs.
-
- The crackers have been able to access only non-classified material,
- such as routine memos say authorities. So far, no evidence has been
- found that they did anything malicious once they broke into a U.S.
- site.
-
- The lack of laws governing computer crime in Holland allows crackers
- to operate with relative impunity, said Martin de Lange, managing
- director of ACE, and Amsterdam-based Unix systems software company.
-
- The impunity combines with an anti-authoritarian atmosphere in Holland
- to make cracking a thriving practice, said Stoll. "There's a national
- sense of thumbing one's nose at the Establishment that's promoted and
- appreciated in the Netherlands," he said. "Walk down the streets of
- Amsterdam and you'll find a thriving population that delights in
- finding ways around the Establishment's walls and barriers."
-
- The break-ins became a subject of notoriety after a Dutch television
- show called After the News ran film Feb. 2 purporting to be of an
- actual cracker break-in, said Henk Bekket, a network manager at
- Utrecht University.
-
- Utrecht University in Holland was reported to be the first site broken
- into. Bekker said he was able to detect two break-ins, one in October
- and one again in January.
-
- The crackers apparently dialed into a campus terminal network that
- operates without a password, accessed the campus TCP/IP backbone, and
- then accessed another machine on campus-a VAX 11/75-that hooks up to
- SURFnet, a national X.25 network in Holland.
-
- >From SURFnet, they were presumably able to crack into an Inter-net
- computer somewhere, and from there access the computers in the United
- States, said Bekker.
-
- The dial-in to SURFnet gateway has been canceled since the January
- attempt, he said. (Presumably, the break-in footage aired Feb. 2 was
- either through another channel, or filmed earlier.)
-
- Bekker said he manages a network consisting of a DECsystem 5500 server
- and 40 to 50 Sun and VAX VMS workstations. He noted a break-in to
- another machine on campus Jan. 16, and into a machine at the
- University of Leyden in October.
-
- A cracker was searching DECnet I password files for accounts with no
- password. The cracker was also breaking into machines over DECnet,
- said Bekker. The cracker had a rough idea of the pattern of DECnet
- node addresses in Holland, and was trying to guess machine addresses
- from there. Node addresses begin with the numerals 28, said Bekker,
- and he found log files of the cracker searching for machines at 28.1,
- 28.2, 28.3 and so on. But the cracker did not know that the actual
- sequence goes 28.100, 28.110, and so on.
-
- "Hackers are organized to get together, discuss technologies, and they
- openly demonstrate where there are installations prone to break-in,"
- de Lange said. Computer crime in Holland can be prosecuted under laws
- covering theft of resources, wiretapping and wire fraud, said Piet
- Beertema, of the European Unix User Group, and network manager of the
- Center for Mathematics and Computer Science in Amsterdam.
-
- And finding someone to investigate can also be a problem, said Bekker.
-
- "You cannot go to the police and say, 'Hey, someone has broken into my
- computer.' They can't do anything about it," he said.
-
- Stoll, the American author, said crackers appear firmly rooted in
- Dutch soil.
-
- "There is a history going back more than five years of people getting
- together and breaking into computers over there," he said. "Hacker
- clubs have been active there since 1985 or 1986."
-
- But he said it's more than lack of law that has made cracking so
- popular. Most industrialized nations have no cracking laws, and those
- that have them find prosecution extremely difficult, he said. Dutch
- citizens also have an anti-authoritarian spirit, he added.
-
- But Stoll condemmed the crackers. "This is the sort of behavior that
- wrecks the community, spreads paranoia and mistrust," he said. "It
- brings a sense of paranoia to a community which is founded on trust."
- Because no classified data was accessed, Mike Godwin, attorney for the
- Electronic Frontiers Foundation (EFF), cautioned against making too
- much of the incidents.
-
- "What did these people do" he said. "There's no sense that they
- vandalized systems or got ahold of any classified information." The
- itself as an organization fighting to see civil rights guarantees
- extended to information systems. The Cambridge, Mass., organization
- has been involved in a number of cracker defenses.
-
- The fact that the systems were breached means the data's integrity is
- compromised, said Netunann. just because the data isn't classified
- doesn't mean it isn't important, he noted. 'Just because you can't get
- into classified systems doesn't mean you can't get sensitive
- information," he said.
-
-
-
-
- #O Network World
- #D April 29, 1991
- #T Long-haul carriers may offer toll-fraud monitoring: Services would
- help shield customers from hackers
- #A Anita Taff, Washington Bureau Chief
-
- WASHINGTON D.C. -- Long-distance carriers are considering offering
- services that would shield customers from toll fraud by monitoring
- network activity for suspicious traffic patterns and tipping off
- users before huge costs would be run up, Network World has
- learned.
-
- Hackers are defrauding corporations by dialing into their private
- branch exchanges and using stolen authorization codes to dial out
- of the switches to remote destinations, sticking the switch owners
- with charges ranging from several thousand to, in one case, a
- million dollars.
-
- Users have been loathe to report toll fraud because they are
- embarrassed about the security breaches or because they have entered
- into private settlements with carriers that cannot be disclosed. But
- earlier this year, Pacific Mutual Life Insurance Co., exasperated by
- $200,000 in fraudulent charges run up during one weekend and lack of
- progress in settling the issue with AT&T, turned to the Federal
- Communications Commission for help.
-
- The insurance company asked the FCC to open a proceeding in order to
- establish guidelines that fairly distribute liability for toll fraud
- among users, long distance carriers and customer premises equipment
- manufacturers. The company questioned the validity of AT&T's claims
- that its tarriffs place the liability for fraud on users' shoulders.
- Both AT&T and MCI Communications Corp. oppose Pacific Mutual's
- position.
-
- But it is clear something has to be done. Customers lose $500 million
- annually to toll fraud, according to the Communications Fraud
- Control Association.
-
- "There are two kinds of customers: those who have been victims of
- toll fraud and those who are about to [become victims]," said Jim
- Snyder, staff member of the systems integrity department at MCI.
-
- According to Snyder, about 80% of the calls placed by hackers go to
- one of three places: Columbia, Pakistan and area code 809, which
- covers Caribbean countries including the Dominican Republic and
- Jamaica. Often, the calls are placed at night or during weekends. It
- is this thumbprint that would enable carriers to set up monitoring
- services to identify unusual activity. He said MCI is considering
- such a service but has not yet decided whether to offer it.
-
- AT&T would also be interested in rolling out such a monitoring
- service if customer demand exists, a spokesman said.
-
- Henry Levine, a telecommunications attorney in Washington, D.C. who
- helps customers put together Tariff 12 deals, said he knows of
- several users that have requested toll-fraud monitoring from AT&T.
- He said AT&T is currently beta-testing technology that gives users
- real-time access to call detail data, a necessary capability for
- real-time monitoring.
-
- US Sprint Communications Co. offers a monitoring service for its
- 800, UltraWATS, Virtual Private Network, SprintNet and voice mail
- customers free of charge, but it is not a daily, around-the-clock
- monitoring service, and the typical lag time until user are notified
- of problems is 24 hours.
-
- In a filing on behalf of the Securities Industry Association, Visa
- USA, Inc., the New York Clearinghouse Association and Pacific
- Mutual, Levine urged the agency to require carriers to offer
- monitoring services. Network equipment could monitor traffic
- according to preset parameters for call volume, off-hour calling and
- suspicious area or country codes, he said. If an anomaly is
- detected, Levine's proposal suggests that carriers notify users
- within 30 minutes. Therefore, users would be held liable for only a
- nominal amount of fraudulent charges.
-
-
-
-
- #O Houston Chronicle
- #T Lawsuit alleges rights violations in computer crime crackdown
- #A Joe Abernathy
-
- An Austin game publisher has sued the U.S. Secret Service for alleged
- civil rights violations in connection with a nationwide crackdown on
- computer crime.
-
- Steve Jackson Games, whose case has become a cause celebre in the
- computer network community, alleges in the lawsuit that a raid
- conducted during OperationSun Devil violated the rights of the company
- and its customers to free speech, free association, and a free press.
-
- The lawsuit in federal district court in Austin further claims the
- raid was a violation of the protection against unreasonable search and
- seizure, and violated the law restricting the government from
- searching the office of publishers for work products and other
- documents. It seeks unspecified damages.
-
- "This is a lawsuit brought to establish the statutory rights of
- businesses and individuals who use computers," said Jackson's
- attorney, Sharon Beckman of Boston. "It's about the First Amendment,
- it's about the right to privacy, and it's about unreasonable
- government intrusion."
-
- Defendants include the Secret Service; Assistant United States
- Attorney William J. Cook in Chicago; Secret Service agents Timothy M.
- Foley and Barbara Golden; and Henry M. Kluepfel of Bellcore, a
- telephone company research consortium which assisted the agency in its
- investigation.
-
- Earl Devaney, special agent in charge of the Secret Service fraud
- division, said that his agency was barred from responding to the
- allegations contained in the lawsuit.
-
- "Our side of the story can't be told because we're compelled by the
- laws that govern us to remain mute," he said. "We'll have to let the
- future indictments, if there are any, and the future trials speak for
- themselves."
-
- Devaney said the agency recently completed its review of evidence
- seized during Operation Sun Devil and has sent it to federal
- prosecutors. He couldn't predict how many indictments will result.
-
- The Electronic Frontier Foundation, founded by computer industry
- activists after questions arose regarding the legality of several Sun
- Devil raids, is paying Jackson's legal fees. James R. George, an
- Austin attorney with expertise in constitutional law, represents
- Jackson in Texas.
-
- Contending that civil rights normally taken for granted are often
- denied to users of computer networks and bulletin boards, the EFF
- attorneys designed Jackson's case as a test of how courts will treat
- these issues.
-
- "What happened was so clearly wrong," Beckman said. "Here we have a
- completely innocent businessman, a publisher no less, whose
- publications are seized, whose computers are seized, whose private
- electronic mail is seized, and all for no good reason."
-
- Jackson's firm was raided on March 1, 1990, along with 27 other homes
- and businesses across the nation. The Secret Service confiscated
- dozens of computers and tens of thousands of computer data disks in
- the raids. After several months passed with no charges being filed,
- the agency came under increasing fire for Sun Devil.
-
- "They raided the office with no cause, confiscated equipment and data,
- and seriously delayed the publication of one big book by confiscating
- every current copy," Jackson said. "It very nearly put us out of
- business, and we are still extremely shaky."
-
- Seven months after the raid on Jackson's firm, the search warrant was
- unsealed, revealing that the firm was not even suspected of
- wrongdoing. An employee was suspected of using a company bulletin
- board system to distribute a document stolen from the telephone
- company.
-
- Bulletin board systems, called BBSs in computer jargon, allow people
- with common interests to share information using computers linked by
- telephone. Jackson's bulletin board, Illuminati, was used to provide
- product support for his games - which are played with dice, not
- computers.
-
- Beckman said the search warrant affidavit indicates investigators
- thought the phone company document was stored on a bulletin board at
- the employee's home, and therefore agents had no reason to search the
- business.
-
- "Computers or no computers, the government had no justification to
- walk through that door," she said.
-
- Beckman said that by seizing the BBS at Steve Jackson Games, the
- Secret Service had denied customers the right to association.
-
- "This board was not only a forum for discussion, it was a forum for a
- virtual community of people with a common interest in the gaming
- field," she said. "Especially for some people who live in a remote
- location, this forum was particularly important, and the Secret
- Service shut that down."
-
- Jackson was joined in the lawsuit by three New Hampshire residents,
- Elizabeth McCoy, Walter Milliken and Steffan O'Sullivan, who used the
- Illuminati BBS.
-
- "Another right is privacy," Beckman said. "When the government seized
- the Illuminati board, they also seized all of the private electronic
- mail that (callers) had stored. There is nothing in the warrant to
- suggest there was reason to think there was evidence of criminal
- activity in the electronic mail - the warrant doesn't even state that
- there was e-mail."
-
- "That, we allege, is a gross violation of the Electronic
- Communications Privacy Act," Beckman said.
-
- Mitchell D. Kapor, creator of the popular Lotus spreadsheet program
- and co-founder of the Electronic Frontier Foundation, said:
-
- "The EFF believes that it is vital that government, private entities,
- and individuals who have violated the Constitutional rights of
- individuals be held accountable for their actions. We also hope this
- case will help demystify the world of computer users to the general
- public and inform them about the potential of computer communities."
-
-
-
-
- #O Computerworld
- #D Gary H. Anthes
- #T Court Tosses Inslaw Appeal
- #A Gary H. Anthes
-
- Washington, D.C.- A three-judge panel of the US Court of Appeals throw
- out two lower court rulings last week that said the US Department of
- Justice had stolen software from Inslaw, Inc. and had conspired to
- drive the firm out of business.
-
- The Court of Appeals for the Washington, D.C., circuit did not
- consider the validity of the lower court findings but said the
- bankruptcy court that first upheld Inslaw's charges had exceeded its
- authority.
-
- This is a serious setback for Inslaw, which said it has spent five
- years and $6 million in legal fees on the matter, but the company
- vowed to fight on. It may ask the full court to reconsider, it may
- appeal to the US Supreme Court, or it may go to more specialized
- tribunals set up by the government to hear disputes over contracts,
- trade secrets, and copyrights, Inslaw President William Hamilton said.
-
- "Not many firms could have lasted this long, and now to have this
- happen is just unbelievable. But there's no way in hell we will put up
- with it," an obviously embittered Hamilton said. It may cost the tiny
- firm "millions more" to reach the next major legal milestone, he said.
-
- Double Trouble
- Since the bankruptcy court trial in 1987, Inslaw has learned of
- additional alleged wrongdoings by the Justice Department.
-
- "The new evidence indicates that the motive of the [software theft]
- was to put Inslaw's software in the hands of private sector friends of
- the Reagan/Bush administration and then to award lucrative government
- contracts to those political supporters," Hamiliton said.
-
- He said that other evidence suggests that the software was illegally
- sold to foreign intelligence agencies.
-
-
-
-
- #O Computerworld
- #D May 13, 1991
- #T Systems Security Tips Go On-Line
- #A Michael Alexander
-
- Farifax, Va.-- Information systems security managers, electronic data
- processing auditors and others involved in systems protection know
- that it can often be difficult to keep on top of security technology
- and fast-breaking news. This week, National Security Associates, Inc.,
- will officially kick off an on-line service dedicated solely to
- computer security.
-
- The repository contains databases of such articles on computer
- security that have appeared in 260 publications, computer security
- incident reports and vendor security products. One database is devoted
- to activity in the computer underground and to techniques used to
- compromise systems security.
-
- "This is a tough industry to keep up with," said Dennis Flanders, a
- communications engineer with computer security responsibilities at
- Boing Co. Flanders has been an alpha tester of National Security
- Associates' systems for about six months. "Security information is now
- being done piecemeal, and you have to go to many sources for
- information. The appealing thing about this is [that] all of the
- information is in one place."
-
- The service costs $12.50 per hour. There is a onetime sign-up charge
- of $30, which includes $15 worth of access time.
-
-
-
-
- #O The LA Times
- #D May 29, 1991 [p. B-3]
- #T Writer Gets Probation in Sting at Fox
- #A John Kendall
-
- Free-lance writer Stuart Goldman pleaded no contest Tuesday to three
- felony charges of illegally entering Fox Televisions computer system
- and stealing story ideas planted by Los Angeles police in a sting
- operation.
-
- In a plea bargain presented by prosecutors and approved by Superior
- Court Judge Richard Neidorf, the 45-year-old self-proclaimed muckraker
- was placed on five years' probation and ordered to pay $90,000 in
- restitution, reduced to $12,000 with Fox's approval.
-
- The judge ordered Goldman to serve 120 days in County Jail but stayed
- the sentence.
-
- Deputy Dist. Atty. Richard Lowenstein moved for dismissal of four
- additional counts of entry of a computer illegally. Goldman's
- no-contest pleas were tantamount to admitting guilt, the prosecutor
- said.
-
- Despite the pleas, Goldman continued to insist outside the courtroom
- Tuesday that Hollywood-based Fox had attempted to silence him.
-
- "There's been an effort by Fox Television to silence me and, as far as
- I'm concerned, that's what this case was all about," Goldman told
- reporters.
-
- Attorney James E. Hornstein, representing Fox Television, denied
- Goldman's charge. He said his client had agreed to reduce the
- court-ordered restitution from $90,000 to $12,000 on Goldman's "plea
- and statement that he is indigent."
-
- "Throughout these proceedings, Mr. Goldman has tried to argue that
- someone was out to get him," Hornstein said. "The only victims in
- these proceedings were the computers of "A Current Affair which Mr.
- Goldman has admitted by the plea he accessed illegally."
-
- Goldman was arrested at his Studio City apartment in March of last
- year by Secret Service agents and Los Angeles police who confiscated a
- personal computer, floppy disks, Rolodexes and a loaded .38 caliber
- handgun.
-
- Prosecutors accused Goldman of using a password apparently gained when
- the journalist worked briefly for "A Current Affair" to enter the Fox
- production's computer system. They charged that Goldman stole bogus
- tips, including one involving "Ronald Reagan Jr.'s Lover," and
- attempted to sell the items to a national tabloid magazine.
-
- In an interview with The Times last year Goldman explained that he was
- engaged in a free-lance undercover inquiry of gossip news-papers and
- TV shows, and he claimed that his arrest was a setup to get him.
-
- "These people will look very foolish when they get into court,"
- Goldman insisted at the time. "I'm a good guy, and I'm going to prove
- it. This is going to be the biggest soap opera you ever saw."
-
- After his arrest, Goldman said he was writing a book about his
- experience as a former gossip media insider who once attacked
- feminists, gays and other targets in vitriolic columns in the National
- Review.
-
- After Tuesday's court session, Goldman vowed to publish his completed
- book, "Snitch," as soon as possible.
-
- Neidorf ordered authorities to return Goldman's computer.
-
- "I'm sure you know now that computers will get you in trouble," the
- judge said. "If you don't, I'll see you back in her again."
-
-
-
-
- #O NewsBytes
- #D June 12, 1991
- #T Len Rose Sentenced To 1 Year
- #A n/a
-
- BALTIMORE, MARYLAND, U.S.A., 1991 JUNE 12 (NB) -- Leonard Rose, Jr., a
- computer consultant also known as "Terminus", was sentenced to a year
- and a day in prison for charges relating to unauthorized sending of
- AT&T UNIX source code via telephone to another party. Rose is
- scheduled to begin serving his sentence on July 10th.
-
- The original indictment against Rose was for interstate transportation
- of stolen property and violations of the Computer Fraud and Abuse Act
- but those charges were dropped and replaced by a single charge of wire
- fraud under a plea agreement entered into in March. The charges
- involving the violation of the Computer Fraud and Abuse Act had been
- challenged in a friend of the court brief filed in January by the
- Electronic Frontier Foundation (EFF) who challenged the statute as
- "unconstitutionally vague and overbroad and in violation of the First
- Amendment guarantees of freedom of speech and association." The issues
- raised by EFF were not resolved as the charges to which they objected
- were dropped as part of the plea agreement.
-
- In his plea, Rose admitted to receiving misappropriated UNIX source
- code and modifying it to introduce a trojan horse into the login
- procedures; the trojan horse would allow its developer to collect
- passwords from unsuspecting persons logging on to a system containing
- this code. Rose admitted that he transmitted the modified code via
- telephone lines to a computer operator in Lockport, IL and a student
- account at the University of Missouri. He also admitted putting
- warnings in the transmitted code saying "Warning: This is AT&T
- proprietary source code. DO NOT get caught with it."
-
- U.S. District Judge J. Frederick Motz, in sentencing Rose, ordered him
- to sell his computer equipment and to inform potential employers of
- his conviction. Assistant United States Attorney Geoffrey Garinther,
- who prosecuted Rose, explained these portions of the sentence to
- Newsbytes, saying "The equipment was seized as evidence during the
- investigation and was only returned to him as part of the agreement
- when it became evident that he had no means of supporting his wife and
- two children. It was returned to him for the sole purpose of selling
- the equipment for this purpose and, although he has not yet sold it,
- he has shown evidence of efforts to do so. The judge just formalized
- the earlier agreement in his sentence. The duty to inform potential
- employers puts the burden of proof on him to insure that he is not
- granted "Root" privileges on a system without the employer's
- knowledge."
-
- Garinther added "I don't have knowledge of the outcome of all the
- cases of this type in the country but I'm told that this is one of the
- stiffest sentences a computer hacker has received. I'm satisfied
- about the outcome."
-
- Jane Macht, attorney for Rose, commenting to Newsbytes on the
- sentence, said "The notification of potential employers was a
- negotiated settlement to allow Len to work during the three years of
- his supervised release while satisfying the government's concern that
- employers be protected." Macht also pointed out that many reports of
- the case had glossed over an important point,"This is not a computer
- intrusion or security case; it was rather a case involving corporate
- computer software property rights. There were no allegations that Len
- broke into anyone's system. Further, there are no reported cases of
- anyone installing his modified code on any system. It should be
- understood that it would require a system manager or someone else with
- 'superuser' status to install this routine into the UNIX login
- procedure. The publishing of the routine did not, as has been
- reported, open the door to a marked increase in unauthorized computer
- access."
-
- Macht said that she believed that Rose had reached an agreement to
- sell the computer equipment. He had been offering it through the
- Internet for $6,000, the amount required to prepay his rent for the
- length of his prison sentence. Because of his financial circumstances,
- which Macht referred to as a "negative net worth", the judge did not
- order any restitution payments from Rose to AT&T.
-
-
-
-
- #O NewsRelease
- #D May 31, 1991
- #T Search Warrants Served in Computer "Hacking" Scheme
-
- INDIANAPOLIS -- The Indianapolis Police Department, the Federal Bureau
- of Investigation, and the United States Secret Service served search
- warrants at five Indianapolis locations on Wednesday, May 29, 1991,
- for computer-related equipment. The warrants were served by five teams
- of law enforcement officials forming a group known as the Special
- Computerized Attack Team (SCAT).
-
- SCAT is a cooperative effort between the Indianapolis Police
- Department the FBI, the Secret Service and other federal, state and
- local law enforcement agencies aimed at tracking computer "hackers"
- who illicitly enter the computer systems of companies in an attempt to
- gain sensitive information, money, or company secrets.
-
- The White Collar Crime Unit of IPD obtained information from the FBI
- and Secret Service concerning illegal computer access to the PBX
- system of an Indianapolis company. Armed with search warrants, SCAT
- members confiscated computer equipment from fie Indianapolis residences
- which linked several juveniles to the crime. The Indianapolis company
- has experienced losses which approach $300,000. A search warrant was
- served simultaneously by FBI agents, the Secret Service and Michigan
- State Police in West Bloomfield, Michigan, in this same case.
-
- Information gained from the search warrants has led police to continue
- the investigation in other cities as well.
-
- Suspects in the case are all juveniles and the investigation is
- continuing to determine if the evidence collected will support
- arrests. The SCAT unit is currently investigating other
- computer-related crimes and hopes to send a strong message to computer
- "hakers" that their illegal actions are being monitored closely bylaw
- enforcement officials.
-
- For further information, please contact Special Agent in Charge Roy
- Yonkus, U.S. Secret Service (Indiana) at 317/ 639-3301; or John M.
- Britt, Assistant to the Special Agent in Charge, U.S. Secret Service
- (Detroit Office) at 313/ 226-6400.
-
-
-
-
- #O NewsBytes
- #D June 21, 1991
- #T Norman & Thackeray Form Security Firm
-
- DALLAS, TEXAS U.S.A., 1991 JUNE 21 (NB) -- Neal Norman, a veteran of
- 34 years with AT&T, has announced the formation of GateKeeper
- Telecommunications Systems, Inc. The new firm will introduce a
- product which it says "provides an airtight defenses against
- unauthorized computer access."
-
- Norman told Newsbytes "we think we have a product that will
- revolutionize telecommunications by stopping unauthorized access to
- computer systems." Norman said that the system, which is scheduled to
- become available in the early fall, will provide protection for
- terminals, mainframes, and PBXs.
-
- Norman also told Newsbytes that Gail Thackeray, ex-Arizona assistant
- attorney general known for her activities in the investigation of
- computer crime, will be a vice president of the new firm. "I am
- extremely happy to have someone of Gail's ability and presence
- involved in this endeavor right from the beginning. Additionally,"
- Norman said, "we have enlisted some of the industry's most well known
- persons to serve on a board of advisors to our new company. These
- respected individuals will provide guidance for us as we bring our
- system to market. Among those who have agreed to serve in this group
- are Donn Parker of SRI; Bill Murray, formerly of IBM; and Bob Snyder,
- Chief Computer Crime Investigator for the Columbus, Ohio, police.
-
- Synder told Newsbytes "I am excited about working with such bright
- people on something of real importance and I hope to contribute to an
- improvement in computer security."
-
-
-
-
- #O The Wall Street Journal
- #D June 6, 1991 [pp A-1, A-7]
- #T Dialing For Free
- #A John J. Keller
-
- Robert Dewayne Sutton wants to help stop the tide of fraud sweeping the
- cellular telephone industry. The 35-year old clearly knows plenty about
-
- (cont' NIA072 / File 9)
-
- / /
- / NIA072 / File 9 /
- / CyberTimes (Vox Populi) /
- / Judge Dredd /
- / /
-
- (cont' NIA072 / File 8)
-
- fraud. After all, he helped spark the crime wave in the first place.
-
- Mr. Sutton is a computer hacker, a technical whiz who used an
- acquaintance's home-grown computer chip to tap into the local cellular
- phone network and dial for free. Mr. Sutton went into business selling the
- chips, authorities say, and soon fraudulent cellular phone calls were
- soaring nationwide.
-
- In February, 1989, police finally nabbed Mr. Sutton in his pick-up truck at
- a small Van Nuys, Calif., gas station. He was about to sell five more of
- the custom chips to a middleman. But by then it was too late. The wave of
- fraud Mr. Sutton helped launch was rolling on without him.
-
- ((stuff deleted explaining that industry currently loosing about $200
- million a year, "more than 4% of annual U.S. revenue" to cellular phone
- fraud, and could rise to %600 million annually. Celluar system first
- cracked in 1987, by Kenneth Steven Bailey an acquaintance of Sutton from
- Laguna Niguel, Calif. Bailey used his PC to rewrite the software in the
- phone's memory chi to change the electronic serial number. By replacing the
- company chip with his own, Bailey could gain free access to the phone
- system.))
-
- ((More stuff deleted, explaining how drug dealers use the phones, and small
- businesses sprung up selling free calls to anyplace in the world for a few
- dollars. Sutton denied selling the chips, but apparently sold his program
- for a few hundred dollars, and anybody with a copy could duplicate it. This
- is, according to the story, an international problem.))
-
- When the dust settled in U.S. District Court in Los Angeles this April, Mr.
- Sutton pleaded guilty to production of counterfeit access devices and, after
- agreeing to cooperate with investigators, was sentenced to three years'
- probation and a $2,500 fine.
-
- ((stuff deleted))
-
- But in adversity there is opportunity, or so believes Mr. Sutton. He says
- he's got a marketable expertise--his knowledge of weaknesses in cellular
- phone security systems--and he wants to help phone companies crack down on
- phone fraud. He'll do that, of course, for a fee.
-
-
-
-
- #O Newsweek
- #D June 3, 1991
- #T How Did They Get My Name?
- #A John Schwartz
-
- When Pam Douglas dropped by Michelle Materres's apartment, Michelle
- was on the phone--but Pam knew that already. She and her son, Brian,
- had been playing with his new walkie-talkie and noticed the toy was
- picking up Michelle's cordless-phone conversation next door. They had
- come over to warn her that her conversation was anything but private.
- Materres was stunned. It was as if her neighbors could peek through a
- window into her bedroom-except that Michelle hadn't known that this
- window was there. "It's like Nineteen Eighty-four ;" she says.
-
- Well, not quite. In Orwell's oppressive world, Big Brother-the police
- state-was watching. "We don't have to worry about Big Brother
- anymore," says Evan Hendricks, publisher of the Washington-based
- Privacy Times. "We have to worry about little brother." Until
- recently, most privacy fears focused on the direct mail industry; now
- people are finding plenty of other snoops. Today's little brothers
- are our neighbors, bosses and merchants, and technology and modern
- marketing techniques have given each a window into our lives.
-
- Suddenly privacy is a very public issue. A 1990 Harris poll, conducted
- for consumer-data giant Equifax, showed that 79 percent of respondents
- were concerned with threats to their personal privacy-up from 47
- percent in 1977. Privacy scare stories are becoming a staple of local
- TV news; New York City's ABC affiliate showed journalist Jeffrey
- Rothfeder poking into Vice President Dan Quayle's on-line credit
- records-a trick he had performed a year before for a story he wrote
- for Business Week. Now Congress is scrambling to bring some order to
- the hodgepodge of privacy and technology laws, and the U.S. Office of
- Consumer Affairs has targeted privacy as one of its prime concerns.
- Advocacy groups like the Consumer Federation of America and the
- American Civil Liberties Union are turning to privacy as one of the
- hot-button issues for the '90s . "There's a tremendous groundswell of
- support out there," says Janlori Goldman, who heads the ACLU Privacy
- Project.
-
- Snooping boss: Concern is on the rise because, like Materres,
- consumers are finding that their lives are an open book. Workers who
- use networked computers can be monitored by their bosses, who in some
- cases can read electronic mail and could conceivably keep track of
- every keystroke to check productivity. Alana Shoars, a former e-mail
- administrator at Epson America, says she was fired after trying to
- make her boss stop reading co-workers' e-mail. The company says
- Shoars got the ax for in subordination; Shoars counters that the
- evidence used against her was in her own e-mail--and was
- misinterpreted. Other new technologies also pose threats: cordless and
- cellular phones are fair game for anyone with the right receiver, be
- it a $1,000 scanner or a baby monitor. Modern digital-telephone
- networks allow tapping without ever placing a physical bug; talented
- "phone phreaks" can monitor calls through phone companies or corporate
- switchboards.
-
- Such invasions may sound spooky, but privacy activists warn that the
- bigger threat comes from business. Information given freely by
- consumers to get credit or insurance is commonly sold for other uses
- without the individual's knowledge or consent; the result is a flood
- of junk mail and more. Banks study personal financial data to target
- potential credit-card customers. Data sellers market lists of people
- who have filed Worker Compensation claims or medical-malpractice
- suits; such databases can be used to blackball prospective employees
- or patients. Citicorp and other data merchants are even pilot testing
- systems in supermarkets that will record your every purchase; folks
- who buy Mennen's Speed Stick could get pitches and discount coupons to
- buy Secret instead. "Everything we do, every transaction we engage in
- goes into somebody's computer, " says Gary Culnan, a Georgetown
- University associate professor of business administration.
-
- How much others know about you can be unsettling. Architect David
- Harrison got an evening call from a local cemetery offering him a deal
- on a plot. The sales rep mentioned Harrison's profession, family size
- and how long he had lived in Chappaqua, N.Y. Harrison gets several
- sales calls a week, but rarely with so much detail: "This one was a
- little bizarre."
-
- High tech is not the only culprit. As databases grow in the '80s, the
- controls were melting away, says Hendricks. "Reagan came in and said,
- 'We're going to get government off the backs of the American people.'
- What he really meant was, 'We're going to get government regulators
- off the i backs of business.' That sent signals to the private sector
- that 'you can use people's personal information any way you want'"'
- The advent of powerful PCs means that the field is primed for another
- boom. Today companies can buy the results of the entire 1990 census
- linked to a street-by-street map of the United States on several
- CD-ROM disks.
-
- Defenders of the direct-marketing industry point out that in most
- cases companies are simply, trying to reach consumers efficiently-and
- that well targeted mail is not "junk" to the recipient. Says Equifax
- spokesman John Ford: "People like the kinds of mail they want to
- receive." Targeting is now crucial, says Columbia University professor
- Alan Westin: "If you can't recognize the people who are your better
- prospects, you can't stay in business." Ronald Plesser, a lawyer who
- represents the Direct Marketing Association, says activists could end
- up hurting groups they support: "It's not just marketers. It's
- nonprofit communication, it's political parties. It's environmental
- groups. "
-
- E-mail protest: Consumers are beginning to fight back. The watershed
- event was a fight over a marketing aid with data on 80 million
- households, Lotus MarketPlace: Households, proposed by the Cambridge,
- Mass.- based Lotus Development Corp. Such information had been readily
- available to large corporations for years, but MarketPlace would have
- let anyone with the right PC tap in. Lotus received some 30,000
- requests to be taken off the households list. Saying the product was
- misunderstood, Lotus killed MarketPlace earlier this year. New York
- Telephone got nearly 800,000 "opt out" requests when it wanted to
- peddle its customer list; the plan was shelved.
-
- With the MarketPlace revolt, a growing right-to-privacy underground
- surfaced for the first time. Privacy has become one of the most
- passionately argued issues on computer networks like the massive
- Internet, which links thousands of academic, business nd military
- computers. Protests against MarketPlace were broadcast on the Internet
- and the WELL (an on-line service that has become a favorite electronic
- hangout for privacy advocates and techie journalists), and many
- anti-MarketPlace letters to Lotus were relayed by e-mail.
-
- Consumers are also taking new steps to safeguard their own privacy
- often by contacting the Direct Marketing Association, which can remove
- names from many mailing lists. But compliance is voluntary, and relief
- is slow. In one chilling case, an unknown enemy began flooding
- business manager Michael Shapiro's Sherman Oaks, Calif., home with
- hundreds of pieces of hate junk mail. Suddenly Shapiro, who is
- Jewish, was receiving mail addressed to "Auschwitz Gene Research" and
- "Belsen Fumigation Labs." Shapiro appealed to the DMA and the mailing
- companies directly but got no responses to most of his calls and
- letters. "They ignore you, throw your letter away and sell your name
- to another generation of people with computers," he complains. Finally
- one marketing executive publicized Shapiro's plight within the DM
- industry. Eight months after the onslaught began, the letters have
- slowed-though some companies still have not removed him from their
- lists.
-
- How else can privacy be protected? It doesn't have to mean living like
- a hermit and only paying cash, but it does mean not saying anything
- over cellular and cordless phones that you wouldn't want others to
- overhear. Culnan of Georgetown uses her American Express card
- exclusively, because while the company collects voluminous data on its
- cardholders, it shares relatively little of it with other companies.
-
- Some privacy activists look hopefully, across the Atlantic Ocean. The
- European Community is pushing tough new data rules to take effect
- after 1992. The Privacy Directive relies on consumer consent;
- companies would have to notify consumers each time they intend to pass
- along personal information. The direct-marketing industry claims the
- regulations would be prohibitively expensive. The rules may be
- softened but could still put pressure on U.S. marketers who do
- business abroad.
-
- U.S. firms might find another incentive to change. Companies don't
- want to alienate privacy-minded customers. "We're in the relationship
- business," says James Tobin, vice president for consumer affairs at
- American Express. "We don't want to do anything to jeopardize that
- relationship." Citicorp's supermarket plan makes privacy advocates
- nervous; but Citicorp rewards customers for giving up their privacy
- with incentives like discount coupons, and it reports that no
- consumers have complained. Eventually, strong privacy-protection
- policies could make companies more attractive to consumers, says
- Columbia's Westin-and may even provide a competitive edge. Then
- consumers might get some of their privacy back-not necessarily because
- it's the law, or even because it's right, but because it's good
- business.
-
-
-
-
- #O Newsweek
- #D June 3, 1991
- #T Would New Laws Fix the Privacy Mess?
- #A Annetta Miller & John Schwartz w/Michael Rogers
-
- Congress is scrambling to catch up with its constituents in the battle
- over privacy. It has a daunting task ahead: to make sense of the
- jumble of laws that have been passed-or are currently under
- consideration-to regulate privacy. Why, for example, is it legal to
- listen in on someone's cordless phone conversation but illegal to
- listen to a cellular call? Why are video-rental records protected but
- records of health-insurance claims largely unprotected? (That one has
- to do with an impertinent reporter revealing the video-renting habits
- of Supreme Court nominee Robert Bork.)
-
- The present foundations of privacy law have their roots in the U.S.
- Constitution. Although the word "privacy" does not appear in the
- document, the Supreme Court has interpreted the Constitution to grant
- individuals a right of privacy based on the First, Fourth, Fifth,
- Ninth and Fourteenth amendments. Since the mid-1960s, Congress has
- enacted no fewer than 10 privacy laws-including the landmark 1974
- Privacy Act. And yet a national right to privacy is far from firmly
- established. On its face, for example, the Fair Credit Reporting Act
- limits access to credit reports. But it also grants an exception to
- anyone with a "legitimate business need." The Right to Financial
- Privacy Act of 1978 severely restricts the federal government's
- ability to snoop through bank-account records; but it exempts state
- agencies, including law-enforcement agencies, and private employers.
- "It's easy to preach about the glories of privacy," says Jim Warren,
- who organized a recent "Computers, Freedom & Privacy" conference. But
- it's hard to implement policies without messing things up."
-
- That hasn't stopped people from trying. James Rule, a State University
- of New York sociology professor, says that new legislation is
- warranted "on the grounds that enough is enough . . . [Privacy
- infringement] produces a world that almost nobody likes the look of."
-
- Data board: The newest efforts to regulate privacy range from simple
- fixes to a full-fledged constitutional amendment. Last week a Senate
- task force recommended extending privacy laws to cover cordless
- tele-phones. One bill, proposed by Rep. Robert Wise of West Virginia,
- would create a federal "data-protection board" to oversee business and
- gov-ernmental use of electronic information. Another, being prepared
- by Sen. Patrick Leahy of Vermont, would apply the Freedom of
- Informa-tion Act to electronic files as well as to paper. Rep. Andy
- Jacobs of Indiana has held hearings on the misuse of social-security
- numbers to link computerized information. And several bills have been
- introduced to stop credit reporters from selling personal data to junk
- mailers.
-
- Possibly the most sweeping proposal for change comes from Harvard
- University law professor Laurence Tribe. In March, Tribe proposed a
- constitutional amendment that would, among other things protect
- individuals from having their private data collected and shared
- without approval. "Constitutional principles should not vary with
- accidents of technology," Tribe said at the "Computers, Freedom &
- Privacy" conference earlier this spring. He said an amendment is
- needed because the letter of the Constitution can seem, at the very
- least, "impossible to take seriously in the world as reconstituted by
- the microchip."
-
- But some experts argue that well-meaning reform could do more harm
- than good. Requiring marketers to get permission every time they want
- to add a name to a mailing list would make almost any kind of mass
- mailing hopelessly expensive. "It's nice to talk about affirmative
- consent, but it really will kill the industry," warns Ronald Plesser,
- who represents the Direct Marketing Association. "And then people who
- live out in the country won't have access to the L.L. Bean catalog and
- the services they like." In this technological age, how much privacy
- Americans enjoy will depend partly on how high a price they are
- willing to pay to keep it.
-
-
-
-
- #O NewsBytes
- #D April 30, 1991
- #T Secret Service: "No Comment" on Reported Siezure
-
- TOLEDO, OHIO, U.S.A., 1991 APR 30 (NB) -- Anthony J. Carmona,
- United States Secret Service Agent-in-Charge of the Toledo, Ohio
- office, responding to Newsbytes questions, said that "there has been
- no recent computer or credit card crime arrests by his office."
-
- Newsbytes contacted Carmona after receiving two independent
- notifications that the Secret Service agents from the Toledo office
- have recently seized computer equipment from an individual
- pursuant to a credit card fraud case. Carmona told Newsbytes that
- his office "could no comment on any seizures or other incidents that
- may be part of an on-going investigation. We can only speak of items
- that are part of the public record."
-
- MIke Godwin, staff counsel of the Electronic Frontier Foundation
- (EFF), told Newsbytes that an unidentified individual had called his
- office purporting to be a "friend" of the subject of a Secret Service
- investigation and equipment seizure in the Toledo area. Godwin said
- that the called asked for advice for his friend and "I told him to
- consult an attorney." Godwin said the caller hung up without leaving
- his name.
-
- Gail Thackeray, former Arizona Assistant AttorneyGeneral, who
- has worked for over a year with the Secret Service in the on-going
- "Sundevil" credit card fraud case told Newsbytes "I don't know
- whether there was any arrest or seizure in Ohio but, if there was, it
- is not related to "Sundevil". Thackeray, now working with the
- Maricopa Country Attorney's office to complete the Sundevil cases,
- has recently brought the first two indictments related to the
- investigation. In the most recent, Baron Majette, 19, also known as
- "Doc Savage", was arrested and charged with a number of felony
- crimes relating to computer system break-ins and misuse of credit
- cards.
-
- Newsbytes will continue to attempt to verify whether or not a seizure
- of computer equipment actually occurred.
-
-
-
-
- #O NewsBytes
- #D July 2, 1991
- #T Law Panel Recommends Computer Search Procedures
-
- WASHINGTON, D.C., U.S.A., 1991 JULY 2 (NB) -- A panel of lawyers and
- civil libertarians, meeting at the Computer Professionals for Social
- Responsibility (CPSR) Washington roundtable, "Civilizing Cyberspace",
- have proposed procedures for police searches and seizures which they
- feel will both allow adequate investigations and protect the
- constitutional rights of the subject of the investigation.
-
- The panel, composed of Mike Godwin, staff counsel of Electronic
- Frontier Foundation; Sharon Beckman attorney with Silverglate &
- Good; David Sobel of CPSR, Jane Macht, attorney with Catterton, Kemp
- and Mason; and Anne Branscomb of Harvard University, based its
- proposals on the assumption that a person, in his use of computer
- equipment, has protection under both the Fourth Amendment and the
- free speech and association provisions of the first amendment.
-
- The panel first addressed the requirements for a specific warrant
- authorizing the search and recommended that the following guidelines
- be observed:
-
- 1. The warrant must contain facts establishing probable cause to
- believe that evidence of a particular crime or crimes will be found
- in the computers or disks sought to be searched.
-
- 2. The warrant must describe with particularity both the data to be
- seized and the place where it is to be found ("with particularity" is
- underlined).
-
- 3. The search warrant must be executed so as to minimize the
- intrusion of privacy, speech and association.
-
- 4. Officers may search for and seize only the data, software, and
- equipment specified in the warrant.
-
- 5. The search should be conducted on-site.
-
- 6. Officers must employ available technology to minimize the
- intrusive of data searches.
-
- The panel then recommended limitations on the ability of officials to
- actually seize equipment by recommending that "Officers may not seize
- hardware unless there is probable cause to believe that the computer
- is used primarily as an instrumentality of a crime or is the fruit of
- a crime; or the hardware is unique and required to read the data; or
- examination of hardware is otherwise required." The panel further
- recommended that, in the event hardware or an original and only copy
- of data has been seized, an adversary post-seizure hearing be held
- before a judge within 72 hours of the seizure.
-
- Panel member Sharon Beckman commented to Newsbytes on the
- recommendations, saying "It is important that we move now to the
- implementation of these guidelines. They may be implemented either by
- the agencies themselves through self-regulation or through case law
- or legislation. It would be a good thing for the agencies t o take
- the initiative."
-
- The panels recommendations come at a time in which procedures used in
- computer investigations have come under criticism from computer and
- civil liberties groups. The seizure of equipment by the United Secret
- Service from Steve Jackson Games has become the subject of litigation
- while the holding of equipment belonging to New York hacker "Phiber
- Optic" for more than a year before his indictment has prompted calls
- from law enforcement personnel as well as civil liberties for better
- procedures and technologies.
-
-
-
-
- #O Chicago Tribune
- #D June 27, 1991 [Sec 2, p2]
- #T Ex-Employee Guilty of Erasing Data
- #A Joseph Sjostrom
-
- A computer technician pleaded guilty Wednesday in Du Page County Court
- to erasing portions of his former employer's database last November in
- anger over the firing of his girlfriend.
-
- Robert J. Stone, 30, of 505 W. Front St., Wheaton, entered the plea on
- a charge of computer fraud to Associate Judge Ronald Mehling. In
- exchange for the guilty plea, prosecutors dismissed a burglary charge.
- Mehling scheduled sentencing for Aug. 8.
-
- Defense lawyer Craig Randall said after the hearing that Stone still
- has a 30-day appeal period during which he can seek to withdraw the
- guilty plea.
-
- "I don't think he erased anything as alleged, and I don't think the
- {prosecution} would be able to prove that he did," Randall said.
-
- Stone was indicted last January for one count of burglary and one
- count of computer fraud for entering the office of his former
- employer, RJN Environmental, 202 W. Front St., Wheaton, and deleting
- eight programs from the company computer.
-
- Assistant Du Page County State's Atty. David Bayer, who prosecuted the
- case along with Assistant State's Atty. Brian Ruxton, said the progams
- were part of a company project for the state of Florida in which RJN
- was, in effect, redrawing maps in digital form and storing them in a
- computer.
-
- Bayer said Stone had left the company the previous April and that his
- girlfriend, who was not identified, worked there too but was fired in
- November.
-
- Bayer said Stone entered the firm's office last Nov. 24, a Saturday
- when nobody else was there.
-
- Employees who came to work on Sunday discovered that data had been
- erased and a quantity of data storage disks were missing.
-
- Bayer said the disks contained several months' worth of work, but were
- recovered. It took about a week to restore the rest of the missing
- computer information, Bayer said.
-
- Bayer said Wheaton police Detective Kenneth Watt interviewed Stone the
- following Monday, and said Stone admitted to erasing data and taking
- the disks. Bayer said Stone told the detective where to find the disks,
- which he had left under a stairwell at RJN.
-
-
-
-
- #O Wall Street Journal
- #D April 25, 1991
- #T Soon, ATMs May Take Your Photograph Too
- #A Paul B. Carroll
-
- *Smile* when you use that automated teller machine. Miniature cameras may soon
- become widespread in ATMs and elsewhere.
- At Edinburgh University in Scotland, researchers have produced a single
- computer chip that incorporates all the circuitry needed for a video camera.
- Even with a lens that fits right on top of the chip, it's still just the size
- of a thumbnail. When they become available in a year or so, such cameras may
- carry as little as a $40 price tag.
- NCR thinks these tiny cameras could find their way into lots of ATMs in the
- next few years. The computer maker already sells ATMs that include cameras,
- allowing banks to doublecheck on people who contend their account was debited
- even though they didn't use an ATM that day. But those cameras are expensive,
- especially because the big box with the electronics has to be so far back in
- the ATM that it requires a long, elaborate lens. The lens also gives away to
- potential cheats the fact that the camera is there, whereas the new tiny
- cameras will just need a pinhole to peep through.
- "We see this as a breakthrough," says Greg Scott, an engineer with NCR in
- Dunfermline, Scotland.
- The Scottish Development Agency, which supplied some of the initial research
- funds, says the tiny cameras may also find their way into baby monitors,
- picture telephones, bar-code readers and robotic vision systems.
-
-
-
- #O NewsBytes
- #D July 1, 1991
- #T Arrests In "Multi-Million" Cellular Phone Fraud
-
- ALBANY, NEW YORK U.S.A., 1991 JUL 1 (NB) -- The New York State Attorney
- General's office has announced the arrest and arraignment of four individuals
- for allegedly illegally utilizing Metro One's cellular service for
- calls totalling in excess of $1 million per month.
-
- According to the charges, the arrested individuals duplicated a Metro
- One customer's electronic serial number (ESN) -- the serial number
- that facilitates customer billing -- and installed the chip in a
- number of cellular phones. Th defendants then allegedly installed the
- phones in cars which they parked in a location near a Metro One cell
- site in the Elmhurst section of Queens in New York City.
-
- >From these cars, the defendants allegedly sold long distance service
- to individuals, typically charging $10 for a 20 minute call. Metro
- One told investigators that many of the calls were made to South
- American locations an that its records indicate that more than $1
- million worth of calls were made in this manner in May 1991.
-
- The arrests were made by a joint law enforcement force composed of
- investigators from The New York State Police, New York City Police
- Special Frauds Squad, United States Service, and New York State
- Attorney General's office. The arrests were made after undercover
- officers, posing as customers, made phone calls from the cellular
- phones to out-of-state locations. The arrests were, according to a
- release from the Attorney General's office, the culmination of an
- investigation begun in September 1990 as the result of complaints
- from Metro One.
-
- The defendants, Carlos Portilla, 29, of Woodside, NY; Wilson
- Villfane, 33, of Jackson Heights, NY; Jaime Renjio-Alvarez, 29, of
- Jackson Heights, NY and Carlos Cardona, 40, of Jackson Heights, NY,
- were charged with computer tampering in the first degree and
- falsifying business records in the first degree, both Class E
- felonies,- and theft of services, a Class A misdemeanor.
- Additionally, Portilla and Villfane were charged were possession of
- burglar tools, also a Class A misdemeanor. At the arraignment,
- Portilla and Renjio-Alvarez pleaded guilty to computer tampering and
- the additional charges against those individuals were dropped.
-
- New York State Police Senior Investigator Donald Delaney, commenting
- on the case to Newsbytes, said "This arrest is but the tip of the
- iceberg. There is an on-going investigation in the area of cellular
- phone fraud and we are looking for those that are organizing this
- type of criminal activity."
-
-
-
-
- #O NewsBytes
- #D July 17, 1991
- #T Sundevil Defendant "DOC SAVAGE" Sentenced 7/17/91
-
- PHOENIX, ARIZONA, U.S.A., 1991 JUL 17(NB) -- The Maricopa County
- Arizona County Attorney's Office has announced the sentencing Baron
- Majette, 20 , also known as "Doc Savage", for computer-related crimes
- uncovered in the joint federal / state investigation known as
- "Sundevil".
-
- Majette was arrested on March 27th of this year and charged with a
- number of felony charges relating to unauthorized use of telephone
- facilities of Toys 'R Us to make calls worth approximately $8,000,
- illegal access of TRW's credit data base and use of information
- obtained therein to obtain in excess of $50,000 in cash, goods, and
- services, and stealing of credit cards from U.S. Mail boxes and use of
- the cards to obtain approximately $10,000 in cash, goods and services.
- If convicted of the charges, Majette faced a possible jail sentence of
- 15 years and the requirement to make restitution for the full amount
- of the alleged losses endured by the firms and individuals.
-
- In late May, Majette pleaded guilty to an amended charge of a single
- count of computer fraud, felony third degree. The reduced charge was a
- result of an agreement between Mark Berardoni, the public defender
- assigned to Majette; Janet Black, Majette's probation officer and the
- Maricopa County Arizona County Attorney's Office. Under the reduced
- charges, Majette's maximum term of incarceration was reduced from the
- aforementioned 15 years to 5.
-
- On July 16th, when the actual sentence was to be imposed, a further
- agreement between the prosecution, defense and parole service was
- presented to the presiding judge, Justice Gottsfield, and, after
- discussion, became the actual sentence. The court decision imposed the
- following:
-
- -- Majette will remain in jail for up to two months while he awaits
- placement in a "Shock Incarceration" program (Majette has been in jail
- since his March 27th arrest because of parole violation related to an
- earlier crime). Assistant County Attorney Gail Thackeray told
- Newsbytes that Shock Incarceration is a 120 day program which
- "provides both intensive counseling and military-like discipline and
- exercise."
-
- -- Upon his release from Shock Incarceration, Majette will enter a 5
- year period of "intensive probation". Under Arizona procedures, the
- subject must provide the probation officer, on a weekly basis, a
- schedule for the next week's activities. In the event that the
- schedule has to be modified in any way, the probation office must be
- called before the new schedule is acted on.
-
- -- During the time of intensive probation, the probation officer may
- visit or call the subject at any time of day or night to insure
- compliance with the schedule.
-
- -- If, at some point after a year of intensive probation, the
- probation officer feels that the subject has followed the rules and
- shown that intensive procedure is no longer warranted, the subject and
- probation officer may recommend to the sentencing judge that the
- subject be transferred to normal probation. In normal probation, the
- subject advises the officer weekly of progress and problems. There is
- not the hovering presence felt in intensive probation, according to
- Thackeray. Additionally, the subject may be released from any form of
- probation at the petition of the probation office and subject and
- approval, after hearing, of the sentencing judge.
-
- -- If, on the other hand, Majette violates the terms of his probation,
- he is liable for incarceration in prison for the remainder of his
- probationary period.
-
- -- Majette was also ordered to make restitution to the parties
- victimized by his activities by paying a sum of $19,774.03 to those
- involved. The sum is to be paid on a monthly basis over the course of
- his sentence. Additionally, he was ordered to make payments to help
- defray the cost of his probationary supervision.
-
- Under the terms of his probation, Majette is subject to the following
- conditions said by Thackeray to be unique to his type of offense:
-
- -- He may not use any computer connected to a modem or communications
- network without the prior permission of his probation officer.
-
- In the event that he takes a job that brings him into contact with
- computer activities, he must notify someone in the employer's office
- of the restrictions on his computer use and must discuss the planned
- activities with his probation officer.
-
- -- He is not to communicate or associate with "members of the computer
- underground" (defined as persons such as those known to have or
- reasonably believed to have been involved in theft of communications
- services, computer fraud or related activities). In the event that any
- such individuals contact him, he must report the contact to his
- probation officer (According to Thackeray, this stipulation is
- intended for Majette' s protection -- "In the event that the
- contacting party is investigated or arrested and phone records show a
- call to Majette, his notification to his probation officer of the call
- will stand as proof that he was not involved in any conspiracy with the
- other individual. His notification responsibility in no way requires
- him to cooperate with authorities in the location or apprehension of
- another individual and such cooperation is neither expected nor
- desired.").
-
- Transcripts of the sentencing hearing reportedly show that it was the
- intention of Judge Gottsfield to sentence Majette to a straight five
- years in prison but was dissuaded by the combined recommendations of
- the prosecution, defense and probation office. Thackeray explained to
- Newsbytes the rationale of the prosecution in recommending a lighter
- sentence -- "Usually computer hackers who get into trouble for
- activities of this nature are kids or young adults who are not the
- type to be in trouble for any other criminal activities. The point of
- sentencing in these cases should be rehabilitation. If we can break
- the pattern of illegal behavior, society will benefit from Majette's
- participation. If we simply locked him up for 5 years, neither he nor
- society would benefit."
-
-
-
-
- #O The Times (London)
- #D July 1, 1991
- #T Victin of computer hackers fights BT over \pounds 8,000 bill
-
- A director of video films is embroiled in a dispute with British Telecom over
- an \pounds 8,000 bill after becoming a victim of hackers -- people who steal
- computer passwords to break into international data bases and use services
- illegally.
-
- George Snow says the bill will ruin him. Experts say the case highlights
- increasing concern over one of Britain's most under-reported crimes. For
- several years, Mr Snow has kept abreast of developments in 3-D computer
- graphics by using access to an American information service called Compuserve.
- To cut costs, he became a customer of BT's Dial Plus service, which allows
- customers to connect their office or home computers to international data bases
- for the price of a local rather than an international call.
-
- Mr Snow, who has directed programmes for Channel 4 and the Arts Council, and
- whose pop video credits include Howard Jones, had found the service useful and
- inexpensive until recently. "My quarterly bill would be around \pounds 30,"
- said the director whose company, WKBC TV, is based in west London. Mr Snow,
- aged 42, now faces a big unscheduled bill for calls he never made. It appears
- that hackers illegally obtained Mr Snow's password and BT agrees. The dispute
- is about who pays the \pounds 5,500 and \pounds 2,500 bills which have been
- run-up in recent months.
-
- BT says that Mr Snow chose a password that hackers could easily borrow [sic].
- He says that the company has a responsibility to ensure its networks are
- secure. "To clock up \pounds 8,000 worth of bills you have to be talking about
- someone using the service 24 hours-a-day day in day out," he said.
-
- To break into a data base, hackers will generally first try obvious passwords
- such as Christian names. They also use programmes that run randomly through
- words in a dictionary until one opens a data base.
-
- Customers with Dial Plus have to sign a disclaimer stating that they will not
- use obvious passwords otherwise they might be liable for hackers' bills. A BT
- spokesman admitted, however, that Mr Snow had joined the service before the
- agreement came into force.
-
- Mr Snow also says that it was BT which approved Superman, the password stolen
- by the hackers. The company says that Mr Snow was warned that his account was
- running up huge bills in early February but that it was sometime later that the
- password was changed. Mr Snow says that it was changed within days and that by
- the time BT contacted him the damage had been done with most of the bill having
- been run up.
-
- He believes that he, and possibly others, are being forced to pay the price for
- the company's poor security and has called in the Computer Crime Unit at
- Scotland Yard to investigate.
-
- David Frost, a computer security expert with accountants Price Waterhouse, said
- yesterday that the amount of hacking taking place in Britain was being
- seriously undeerplayed by companies.
-
- BT rejects suggestions that it is cavalier with security. A spokesman said the
- company would write to Mr Snow this week. He says that he willfight BT in
- court if it prosecutes him. "\pounds 8,000 is about 10 per cent of my
- turnover," he said.
-
- [I have a few comments, based solely on the report as printed. I do not know
- what truly happened. I draw attention to the BT's apparent attitude to
- password security. They used the term "borrow", rather than "steal" or "use
- illegally". They vetted the password, implying that Mr Snow was asked to
- reveal his password rather than keep it secret. Even so, they gave the OK to
- a password which is of dubious security. It is generally agreed that proper
- names, dictionary words, literay characters and the like are easily guessed.
-
- More generally, it is interesting how British newspapers, and _The Times_ in
- particular, are beginning to take an informed interest in he subject of
- computer security and, indeed, in computer-related risks in general. Apart
- from some quaint terminology ("programmes", "data bases") they seem
- reasonably competent at understanding the issues and reporting them clearly
- to a non-expert audience.
-
-
-
-
-
- #O The Atlanta Journal
- #D Friday, June 14,1991
- #T GBI searching for byte-size evidence
- #A By Rob Johnson and David Pendered
- #B Typed for data by The Esoterrorist
-
- Computers, floppy disks taken
- from suspected teen hackers
-
-
- Four suburban Atlanta teenagers, stripped of their home
- computers, began a long wait Thursday for GBI agents to rummange
- through huge libraries of floppy disks for evidence of criminal
- invasion of perhaps hundreds of corporate and government computer
- networks.
-
- Georgia Bureau of Investigation agents confiscated 12 computers
- and more than 1,400 disks from the north Fulton and Gwinnett county
- homes of the four teens Wednesday. The youths - two 15-year-olds
- and two 17-year-olds - have not been charged or identified publicly.
-
- In an apparently related case six months ago, four Gwinnett
- County teens were linked to an international network of about 70
- computer hackers who were believed to have bilked the National
- Aeronautics and Space Administration (NASA) of $12 million in
- telephone services and an undetermined amout from BellSouth Inc.
-
- "I understand that these four teens were part of that same
- group that we investigated last year," said Jim Steele, assistant
- superintendent of security for the Gwinnett County school
- district. "We believe that this is a result of the same
- investigation."
-
- Until agents analyze the digital data in the newly confiscated
- discs, they won't know exactly what the four teen hackers did or if
- charges will be brought, said GBI spokesman John Bankhead. "There
- is no indication yet that harm was done," he said, "but penetration
- took place."
-
- Emory, Tech were targets
-
- Hackers apparently penetrated networks at Emory University,
- Georgia Tech and WXIA-Channel 11, but BellSouth apparently was the
- primary target, according to investigators.
-
- In the earlier investigation, Gwinnett school officials
- discovered in June 1990 that hackers had penetrated a school
- teleconference system and launched from there into BellSouth's
- system. Hackers in the U.S. and six or seven other countries avoided
- telephone charges for their computer modems by billing them to the
- school district, BellSouth and NASA, the investigation revealed.
-
- School investigators stopped their probe in December and
- delivered their records to the GBI and BellSouth investigators, Mr.
- Steele said.
-
-
- This following glossary was included in the article. heh...
- ...use this as a reference for filling out those super elite bbs
- infoforms that you never know all the answers....
-
- -------------------------------------------------------------------
- | |
- | Hacking: A short glossary |
- | |
- | |
- | HACKER - What all computer hobbyists used to call themselves, but |
- | the term has come to mean someone who breaks into computers for |
- | fun or for profit |
- | |
-
- | MODEM - The device that lets computers talk over the telephone |
- | lines. |
- | |
- | COMPUTER NETWORK - Where several computer terminals, or computers,|
- | are connected so that information can be exchanged. |
-
- | |
-
- | WAR GAMES DIALER - A specialized computer program that dials |
- | every number in an exchange and identifies lines connected to |
- | modems. |
- | |
- | PASSWORD - The secret word or code, usually used in combination |
- | with a name, that allows an individual to have access to a |
- | computer's files. |
- | |
- | |
- -------------------------------------------------------------------
-
-
- Suspected hackers targeted BellSouth
-
-
- By Rob Johnson
- and Bill Husted
-
- Phone companies offer 'interesting puzzle'
-
- Investigators said Thursday that BellSouth apparently was the
- primary target of suspected computer hackers being questioned by
- GBI agents, and experts say phone companies usually are a favorite
- target for young hackers wanting to cruise through a massive network.
-
- "It's the oldest computer system known," said Mike Godwin of
- Electronic Frontier Foundation, the Cambridge, Mass., organization
- that monitors the legal quandries raised by the computer age.
- "It's so huge and complex. That's why it's a particular
- interesting puzzle."
-
- BellSouth calls it a serious crime nevertheless.
-
- "It's a break-in," said Scott Ticer, the company's operations
- manager. "It doesn't matter whether it's grand theft auto or
- joyriding, you're car is still not in the driveway. Same thing here.
- We take it very seriously."
-
- Trespassing or burglary?
-
- Mr. Godwin agrees intrusions are a crime, but he says law
- enforcement agencies and the courts rarely see the difference
- between the curious teenager who pokes around inside a network and
- the hacker who maliciously manipulates a company's computer
- operations.
-
- "It's really like the difference between trespassing and
- burglary," Mr. Godwin said.
-
- Darren McKeeman, 23, who was convicted in 1988 for breaking
- into the Georgia World Congress Center's computers, said a GBI
- investigation is a terrifying experience for the hacker and the
- family.
-
- "It's a total surprise," he said of a GBI raid.
-
- Hackers bent on stealing information are like burglars who work
-
- (cont' NIA072 / File 10)
-
-
- / /
- / NIA072 / File 10 /
- / CyberTimes (Vox Populi) /
- / Judge Dredd /
- / /
-
- (cont' NIA072 / File 9)
-
- from home, say experts.
-
- Their targets are computer networks used by governments and
- businesses. Breaking into one is as challenging for a hacker as a
- well-locked door is for a burglar. Most computer networks have an
- electronic doorway: the telephone line used by employees to connect
- to the office computer from home. That door is locked with a
- pasword. So, for burglar and hacker alike, the problem is: How do
- you get in?
-
- The first step is usually the easiest. According to experts,
- finding the telephone number that connects the hacker to a computer
- is often a simple matter of who you know. A company employee is
- the most likely source. Maybe he tells a friend, that tells
- someone else, and - somewhere down the chain - the number is passed
- along to the hacker.
-
- Ways to get in
-
- Then, the ahcker has to convince the computer to open the
- door. That means finding the name and password for someone who has
- access to the computer system. Finding the name can be as simple
- as calling a company and asking for the name of a key manager ("who
- is your vice president of marketing?" for instance). Passwords are
- more difficult to find. The easy way is through a talkative
- employee. Failing that, things get complicated.
-
- For instance, the passwords for computers that operate with the
- Unix operating system are scrambled into meaningless numbers and
- symbols using a mathematical formula. But, if an electronic
- burglar can sneak into the system (some computers allow limited
- access to a "guest" or "visitor") the file can sometimes be located
- and copied.
-
- Passwords are often ridiculously simple to guess. Since people
- want passwords that are easy to remember, they often use the first
- name often use the first name of a spouse, of a child, digits from
- their telephone number, or vehicle license plate. That makes it
- easy for hackers, too.
-
-
-
-
- #O Philadelphia Inquirer
- #D July 16 [editorial page]
- #A Richard Pence
- #T The Dat the Telephone Bug Bit
-
- Those big phone outages of recent weeks have had me feeling a
- bit guilty over what's been happening.
-
- You see, I remember exactly how all this started. Back in
- 1950 I was a novice seahand aboard a cruiser based In Philadelphia,
- barely six months out of high school and fresh from the plains of
- South Dakota.
-
- One Friday night in November, we were granted shore leave at
- the end of a two week training cruise. Homesick and seasick,, I
- headed immediately for the row of pay phones that lined the dock.
-
- Depositing a carefully preserved nickel (remember?), I dialed
- "O." The following is a roughly verbatim account of what transpired
- after the Philadelphia operator answered:
-
- "I'd like to place a station to station collect call to the Bob Pence
- residence in Columbia, South Dakota," I said in my best telephone
- voice.
-
- The Philadelphia operator was sure she had heard wrong. "You mean
- Columbia, South Carolina, don't you?"
-
- "No, I mean Columbia, South Dakota." I had tried to call home once
- before, and I was ready for that one.
-
- "Certainly. What is the number, please?" I could tell she still
- didn't't believe me.
-
- "They don't have a number," I mumbled. I'd tried to call home before,
- and I knew what was coming.
-
- She was incredulous. "They don't have a number?"
-
- "I don't think so."
-
- "I can't complete the call without a number. Do you have it?" she
- demanded.
-
- I didn't relish seeming like even more of a bumpkin, but I was in the
- Navy and I knew authority when I heard it. "Well ... the only thing I
- know is ... two longs and a short."
-
- I think that's the first time she snorted. "Never mind. I'll get the
- number for you. One moment please."
-
- There followed an audible click and a long period of silence while she
- apparently first determined if, indeed, there was a Columbia, S D.,
- and then if it was possible to call there.
-
- When she returned to the line, she was armed with the not-insignificant
- knowledge necessary complete her task.
-
- In deliberate succession, she dialed an operator in Cleveland, asked
- her to dial one in Chicago, asked Chicago to dial Minneapolis, and
- Minneapolis to dial Sioux City, Iowa. Sioux City called Sioux Falls,
- S.D., and the operator there dialed one in Aberdeen, S.D. At last,
- Aberdeen dialed the operator in Columbia.
-
- By this time, Philadelphia's patience was wearing thin, but when
- Columbia answered, she knew what had to be done.
-
- "The number for the Bob Pence residence, please," she said, now in
- control.
-
- Columbia didn't even hesitate. "Two longs and a short," she declared.
-
- Philadelphia was set back for an instant but valiantly plowed on. "I
- have a collect call from Philadelphia, Pennsylvania, for anyone at
- that number. Will you please ring?"
-
- "They're not home," said Columbia, again not missing a beat.
-
- Philadelphia digested this and decided not to press the point.
- Instead, she relayed the message I'd already heard. "There is no one
- at that number, sir. Would you like to try again in later?"
-
- Columbia quickly interrupted: "Is that you, Dick?"
-
- "Yeah, Margaret ... Where are the folks?"
-
- Philadelphia was baffled, but her instincts told her to look out for
- the company. "Sir, madam ... you can't ..."
-
- Margaret ignored her. "They're up at the school house at the
- basketball game. Want me to ring?"
-
- I knew I was pushing my luck with Philadelphia, so I said it likely
- would be too much trouble to get them out of the game.
-
- "No trouble at all," said Margaret. "It's halftime."
-
- Philadelphia was still in there trying to protect the company. By this
- time, though, she was out of words. "But ... but ... " she stammered.
-
- I caved in to Margaret, mainly because I didn't want to have to start
- over later. "All right."
-
- Philadelphia made one last effort. Mustering her most official tone,
- she insisted: "But this is a station to station collect call!"
-
- "That's all right, honey," said Columbia, "I'll just put it on Bob's
- bill."
-
- Philadelphia was still protesting when the phone rang and was answered
- at the school house.
-
- "I have a station-to-station collect call for Bob Pence," Philadelphia
- said, certain that Ma Bell had somehow been had.
-
- "This is he," replied my father.
-
- "Go ahead," whispered an astonished Philadelphia.
-
- I'm glad couldn't'see her face when I began my end of the conversation
- the way all Midwesterners do:
-
- "Hi, Dad, how's the weather?"
-
- "Jeez," said Philadelphia and clicked off.
-
- Now comes the confession. I have it on good authority it was the next
- Monday morning that AT&T began to automate phone service And now look
- where we are.
-
-
- [Richard Pence is a Washington, D.C., writer and editor. He wrote this
- for the {Washington Post}.]
-
-
-
-
- #O Chicago Sun-Times
- #D July 16, 1991
- #A Maureen O'Donnell, Staff Writer
- #T Test In Two Wards WIll Make Public Calls Easy To Trace
-
- Brison Poindexter says he knows when a motorist using the pay phone
- outside his south side 7-Eleven store is up to no good.
-
- "Someone pulls up in a fancy car in the middle of the night and asks
- for change for $3 or $4. You don't ask for that kind of change to call
- mom," said the 21-year old manager of the convenience store at 1800
- East 87th Street.
-
- Poindexter suspects the callers are using the payphones to conduct
- drug deals or other illegal activity.
-
- But as of Monday night (July 15), Illinois Bell is conducting an
- unusual experiment aimed at payphone drug-dealing and other called-in
- criminal activity in two city wards, including the one where
- Poindexter's 7-Eleven is located.
-
- More than 50 payphones in the 8th and 37th wards will no longer accept
- coins between 6 PM and 6 AM.
-
- All outgoing calls from those phones must be 'zero-plussed', meaning
- the caller must use a calling card, call collect, or bill the call to
- a third party, but quarters won't do them any good. Bell believes is
- is the first such experiment in the country. It will not affect free
- calls to 911 (emergency), 411 (inquiries) or 611 (repair bureau).
-
- "The reason they (drug dealers) like payphones is they can put in
- their quarter and no one knows who they are," said Illinois Bell
- spokesman Geoff Potter. "That's going to change with this. If they
- call collect, or with their calling card, they're going to leave a
- paper trail. And billing to a third party is also going to be difficult,
- since that links another person to that call. That'll discourage them.
-
- The 90-day trial has the approval of Chicago Police Superintendent
- LeRoy Martin and City Aldermen Lorraine L. Dixon (8th ward) and Percy
- Giles, (37th ward), who praised the idea from Bell.
-
- "We believe this restriction will help deter criminals from using
- public phones to plan drug-dealing and other illegal activities,"
- Martin said.
-
- But the American Civil Liberties Union questions how it will affect
- poor people who don't have phones. Illinois Bell requires a $500
- deposit from people who do not have phones before it will issue a
- calling card. Poor people cannot afford such a payment, according to
- Harvey Grossman, legal director of the Illinois chapter of the ACLU.
-
- "Basically, it will have a discriminatory effect on poor people and
- African-Americans, and the drug-dealers will just move to other
- telephones," Grossman said. "We question the appropriateness of that
- kind of decision by a public utility."
-
- "For people without phones, they'll have to call collect pretty much,"
- Potter said. "Or, if it is not an emergency, wait until the next day."
-
- The phones involved in the trial are only a portion of the total
- Illinois Bell phones in the area. Independent payphone providers are
- not participating in the experiment, Potter said.
-
- Illinois Bell has received no opposition so far. Business groups,
- including the 87th Street/Stony Island Avenue Business Association are
- backing the experiment.
-
- The neighborhood around 87th and Stony Island Avenue, called Calumet
- Heights, is a thriving business community whose residents include
- Police Superintendent Martin, said Sam Neely, owner of Neely Brothers
- Shell Service Station, 8700 South Stony Island Avenue, and president
- of the local business association. The payphones outside Neely's
- gasoline service station are going to restrict night-time coin calls.
-
- The experiment is intended to head off trouble in a good neighborhood,
- Neely said. "It is preventive. We don't want things to happen," he
- said.
-
- "I think it is a great idea," Poindexter said. "Anything to cut down
- on drugs."
-
-
- #O APwire
- #A Laurie Asseo
- #T 'Baby Bells' Get OK to Join Electronic Information Industry
-
- WASHINGTON (AP) _ A federal judge reluctantly gave the nation's seven
- regional telephone companies permission Thursday to join the electronic
- information industry by providing such services as home shopping and stock
- market quotes.
- U.S. District Judge Harold H. Greene said he believed that letting the
- companies enter the information market ``would allow them quickly to
- dominate that market and to eliminate both competition and the independents
- which would make that competition possible.''
- But the judge said an appellate court decision reversing his 1987
- refusal to grant such permission created a higher standard _ whether the
- judge could be certain that letting the so-called Baby Bells into the
- market would lessen competition.
- ``The answer to that question is in the negative,'' Greene wrote.
- His order delayed the effect of the ruling until it can be appealed by
- the opponents of lifting the ban.
- The Justice Department joined the regional phone companies in asking
- Greene to allow them to use their phone lines to sell such services as
- ``electronic Yellow Pages,'' home shopping, stock quotes, banking and
- classified advertising.
- The seven companies were barred from selling such services as part of
- the 1982 consent decree, which Greene oversaw, that broke up the AT&T phone
- monopoly.
- Opponents of letting the Baby Bells into the market said at an April
- court hearing that the regional companies would use unfair practices to
- squeeze out competitors. The opponents include consumer groups, long
- distance carriers such as MCI Telecommunications Corp., and the American
- Newspaper Publishers Association.
- The regional companies and the Justice Department contended that
- letting the seven provide information services would increase competition.
- Greene wrote, however, that he believed ``the most probable
- consequences of such entry by the regional companies into the sensitive
- information services market will be the elimination of competition from
- that market and the concentration of the sources of information of the
- American people in just a few dominant, collaborative conglomerates, with
- the captive local telephone monopolies as their base.
- ``Such a development would be inimical to the objective of a
- competitive market, the purposes of the antitrust laws, and the economic
- well-being of the American people,'' the judge said.
- Greene dismissed as ``preposterous'' the regional companies' contention
- that their input is needed to provide better information services and said
- the claim that the Baby Bells' entry into the market would start a new era
- of sophisticated information services was ``so much hype.''
- But Greene said that because of the 1990 ruling by the U.S. Court of
- Appeals for the District of Columbia Circuit, he was left with no choice
- but to remove the restriction, ``albeit with considerable reluctance.''
- He said the appellate court required him to give special deference to
- the Justice Department's views in the case, and it required him to consider
- economists' present-day forecasts rather than evidence of anti-competitive
- behavior by local telephone companies before the AT&T breakup.
- Greene said he decided not to let his ruling take effect immediately
- because the Court of Appeals may decide he misinterpreted its decision.
- If the regional phone companies were allowed to enter the information
- market while the question is unsettled, they could wind up spending large
- amounts of money on services they could later be barred from providing, the
- judge said.
- Ronald F. Stowe, vice president of Washington operations for Pacific
- Telesis, one of the seven, said, ``This is a major step forward for
- American consumers, American businesses and the American economy.''
- Stowe said he was disappointed that Greene had delayed implementation
- of the ruling and added, ``We are seriously considering asking the court to
- vacate the stay.''
- Stowe said the ruling means PacTel and other operating companies ``can
- more fully meet the information services needs of our customers,'' who, he
- said, have requested such offerings for years.
- Opponents of lifting the ban contended that the Baby Bells would be
- able to evade regulations that bar them from subsidizing non-regulated
- services with money from their normal rate base.
- But the regional companies said there was no sign they had used such
- cross-subsidization in other competitive markets.
- Gene Kimmelman, legislative director of the Consumer Federation of
- America, called the decision ``terrible for consumers.''
- ``This really signals a beginning of a monopoly environment, which is
- going to invite rate increases and inflated local telephone rates and a
- litany of new lawsuits very similar to the antitrust litigation that led to
- the breakup in the first place,'' he added.
- Federal Communications Commission Chairman Alfred Sikes said the FCC
- ``will continue to provide full and effective public interest safeguards''
- if the regional Bells enter the information services business.
- Sikes hailed Greene's decision, saying, ``I believe the nation will
- greatly benefit. ...''
- The AT&T breakup decree also bars the regional operating companies from
- offering long distance service and manufacturing telecommuncations
- equipment.
- The companies are pushing legislation in Congress to lift the
- manufacturing ban. The bill was passed last month by the Senate and is
- being considered by a House subcommittee.
- In a response to a request from Sen. Paul Simon, D-Ill., for his views
- on the bill, Greene wrote a May 29 letter in which he declined to give an
-
-
- (here the writing blurs........)
-
-
-
- --- * NIA * GrapeVine ---
-
- CCC Update:
-
- On Chaos Computer Club's last Congress 1990, a Dutch group and few other
- phreaks reported on some techniques to "travel inexpensively on international
- networks" (see my report in January 1991). Against their usually detailed
- description of the content of the respective session, CCCs electronic Congress
- newspaper describes the reports and discussion only in general terms; no
- details regarding frequencies and computer programs (which meanwhile replaced
- the "blue boxes" more flexibly) were given.
-
- According to a report in the ("usually well-informed") German weekly magazine
- Der SPIEGEL, the Dutch group HAC-TIC now published a detailed report on how to
- "use" special methods, dial-tunes (with frequencies and sequences of operation)
- and telephone numbers (in Germany: 0130) in diverse areas of the world to
- establish toll-free phone connections via specific programs. As the magazine
- reports, HAC-TIC aims with its detailed description to counterfeit some people
- who sell (e.g. on AMIGA) such tune-dialing programs for up to 1,000 DM (about
- 520$ currently).
-
- ---
-
- Electronic Frontier Foundation
- Tracking The Steve Jackson Case
-
- Our major case, the Steve Jackson Games case, is proceeding as expected.
- The next stage in our ongoing effort in that case will be the
- government's filing of a response to our complaint. As of the week of
- June 21, the government has sought a 30-day extension of the deadline
- for its response. Such extensions are routinely granted with the
- agreement of the plaintiff, and we have agreed in this case. The
- extended deadline will mean that the government's response will be due
- the first week of August.
-
- ---
-
- Computer Crime (Information Weekly, July 8, 1991, page 6)
-
- A Computer Systems Protection Act went into effect last week in Georgia. The
- Act provides the same punishment for computer thievery as for other types of
- theft crimes. The bill calls for prison terms of up to 15 years for
- "computer-assisted theft, trespass, invasion of privacy, and forgery." Under
- the Act, stealing someone's computer password in Georgia can get you a $5,000
- fine or one year behind bars.
-
- ---
-
- Excerpts from an article headlined PHONE OUTAGES SHOW HAZARDS OF NEW TECHNOLOGY
- by Jonathan Weber in the 28 June 1991 `Los Angeles Times':
-
- "The massive telephone failures in the Los Angeles and Washington areas earlier
- this week stemmed from glitches in ... a specialized computer network that
- shuttles information about calls between telephone company switching
- offices.... The inherent complexity of an increasingly software-based phone
- system ... raises the prospect that the public telephone service may be
- inherently less reliable in the future than it has been in the past. Pacific
- Bell said Thursday that it had suspended further deployment of ... Signaling
- System 7 until the exact cause of the problem could be identified. It appeared
- ... that the [LA and Washington] problems ... were not identical, but both
- [were] attributed to breakdowns [in the] SS-7 equipment supplied by DSC
- Communications of Dallas."
-
- [Explanations of expected benefits from the SS-7, including improved
- efficiency, capacity, speed, security, and new service possibilities such as
- "the controversial Caller ID."]
-
- "The flip side of all this ... is that if the SS-7 system malfunctions, it
- begins sending incorrect information all over the network. Ross Ireland,
- general manager for network services at Pacific Bell, said Wednsday's incident
- was caused by a signaling system unit in downtown Los Angeles that inexplicably
- began sending out a flurry of wrong information about problems in the network,
- and ultimately shut itself down. Then there was a cascade effect, in which the
- other signaling system units began acting on the incorrect information.
- Finally, when people tried to make calls and couldn't, they kept trying, which
- created an abnormally high level of calling traffic and thus further
- exacerbated the problem.
-
- "Because a phone network is so tightly integrated -- akin to one big computer
- -- it's very hard to locate and fix problems...."
-
- [See also `Los Angeles Times,' John Kendall and Paul Lieberman, 27 June 1991:
- "By coincidence, service also was disrupted to 6.7 million telephone customers
- Wednesday in the District of Columbia, Maryland, Virginia, and parts of West
- Virginia.... [T]he trouble began in Baltimore during a routine modification of
- equipment procedure." [sic]]
-
- [Officials at Chesapeake and Potomac said the problems were probably
- unrelated. Asked if hackers could have caused the problems, Ellen
- Fitzgerald, a spokeswoman for Chesapeake and Potomac, said she she had been
- assured that the system could not be penetrated. [!!!] But, she added, ``a
- few days ago I would have told you that what happened yesterday wouldn't
- happen.''
-
- Terry Adams, a spokesman at the DSC Communications Corp., which made both
- systems, said company officials also discounted any connection between the
- failures. {From the NY Times article, 28 Jun 91. PGN}]
-
- ---
-
- According to an AP story carried in the 18 June '91 `New York Times',
- Mitsubishi is suing AT&T over a pbx system that was broken into by hackers who
- made thousands of illegal calls worldwide.
-
- Mitsubishi contends that AT&T's System 85 Private Branch Exchange is not secure
- and that AT&T failed to warn Mitsubishi of the potential for unauthorized use.
- Mitsubishi seeks $10 million in punitive damages and a dismissal of $430,000
- billed for 30,000 phone calls which Mitsubishi attributes to unauthorized
- users.
-
- The pbx system, installed in 1988 and disconnected last year, permitted
- Mitsubishi employees to make calls on the company lines no matter where they
- were by using a 6-digit personal password. According to Mitsubishi, AT&T
- failed to diagnose the problem, and it was New York Telephone which finally
- told Mitsubishi of the possibility of system crackers.
-
- Andrew Myers of AT&T declined to comment on the suit but said that under
- federal communications law, "customers are clearly responsible for both
- authorized and unauthorized service."
-
- ---
-
-
- The old sell-illegal-calls-at-a-discount scam has reemerged in Elmhurst,
- Queens, NY. High-tech mobile phone booths (cars) are very popular there, and
- draw crowds of people standing in lines to make their calls, often to Colombia
- or Peru. Each car has a doctored cellular phone chip containing an ID
- illegally set to some poor sap's valid ID. "The swindle has become so popular
- that legal cellular phone users in the area can rarely get access to an
- available phone line." Law-enforcement officials say that many of the calls
- are made to high-level drug dealers in Colombia. Many of the numbers dialed
- from Elmhurst match up with Colombian phone numbers that investigators have on
- file with the Federal Drug Enforcement Administration.
-
- Metro One in Paramus, N.J., one of the two cellular carriers for New York City,
- estimated that it has lost more than $1 million a month from illegal calls
- transmitted from Elmhurst. Nationwide, such fraudulent calls cost the cellular
- phone industry about $700 million in 1990, according to Donald Delaney, an
- investigator for the NY state police. Industry officials put the figure much
- lower, at $100 million. [Source: Cars Using Rigged Cellular Phones Sell
- Illegal Overseas Calls, By Donatella Lorch, N.Y. Times News Service, 28 Jun 91]
-
- ---
-
- In San Diego, the former General Dynamics Corp. computer programmer, Michael
- John Lauffenburger, was arrested for allegedly planting a ``logic bomb,'' a
- type of virus that would have destroyed vital rocket project data.
- Lauffenburger's goal, according to a federal indictment, was to get rehired as
- a high-priced consultant to fix the damage he created. He quit May 29.
- A fellow General Dynamics worker defused the plot by accidentally stumbling
- onto the logic bomb. Lauffenburger was charged with computer tampering and
- attempted computer fraud. If convicted, he faces up to 10 years in prison and
- a $500,000 fine. He pleaded innocent and was released on $10,000 bail.
-
- [Source: Article by Laura Myers, AP Business Writer, 26 June 91]
-
- ---
-
- In a 6/28 press release, US West announced they intend to make line-blocking
- available on a "normal" basis, for the first time, in Iowa, where it's part of
- a modified proposal to the Iowa PUC.
-
- The company indicated this apparent switch in policy was in response to interest
-
- expressed by some users in the Omaha and Boise trials.
-
- There's a price, though. In the Iowa proposal, $3.50/mo. for res. and $4.00 for
- bus.
-
- In a related item, US West's Terri Ford, in 6/26 rebuttal testimony with the
- Idaho PUC, also indicated USWC intended to offer line-blocking before the
- completion date of the Boise market trial. Although no dates or prices were
- mentioned in Ford's filed testimony, she did state that the feature offering
- would be accompanied by a waived non-recurring charge.
-
- ---
-
- "Outro"
-
- Just a quick note to say Goodbye to many friends and compatriots.
- I will be off the net for about a year I suppose. Many of you deserve
- more than just "Thanks" and some of you deserve utter contempt.
-
- Watch yourselves. It can happen to anyone.
-
- Len [Rose]
-
- ---
- : _
- \ /
- STILL GOING! NOTHING OUTLASTS THE UU __
- ENERGIZER! THEY KEEP GOING AND GOING... ==/ \
- /\__o :
- :__\__/
- boomp boomp boomp boomp boomp boomp boomp boomp /_ \_
-
- [Editors Note: How'd that get in here?]
-
- ---
-
- The U.S. National Commission on Libraries and Information Science is a
- permanent, independent agency of the federal government charged with
- advising both Congress and the President on matters relating to national
- library and information policies and plans.
-
- The commission has approved unanimously a major federal policy document,
- ``Principles of Public Information,'' and urged its use by all branches of
- the federal government as well as state and local government, and the
- private sector in the development of information policies. The document
- was adopted by the commission at its June 29, 1990 meeting.
-
- The full text of the ``Principles of Public Information'' follows:
-
- Preamble
-
- From the birth of our nation, open and uninhibited access to public
- information has ensured good government and a free society. Public
- information helps to educate our people, stimulate our progress and solve
- our most complex economic, scientific and social problems. With the
- coming of the Information Age and its many new technologies, however,
- public information has expanded so quickly that basic principles regarding
- its creation, use and dissemination are in danger of being neglected and
- even forgotten.
-
- The National Commission on LIbraries and Information Science, therefore,
- reaffirms that the information policies of the U.S. government are based
- on the freedoms guaranteed by the constitution, and on the recognition of
- public information as a national resource to be developed and preserved in
- the public interest. We define ``public information'' as information
- created, compiled, and/or maintained by the Federal Government. We assert
- that public information is information owned by the people, held in trust
- by their government, and should be available to the people except where
- restricted by law. It is this spirit of public ownership and public trust
- that we offer the following Principles of Public Information.
-
- 1. The public has the right of access to public information.
-
- Government agencies should guarantee open, timely and uninhibited access
- to public information except where restricted by law. People should be
- able to access public information, regardless of format, without any
- special training or expertise.
-
- 2. The Federal Government should guarantee the integrity and preservation
- of public information, regardless of its format.
-
- By maintaining public information in the face of changing times and
- technologies, government agencies assure the government's accountability
- and the accessibility of the government's business to the public.
-
- 3. The Federal Government should guarantee the dissemination,
- reproduction, and redistribution of public information.
-
- Any restriction of dissemination or any other function dealing with public
- information must be strictly defined by law.
-
- 4. The federal government should safeguard the privacy of persons who use
- or request information, as well as persons about whom information exists
- in government records.
-
- 5. The Federal Government should ensure a wide diversity of sources of
- access, private as well as governmental, to public information.
-
- Although sources of access may change over time and because of advances in
- technology, government agencies have an obligation to public to encourage
- diversity.
-
- 6. The Federal Government should not allow cost to obstruct the people's
- access to public information.
-
- Costs incurred by creating, collecting, and processing information for the
- government's own purposes should not be passed on to people who wish to
- utilize public information.
-
- 7. The Federal Government should ensure that information about government
- information is easily available and in a single index accessible in a
- variety of formats.
-
- The government index of public information should be in addition to
- inventories of information kept within individual government agencies.
-
- 8. The Federal Government should guarantee the public's access to public
- information, regardless of where they live and work, through national
- networks like the Depository Library Program.
-
- Government agencies should periodically review such programs as well as
- the emerging technology to ensure that access to public information
- remains inexpensive and convenient to the public.
-
- Conclusion
-
- The National Commission on Libraries and Information Science offers these
- Principles of Public Information as a foundation for the decisions made
- throughout the Federal Government and the nation regarding issues of
- public information. We urge all branches of the Federal Government, state
- and local governments and the private sector to utilize these principles
- in the development of information policies and in the creation, use,
- dissemination and preservation of public information. We believe that in
- so acting, they will serve the best interests of the nation and the people
- in the Information Age.
-
- ---
-
- [Note: H. Keith Henson is the same guy who circulated that letter to AT&T and
- started the call for a general boycott against them.]
-
- The long running Alcor/email case against the County and City of Riverside, CA
- was settled out of court in April of this year. The announcement was delayed
- until all parties had signed off, and the check had cleared the bank :-).
-
- The Alcor Life Extension Foundation (a non-profit cryonics organization
- --alcor@cup.portal.com) ran a BBS for members and prospective members from
- early 1987 through January 12, 1988. On that day, the BBS computer was removed
- under a warrant to take the computer (but no mention of any contained email) in
- connection with the investigation into the death of 83-year-old Dora Kent.
- (Mrs. Kent was placed into cryonic suspension by Alcor in December of 1987.
- During and following the investigation, Alcor staff members were publicly
- accused by county officials of murder, theft, and building code violations. No
- charges were ever filed and the investigation was officially closed three years
- later.)
-
- In December of 1988 Keith Henson filed a civil suit to force an investigation
- of the apparent violations of the Electronic Communication Privacy Act by the
- FBI, but the case was dismissed by the now convicted Judge Aguilar.
-
- In early 1990, just before the statute of limitations ran out, Henson and
- 14 others (of the roughly 50 people who had email on the system) filed a
- civil action against a number of officials and the County and City of
- Riverside, CA under Section 2707 of the Electronic Communication Privacy
- Act which forbids inspecting or denying access to email without a warrant.
-
- Some time after the case was filed, the Electronic Frontier Foundation came
- into existence in response to law enforcement abuses involving a wide spectrum
- of the online community. EFF considered this case an important one, and helped
- the plaintiffs in the case by locating pro bono legal help. While the case was
- being transferred, the County and City offered a settlement which was close to
- the maximum damages which could have been obtained at trial. Although no
- precedent was set because the case did not go to trial, considerable legal
- research has been done, and one judgment issued in response to the Defendants'
- Motion to Dismiss. The legal filings and the responses they generated from the
- law firm representing the County/City and officials are available by email from
- mnemonic@eff.org or (with delay) from hkhenson@cup.portal.com. (They are also
- posted on Portal.)
-
- The Plaintiffs were represented by Christopher Ashworth of Garfield, Tepper,
- Ashworth and Epstein in Los Angeles (408-277-1981). The only significant item
- in the settlement agreement was the $30k payment to the plaintiffs.
-
- ---
-
-
- Title: TRW Accused of Exploiting Consumers
-
- Six states have sued TRW Inc., charging that its credit bureau division
- secretly grades consumers on their bill-paying ability -- sometimes with
- inaccurate information -- and sells confidential mail to junk mailers. The NY
- State suit also charges TRW with providing inaccurate information about
- consumers to banks and other credit grantors, which often results in denied
- credit. Texas, Alabama, Idaho, Michigan, and California have filed another
- suit in State District Court in Dallas TX. (Reuters report in the San
- Francisco Chronicle, 10Jul91, p.C1)
-
-
- ---
-
- Subject: Houston City Hall voice-mail prank
-
- Houston acquired an AT&T telephone system in 1986 for $28M, but configured it
- with no passwords required for accessing voice mail. Thus, it should not
- surprise any of you to hear that recently a "prankster intercepted and rerouted
- confidential telephone messages from voice-mail machines in City Hall,
- prompting officials to pull the plug on the telephone system." Messages were
- being delivered to nonintended recipients. [Source: San Francisco Chronicle,
- 20Jul91, p.A5]
-
- [Also noted by Steve Bellovin]
-
- Subject: The voice-mail shuffle at City Hall
-
- ... A few stations even played quick snippets from one message, which appeared
- to be a kind of verbal "love letter" left for someone. Needless to say, the
- intended recipient was not the actual recipient. The perpetrator evidently
- would somehow try to simlulate a message break tone before each misdirected
- message by whistling a tone on the recording.
-
- While some of the redirected messages were, in some people's opinion, harmless,
- others were matters of City and State affairs, and the ramifications of these
- messages not being received were more than trivial. Needless to say, the
- service was down the next day for "upgrade modification".
-
- As one newscast put it at the end of their story, "when you leave a message at
- City Hall, don't leave one you wouldn't want repeated in public."
-
- ---
-
- Title: "How Did They Get My Name?"
-
- [From NEWSWEEK, 6/3/91, p.40]:
-
- Consumers are growing more uneasy about threats to privacy -- and are fighting
- back.
-
- "We don't have to worry about Big Brother anymore," says Evan Hendricks,
- publisher of Privacy Times. "We have to worry about little brother." Until
- recently, most privacy fears focused on the direct-mail indistry; now people
- are finding plenty of other snoops.
-
- Suddenly privacy is a very public issue. Privacy scare stories are becoming
- a staple of local TV news. Now Congress is scrambling to bring some order to
- the hodepodge of privacy and technology laws, and the U.S. Office of
- Consumer Affairs has targeted privacy as one of its prime concerns. Advocacy
- groups like the Consumer Federation of America and the American Civil Liberties
- cy as one the hot-button issues for the '90s.
-
- Concern is on the rise because consumers are finding that their lives are an
- open book.
-
- Privacy activists warn that the bigger threat comes from business. Citicorp
- and other data merchants are even pilot testing systems in supermarkets that
- will record your every purchase. "Everything we do, every transaction we
- engage in goes into somebody's computer," says Mary Culnan, a Georgetown
- University associate professor of business administration.
-
- How much others know about you can be unsettling.
-
- In the '80s, the controls were melting away, says Hendricks.
-
- "Reagan came in and said, 'We're going to get government regulators off
- the backs of business.' That sent signals to the private sector that 'you
- can use people's personal information any way you want.'"
-
- Consumers are beginning to fight back. The watershed event was a fight
- over Lotus MarketPlace: Households. New York Telephone got nearly
- 800,000 "opt out" requests when it wanted to peddle its customer list;
- the plan was shelved.
-
- With the MarketPlace revolt, a growing right-to-privacy underground
- surfaced for the first time. Privacy has become one of the most
- passionately argued issues on computer networks like the massive
- Internet and the WELL (an on-line service that has become a favorite
- electronic hangout for privacy advocates and techie journalists).
-
- Some privacy activists look hopefully across the Atlantic. The
- European Community is pushing tough new data rules to take effect after
- 1992. The Privacy Directive relies on consumer consent; companies would
- have to notify consumers each time they intend to pass along personal
- information. The direct-marketing industry claims the regulations would
- be prohibitively expensive.
-
- U.S. firms might find another incentive to change. Companies don't want
- to alienate privacy-minded customers. Then consumers might get some of
- their privacy back--not necessarily beacuse it's the law, or even because
- it's right, but because it's good business.
-
-
- "Would New Laws Fix the Privacy Mess?" (also from Newsweek in sidebar)
-
- Since the mid-1960s, Congress has enacted no fewer than 10
- privacy laws. And yet a national right to privacy is far from firmly
- established. "It's easy to preach about the glories of privacy," says
- Jim Warren, who organized a recent "Computers, Freedom & Privacy"
- conference. "But it's hard to implement policies without messing things
- up."
-
- That hasn't stopped people from trying. James Rule, a State University
- of New York sociology professor, says that new legislation is warranted
- "on the grounds that enough is enough. Privacy infringement produces a
- world that almost nobody likes the look of."
-
- Last week a Senate task force recommended extending privacy laws to cover
- cordless phones. One bill would create a federal "data-protection
- board" to oversee business and governmental use of electronic
- information. Another would apply the Freedom of Information Act to
- electronic files as well as paper.
-
- In this technological age, how much privacy Americans enjoy will depend
- partly on how high a price they are willing to pay to keep it.
-
-
- ---
-
-
- AT&T's announcement from the company's internal News Briefs describing
- their victory in Harold Greene's courtroom:
-
-
- AT&T NEWS BRIEFS
- [All items are today's date unless otherwise noted]
-
- Friday, July 26, 1991
-
- FREEDOM -- Phone lines were cleared Thursday for the seven
- regional phone companies to provide electronic information such as
- stock quotes and sports scores. ... USA Today, 1A. [Judge Harold]
- Greene simultaneously stayed his order, however, to permit all
- appeals to be heard, which raised the possibility its effect could
- be delayed for months. His decision is expected to draw fierce
- opposition. ... Washington Post, A1. ... Today's ruling did not
- change the restrictions that bar the Bell companies from entering
- the long-distance telephone industry or manufacturing telephone
- equipment, but the appeals court ruling that prompted today's
- decision also recommended that Judge Greene apply more flexible
- legal standards in considering these restrictions. ... Herb
- Linnen, AT&T spokesman, said the company had never objected to the
- Bell companies' entry into the information services market,
- provided that they remained excluded from the equipment
- manufacturing and long-distance industries. ... New York Times,
- B1. ... [The] ruling also moves the regional phone companies a
- step closer to being able to compete for cable television
- customers. ... New York Newsday, p. 5. ... The 71-page opinion
- noted that an appeals court decision last spring left no other
- choice. ... Wall Street Journal, B1. Also all major newspapers.
- Regardless of the legal maneuvering involving the regional
- telephone companies, AT&T plans to offer what it calls a Smart
- Phone, a telephone-and-video-screen device, as soon as next
- summer, Ray Zardetto, a company spokesman, said yesterday. ...
- "You can call up stock reports, for instance," Zardetto said about
- one use for the Smart Phone. "Whatever part of the stock report
- you want will run across the screen. Or you can preprogram your
- pizza order from your favorite pizza parlor, push a button and it
- goes across the network to his Smart Phone and it'll be
- delivered." New York Newsday, p. 35.
-
- ---
-
-
- THE COMPUTER SECURITY EVENT OF THE YEAR
-
- It says, in part:
-
- The 18th Annual Computer Security Conference and National Exhibition--
- the largest ever--will be held in Miami at the Fontainebleau Hilton Hotel
- on NOvember 11-14, 1991. With over 110 speakers, the Security Event of the
- Year, sponsored by the Computer Security Institute, will address the full
- range of issues facing computer security practitioners in business and
- government.
-
- ...
-
- Conference highlights include:
-
- *Tom Peltier on "Information Security Approaches the Second Millenium."
-
- *Scott Charney from the US Department of Justice with a practical look on
- what the Department of Justice is doing to prosecute computer crime.
-
- *Harry DeMaio from Deloitte & Touche, who will address the topic "Effective
- Information Protection in a Complex Environment."
-
- *Cameron Carey of Computer Security Placement Specialists, on the job
- market outlook for computer security professionals.
-
- *Dr. Lance Hoffman of George Washington University will address the topic
- "Computer Security: We're Not Just Talking To Ourselves Anymore!"
-
- Also, two of the industry's leading lights--Bill Murray of Deloitte &
- Touce and Donn Parker of SRI International--will debate some of the key
- issues in computer security.
-
- Over a thousand computer security professionals are expected to attend
- this premiere event, which also features the largest compiuter security
- products trade show in the United States.
-
-
- Contact is Philip Chapnick, (415)905-2267.
-
- Computer Security Institute: (415)905-2200 voice, 905-2234 fax
-
-
-
- [End of CyberTimes (Vox Populi) NIA072 01JAN91-01AUG91 Edition]
-
- ----------------------------------------------------------------------------
-
-
- Greetings. Well, this completes issue number 72. Expect to see issue 73
- in about 2 months or so. We do not have enough material to complete it yet,
- so if you would like to contribute, please contact us at nia@nuchat.sccsi.com
- or by getting ahold of one of our staff and/or contributors.
-
- If you would like to write to Len Rose, he can be reached at:
- Len Rose
- Federal Prison Camp
- Seymour Johnson AFB
- Caller Box 8004
- Goldsboro, NC 27531-5000
- We're sure Len could use the mail. He can be reached there for oh, say, the
- next ten months or so. Our sympathies go to him and his family.
-
- Concerning the news, Cybertimes, we are always looking for submissions. If
- you see an article in your local paper, please type it up and send it in.
-
- We are also accepting donations of used and/or obsolete computer equipment.
- We are willing to cover the cost of postage to ship it to Texas. As soon as we
- can get the Kludge operating, we will set up an NIA home system where all the
- issues will be online for downloading as well as reading.
-
- With regards to the Hacker Manifeso file, Erik Bloodaxe is no longer in
- the underground community. This is an old file that was dug up from the days
- when he was still hacking. Best of luck to you and your associates in your new
- endeavour, Erik.
-
- Attention Internet Subscribers: Plese tell us when you are moving or
- losing your account so that we may keep the maillist current. Back issues
- may be found at the CuD Archive Server [ftp.sc.widener.edu /pub/cud/nia] and
- the EFF Server [ftp.eff.org /cud/nia].
-
- We will soon have an AE line (no shit!) running HST for those of you
- without InterNet access.
-
- Until next time...
- JD & LMcD
-
- "The New York Times is read by people who run the country.
- The Washington Post is read by people who think they run the country.
- The National Enquirer is read by people who think that Elvis is alive and
- running the country..."
- - Robert J. Woodhead
-
- [End of issue NIA072]
-
-