home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 64.1 KB | 1,356 lines |
- ---[ Phrack Magazine Volume 8, Issue 52 January 26, 1998, article 19 of 20
-
-
- -------------------------[ P H R A C K W O R L D N E W S
-
- Phrack World News - 52
-
- New categorization:
- -[ Stories
- -[ Book Releases
- -[ Conventions
- -[ Other Headlines of Interest
-
- --------[ Issue 52
-
-
- 0x1: Hacker Acquitted & Iraq Computerises
- 0x2: The Impact of Encryption on Public Safety
- 0x3: Urban Ka0s -- 26 Indonesian Servers Haxed
- 0x4: Hacker accused of sabotaging Forbes computers
- 0x5: Privacy, Inc. Unveils its Internet Background Check
- 0x6: Commerce Dept encryption rules declared unconstitutional
- 0x7: The Million Dollar Challenge
- 0x8: High Profile Detainee Seeks Legal Help
- 0x9: Kevin Mitnick Press Release
- 0xa: SAFE crypto bill cracked again
- 0xb: RC5 Cracked - The unknown message is...
- 0xc: Kashpureff in custody.
- 0xd: XS4ALL refuses Internet tap
- 0xe: The FCC Wants V-Chip in PCs too
-
- 1x1: Book Title: Underground (review)
- 1x2: Book Title: The Electronic Privacy Papers
- 1x3: Book Title: "Computer Security and Privacy: An Information Sourcebook..
-
- 2x0: Convention: <none>
-
- 3x1: Misc: Civil Liberties Groups ask FCC to Block FBI Proposal
- 3x2: Misc: Anti-Spam Bills in Congress
- 3x3: Misc: Justice Dept Charges Microsoft..
- 3x4: Misc: Small Minds Think Alike
- 3x5: Misc: Cyber Promotions tossed offline
-
- 0x1>-------------------------------------------------------------------------
-
- [submitted by: the wizard of id]
-
- Phrack,
-
- I thought that you guys may be able to make use of these articles which I
- found in my newspaper's IT section. Perhaps you should pass them on to the
- editors of Phrack World News.
-
- <start article 1>
-
- Hacker Acquitted
- ================
- Extract from The Age, Victoria, Australia. -Tuesday
- 11/25/97
-
- The US Air Force failed last Friday to convince Woolwich Crown Court in
- the UK that Matthew Bevan, 23, hacked into its secret files with his home
- computer. Computer guru Bevan was cleared of all accusations, which led to
- fears of US national security risk. He was charged with three offences of
- "unauthorised access and modification" into sensitive research and
- development files at New York's Griffiss Air Force Base and Lockheed Space
- and Missle Company in California via the Internet.
-
-
- <end article 1>
-
- The article is accompanied by a very cool picture of Bevan in a black
- suit, wearing mirrored sunglasses. :)
-
- <start article 2>
-
- Iraq Computerises
- =================
- Extract from The Age, Victoria, Australia. -Tuesday
- 11/25/97
-
- To conceal its deadliest arms from U.N. weapons inspectors, Iraq increasingly
- has turned to computers, including American brands sold to Baghdad since
- the end of the 1991 Persian Gulf War in violation of international sanctions,
- according to US officials and U.N. diplomats.
-
- Iraq is using mostly Western-made computers for two cirtical functions: To
- transfer data from bulky paper to small disks that they can easilly
- disperse, making the information difficult for U.N. weapons inspection
- teams to track.
-
- For research and development in all four categories of weapons Iraq has
- been forbidden from keeping under terms of the U.N. resolution ending the
- war - nuclear, chemical and biological weapons and long-rnge missiles.
-
- Because of shifting tactics, computer specialists have become an ever more
- important component of the weapons inspections teams, US and U.N. sources
- say.
-
- Their work often involves digging into hard drives and unearthing material
- that was erased after being transferred to disks.
-
- <end article 2>
-
- 0x2>-------------------------------------------------------------------------
-
- [submitted by: Mike Kretsch]
-
- Statement of Louis J. Freeh, Director
- Federal Bureau of Investigation
-
- Before the Permanent Select Committee on
- Intelligence, United States House of Representatives
- Washington, D. C.
- September 9, 1997
-
- This man must be stopped. For other fun reading,
- check out his statements about the FBI's International
- Crime fighting efforts. Errrr. Wasnt international
- supposed to be CIA and domestic FBI?
-
-
- The Impact of Encryption
- on Public Safety
-
-
- Statement of Louis J. Freeh, Director
- Federal Bureau of Investigation
-
- Before the Permanent Select Committee on Intelligence
- United States House of Representatives
-
- Washington, D. C.
- September 9, 1997
-
- Mr. Chairman and members of the committee, I appreciate the opportunity to
- discuss the issue of encryption and I applaud your willingness to deal with
- this vital public safety issue.
-
- The looming spectre of the widespread use of robust, virtually unbreakable
- encryption is one of the most difficult problems confronting law enforcement
- as the next century approaches. At stake are some of our most valuable and
- reliable investigative techniques, and the public safety of our citizens.
- We believe that unless a balanced approach to encryption is adopted that
- includes a viable key management infrastructure that supports immediate
- decryption capabilities for lawful purposes, our ability to investigate
- and sometimes prevent the most serious crimes and terrorism will be severely
- impaired. Our national security will also be jeopardized.
-
- For law enforcement, framing the issue is simple. In this time of dazzling
- telecommunications and computer technology where information can have
- extraordinary value, the ready availability of robust encryption is
- essential. No one in law enforcement disputes that. Clearly, in today's
- world and more so in the future, the ability to encrypt both contemporaneous
- communications and stored data is a vital component of information security.
-
- As is so often the case, however, there is another aspect to the encryption
- issue that if left unaddressed will have severe public safety and national
- security ramifications. Law enforcement is in unanimous agreement that the
- widespread use of robust unbreakable encryption ultimately will devastate
- our ability to fight crime and prevent terrorism. Unbreakable encryption
- will allow drug lords, spies, terrorists and even violent gangs to
- communicate about their crimes and their conspiracies with impunity. We wll
- lose one of the few remaining vulnerabilities of the worst criminals and
- terrorists upon which law enforcement depends to successfully investigate
- and often prevent the worst crimes.
-
- For this reason, the law enforcement community is unanimous in calling for
- a balanced solution to this problem. Such a solution must satisfy both the
- commercial needs of industry for strong encryption and law enforcement's
- public safety decryption needs. In our view, any legislative approach that
- does not achieve such a balanced approach seriously jeopardizes the
- long-term viability and usefulness of court-authorized access to transmitted
- as well as stored evidence and information. Electronic surveillance and
- search and seizure are techniques upon which law enforcement depends to
- ensure public safety and maintain national security.
-
- One such balanced solution to this problem is key recovery encryption.
- Under this approach, a decryption "key" for a given encryption product is
- deposited with a trustworthy key recovery agent for safe keeping. The key
- recovery agent could be a private company, a bank, or other commercial or
- government entity that meets established trustworthiness criteria. Should
- encryption users need access to their encrypted information, they could
- obtain the decryption key from the key recovery agent. Additionally, when
- law enforcement needs to decrypt criminal-related communications or computer
- files lawfully seized under established legal authorities, they too, under
- conditions prescribed by law and with the presentation of proper legal
- process, could obtain the decryption key from the key recovery agent. This
- is the only viable way to permit the timely decryption of lawfully seized
- communications or computer files that are in furtherance of criminal
- activity.
-
- The decryption key or information would be provided to the law enforcement
- agency under very strict controls and would be used only for its intended
- public safety purpose. Under this approach, the law-abiding would gain the
- benefits of strong, robust encryption products and services with emergency
- decryption capabilities and public safety and national security would be
- maintained--as manufacturers produce and sell encryption products that
- include features that allow for the immediate decryption of criminal-related
- encrypted communications or electronic information.
-
- This solution meets industry's information security and communications
- privacy needs for strong encryption while addressing law enforcement's
- public safety needs for immediate decryption when such products are used
- to conceal crimes or impending acts of terrorism or espionage.
-
- Some have argued that government policy makers should step aside and let
- market forces solely determine the direction of key recovery encryption,
- letting market forces determine the type of technologies that will be used
- and under what circumstances. They argue that most corporations that see
- the need for encryption will also recognize the need for, and even insist
- on, key recovery encryption products to secure their electronically stored
- information and to protect their corporate interests should an encryption
- key be lost, stolen or used by a rogue employee for extortion purposes.
-
- We agree that rational thinking corporations will act in a prudent manner
- and will insist on using key recovery encryption for electronically stored
- information. However, law enforcement has a unique public safety requirement
- in the area of perishable communications which are in transit (telephone
- calls, e-mail, etc.). It is law enforcement, not corporations, that
- has a need for the immediate decryption of communications in transit. There
- is extraordinary risk in trusting public safety and national security to
- market forces that rightfully are protecting important but unrelated
- interests. Law enforcement's needs will not be adequately addressed by
- this type of an approach.
-
- It is for this reason that government policy makers and Congress should
- play a direct role in shaping our national encryption policy and adopt a
- balanced approach that addresses both the commercial and the public safety
- needs. The adverse impact to public safety and national security associated
- with any type of "wait and see" or voluntary market force approach would
- be far too great of a price for the American public to pay.
-
- Several bills have recently been introduced which address encryption.
- Language in some of the proposed bills makes it unlawful to use encryption
- in the furtherance of criminal activity and set out procedures for law
- enforcement access to stored decryption keys in those instances where
- key recovery encryption was voluntarily used. Only one of these bills,
- S. 909, comes close to meeting our core public safety, effective law
- enforcement, and national security needs. S. 909 takes significant strides
- in the direction of protecting public safety by encouraging the use of key
- recovery encryption through market based incentives and other inducements.
- All of the other bills currently under consideration by the Congress, to
- include S. 376, S. 377 , and H.R. 695, would have a significant negative
- impact on public safety and national security and would risk great harm
- to our ability to enforce the laws and protect our citizens if enacted.
-
- Unfortunately, S. 909 still does not contain sufficient assurances that
- the impact on public safety and effective law enforcement caused by the
- widespread availability of encryption will be adequately addressed. We look
- forward to working with you to develop legislative accommodations that
- adequately address the public safety needs of law enforcement and a balanced
- encryption policy.
-
- Further, some argue the encryption "Genie is out of the bottle," and that
- attempts to influence the future use of encryption are futile. I do not
- believe that to be the case. Strong encryption products that include
- decryption features for lawful purposes can, with government and industry
- support, become the standard for use in the global information
- infrastructure.
-
- No one contends that the adoption of a balanced encryption policy will
- prevent all criminals, spies and terrorists from gaining access to and
- using unbreakable encryption. But if we, as a nation, act responsibly
- and only build systems and encryption products that support and include
- appropriate decryption features, all facets of the public's interest can
- be served.
-
- And as this committee knows, export controls on encryption products exist
- primarily to protect national security and foreign policy interests.
- However, law enforcement is more concerned about the significant and
- growing threat to public safety and effective law enforcement that would
- be caused by the proliferation and use within the United States of a
- communications infrastructure that supports the use of strong encryption
- products but that does not support law enforcement's immediate decryption
- needs. Without question, such an infrastructure will be used by dangerous
- criminals and terrorists to conceal their illegal plans and activities
- from law enforcement, thus inhibiting our ability to enforce the laws
- and prevent terrorism.
-
- Congress has on many occasions accepted the premise that the use of
- electronic surveillance is a tool of utmost importance in terrorism cases
- and in many criminal investigations, especially those involving serious
- and violent crime, terrorism, espionage, organized crime, drug-trafficking,
- corruption and fraud. There have been numerous cases where law enforcement,
- through the use of electronic surveillance, has not only solved and
- successfully prosecuted serious crimes and dangerous criminals, but has
- also been able to prevent serious and life-threatening criminal acts. For
- example, terrorists in New York were plotting to bomb the United Nations
- building, the Lincoln and Holland tunnels, and 26 Federal Plaza as well as
- conduct assassinations of political figures. Court-authorized electronic
- surveillance enabled the FBI to disrupt the plot as explosives were being
- mixed. Ultimately, the evidence obtained was used to convict the
- conspirators. In another example, electronic surveillance was used to
- prevent and then convict two men who intended to kidnap, molest and then
- kill a male child.
-
- Most encryption products manufactured today do not contain features that
- provide for immediate law enforcement decryption. Widespread use of
- unbreakable encryption or communications infrastructure that supports the
- use of unbreakable encryption clearly will undermine law enforcement's
- ability to effectively carry out its public safety mission and to combat
- dangerous criminals and terrorists.
-
- This is not a problem that will begin sometime in the future. Law
- enforcement is already encountering the harmful effects of encryption
- in many important investigations today. For example:
-
- convicted spy Aldrich Ames was told by the Russian Intelligence
- Service to encrypt computer file information that was to be passed
- to them. an international terrorist was plotting to blow up 11
- U.S.-owned commercial airliners in the Far East. His laptop computer
- which was seized during his arrest in Manilla contained encrypted
- files concerning this terrorist plot. a subject in a child pornography
- case used encryption in transmitting obscene and pornographic images
- of children over the Internet. a major international drug trafficking
- subject recently used a telephone encryption device to frustrate
- court-approved electronic surveillance.
-
- Requests for cryptographic support pertaining to electronic surveillance
- interceptions from FBI field offices and other law enforcement agencies
- have steadily risen over the past several years. For example, from 1995
- to 1996, there was a two-fold increase (from 5 to 12) in the number of
- instances where the FBI's court-authorized electronic efforts were frustrated
- by the use of encryption products that did not allow for lawful law
- enforcement decryption.
-
- Over the last three (3) years, the FBI has also seen the number of
- computer-related cases utilizing encryption and/or password protection
- increase from 20 or two (2) percent of the cases involving electronically
- stored information to 140 or seven (7) percent. These included the use of
- 56-bit data encryption standard (DES) and 128-bit "pretty good privacy"
- (PGP) encryption.
-
- Just as when the Congress so boldly addressed the digital telephony issue
- in 1994, the government and the nation are again at an historic crossroad
- on this issue. The Attorney General and the heads of federal law enforcement
- agencies as well as the presidents of several state and local law enforcement
- associations recently sent letters to every member of Congress urging the
- adoption of a balanced encryption policy. In addition, the International
- Association of Chiefs of Police, the National Sheriff's Association and
- the National District Attorneys Association have all enacted resolutions
- supporting a balanced encryption policy and opposing any legislation that
- undercuts or falls short such a balanced policy.
-
- If public policy makers act wisely, the safety of all Americans will be
- enhanced for decades to come. But if narrow interests prevail, then law
- enforcement will be unable to provide the level of protection that people
- in a democracy properly expect and deserve.
-
- Conclusion
-
- We are not asking that the magnificent advances in encryption technology
- be abandoned. We are the strongest proponents of robust, reliable encryption
- manufactured and sold by American companies all over the world. Our position
- is simple and, we believe, vital. Encryption is certainly a commercial
- interest of great importance to this great nation. But it's not merely a
- commercial or business issue. To those of us charged with the protection of
- public safety and national security, encryption technology and its
- application in the information age--here at the dawn of the 21st century
- and thereafter--will become a matter of life and death in many instances
- which will directly impact on our safety and freedoms. Good and sound
- public policy decisions about encryption must be made now by the Congress
- and not be left to private enterprise. Legislation which carefully balances
- public safety and private enterprise must be established with respect to
- encryption.
-
- Would we allow a car to be driven with features which would evade and outrun
- police cars? Would we build houses or buildings which firefighters could not
- enter to save people?
-
- Most importantly, we are not advocating that the privacy rights or personal
- security of any person or enterprise be compromised or threatened. You can't
- yell "fire" in a crowded theater. You can't with impunity commit libel or
- slander. You can't use common law honored privileges to commit crimes.
-
- In support of our position for a rational encryption policy which balances
- public safety with the right to secure communications, we rely on the Fourth
- Amendment to the Constitution. There the framers established a delicate
- balance between "the right of the people to be secure in their persons,
- houses, papers, and effects (today we might add personal computers, modems,
- data streams, discs, etc.) against unreasonable searches and seizures."
- Those precious rights, however, were balanced against the legitimate right
- and necessity of the police, acting through strict legal process, to gain
- access by lawful search and seizure to the conversations and stored evidence
- of criminals, spies and terrorists.
-
- The precepts and balance of the Fourth Amendment have not changed or altered.
- What has changed from the late eighteenth to the late twentieth century is
- technology and telecommunications well beyond the contemplation of the
- framers.
-
- The unchecked proliferation of unbreakable encryption will drastically
- change the balance of the Fourth Amendment in a way which would shock its
- original proponents. Police soon may be unable through legal process and
- with sufficient probable cause to conduct a reasonable and lawful search
- or seizure, because they cannot gain access to evidence being channeled or
- stored by criminals, terrorists and spies. Significantly, their lack of
- future access may be in part due to policy decisions about encryption made
- or not made by the United States. This would be a terrible upset of the
- balance so wisely set forth in the Fourth Amendment on December 15, 1791.
- I urge you to maintain that balance and allow your police departments,
- district attorneys, sheriffs and federal law enforcement authorities to
- continue to use their most effective techniques to fight crime and
- terrorism--techniques well understood and authorized by the framers and
- Congress for over two hundred years.
-
- I look forward to working with you on this matter and at this time would
- be pleased to answer any questions.
-
-
- 0x3>-------------------------------------------------------------------------
-
- Subject: Urban Ka0s -- 26 Indonesian Servers Haxed
-
-
- Greetings Phrack,
-
- Today, our group (Urban Ka0s) and several portuguese Hackers attacked
- several Indonesian servers, in order to defend East Timor rights!
-
- We are Portuguese Hackers Agaisnt Indonesian Tirany.
-
- "Thix Site Was Haxed & Deleted by PHAiT. This attack is not
- against indonesian people but against its government and their
- opression towards the republic of timor. These actions were
- made to honour and remember all the 250 people killed in Dili
- on the 12 november 1991.
-
- As a result all sites belonging to indonesia's goverment were
- erased, the rest only had their webpages changed."
-
- East Timor, One People, One Nation
-
- "Whether it is in Tibet or Poland, the Baltics or the
- South Pacific, Africa or the Caribbean, it has been shown
- that force and repression can never totally suffocate the
- reasons underlying the existence of a people: pride in its
- own identity, capacity to preserve, without restriction,
- everything that identifies it as such, freedom to pass all
- this on to future generations, in brief, the right to manage
- its own destiny."
-
- Xanana GusmĪo
- October 5, 1989
-
- Please inform all ciber citizens of this action.
-
- Our contact is at:
- -- Urban Ka0s --
- http://urbankaos.org
- irc: PT-Net irc.urbankaos.org
-
- 0x4>-------------------------------------------------------------------------
-
- Title: Hacker accused of sabotaging Forbes computers
- Source: Infobeat News
- Author: unknown
- Date: unknown
-
- A former temporary computer technician at business publisher Forbes
- Inc has been charged with sabotage and causing a massive crash of the
- firm's computer network, prosecutors said. According to the complaint
- filed in Manhattan Federal Court and unsealed Monday, George Mario
- Parente, 30, of Howard Beach in the borough of Queens was accused of
- hacking his way into the Forbes' network in April from his home,
- using an unauthorized password. Prosecutors alleged he erased vital
- information including budgets and salary from Forbes' computers
- because he was angry with the company after he was fired.
-
- 0x5>-------------------------------------------------------------------------
-
- Title: Privacy, Inc. Unveils its Internet Background Check
- Source:
- Author: unknown
- Date: August 1, 1997
-
- Aurora, Colorado
-
- Privacy, Inc. (www.privacyinc.com) today released its Internet Background
- Check, a utility that empowers users to determine if they are at risk from
- the plethora of databases that are being placed on the Internet. Searches
- quickly scan through hundreds of databases beng placed on-line by state and
- local governments and law enforcement angencies in categories such as:
-
- * Registered Sex Offenders and Predators
- * Deadbeat Parents
- * Wanted Persons
- * Missing Persons
- * Arrest/Prison
-
- 'The Computer Is Never Wrong'
-
- "Errors and risks of mistaken identity in this data are a key concern," says
- Edward Allburn, founder and president of Privacy, Inc. The recent flurry of
- activity by government and law enforcement agencies to distribute such
- volatile information on the Internet creates an environment that potentially
- places innocent people at risk, especially for mistaken identity.
-
- Advanced technology was incorporated into the development of the Internet
- Background Check with this risk in mind. This technology allows users to
- also search for names that look and/or sound similar to their own while still
- delivering highly focused results that standard Internet search engines
- (such as Yahoo! and Lycos) are incapable of producing.
-
- One More Tool
-
- The release provides one more tool for consumers to protect themselves in the
- Information Age. Additional resources provided by Privacy, Inc. include:
- * Consumer Privacy Guide
- * Government Database Guide
- * Government Dossier Service
- * David Sobel's Legal FAQ
- * Privacy News Archive, updated weekly
-
- Guido, the Cyber-Bodyguard is another utility planned to be released in the
- coming months. Guido will interface with the Internet Background Check to
- automatically alert users via e-mail if/when their name appears in a new or
- updated database, in effect monitoring the Internet so users don't have to.
-
- 0x6>-------------------------------------------------------------------------
-
- Title: Commerce Dept encryption rules declared unconstitutional
- Source: fight-censorship@vorlon.mit.edu
- Author: unknown
- Date: unknown
-
- A Federal judge in San Francisco ruled today that the Commerce
- Department's export controls on encryption products violate the
- First Amendment's guarantees of freedom of speech.
-
- In a 35-page decision, U.S. District Judge Marilyn Patel said the
- Clinton administration's rules violate "the First Amendment on the
- grounds of prior restraint and are, therefore, unconstitutional."
- Patel reaffirmed her December 1996 decision against the State
- Department regulations, saying that the newer Commerce Department
- rules suffer from similar constitutional infirmities.
-
- Patel barred the government from "threatening, detaining,
- prosecuting, discouraging, or otherwise interfering with" anyone
- "who uses, discusses, or publishes or seeks to use, discuss or
- publish plaintiff's encryption programs and related materials."
- Daniel Bernstein, now a math professor at the University of
- Illinois, filed the lawsuit with the help of the Electronic
- Frontier Foundation.
-
- Patel dismissed the State, Energy, and Justice departments and
- CIA as defendants. President Clinton transferred jurisdiction over
- encryption exports from the State to the Commerce department on
- December 30, 1996.
-
- The Justice Department seems likely to appeal the ruling to the
- Ninth Circuit, which could rule on the case in the near future.
-
- 0x7>-------------------------------------------------------------------------
-
- Title: The Million Dollar Challenge
- Source: unknown mail list
-
- Ultimate Privacy, the e-mail encryption program combining ease
- of use with unbreakability.
-
- Ultimate Privacy is serious cryptography. On the Links page we
- have links to other Internet sites that discuss One-Time Pad
- cryptography and why it is unbreakable when properly
- implemented.
-
- Nevertheless, should you wish to try, the first person to be able
- to discern the original message within a year (following the
- simple requirements of the Challenge) will actually receive the
- million dollar prize as specified in the Rules page. The prize
- is backed by the full faith and credit of Crypto-Logic
- Corporation and its insurors.
-
- You might be interested in to know how the Challenge was done. We
- used a clean, non-network-connected computer. After installing
- Ultimate Privacy, one person alone entered the Challenge message
- and encrypted it. After making a copy of the encrypted message,
- we removed the hard disk from the computer and it was
- immediately transported to a vault for a year.
-
- Therefore, the original message is not known by Crypto-Logic
- Corporation staff (other than the first few characters for
- screening purposes), nor are there any clues to the original
- message on any media in our offices.
-
- 0x8>-------------------------------------------------------------------------
-
- Title: High Profile Detainee Seeks Legal Help
- Source: fight-censorship@vorlon.mit.edu
- Author: unknown
- Date: September 3, 1997
-
-
- Mr. Kevin Mitnick has been detained in Federal custody without
- bail on computer "hacking" allegations for over thirty months.
- Having no financial resources, Mr. Mitnick has been appointed
- counsel from the Federal Indigent Defense Panel. As such, Mr.
- Mitnick's representation is limited; his attorney is not permitted
- to assist with civil actions, such as filing a Writ of Habeas
- Corpus.
-
- For the past two years, Mr. Mitnick has attempted to assist in his
- own defense by conducting legal research in the inmate law library
- at the Metropolitan Detention Center (hereinafter "MDC") in Los
- Angeles, California. Mr. Mitnick's research includes reviewing
- court decisions for similar factual circumstances which have
- occurred in his case. MDC prison officials have been consistently
- hampering Mr. Mitnick's efforts by denying him reasonable access
- to law library materials. Earlier this year, Mr. Mitnick's lawyer
- submitted a formal request to Mr. Wayne Siefert, MDC Warden,
- seeking permission to allow his client access to the law library
- on the days set aside for inmates needing extra law library time.
- The Warden refused.
-
- In August 1995, Mr. Mitnick filed an administrative remedy request
- with the Bureau of Prisons complaining that MDC policy in
- connection with inmate access to law library materials does not
- comply with Federal rules and regulations. Specifically, the
- Warden established a policy for MDC inmates that detracts from
- Bureau of Prison's policy codified in the Code of Federal
- Regulations.
-
- Briefly, Federal law requires the Warden to grant additional law
- library time to an inmate who has an "imminent court deadline".
- The MDC's policy circumvents this law by erroneously interpreting
- the phrase "imminent court deadline" to include other factors,
- such as, whether an inmate exercises his right to assistance of
- counsel, or the type of imminent court deadline.
- For example, MDC policy does not consider detention (bail),
- motion, status conference, or sentencing hearings as imminent
- court deadlines for represented inmates. MDC officials use this
- policy as a tool to subject inmates to arbitrary and capricious
- treatment. It appears MDC policy in connection with inmate legal
- activities is inconsistent with Federal law and thereby affects
- the substantial rights of detainees which involve substantial
- liberty interests.
-
- In June 1997, Mr. Mitnick finally exhausted administrative
- remedies with the Bureau of Prisons. Mr. Mitnick's only avenue of
- vindication is to seek judicial review in a Court of Law. Mr.
- Mitnick wishes to file a Writ of Habeas Corpus challenging his
- conditions of detention, and a motion to compel Federal
- authorities to follow their own rules and regulations.
-
- Mr. Mitnick is hoping to find someone with legal experience, such
- as an attorney or a law student willing to donate some time to
- this cause to insure fair treatment for everyone, and to allow
- detainees to effectively assist in their own defense without
- "Government" interference. Mr. Mitnick needs help drafting a
- Habeas Corpus petition with points and authorities to be submitted
- by him pro-se. His objective is to be granted reasonable access
- to law library materials to assist in his own defense.
-
- If you would like to help Kevin, please contact him at the
- following address:
-
- Mr. Kevin Mitnick
- Reg. No. 89950-012
- P.O. Box 1500
- Los Angeles, CA 90053-1500
-
- 0x9>-------------------------------------------------------------------------
-
- Title: Kevin Mitnick Press Release
- Source: Press Release
- Author: Donald C. Randolph
- Date: August 7, 1997
-
- THE UNITED STATES V. KEVIN DAVID MITNICK
-
- I. Proceedings to Date
-
- With 25 counts of alleged federal computer and wire fraud violations still
- pending against him, the criminal prosecution of Kevin Mitnick is
- approaching its most crucial hour. The trial is anticipated to begin in
- January, 1998. In reaching this point, however, Kevin has already
- experienced years of legal battles over alleged violations of the
- conditions of his supervised release and for possession of unauthorized
- cellular access codes.
-
- A. Settling the "Fugitive" Question
-
- The seemingly unexceptional charges relating to supervised release
- violations resulted in months of litigation when the government attempted
- to tack on additional allegations for conduct occurring nearly three years
- after the scheduled expiration of Kevin's term of supervised release in
- December, 1992. The government claimed that Kevin had become a fugitive
- prior to the expiration of his term, thereby "tolling" the term and
- allowing for the inclusion of additional charges. After months of
- increasingly bold assertions concerning Kevin's "fugitive" status,
- evidentiary hearings were held in which the government was forced to
- concede that its original position in this matter was unsupported by the
- facts.
-
- B. Sentencing
-
- In June of this year Kevin was sentenced for certain admitted violations of
- his supervised release and for possession of unauthorized access codes.
- The court imposed a sentence of 22 months instead of the 32 months sought
- by the government. Since Kevin has been in custody since his arrest in
- February 1995, this sentence has been satisfied. We are currently
- preparing a request for release on bail.
-
- During this stage of the proceedings, the government sought to impose
- restrictions on Kevin's access to computers which were so severe as to
- virtually prohibit him from functioning altogether in today's society. The
- proposed restrictions sought to completely prohibit Kevin from "using or
- possessing" all computer hardware equipment, software programs, and
- wireless communications equipment. After arguments that such restrictions
- unduly burdened Kevin's freedom to associate with the on-line computer
- community and were not reasonably necessary to ensure the protection of the
- public, the court modified its restrictions by allowing for computer access
- with the consent of the Probation Office. Nonetheless, the defense
- believes that the severe restrictions imposed upon Mr. Mitnick are
- unwarranted in this case and is, therefore, pursuing an appeal to the Ninth
- Circuit.
-
- II. The Government Seeks to make an Example of Mr. Mitnick
-
- One of the strongest motivating factors for the government in the
- prosecution of Kevin Mitnick is a desire to send a message to other
- would-be "hackers". The government has hyped this prosecution by
- exaggerating the value of loss in the case, seeking unreasonably stiff
- sentences, and by painting a portrait of Kevin which conjures the likeness
- of a cyber-boogie man.
-
- There are a number of objectives prompting the government's tactics in this
- respect. First, by dramatically exaggerating the amount of loss at issue
- in the case (the government arbitrarily claims losses exceed some $80
- million) the government can seek a longer sentence and create a
- high-profile image for the prosecution. Second, through a long sentence
- for Kevin, the government hopes to encourage more guilty pleas in future
- cases against other hackers. For example, a prosecutor offering a moderate
- sentence in exchange for a guilty plea would be able to use Kevin Mitnick's
- sentence as an example of what "could happen" if the accused decides to go
- to trial. Third, by striking fear into the hearts of the public over the
- dangers of computer hackers, the government hopes to divert scrutiny away
- from its own game-plan regarding the control and regulation of the Internet
- and other telecommunications systems.
-
- III. Crime of Curiosity
-
- The greatest injustice in the prosecution of Kevin Mitnick is revealed when
- one examines the actual harm to society (or lack thereof) which resulted
- from Kevin's actions. To the extent that Kevin is a "hacker" he must be
- considered a purist. The simple truth is that Kevin never sought monetary
- gain from his hacking, though it could have proven extremely profitable.
- Nor did he hack with the malicious intent to damage or destroy other
- people's property. Rather, Kevin pursued his hacking as a means of
- satisfying his intellectual curiosity and applying Yankee ingenuity. These
- attributes are more frequently promoted rather than punished by society.
-
- The ongoing case of Kevin Mitnick is gaining increased attention as the
- various issues and competing interests are played out in the arena of the
- courtroom. Exactly who Kevin Mitnick is and what he represents, however,
- is ultimately subject to personal interpretation and to the legacy which
- will be left by "The United States v. Kevin David Mitnick".
-
- 0xa>-------------------------------------------------------------------------
-
- Title: SAFE crypto bill cracked again
- Source:
- Author: By Alex Lash and Dan Goodin
- Date: September 12, 1997, 8:40 a.m. PT
-
- For the second time in a week, a House committee has made significant
- changes to the Security and Freedom through Encryption (SAFE) Act to
- mandate that domestic encryption products give law enforcement agencies
- access to users' messages.
-
- The changes by the Intelligence Committee, which were passed as a
- "substitute" to SAFE, turn the legislation on its head. The amendment
- follows similar changes two days ago in the House National Security
- Committee.
-
- Initially drafted as a way to loosen U.S. export controls on encryption,
- legislators have instead "marked up" the bill, or amended it at the
- committee level, to reflect the wishes of the Federal Bureau of
- Investigation and other law enforcement agencies that want "wiretap"
- access to all encrypted email and other digital files.
-
- Both the Intelligence and the National Security committees tend to favor
- export controls, because they view encryption as a threat to
- information-gathering activities by U.S. military and law enforcement
- officials.
-
- The Intelligence Committee cited those concerns today when announcing
- the substitute legislation. "Terrorist groups...drug cartels...and those
- who proliferate in deadly chemical and biological weapons are all
- formidable opponents of peace and security in the global society," said
- committee chairman Porter Goss (R-Florida) in a statement. "These bad
- actors must know that the U.S. law enforcement and national security
- agencies, working under proper oversight, will have the tools to
- frustrate illegal and deadly activity and bring international criminals
- to justice."
-
- Opponents of government attempts to regulate encryption, including a
- leading panel of cryptographers, have argued that built-in access to
- encrypted files would in fact threaten national and individual security
- and be prohibitively expensive to implement.
-
- The amended legislation calls for all imported or U.S.-made encryption
- products that are manufactured or distributed after January 31, 2000, to
- provide "immediate access" to the decrypted text if the law officials
- present a court order. "Law enforcement will specifically be required to
- obtain a separate court order to have the data, including
- communications, decrypted."
-
- A markup of the same bill in the House Commerce Committee was postponed
- today for two weeks. It will be the fifth such committee vote on the
- bill since its introduction.
-
- The Intelligence and National Security amendments this week are by no
- means a defeat of the bill. Instead, they would have to be reconciled
- with versions of the bill already approved by the House Judiciary and
- International Relations committees. That reconciliation most likely
- would have to happen on the House floor. The rapidly fragmenting bill
- still has several layers of procedure to wend through before it reaches
- a potential floor vote, but people on both sides of the encryption
- debate openly question if the bill--in any form--will make it that far
- this year.
-
- The legislation has 252 cosponsors, more than half of the House
- membership.
-
- 0xb>-------------------------------------------------------------------------
-
- Title: RC5 Cracked - The unknown message is...
- Source:
- Author: David McNett <nugget@slacker.com>[:]
- Date: Mon, 27 Oct 1997 08:43:38 -0500
-
-
- -----BEGIN PGP SIGNED MESSAGE-----
- Hash: SHA1
-
- It is a great privilege and we are excited to announce that at 13:25
- GMT on 19-Oct-1997, we found the correct solution for RSA Labs' RC5-
- 32/12/7 56-bit secret-key challenge. Confirmed by RSA Labs, the key
- 0x532B744CC20999 presented us with the plaintext message for which we
- have been searching these past 250 days.
-
- The unknown message is: It's time to move to a longer key length
-
- In undeniably the largest distributed-computing effort ever, the
- Bovine RC5 Cooperative (http://www.distributed.net/), under the
- leadership of distributed.net, managed to evaluate 47% of the
- keyspace, or 34 quadrillion keys, before finding the winning key. At
- the close of this contest our 4000 active teams were processing over
- 7 billion keys each second at an aggregate computing power equivalent
- to more than 26 thousand Pentium 200's or over 11 thousand PowerPC
- 604e/200's. Over the course of the project, we received block
- submissions from over 500 thousand unique IP addresses.
-
- The winning key was found by Peter Stuer <peter@dinf.vub.ac.be> with
- an Intel Pentium Pro 200 running Windows NT Workstation, working for
- the STARLab Bovine Team coordinated by Jo Hermans
- <Jo.Hermans@vub.ac.be> and centered in the Computer Science
- Department (DINF) of the Vrije Universiteit (VUB) in Brussels,
- Belgium. (http://dinf.vub.ac.be/bovine.html/). Jo's only comments
- were that "$1000 will buy a lot of beer" and that he wished that the
- solution had been found by a Macintosh, the platform that represented
- the largest portion of his team's cracking power. Congratulations
- Peter and Jo!
-
- Of the US$10000 prize from RSA Labs, they will receive US$1000 and
- plan to host an unforgettable party in celebration of our collective
- victory. If you're anywhere near Brussels, you might want to find
- out when the party will be held. US$8000, of course, is being
- donated to Project Gutenberg (http://www.promo.net/pg/) to assist
- them in their continuing efforts in converting literature into
- electronic format for the public use. The remaining US$1000 is being
- retained by distributed.net to assist in funding future projects.
-
- Equally important are the thanks, accolades, and congratulations due
- to all who participated and contributed to the Bovine RC5-56 Effort!
- The thousands of teams and tens of thousands of individuals who have
- diligently tested key after key are the reason we are so successful.
-
- The thrill of finding the key more than compensates for the sleep,
- food, and free time that we've sacrificed!
-
- Special thanks go to all the coders and developers, especially Tim
- Charron, who has graciously given his time and expertise since the
- earliest days of the Bovine effort. Thanks to all the coordinators
- and keyserver operators: Chris Chiapusio, Paul Chvostek, Peter
- Denitto, Peter Doubt, Mishari Muqbil, Steve Sether, and Chris
- Yarnell. Thanks to Andrew Meggs, Roderick Mann, and Kevyn Shortell
- for showing us the true power of the Macintosh and the strength of
- its users. We'd also like to thank Dave Avery for attempting to
- bridge the gap between Bovine and the other RC5 efforts.
-
- Once again, a heartfelt clap on the back goes out to all of us who
- have run the client. Celebrations are in order. I'd like to invite
- any and all to join us on the EFNet IRC network channel #rc5 for
- celebrations as we regroup and set our sights on the next task. Now
- that we've proven the limitations of a 56-bit key length, let's go
- one further and demonstrate the power of distributed computing! We
- are, all of us, the future of computing. Join the excitement as the
- world is forced to take notice of the power we've harnessed.
-
- Moo and a good hearty laugh.
-
- Adam L. Beberg - Client design and overall visionary
- Jeff Lawson - keymaster/server network design and morale booster
- David McNett - stats development and general busybody
-
- 0xc>-------------------------------------------------------------------------
-
- Title: Kashpureff in custody.
- Source: Marc Hurst <mhurst@fastlane.ca>
- Author: Marc Hurst <mhurst@fastlane.ca>
- Date: Fri, 31 Oct 1997 10:40:20 -0500 (EST)
-
-
- Eugene Kashpureff, known for his redirect of the NSI web page,
- was apprehended this morning in Toronto by undercover RCMP
- detectives.
-
- Pending a deportation hearing, he will be returned to New York to
- face Felony Wire Fraud charges that were sworn out against him
- after he had settled out of court with NSI in regard to their
- civil suit.
-
- Early in the week Eugene relinquished control of the Alternic to
- an adhoc industry group and that group will be making an
- announcement in the next few days.
-
- A this time I have no further information to volunteer.
-
- Sincerely
- Marc Hurst
-
- 0xd>-------------------------------------------------------------------------
-
- Title: XS4ALL refuses Internet tap
- Source: Press Release
- Author: Maurice Wessling
- Date: November 13th 1997, Amsterdam, Netherlands.
-
-
- XS4ALL Internet is refusing to comply with an instruction from the
- Dutch Ministry of Justice that it should tap the Internet traffic
- of one of its users as part of an investigation. XS4ALL has
- informed the Ministry that in its view the instruction lacks any
- adequate legal basis. The company's refusal makes it liable for a
- penalty but XS4ALL is hoping for a trial case to be brought in the
- near future so that a court can make a pronouncement.
-
- On Friday October 31st, a detective and a computer expert from the
- Forensic Science Laboratory issued the instruction to XS4ALL. The
- Ministry of Justice wants XS4ALL to tap for a month all Internet
- traffic to and from this user and then supply the information to
- the police. This covers e-mail, the World Wide Web, news groups,
- IRC and all Internet services that this person uses. XS4ALL would
- have to make all the technical arrangements itself.
-
- As far as we are aware, there is no precedent in the Netherlands
- for the Ministry of Justice issuing such a far-reaching
- instruction to an Internet provider. The detectives involved also
- acknowledge as much. Considering that a national meeting of
- Examining judges convened to discuss the instruction, one may
- appreciate just how unprecedented this situation is. Hitherto,
- instructions have mainly been confined to requests for personal
- information on the basis of an e-mail address.
-
- XS4ALL feels obliged in principle to protect its users and their
- privacy. Furthermore, XS4ALL has a commercial interest, since it
- must not run the risk of action being brought by users under Civil
- Law on account of unlawful deeds. This could happen with such an
- intervention by the provider which is not based in law. Finally,
- it is important from the social point of view that means of
- investigation have adequate statutory basis. To comply with the
- instruction could act as an undesirable precedent which could have
- a major impact on the privacy of all Internet users in the
- Netherlands.
-
- XS4ALL has no view on the nature of the investigation itself or
- the alleged crimes. It is happy to leave the court to decide that.
- Nor will XS4ALL make any comment on the content of the study or
- the region in which this is occurring for it is not its intention
- that the investigation should founder. XS4ALL has proposed in vain
- to the examining judge that the instruction be recast in terms
- which ensures the legal objections are catered for.
-
- The Ministry of Justice based its claim on Article 125i of the
- Penal Code. This article was introduced in 1993 as part of the
- Computer Crime Act. It gives the examining judge the option of
- advising third parties during statutory preliminary investigations
- to provide data stored in computers in the interest of
- establishing the truth. According to legal history, it was never
- the intention to apply this provision to an instruction focused on
- the future. Legislators are still working to fill this gap in the
- arsenal of detection methods, by analogy with the Ministry of
- Justice tapping phone lines (125g of the Penal Code). The Dutch
- Constitution and the European Convention on the Protection of
- Human Rights demand a precise statutory basis for violating basic
- rights such as privacy and confidentiality of correspondence. The
- Ministry clearly does not wish to wait for this and is now
- attempting to use Article 125i of the Penal Code, which is not
- intended for this purpose, to compel providers themselves to start
- tapping suspect users. The Ministry of Justice is taking the risk
- of the prosecution of X, in the context of which the instruction
- was issued to XS4ALL, running aground on account of using illegal
- detection methods. Here, again, XS4ALL does not wish to be liable
- in any respect in this matter.
-
- For information please contact:
-
- XS4ALL
- Maurice Wessling
- email: maurice@xs4all.nl
- http://www.xs4all.nl/
-
- 0xf>-------------------------------------------------------------------------
-
- Title: The FCC Wants V-Chip in PCs too
- Source: Cyber-Liberties Update
- Author:
- Date: Monday, November 3, 1997
-
-
- Mandating that all new televisions have built-in censorship technology
- is not the only thing that the Federal Communications Commission (FCC)
- is seeking, said ACLU Associate Director Barry Steinhardt, it is also
- looking to require that the same technology be added to all new personal
- computers.
-
- Last year, culminating a protracted campaign against TV violence,
- Congress passed the Telecommunications Act of 1996, a law requiring that
- new televisions be equipped with the so-called V-chip. The V-chip is a
- computerized chip capable of detecting program ratings and blocking
- adversely rated programs from view.
-
- Now, the FCC has announced that it is soliciting public comments through
- November 24, on the idea of placing V-chips inside personal computers
- since some are capable of delivering television programming.
-
- ^SAt the time the V-chip was being considered we warned that with the
- growing convergence between traditional television (broadcast and cable)
- and the Internet, it was only a matter of time before the government
- would move to require that the V-chip be placed in PC's. Now that has
- happened,^T Steinhardt said.
-
- ^SHardwiring censorship technology into the PC is part of the headlong
- rush to
- a scheme of rating and blocking Internet content that will turn the
- Internet into a bland homogenized medium in which only large corporate
- interest will have truly free speech,^T Steinhardt said.
-
- The ACLU has criticized the mandatory requirement of V-chip arguing that
- it is a form of censorship clearly forbidden by the First Amendment.
-
- ^SAlthough its supporters claim the V-chip gives parents control over
- their
- children's viewing habits, in fact it will function as a governmental
- usurpation of parental control,^T said Solange Bitol, Legislative Counsel
- for the ACLU^Rs Washington National Office.
-
- ^SUnder the legislation, it is the government (either directly or by
- coercing private industry), and not the parents, that will determine how
- programs will be rated. If a parent activates the V-chip, all programs
- with a "violent" rating will be blocked. What kind of violence will be
- censored? Football games? War movies? News reports?^T she added.
-
- The ACLU is opposed to mandatory addition or use of censoring
- technologies and we will be filing comments with the FCC later this
- month. We believe people are smart enough to turn off their television
- sets or PCs on their own if they don^Rt like what they see.
-
- Tell the FCC what you think. Submit comments to them online at
- <http://www.fcc.gov/vchip/>, and send us a copy as well so that we make
- sure your voice is heard. E-mail them to CSehgal@aclu.org.
-
- =-=
-
- To subscribe to the ACLU Cyber-Liberties Update, send a message to
- majordomo@aclu.org with "subscribe Cyber-Liberties" in the body of your
- message. To terminate your subscription, send a message to
- majordomo@aclu.org with "unsubscribe Cyber-Liberties" in the body.
-
-
- 1x1>-------------------------------------------------------------------------
-
- Book Title: Underground
- Poster: George Smith via Crypt Newsletter
-
- Date: 27 Aug 97 00:36:12 EDT
- From: "George Smith [CRYPTN]" <70743.1711@CompuServe.COM>
- Subject: File 5--An "Underground" Book on Australian Hackers Burns the Mind
-
- Source - CRYPT NEWSLETTER 44
-
- AN "UNDERGROUND" BOOK ON AUSTRALIAN HACKERS BURNS THE MIND
-
- Crypt News reads so many bad books, reports and news pieces on
- hacking and the computing underground that it's a real pleasure to
- find a writer who brings genuine perception to the subject.
- Suelette Dreyfus is such a writer, and "Underground," published by
- the Australian imprint, Mandarin, is such a book.
-
- The hacker stereotypes perpetrated by the mainstream media include
- descriptions which barely even fit any class of real homo sapiens
- Crypt News has met. The constant regurgitation of idiot slogans
- -- "Information wants to be free," "Hackers are just people who
- want to find out how things work" -- insults the intelligence.
- After all, have you ever met anyone who wouldn't want their access
- to information to be free or who didn't admit to some curiosity
- about how the world works? No -- of course not. Dreyfus'
- "Underground" is utterly devoid of this manner of patronizing
- garbage and the reader is the better for it.
-
- "Underground" is, however, quite a tale of human frailty. It's
- strength comes not from the feats of hacking it portrays --and
- there are plenty of them -- but in the emotional and physical cost
- to the players. It's painful to read about people like Anthrax, an
- Australian 17-year old trapped in a dysfunctional family.
- Anthrax's father is abusive and racist, so the son --paradoxically
- -- winds up being a little to much like him for comfort,
- delighting in victimizing complete strangers with mean jokes and
- absorbing the anti-Semitic tracts of Louis Farrakhan. For no
- discernible reason, the hacker repetitively baits an old man
- living in the United States with harassing telephone calls.
- Anthrax spends months of his time engaged in completely pointless,
- obsessed hacking of a sensitive U.S. military system. Inevitably,
- Anthrax becomes entangled in the Australian courts and his life
- collapses.
-
- Equally harrowing is the story of Electron whose hacking pales in
- comparison to his duel with mental illness. Crypt News challenges
- the readers of "Underground" not to squirm at the image of
- Electron, his face distorted into a fright mask of rolling eyes
- and open mouth due to tardive dyskinesia, a side-effect of being
- put on anti-schizophrenic medication.
-
- Dreyfus expends a great deal of effort exploring what happens when
- obsession becomes the only driving force behind her subjects'
- hacking. In some instances, "Underground's" characters degenerate
- into mental illness, others try to find solace in drugs. This is
- not a book in which the hackers declaim at any great length upon
- contorted philosophies in which the hacker positions himself as
- someone whose function is a betterment to society, a lubricant of
- information flow, or a noble scourge of bureaucrats and tyrants.
- Mostly, they hack because they're good at it, it affords a measure
- of recognition and respect -- and it develops a grip upon them
- which goes beyond anything definable by words.
-
- Since this is the case, "Underground" won't be popular with the
- goon squad contingent of the police corp and computer security
- industry. Dreyfus' subjects aren't the kind that come neatly
- packaged in the
- "throw-'em-in-jail-for-a-few-years-while-awaiting-trial"
- phenomenon that's associated with America's Kevin Mitnick-types.
- However, the state of these hackers -- sometimes destitute,
- unemployable or in therapy -- at the end of their travails is
- seemingly quite sufficient punishment.
-
- Some things, however, never change. Apparently, much of
- Australia's mainstream media is as dreadful at covering this type
- of story as America's. Throughout "Underground," Dreyfus includes
- clippings from Australian newspapers featuring fabrications and
- exaggeration that bare almost no relationship to reality. Indeed,
- in one prosecution conducted within the United Kingdom, the
- tabloid press whipped the populace into a blood frenzy by
- suggesting a hacker under trial could have affected the outcome of
- the Gulf War in his trips through U.S. computers.
-
- Those inclined to seek the unvarnished truth will find
- "Underground" an excellent read. Before each chapter, Dreyfus
- presents a snippet of lyric chosen from the music of Midnight Oil.
- It's an elegant touch, but I'll suggest a lyric from another
- Australian band, a bit more obscure, to describe the spirit of
- "Underground." From Radio Birdman's second album: "Burned my eye,
- burned my mind, I couldn't believe it . . . "
- +++++++++
-
- ["Underground: Tales of Hacking, Madness and Obsession on the
- Electronic Frontier" by Suelette Dreyfus with research by Julian
- Assange, Mandarin, 475 pp.]
-
- Excerpts and ordering information for "Underground" can be found
- on the Web at http://www.underground-book.com .
-
- George Smith, Ph.D., edits the Crypt Newsletter from Pasadena,
- CA.
-
- 1x2>-------------------------------------------------------------------------
-
- Book Title: The Electronic Privacy Papers
- : Documents on the Battle for Privacy in the Age of Surveillance
- by: Bruce Schneier + David Banisar
- publisher: John Wiley 1997
- other: 747 pages, index, US$59.99
-
- _The Privacy Papers_ is not about electronic privacy in general: it covers
- only United States Federal politics, and only the areas of wiretapping
- and cryptography. The three topics covered are wiretapping and the
- Digital Telephony proposals, the Clipper Chip, and other controls on
- cryptography (such as export controls and software key escrow proposals).
-
- The documents included fall into several categories. There are broad
- overviews of the issues, some of them written just for this volume.
- There are public pronouncements and documents from various government
- bodies: legislation, legal judgements, policy statements, and so forth.
- There are government documents obtained under Freedom of Information
- requests (some of them partially declassified documents complete with
- blacked out sections and scrawled marginal annotations), which tell
- the story of what happened behind the scenes. And there are newspaper
- editorials, opinion pieces, submissions to government enquiries, and
- policy statements from corporations and non-government organisations,
- presenting the response from the public.
-
- Some of the material included in _The Privacy Papers_ is available
- online, none of it is breaking news (the cut-off for material appears
- to be mid-to-late 1996), and some of the government documents included
- are rather long-winded (no surprise there). It is not intended to be a
- "current affairs" study, however; nor is it aimed at a popular audience.
- _The Privacy Papers_ will be a valuable reference sourcebook for anyone
- involved with recent government attempts to control the technology
- necessary for privacy -- for historians, activists, journalists,
- lobbyists, researchers, and maybe even politicians.
-
- --
-
- %T The Electronic Privacy Papers
- %S Documents on the Battle for Privacy in the Age of Surveillance
- %A Bruce Schneier
- %A David Banisar
- %I John Wiley
- %C New York
- %D 1997
- %O hardcover, bibliography, index
- %G ISBN 0-471-12297-1
- %P xvi,747pp
- %K crime, politics, computing
-
-
- 1x3>-------------------------------------------------------------------------
-
- Book Title: "Computer Security and Privacy: An Information Sourcebook:
- Topics and Issues for the 21st Century"
-
-
- by Mark W. Greenia
- List: $29.95
- Publisher: Lexikon Services
- Win/Disk Edition
- Binding: Software
- Expected publication date: 1998
- ISBN: 0944601154
-
-
- [PWN: I haven't seen this one in stores, and no further information or
- reviews have been found.]
-
- 3x1>-------------------------------------------------------------------------
-
- CDT POLICY POST Volume 3, Number 12 August 11, 1997
-
- (1) CIVIL LIBERTIES GROUPS ASK FCC TO BLOCK FBI ELECTRONIC SURVEILLANCE
- PROPOSAL
-
- The Center for Democracy and Technology and the Electronic Frontier
- Foundation today filed a petition with the Federal Communications
- Commission to block the FBI from using the 1994 "Digital Telephony" law to
- expand government surveillance powers.
-
- The law, officially known as the "Communications Assistance for Law
- Enforcement Act" (CALEA), was intended to preserve law enforcement
- wiretapping ability in the face of changes in communications technologies.
- In their filing, CDT and EFF argue that the FBI has tried to use CALEA to
- expand its surveillance capabilities by forcing telephone companies to
- install intrusive and expensive surveillance features that threaten privacy
- and violate the scope of the law.
-
- 3x2>-------------------------------------------------------------------------
-
- Anti-Spam Bills in Congress
-
- Source - ACLU Cyber-Liberties Update, Tuesday, September 2, 1997
-
- Unsolicited e-mail advertisement, or "spam," has few fans on the
- net. Court battles have been waged between service providers, such
- as AOL and Compuserve, and spam advertisers, including Cyber
- Promotions, over whether the thousands of messages sent to user
- e-mails can be blocked. Congress and several state legislatures
- have also stepped into the debate and have introduced some bills
- fraught with First Amendment problems because they ban commercial
- speech altogether or are content specific.
-
- [Laws against spam.. oh neat. So, how do they plan on enforcing it?]
-
- 3x3>-------------------------------------------------------------------------
-
- JUSTICE DEPARTMENT CHARGES MICROSOFT WITH VIOLATING 1995 COURT ORDER
-
- Asks Court to Impose $1 Million a Day Fine if Violation Continues
-
- WASHINGTON, D.C. -- The Department of Justice asked a
- federal court today to hold Microsoft Corporation--the world's
- dominant personal computer software company--in civil contempt
- for violating terms of a 1995 court order barring it from
- imposing anticompetitive licensing terms on manufacturers of
- personal computers.
-
- [PWN: Hey Bill.. nah nah nah, thptptptptptptp, nanny nanny boo boo]
-
- 3x4>-------------------------------------------------------------------------
-
- Small Minds Think Alike
- Source - : fight-censorship@vorlon.mit.edu
-
- CyberWire Dispatch Bulletin
-
- Washington --In this boneyard of Washington, DC it doesn't take
- long for big dawgs and small alike to bark. A couple of small
- ones yipped it up today.
-
- Rep. Marge (no relation to Homer) Roukema, R-N.J. and Sen. Lauch
- (??) Faircloth, R-N.C. introduced a bill to amend the
- Communications Act that would ban convicted sex offenders from
- using the Internet.
-
- [PWN: Oh yeah.. that will be easy to enforce.]
-
- 3x5>-------------------------------------------------------------------------
-
- Cyber Promotions tossed offline
-
- Cyber Promotions tossed offline
- By Janet Kornblum
- September 19, 1997, 1:25 p.m. PT
-
- Cyber Promotions, antispammers' enemy No. 1 on the Net, has once again
- been dumped by its access provider.
-
- Backbone provider AGIS cut off Cyber Promotions Wednesday, and the
- company has been scrambling for another ISP since.
-
- [PWN: Hey Samford.. ha ha ha, nanny nanny, thptptptptp.]
-
- "Ping-flood attacks observed originating from the West Coast into AGIS
- and directed to the Washington and Philadelphia routers severely
- degraded AGIS network performance to [an] unacceptable level...AGIS
- had no alternative but to shut off services to Cyber Promotions,"
- reads a statement that Wallace put on his page. He alleged that the
- statement came from an AGIS engineer.
-
- [PWN: If a ping flood took them down this time...]
-
-
-
- ----[ EOF
-
-